IT Glossary - ITU Online IT Training
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Software Licensing

The legal agreements and terms that govern the use, distribution, and redistribution of software.

You will find this term commonly used in Legal, General IT

Software Maintenance

Software maintenance is the process of modifying, updating, and enhancing software applications or systems after their initial deployment, typically to fix bugs, improve performance, or add new features and functionalities.

You will find this term commonly used in Software Development, Maintenance

Software Patch

A piece of software designed to update or fix problems with a computer program.

You will find this term commonly used in Security

Software Piracy

The unauthorized copying, distribution, or use of software. It is illegal and considered a breach of copyright law.

You will find this term commonly used in Legal, Software Management

Software Quality Assurance (SQA)

A means of monitoring the software engineering processes and methods used to ensure quality.

You will find this term commonly used in Software Development, Quality Assurance

Software Repository

A storage location from which software packages may be retrieved and installed on a computer.

You will find this term commonly used in Software Development, Software Management

Software Testing

Software testing is the process of evaluating and verifying the functionality, performance, and quality of software applications or systems through systematic execution of test cases, aiming to identify defects and ensure reliability.

You will find this term commonly used in Software Development, Quality Assurance

Solid Programming

A set of principles designed to improve software maintainability and extendibility by promoting a more loosely coupled and modular architecture.

You will find this term commonly used in Software Development, Programming

Solid State Drive (SSD)

A data storage device that uses integrated circuit assemblies to store data persistently, typically faster and more reliable than traditional hard disk drives (HDDs).

You will find this term commonly used in Storage

Solidity

A contract-oriented programming language for writing smart contracts. It is used for implementing smart contracts on various blockchain platforms, most notably, Ethereum.

You will find this term commonly used in Software Development, Blockchain

Source Code

Source code is the human-readable version of a computer program written in programming languages, containing instructions and logic that define the behavior and functionality of software applications.

You will find this term commonly used in Software Development, Programming Languages

Source Code Management (SCM)

The management of changes to documents, programs, and other information stored as computer files.

You will find this term commonly used in Software Development, Version Control

Spam

Unsolicited or unwanted email messages, often sent in bulk, typically for advertising or phishing purposes.

You will find this term commonly used in Cybersecurity

Spam Filter

Software or hardware mechanisms designed to identify and remove unsolicited or unwanted email messages from an inbox.

You will find this term commonly used in Cybersecurity

Spam Filtering

The use of various methods to block email spam, or unsolicited bulk email.

You will find this term commonly used in Security, Email Systems

Spatial Computing

A computing paradigm that integrates digital information with the physical environment, often using technologies such as augmented reality (AR) and virtual reality (VR).

You will find this term commonly used in AR/VR, General IT

Spatial Database

A database that is optimized to store and query data related to objects in space, including points, lines, and polygons.

You will find this term commonly used in Databases, GIS

Spear Phishing

An email or electronic communications scam targeted towards a specific individual, organization, or business.

You will find this term commonly used in Security, Cybersecurity

Spear Phishing Attack

A targeted attempt to steal sensitive information such as account credentials or financial information from a specific victim, often for malicious reasons.

You will find this term commonly used in Cybersecurity

Specification by Example

An approach to software development that defines software requirements using realistic examples instead of abstract statements.

You will find this term commonly used in Software Development, Agile Methodologies

Speech Recognition

The ability of a computer program to identify words and phrases in spoken language and convert them to a machine-readable format.

You will find this term commonly used in AI, Human-Computer Interaction

Speech Synthesis

The artificial production of human speech.

You will find this term commonly used in AI, Human-Computer Interaction

Speech to Text

The process of converting spoken words into written texts. This technology is often used in voice recognition systems.

You will find this term commonly used in AI, Human-Computer Interaction

Spline

A mathematical function used for creating smooth curves in computer graphics and other fields.

You will find this term commonly used in Computer Graphics, Modeling

Splunk

A software platform to search, analyze and visualize the machine-generated data gathered from the websites, applications, sensors, devices, etc.

You will find this term commonly used in Big Data, Security

Spoofing

The act of masquerading as a valid entity through falsification of data (such as an IP address or username), to gain an illegitimate advantage.

You will find this term commonly used in Cybersecurity

Spyware

Malicious software that secretly gathers information about a user.

You will find this term commonly used in Security

SQL

Structured Query Language, used for managing and manipulating relational databases.

You will find this term commonly used in Database Management

SQL (Structured Query Language)

A domain-specific language used for managing and manipulating relational databases.

You will find this term commonly used in General IT

SQL Database

A database that uses SQL (Structured Query Language) for defining and manipulating data.

You will find this term commonly used in Databases, Data Management

SSD (Solid State Drive)

A type of nonvolatile storage media that stores persistent data on solid-state flash memory.

You will find this term commonly used in Hardware, Storage

SSD Overprovisioning

The inclusion of extra capacity in a solid-state drive (SSD), which is not accessible to the end-user, to manage write operations and improve the drive's lifespan.

You will find this term commonly used in Hardware, Storage

SSL

Secure Sockets Layer, a protocol for securing communication over the internet.

You will find this term commonly used in Security

SSL (Secure Sockets Layer)

A cryptographic protocol used to secure communication over a computer network, commonly used for securing web traffic.

You will find this term commonly used in Security, Networking, Cybersecurity

SSL Acceleration

The use of a device that offloads the SSL encryption and decryption work from the web server to improve performance.

You will find this term commonly used in Networking, Web Security

SSL Certificate

A digital certificate that provides authentication for a website and enables an encrypted connection.

You will find this term commonly used in Security, Web Security

SSL/TLS

Protocols used to provide secure communication over a computer network by encrypting data transmitted between clients and servers.

You will find this term commonly used in Security, Cybersecurity

Stack Overflow

A popular Q&A website for programmers and developers to learn, share their knowledge, and build their careers.

You will find this term commonly used in Software Development, Community

Stateless

A communication protocol in which each transaction is independent of any previous transaction, unlike stateful protocols which require keeping of the internal state on the server.

You will find this term commonly used in Networking, Web Development

Stateless Application

An application that does not save client data generated in one session for use in the next session with that client.

You will find this term commonly used in Software Development, Web Development

Stateless Protocol

A communication protocol in which each message contains all the information needed to understand the message, independent of any previous messages.

You will find this term commonly used in Networking, Web Development

Static Code Analysis

The analysis of computer software that is performed without actually executing programs, in contrast with dynamic analysis, which is analysis performed on programs while they are executing.

You will find this term commonly used in Software Development, Quality Assurance

Static IP Address

An IP address that doesn't change. Contrast with a dynamic IP address which can change every time the device connects to the internet or the network.

You will find this term commonly used in Networking, Internet Technology

Static Typing

A programming language feature in which variable types are explicitly declared and thus are determined at compile time.

You will find this term commonly used in Software Development, Programming Languages

Steganography

The practice of concealing messages or information within other non-secret text or data.

You will find this term commonly used in Security, Cryptography

Stepper Motor

A type of DC motor that moves in discrete steps. It is used in a variety of applications requiring precise position control.

You will find this term commonly used in Hardware, Robotics

Sticky Session

A method used in web servers to achieve server-side load balancing; once a session is started on one server, all the requests from that user are sent to the same server.

You will find this term commonly used in Networking, Web Development

Storage

The process of retaining data in a digital format for future use.

You will find this term commonly used in General IT

Storage Area Network (SAN)

A specialized high-speed network that provides access to consolidated, block-level data storage.

You will find this term commonly used in Networking

Storage Virtualization

The process of abstracting logical storage from physical storage.

You will find this term commonly used in Storage

What's Your
Career Path?
Entry Level Information Security Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
113 Hrs 4 Min
icons8-video-camera-58
513 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Video Editor Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
24 Hrs 2 Min
icons8-video-camera-58
154 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Security Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
111 Hrs 24 Min
icons8-video-camera-58
518 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Comprehensive IT User Support Specialist Training: Accelerate Your Career

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
128 Hrs 51 Min
icons8-video-camera-58
621 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Google DevOps Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
43 Hrs 22 Min
icons8-video-camera-58
479 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Manager’s Survival Bundle Training Series – 10 Courses

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
174 Hrs 15 Min
icons8-video-camera-58
773 On-demand Videos

Original price was: $179.00.Current price is: $47.40.

Add To Cart
AWS Cloud Practitioner Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
62 Hrs 56 Min
icons8-video-camera-58
475 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Pentester Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
100 Hrs 16 Min
icons8-video-camera-58
430 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
37 Hrs 56 Min
icons8-video-camera-58
193 On-demand Videos

Original price was: $99.00.Current price is: $29.00.

Add To Cart
Web Designer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
34 Hrs 37 Min
icons8-video-camera-58
172 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AZ-104 Learning Path : Become an Azure Administrator

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
109 Hrs 6 Min
icons8-video-camera-58
433 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Project Manager Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

Cyber Monday

70% off

Our Most popular LIFETIME All-Access Pass