Browse Definitions:
Reference

How do you pronounce IT?

Contributor(s): Jon Panker, Mark Lewis, Evan Fahey, and Melvin Jafet Vasquez

This page lists many of the most commonly mispronounced words in information technology. To hear each term pronounced, click the "play" button or the MP3 hyperlink if you don't have Flash installed. If you think an alternate pronunciation is correct or of another term in IT that people often mispronounce, please let us know.

TERM PRONUNCIATION HEAR IT
802.11 eight-oh-two-dot-e-lev-n MP3
ABAP ah-bop MP3
ACL AY-see-el MP3
acronym AK-ruh-nihm MP3
APAR AY-pahr MP3
ASCII ASK-ee MP3
BAPI BAH-pee MP3
Beowulf bay-oh-woolf MP3
cache cash MP3
canonicalization KA-nahn-nik-cal-ih-ZAY-shun MP3
CICS kicks  MP3
CISSP Pronounce letters  MP3
CLEC cleck MP3
COMMAREA COM-area MP3
daemon DAY-mon MP3
data DAY-tuh MP3
Debian DEB-ee-an MP3
DOS doss MP3
EBCDIC EHB-suh-dik MP3
FAQ Pronounce letters MP3
Fibre fie-burr MP3
Freethem.K free-thum-KAY (do not pronounce the dot) MP3
FUD fud MP3
gibibyte GIH-bee-bite MP3
GIF giff (with a hard "g" as in goat)  MP3
GNOME nome (rhymes with home) MP3
GNU new MP3
grok rhymes with rock MP3
GUI GOO-ee MP3
heterogeneous het-ter-o-GENE-ee-us MP3
HIPAA HIP-puh MP3
IDS pronounce letters MP3
IPsec EYE-PEE-sec MP3
iSCSI EYE-scuzzy MP3
IT EYE-TEE MP3
ITIL eye-till MP3
J2EE pronounce letters (and number) MP3
keitai kay-tie MP3
Kerberos KERR-berr-ross MP3
KLOC KAY-lock MP3
LAN Lan (rhymes with man) MP3
LEC lehk MP3
Linux LIH-nux MP3
LOB pronounce letters MP3
LPAR EL-par MP3
LU-LU loo-loo MP3
mebibyte MEH-bee-byte MP3
MEMS mems (rhymes with stems) 
MIPS mihps MP3
MySQL my-ess-q-el MP3
NAS nazz MP3
NetBEUI NET-boo-ee MP3
nuclear new-klee-er MP3
OLE pronounce letters MP3
OS X OH-ESS-ten MP3
parity PAIR-ih-tee MP3
PC-cillin PEE-CEE SIHL-uhn (rhymes with penicillin) MP3
PEBCAK PEB-kak MP3
PoE pronounce letters MP3
POSIX POE-zihcks MP3
PostgreSQL post-gree-es-q-el MP3
QAM kwam MP3
queue just like the letter q MP3
QWERTY KWEHR-tee MP3
RACF rack-EFF MP3
Rijndael RAIN-dahl MP3
router rowt-ter (US) or root-ter (UK) MP3
SaaS rhymes with "glass" MP3
SAML SAM-muhl MP3
SAP pronounce letters MP3
SAPScript ess-ay-pee-script MP3
SATA SAY-tuh MP3
schema SKI-muh MP3
SFA pronounce letters MP3
Siebel SEE-bull MP3
SIP sihp MP3
SOA soh-ah MP3
Sophos SO-fohs MP3
SQL  SEE-kwil  (or pronounce letters) MP3
SuSE SUE-sah MP3
sysop SISS-op MP3
UDDI you-die or pronounce letters MP3
URL pronounce letters MP3
VAR vahr (rhymes with jar) MP3
vi pronounce letters MP3
VoIP v-OI-p MP3
WAN wan (rhymes with man) MP3
wav file WAVE-file MP3
WebDAV WEB-daav MP3
Wi-Fi WHY-FY (rhymes with sky) MP3
WLAN double-you-LAN MP3
WSCI WIZ-key WSCI
WSDL WIZ-dull WSCI
WYSIWYG WIZ-ee-wig WYSIWYG
Xanadu ZAN-ah-doo Xanadu
This was last updated in August 2007

Join the conversation

1 comment

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

thank you very much. that was very helpful for me.
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher used by the U.S. government to protect classified ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • spear phishing

    Spear phishing is an email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to ...

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

SearchStorage

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...

  • GlusterFS (Gluster File System)

    GlusterFS (Gluster File System) is an open source distributed file system that can scale out in building-block fashion to store ...

  • virtual memory

    Virtual memory is a memory management capability of an OS that allows a computer to compensate for physical memory shortages by ...

SearchSolidStateStorage

  • Tier 0

    Tier 0 (tier zero) is a level of data storage that is faster, and perhaps more expensive, than any other level in the storage ...

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close