Browse Definitions:
Reference

How do you pronounce IT?

Contributor(s): Jon Panker, Mark Lewis, Evan Fahey, and Melvin Jafet Vasquez

This page lists many of the most commonly mispronounced words in information technology. To hear each term pronounced, click the "play" button or the MP3 hyperlink if you don't have Flash installed. If you think an alternate pronunciation is correct or of another term in IT that people often mispronounce, please let us know.

TERM PRONUNCIATION HEAR IT
802.11 eight-oh-two-dot-e-lev-n MP3
ABAP ah-bop MP3
ACL AY-see-el MP3
acronym AK-ruh-nihm MP3
APAR AY-pahr MP3
ASCII ASK-ee MP3
BAPI BAH-pee MP3
Beowulf bay-oh-woolf MP3
cache cash MP3
canonicalization KA-nahn-nik-cal-ih-ZAY-shun MP3
CICS kicks  MP3
CISSP Pronounce letters  MP3
CLEC cleck MP3
COMMAREA COM-area MP3
daemon DAY-mon MP3
data DAY-tuh MP3
Debian DEB-ee-an MP3
DOS doss MP3
EBCDIC EHB-suh-dik MP3
FAQ Pronounce letters MP3
Fibre fie-burr MP3
Freethem.K free-thum-KAY (do not pronounce the dot) MP3
FUD fud MP3
gibibyte GIH-bee-bite MP3
GIF giff (with a hard "g" as in goat)  MP3
GNOME nome (rhymes with home) MP3
GNU new MP3
grok rhymes with rock MP3
GUI GOO-ee MP3
heterogeneous het-ter-o-GENE-ee-us MP3
HIPAA HIP-puh MP3
IDS pronounce letters MP3
IPsec EYE-PEE-sec MP3
iSCSI EYE-scuzzy MP3
IT EYE-TEE MP3
ITIL eye-till MP3
J2EE pronounce letters (and number) MP3
keitai kay-tie MP3
Kerberos KERR-berr-ross MP3
KLOC KAY-lock MP3
LAN Lan (rhymes with man) MP3
LEC lehk MP3
Linux LIH-nux MP3
LOB pronounce letters MP3
LPAR EL-par MP3
LU-LU loo-loo MP3
mebibyte MEH-bee-byte MP3
MEMS mems (rhymes with stems) 
MIPS mihps MP3
MySQL my-ess-q-el MP3
NAS nazz MP3
NetBEUI NET-boo-ee MP3
nuclear new-klee-er MP3
OLE pronounce letters MP3
OS X OH-ESS-ten MP3
parity PAIR-ih-tee MP3
PC-cillin PEE-CEE SIHL-uhn (rhymes with penicillin) MP3
PEBCAK PEB-kak MP3
PoE pronounce letters MP3
POSIX POE-zihcks MP3
PostgreSQL post-gree-es-q-el MP3
QAM kwam MP3
queue just like the letter q MP3
QWERTY KWEHR-tee MP3
RACF rack-EFF MP3
Rijndael RAIN-dahl MP3
router rowt-ter (US) or root-ter (UK) MP3
SaaS rhymes with "glass" MP3
SAML SAM-muhl MP3
SAP pronounce letters MP3
SAPScript ess-ay-pee-script MP3
SATA SAY-tuh MP3
schema SKI-muh MP3
SFA pronounce letters MP3
Siebel SEE-bull MP3
SIP sihp MP3
SOA soh-ah MP3
Sophos SO-fohs MP3
SQL  SEE-kwil  (or pronounce letters) MP3
SuSE SUE-sah MP3
sysop SISS-op MP3
UDDI you-die or pronounce letters MP3
URL pronounce letters MP3
VAR vahr (rhymes with jar) MP3
vi pronounce letters MP3
VoIP v-OI-p MP3
WAN wan (rhymes with man) MP3
wav file WAVE-file MP3
WebDAV WEB-daav MP3
Wi-Fi WHY-FY (rhymes with sky) MP3
WLAN double-you-LAN MP3
WSCI WIZ-key WSCI
WSDL WIZ-dull WSCI
WYSIWYG WIZ-ee-wig WYSIWYG
Xanadu ZAN-ah-doo Xanadu
This was last updated in August 2007

Join the conversation

1 comment

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

thank you very much. that was very helpful for me.
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • email spam

    Email spam, or junk email, is unsolicited bulk messages sent through email with commercial, fraudulent or malicious intent.

  • distributed denial of service (DDoS) attack

    A distributed denial-of-service attack occurs when an attack originates from multiple computers or devices, usually from multiple...

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

SearchHealthIT

  • athenahealth Inc.

    Based in Watertown, Mass., athenahealth Inc. is a leading vendor of cloud-based EHRs for small to medium-sized physician ...

  • Affordable Care Act (ACA or Obamacare)

    The Affordable Care Act (ACA) is legislation passed in 2010 that changed how uninsured Americans enroll in and receive healthcare...

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

SearchDisasterRecovery

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

SearchStorage

  • virtual memory

    Virtual memory is a memory management capability of an OS that allows a computer to compensate for physical memory shortages by ...

  • yottabyte (YB)

    A yottabyte is a measure of theoretical storage capacity and is 2 to the 80th power bytes, or, in decimal, approximately 1,000 ...

  • Kilo, mega, giga, tera, peta, exa, zetta and all that

    Kilo, mega, giga, tera, peta, exa, zetta are among the list of prefixes used to denote the quantity of something, such as a byte ...

SearchSolidStateStorage

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

  • NVDIMM (Non-Volatile Dual In-line Memory Module)

    An NVDIMM (non-volatile dual in-line memory module) is hybrid computer memory that retains data during a service outage.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close