A Full List of IT Terminology

We’ve compiled a full list of commonly encountered IT terminology that will help you better understand the industry and how it works. By familiarizing yourself with basic computer terms and definitions, you’ll allow yourself to understand manuals, descriptions, and everyday jargon necessary to fully grasp IT products and services.

You’ll find our tech glossary is conveniently laid out below in alphabetical order with an easy navigation interface so you can quickly reference words related to technology.

In addition to our tech terms, you can also find other resources to help you learn more about the role of technology in modern industry, including blogs, whitepapers, and case studies. Though our list of IT terms to know is expansive, if you have any further questions regarding things to know about technology, please contact us.



Desktop as a Service is a type of virtual computing that embraces mobility by transforming any device into your work computer and allows you to control applications and conduct business securely through the cloud.

Related Resources


A domain contains a group of resources that can be accessed and administered with a standard set of rules and procedures. Within the Internet, domains are named by the IP (Internet Protocol) address, and all of the devices sharing a common element of the IP address are stated to be within the same domain.

Related Resources

Domain Controller

A domain controller is a server that supports network security by verifying the user authentication and authorization and manages the user database for the domain. Domain controllers are mainly significant in Microsoft directory services terminology and authenticating Windows user identities.

Related Resources


A Domain Name System (DNS) is a system that maintains a directory of domain names and translates them to IP addresses.

Related Resources

Open DNS

OpenDNS is a third party set of cloud-based consumer products aimed at making internet connection faster, safer, and more reliable through performing URL, DNS, IP Layer, Proxy and Content Filtering. DNS Forwarders are set in place to filter all traffic in the cloud before it gets to your public facing firewall and internal network.

Related Resources


Downtime refers to the period of time where a system or service is inactive usually as a result of system function failure because of an unplanned event, routine maintenance, or other inconveniences. This inactivity ultimately has a negative impact on productivity and processes within the business environment.

Related Resources

Data Loss Prevention

Data Loss Prevention is a system or service that prevents users from breaching sensitive or critical information outside of the corporate network. The network administrator(s) manages what data end users can transfer. Firewalls, antivirus software, and intrusion detection systems (IDS) are often accessible as standard security measures and products that protect devices against both outsider and insider attacks.

Related Resources

DoD Wipe

DoD wipe refers to a method of standards, created by the Department of Defense, which is used in overwriting the data that aims to destroy all electronic data residing on a hard disk drive or other digital media. A DoD wipe requires a computer’s information to be overwritten seven times in order for the data to be considered unrecoverable.


DRaaS (Disaster Recovery as a Service) is a system of policies and procedures set in place that will give businesses and organizations total system backup in the event of a system failure that is either natural or human-induced, and it allows operations to continue while the primary system undergoes repair.

Related Resources