Browse Definitions :

Browse Definitions by Alphabet

Q - QXG

  • Q format - Q (number) format is a fixed-point method of coding fractional and whole integers for processing by a computer’s CPU or a digital signal processor (DSP).
  • Q signaling (QSIG) - Q signaling (abbreviated QSIG), a protocol for Integrated Services Digital Network (ISDN) communications based on the Q.
  • Q.931 - Q.931 (also called Q93 is a signaling protocol for Integrated Services Digital Network (ISDN) communications that is used in voice over IP (VoIP).
  • QAM (quadrature amplitude modulation) - QAM (quadrature amplitude modulation) is a method of combining two amplitude modulation (AM) signals into a single channel.
  • QHD (quad high definition) - QHD (Quad High Definition) is a resolution standard for high-end monitors, televisions and mobile devices.
  • qHD (quarter high definition) - qHD (quarter high definition) is a resolution standard for mobile devices.
  • QIX (NASDAQ Information Exchange protocol) - QIX (NASDAQ Information Exchange protocol) is a proprietary specification intended to streamline automated trading in the financial industry.
  • QLC NAND - QLC NAND (quad-level cell NAND) is a form of NAND flash memory that can store up to four bits of data per memory cell.
  • Qlik - Qlik is a software vendor specializing in data visualization, executive dashboards and self-service business intelligence products.
  • QNAP Systems Inc. (Quality Network Appliance Provider Systems Inc.) - QNAP Systems Inc.
  • QNX - QNX is a mobile operating system that was originally developed for embedded systems.
  • QR code (quick response code) - A QR code (quick response code) is a type of 2D bar code that provides easy access to information through a smartphone camera.
  • quad gate - A quad gate is an IC (integrated circuit or chip) containing four logic gates.
  • quad-core processor - A quad-core processor is a chip with four independent units called cores that read and execute central processing unit (CPU) instructions such as add, move data and branch.
  • Qualified Security Assessor (QSA) - A Qualified Security Assessor (QSA) is a person who has been certified by the PCI Security Standards Council to audit merchants for Payment Card Industry Data Security Standard (PCI DSS) compliance.
  • qualitative data - Qualitative data is information that cannot be counted, measured or easily expressed using numbers.
  • quality - In an information technology product or service, quality is sometimes defined as "meeting the requirements of the customer.
  • quality assurance (QA) - Quality assurance (QA) is any systematic process of determining whether a product or service meets specified requirements.
  • quality control (QC) - Quality control (QC) is a procedure or set of procedures intended to ensure that a manufactured product or performed service adheres to a defined set of quality criteria or meets the requirements of the client or customer.
  • quality function deployment - Quality function deployment (QFD) is the translation of user requirements or requests into designs.
  • quality gate - A quality gate is a milestone in an IT project that requires that predefined criteria be met before the project can proceed to the next phase.
  • Quality of Experience (QoE or QoX) - Quality of Experience (QoE or QoX) is a measure of the overall level of customer satisfaction with a vendor.
  • quality of service (QoS) - Quality of service (QoS) refers to any technology that manages data traffic to reduce packet loss, latency and jitter on a network.
  • quant (quantitative analyst) - A quant (quantitative analyst) is a financial services professional whose qualifications also include advanced mathematics and and computer skills.
  • quantum - A quantum (plural: quanta) is the smallest discrete unit of a phenomenon.
  • quantum as a service (QaaS) - Quantum as a service (QaaS) is the offering of quantum compute facilities as an on demand service.
  • quantum computing - Quantum computing is an area of study focused on the development of computer technologies based on the principles of quantum theory.
  • quantum cryptography - Quantum cryptography is a method of encryption that uses the naturally occurring properties of quantum mechanics to secure and transmit data.
  • quantum interference - Quantum interference is one of the most challenging principles of quantum theory.
  • quantum internet - The quantum internet is a theoretical system of interconnected quantum computers that uses quantum signals to send information rather than radio waves.
  • quantum key distribution (QKD) - Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties.
  • quantum microphone - A quantum microphone is an extremely device that detects the smallest particles of sound, such as packets of vibrational energy called phonons.
  • quantum supremacy - Quantum supremacy is the experimental demonstration of a quantum computer's dominance and advantage over classic computers by performing calculations that were previously impossible at unmatched speeds.
  • quantum theory - Quantum theory is the theoretical basis of modern physics that explains the nature and behavior of matter and energy on the atomic and subatomic level.
  • qubit - A qubit is a quantum bit, the counterpart in quantum computing to the binary digit or bit of classical computing.
  • queries-per-second (QPS) - Queries-per-second (QPS) (or the query-per-second rate) is a measure of how much traffic a particular query server is handling at a given time.
  • query - A query is a question or a request for information expressed in a formal manner.
  • Query by Example (QBE) - Query by Example (QBE) is a method of query creation that allows the user to search for documents based on an example in the form of a selected text string or in the form of a document name or a list of documents.
  • querystring - A querystring is a set of characters input to a computer or Web browser and sent to a query program to recover specific information from a database.
  • queue - In general, a queue is a line of people or things waiting to be handled, usually in sequential order starting at the beginning or top of the line or sequence.
  • queue depth - Queue depth, in storage, is the number of pending input/output (I/O) requests that a storage resource can handle at any one time.
  • Quicktime - Quicktime is a multimedia development, storage, and playback technology from Apple.
  • quiet period - A quiet period is a measure of time during which corporate insiders are restricted from disclosing information relative to the performance or prospective performance of a company before that information is made public.
  • Quiz: Mobile Device Security -- Who else can hear me now? - Mobile device security and compliance regulations can be as hard to pin down as a strong connection for your smartphone.
  • Quiz: Who Done IT? A Murder Mystery - How to take the quiz: - After reading the question, click on the answer that you think is correct.
  • Qumulo - Qumulo is a Seattle-based storage vendor that specializes in selling its data-aware storage software application called the Qumulo Core.
  • QWERTY keyboard - The QWERTY (pronounced KWEHR-tee) keyboard is the standard typewriter and computer keyboard in countries that use a Latin-based alphabet.
  • QXGA (Quantum Extended Graphics Array) - QXGA (Quantum Extended Graphics Array) is a display mode in which the resolution is 2048 pixels horizontally by 1536 pixels vertically (2048 x 1536).
SearchNetworking
  • network packet

    A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a ...

  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

SearchSecurity
  • Domain-based Message Authentication, Reporting and Conformance (DMARC)

    The Domain-based Message Authentication, Reporting and Conformance (DMARC) protocol is one leg of the tripod of internet ...

  • data breach

    A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed or disclosed in an...

  • insider threat

    An insider threat is a category of risk posed by those who have access to an organization's physical or digital assets.

SearchCIO
  • data privacy (information privacy)

    Data privacy, also called information privacy, is an aspect of data protection that addresses the proper storage, access, ...

  • leadership skills

    Leadership skills are the strengths and abilities individuals demonstrate that help to oversee processes, guide initiatives and ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchHRSoftware
SearchCustomerExperience
  • recommerce

    Recommerce is the selling of previously owned items through online marketplaces to buyers who reuse, recycle or resell them.

  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

Close