Browse Definitions :

Browse Definitions by Alphabet

Q - QUI

  • Q format - Q (number) format is a fixed-point method of coding fractional and whole integers for processing by a computer’s CPU or a digital signal processor (DSP).
  • Q signaling (QSIG) - Q signaling (abbreviated QSIG), a protocol for Integrated Services Digital Network (ISDN) communications based on the Q.
  • Q.931 - Q.931 (also called Q93 is a signaling protocol for Integrated Services Digital Network (ISDN) communications that is used in voice over IP (VoIP).
  • QAM (quadrature amplitude modulation) - QAM (quadrature amplitude modulation) is a method of combining two amplitude modulation (AM) signals into a single channel.
  • QHD (quad high definition) - QHD (Quad High Definition) is a resolution standard for high-end monitors, televisions and mobile devices.
  • qHD (quarter high definition) - qHD (quarter high definition) is a resolution standard for mobile devices.
  • QIX (NASDAQ Information Exchange protocol) - QIX (NASDAQ Information Exchange protocol) is a proprietary specification intended to streamline automated trading in the financial industry.
  • QLC NAND - QLC NAND (quad-level cell NAND) is a form of NAND flash memory that can store up to four bits of data per memory cell.
  • Qlik - Qlik is a software vendor specializing in data visualization, executive dashboards and self-service business intelligence products.
  • QNAP Systems Inc. (Quality Network Appliance Provider Systems Inc.) - QNAP Systems Inc.
  • QNX - QNX is a mobile operating system that was originally developed for embedded systems.
  • QR code (quick response code) - A QR code (quick response code) is a type of 2D bar code that provides easy access to information through a smartphone camera.
  • quad gate - A quad gate is an IC (integrated circuit or chip) containing four logic gates.
  • quad-core processor - A quad-core processor is a chip with four independent units called cores that read and execute central processing unit (CPU) instructions such as add, move data and branch.
  • Qualified Security Assessor (QSA) - A Qualified Security Assessor (QSA) is a person who has been certified by the PCI Security Standards Council to audit merchants for Payment Card Industry Data Security Standard (PCI DSS) compliance.
  • qualitative data - Qualitative data is information that cannot be counted, measured or easily expressed using numbers.
  • quality - In an information technology product or service, quality is sometimes defined as "meeting the requirements of the customer.
  • quality assurance (QA) - Quality assurance (QA) is any systematic process of determining whether a product or service meets specified requirements.
  • quality control (QC) - Quality control (QC) is a procedure or set of procedures intended to ensure that a manufactured product or performed service adheres to a defined set of quality criteria or meets the requirements of the client or customer.
  • quality function deployment - Quality function deployment (QFD) is the translation of user requirements or requests into designs.
  • quality gate - A quality gate is a milestone in an IT project that requires that predefined criteria be met before the project can proceed to the next phase.
  • Quality of Experience (QoE or QoX) - Quality of Experience (QoE or QoX) is a measure of the overall level of customer satisfaction with a vendor.
  • quality of service (QoS) - Quality of service (QoS) refers to any technology that manages data traffic to reduce packet loss, latency and jitter on a network.
  • quant (quantitative analyst) - A quant (quantitative analyst) is a financial services professional whose qualifications also include advanced mathematics and and computer skills.
  • quantum - A quantum (plural: quanta) is the smallest discrete unit of a phenomenon.
  • quantum as a service (QaaS) - Quantum as a service (QaaS) is the offering of quantum compute facilities as an on demand service.
  • quantum computer - A quantum computer is a machine, as-yet hypothetical, that performs calculations based on the behavior of particles at the sub-atomic level.
  • quantum computing - Quantum computing is an area of study focused on the development of computer technologies based on the principles of quantum theory.
  • quantum cryptography - Quantum cryptography is a method of encryption that uses the naturally occurring properties of quantum mechanics to secure and transmit data.
  • quantum interference - Quantum interference is one of the most challenging principles of quantum theory.
  • quantum internet - The quantum internet is a theoretical system of interconnected quantum computers that uses quantum signals to send information rather than radio waves.
  • quantum key distribution (QKD) - Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties.
  • quantum microphone - A quantum microphone is an extremely device that detects the smallest particles of sound, such as packets of vibrational energy called phonons.
  • quantum supremacy - Quantum supremacy is the experimental demonstration of a quantum computer's dominance and advantage over classic computers by performing calculations that were previously impossible at unmatched speeds.
  • quantum theory - Quantum theory is the theoretical basis of modern physics that explains the nature and behavior of matter and energy on the atomic and subatomic level.
  • quark - A quark is one of two currently recognized groups of fundamental particles, which are subatomic, indivisible (at least as far as we know today) particles that represent the smallest known units of matter.
  • qubit - A qubit is a quantum bit, the counterpart in quantum computing to the binary digit or bit of classical computing.
  • queries-per-second (QPS) - Queries-per-second (QPS) (or the query-per-second rate) is a measure of how much traffic a particular query server is handling at a given time.
  • query - A query is a question or a request for information expressed in a formal manner.
  • querystring - A querystring is a set of characters input to a computer or Web browser and sent to a query program to recover specific information from a database.
  • Question 1 - Test yourself.
  • Question 10 - Test yourself.
  • Question 2 - Test yourself.
  • Question 3 - Test yourself.
  • Question 4 - Test yourself.
  • Question 5 - Test yourself.
  • Question 6 - Test yourself.
  • Question 7 - Test yourself.
  • Question 8 - Test yourself.
  • Question 9 - Test yourself.
  • queue - In general, a queue is a line of people or things waiting to be handled, usually in sequential order starting at the beginning or top of the line or sequence.
  • queue depth - Queue depth, in storage, is the number of pending input/output (I/O) requests that a storage resource can handle at any one time.
  • queueing theory - In computer science, queueing theory is the study of queues as a technique for managing processes and objects in a computer.
  • Quicktime - Quicktime is a multimedia development, storage, and playback technology from Apple.
  • quiet period - A quiet period is a measure of time during which corporate insiders are restricted from disclosing information relative to the performance or prospective performance of a company before that information is made public.
  • quiet zone - In barcode technology, a quiet zone is the blank margin on either side of a bar code that's used to tell the barcode reader where a barcode's symbology starts and stops.
  • Quiz: 10 hot green terms to keep you (and the planet) cool - A quiz on green technology: This term describes surfing search engine results using an inverted palette, with white text on a black body, saving monitor wattage in the process.
  • Quiz: A taste for tech? - A quiz about food-related tech terms: Does this prominent producer of hardware and software keep the doctor away?.
  • Quiz: Believe it or Not: Do you speak Geek? - An April Fools tech quiz: The first computer ever designed, called the Difference Engine, was powered by a wind-up crank on the side.
  • Quiz: Business Intelligence - A business intelligence tech quiz: What is an approach to selling goods and services in which a prospect explicitly agrees in advance to receive marketing information.
  • Quiz: Common Vulnerabilities - A quiz about security vulnerabilities: An intruder might install this on a networked computer to collect user ids and passwords from other machines on the network.
  • Quiz: Computer Nostalgia - A quiz about computer history: What network, largely funded by the U.
  • Quiz: Computer Nostalgia 2.0 - A computer history quiz: In 1982, young Richard Skrenta secured his place in computer history by creating a program called Elk Cloner.
  • Quiz: Do you eat Geek? - A tech quiz with a food-oriented theme: If you're a geek eating Mexican, you might be confused about asking for a mole sauce.
  • Quiz: Do you speak Geek during the holidays? - A quiz featuring IT terms related to the holidays: If Saint Nick ate them all in one night, he might need extra RP (reindeer power) to get that sleigh airborne! On the Internet, it's a small text file a Web server sends to your browser.
  • Quiz: Do you speak Geek with the Simpsons? - In honor of the Simpsons movie hitting megaplexes (and likely BitTorrent clients) worldwide, we've put together yet another technology quiz for the readers of WhatIs.
  • Quiz: Do you speak Geek, Greek, or Elvish? - A tech quiz with a ancient Greece/Lord of the Rings theme: Which of the following conveys malicious or harmful code concealed within harmless programming? (Hint: It was used by the Greeks, as told in the Aeneid.
  • Quiz: Do you speak project management? - A project management quiz: Developed by the U.
  • Quiz: DSL - DSL (Digital Subscriber Line) is a technology for bringing high-bandwidth information to homes and small businesses over ordinary copper telephone lines.
  • Quiz: E-business trends and technologies - A quiz about e-business: This Web site feature involves tailoring pages to individual users' characteristics or preferences.
  • Quiz: E-mail Marketing and the Spam Problem - A quiz about email marketing and spam: What is a technique used by legitimate marketers to customize offerings for specific customers.
  • Quiz: Ego-Booster - A tech terminology quiz: This is an unspaced sequence of characters used to determine that a computer user requesting access to a computer system is really that particular user.
  • Quiz: Eureka! - IT's all about the light bulb moments.
  • Quiz: For Latin Lovers - A tech trivia quiz featuring Latin-derived terms: What does quid pro quo mean?.
  • Quiz: Greening the cube farm - A quiz about environmentally-friendly computing practices: What innovative technology powers laptops from the One Laptop Per Child foundation?.
  • Quiz: Halloween IV: Can you shriek Geek? - Halloween-themed tech quiz: Ugh! This scourge of the Internet gets its name from a Latin word meaning slimy liquid or poison.
  • Quiz: Help Desk Basics - A quiz about help desks: What basic Internet program lets you verify that a particular Internet address exists and can accept requests?.
  • Quiz: HP - A quiz about Hewlett-Packard technologies: What is a software suite from HP for managing applications, device availability, network conditions and status, system performance, service and program maintenance, and storage resources.
  • Quiz: IM lingo 4U - Test yourself.
  • Quiz: Improve your memory! - A quiz about computer storage: If you loaded your pickup truck full of books, how much data would it hold -- 650 megabytes, a half-terabyte or a gigabyte?.
  • Quiz: Integrated threat management - A quiz about integrated threat management.
  • Quiz: Intrusion prevention fundamentals - A quiz about intrusion prevention: What describes any attack strategy where the attacker purposely makes it confusing and difficult for interested parties to figure out who initiated the attack.
  • Quiz: IT lives! - A quiz about inventors and innovators in information technology: This hugely successful organization began life in 1996 as an application called 'Backrub.
  • Quiz: IT Potpourri - IT trivia quiz: According to recent reports, Microsoft and Intel are conspiring on a device that will crush a popular handheld device with a fruity name.
  • Quiz: IT's About Taxes - A quiz about taxes and technology: This organization lobbies in Congress on behalf of information technology companies and users in matters related to tax laws and enforcement, along with the protection of copyrights, patents and privacy in communication.
  • Quiz: IT's about time! - A quiz about time: Our current calendar system was instituted by Pope Gregory XIII, back in 1582.
  • Quiz: IT's Greek to me! - A quiz about tech terms derived from Greek: If you think your computer has a mean streak, you're exhibiting this, the tendency to think of non-humans as having human characteristics.
  • Quiz: Laptops - A quiz about laptop computers: This technology is used in the liquid crystal displays of notebook and laptop computers to provide a more responsive image at a wider range of viewing angle.
  • Quiz: Looney Tunes - A tech trivia quiz with a Looney-Toons theme: What starring character's first name is also a term for pesky coding errors?.
  • Quiz: Mainframe Acronym-o-phobia - Test yourself.
  • Quiz: Mobile Device Security -- Who else can hear me now? - Mobile device security and compliance regulations can be as hard to pin down as a strong connection for your smartphone.
  • Quiz: More fun with open source - Test yourself.
  • Quiz: Name my claim to fame! - Test yourself.
  • Quiz: Netiquette - Test yourself.
  • Quiz: Online threats to privacy - Test yourself.
  • Quiz: Peripherals - Test yourself.
  • Quiz: Presence Technology - Test yourself.
  • Quiz: Processing Power - Test yourself.
  • Quiz: Recycling electronic equipment - Test yourself.
  • Quiz: Ruling Your IT Universe - Test yourself.
SearchNetworking
  • cloud-native network function (CNF)

    A cloud-native network function (CNF) is a service that performs network duties in software, as opposed to purpose-built hardware.

  • Wi-Fi 6E

    Wi-Fi 6E is one variant of the 802.11ax standard.

  • microsegmentation

    Microsegmentation is a security technique that splits a network into definable zones and uses policies to dictate how data and ...

SearchSecurity
  • MICR (magnetic ink character recognition)

    MICR (magnetic ink character recognition) is a technology invented in the 1950s that's used to verify the legitimacy or ...

  • What is cybersecurity?

    Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats.

  • Android System WebView

    Android System WebView is a system component for the Android operating system (OS) that allows Android apps to display web ...

SearchCIO
  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • contingent workforce

    A contingent workforce is a labor pool whose members are hired by an organization on an on-demand basis.

  • product development (new product development -- NPD)

    Product development, also called new product management, is a series of steps that includes the conceptualization, design, ...

SearchHRSoftware
  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

SearchCustomerExperience
  • hockey stick growth

    Hockey stick growth is a growth pattern in a line chart that shows a sudden and extremely rapid growth after a long period of ...

  • Salesforce Trailhead

    Salesforce Trailhead is a series of online tutorials that coach beginner and intermediate developers who need to learn how to ...

  • Salesforce

    Salesforce, Inc. is a cloud computing and social enterprise software-as-a-service (SaaS) provider based in San Francisco.

Close