Browse Definitions:
Reference

How do you pronounce IT?

Contributor(s): Jon Panker, Mark Lewis, Evan Fahey, and Melvin Jafet Vasquez

This page lists many of the most commonly mispronounced words in information technology. To hear each term pronounced, click the "play" button or the MP3 hyperlink if you don't have Flash installed. If you think an alternate pronunciation is correct or of another term in IT that people often mispronounce, please let us know.

TERM PRONUNCIATION HEAR IT
802.11 eight-oh-two-dot-e-lev-n MP3
ABAP ah-bop MP3
ACL AY-see-el MP3
acronym AK-ruh-nihm MP3
APAR AY-pahr MP3
ASCII ASK-ee MP3
BAPI BAH-pee MP3
Beowulf bay-oh-woolf MP3
cache cash MP3
canonicalization KA-nahn-nik-cal-ih-ZAY-shun MP3
CICS kicks  MP3
CISSP Pronounce letters  MP3
CLEC cleck MP3
COMMAREA COM-area MP3
daemon DAY-mon MP3
data DAY-tuh MP3
Debian DEB-ee-an MP3
DOS doss MP3
EBCDIC EHB-suh-dik MP3
FAQ Pronounce letters MP3
Fibre fie-burr MP3
Freethem.K free-thum-KAY (do not pronounce the dot) MP3
FUD fud MP3
gibibyte GIH-bee-bite MP3
GIF giff (with a hard "g" as in goat)  MP3
GNOME nome (rhymes with home) MP3
GNU new MP3
grok rhymes with rock MP3
GUI GOO-ee MP3
heterogeneous het-ter-o-GENE-ee-us MP3
HIPAA HIP-puh MP3
IDS pronounce letters MP3
IPsec EYE-PEE-sec MP3
iSCSI EYE-scuzzy MP3
IT EYE-TEE MP3
ITIL eye-till MP3
J2EE pronounce letters (and number) MP3
keitai kay-tie MP3
Kerberos KERR-berr-ross MP3
KLOC KAY-lock MP3
LAN Lan (rhymes with man) MP3
LEC lehk MP3
Linux LIH-nux MP3
LOB pronounce letters MP3
LPAR EL-par MP3
LU-LU loo-loo MP3
mebibyte MEH-bee-byte MP3
MEMS mems (rhymes with stems) 
MIPS mihps MP3
MySQL my-ess-q-el MP3
NAS nazz MP3
NetBEUI NET-boo-ee MP3
nuclear new-klee-er MP3
OLE pronounce letters MP3
OS X OH-ESS-ten MP3
parity PAIR-ih-tee MP3
PC-cillin PEE-CEE SIHL-uhn (rhymes with penicillin) MP3
PEBCAK PEB-kak MP3
PoE pronounce letters MP3
POSIX POE-zihcks MP3
PostgreSQL post-gree-es-q-el MP3
QAM kwam MP3
queue just like the letter q MP3
QWERTY KWEHR-tee MP3
RACF rack-EFF MP3
Rijndael RAIN-dahl MP3
router rowt-ter (US) or root-ter (UK) MP3
SaaS rhymes with "glass" MP3
SAML SAM-muhl MP3
SAP pronounce letters MP3
SAPScript ess-ay-pee-script MP3
SATA SAY-tuh MP3
schema SKI-muh MP3
SFA pronounce letters MP3
Siebel SEE-bull MP3
SIP sihp MP3
SOA soh-ah MP3
Sophos SO-fohs MP3
SQL  SEE-kwil  (or pronounce letters) MP3
SuSE SUE-sah MP3
sysop SISS-op MP3
UDDI you-die or pronounce letters MP3
URL pronounce letters MP3
VAR vahr (rhymes with jar) MP3
vi pronounce letters MP3
VoIP v-OI-p MP3
WAN wan (rhymes with man) MP3
wav file WAVE-file MP3
WebDAV WEB-daav MP3
Wi-Fi WHY-FY (rhymes with sky) MP3
WLAN double-you-LAN MP3
WSCI WIZ-key WSCI
WSDL WIZ-dull WSCI
WYSIWYG WIZ-ee-wig WYSIWYG
Xanadu ZAN-ah-doo Xanadu
This was last updated in August 2007

Join the conversation

1 comment

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

thank you very much. that was very helpful for me.
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • nearline storage

    Nearline storage is the on-site storage of data on removable media.

  • application-aware storage

    Application-aware storage is a storage system with built-in intelligence about relevant applications and their utilization ...

  • Remote Direct Memory Access (RDMA)

    Remote Direct Memory Access (RDMA) is a technology that allows computers in a network to exchange data in main memory without ...

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close