Browse Definitions :

Browse Definitions by Alphabet

Q - QXG

  • Q format - Q (number) format is a fixed-point method of coding fractional and whole integers for processing by a computer’s CPU or a digital signal processor (DSP).
  • Q signaling (QSIG) - Q signaling (abbreviated QSIG), a protocol for Integrated Services Digital Network (ISDN) communications based on the Q.
  • Q.931 - Q.931 (also called Q93 is a signaling protocol for Integrated Services Digital Network (ISDN) communications that is used in voice over IP (VoIP).
  • QAM (quadrature amplitude modulation) - QAM (quadrature amplitude modulation) is a method of combining two amplitude modulation (AM) signals into a single channel.
  • QHD (quad high definition) - QHD (Quad High Definition) is a resolution standard for high-end monitors, televisions and mobile devices.
  • qHD (quarter high definition) - qHD (quarter high definition) is a resolution standard for mobile devices.
  • QIX (NASDAQ Information Exchange protocol) - QIX (NASDAQ Information Exchange protocol) is a proprietary specification intended to streamline automated trading in the financial industry.
  • QLC NAND - QLC NAND (quad-level cell NAND) is a form of NAND flash memory that can store up to four bits of data per memory cell.
  • Qlik - Qlik is a software vendor specializing in data visualization, executive dashboards and self-service business intelligence products.
  • QNAP Systems Inc. (Quality Network Appliance Provider Systems Inc.) - QNAP Systems Inc.
  • QNX - QNX is a mobile operating system that was originally developed for embedded systems.
  • QR code (quick response code) - A QR code (quick response code) is a type of 2D bar code that provides easy access to information through a smartphone camera.
  • quad gate - A quad gate is an IC (integrated circuit or chip) containing four logic gates.
  • quad-core processor - A quad-core processor is a chip with four independent units called cores that read and execute central processing unit (CPU) instructions such as add, move data, and branch.
  • Qualified Security Assessor (QSA) - A Qualified Security Assessor (QSA) is a person who has been certified by the PCI Security Standards Council to audit merchants for Payment Card Industry Data Security Standard (PCI DSS) compliance.
  • qualitative data - Qualitative data is information that cannot be counted, measured or easily expressed using numbers.
  • quality - In an information technology product or service, quality is sometimes defined as "meeting the requirements of the customer.
  • quality assurance (QA) - Quality assurance (QA) is any systematic process of determining whether a product or service meets specified requirements.
  • quality control (QC) - Quality control (QC) is a procedure or set of procedures intended to ensure that a manufactured product or performed service adheres to a defined set of quality criteria or meets the requirements of the client or customer.
  • quality function deployment - Quality function deployment (QFD) is the translation of user requirements or requests into designs.
  • quality gate - A quality gate is a milestone in an IT project that requires that predefined criteria be met before the project can proceed to the next phase.
  • Quality of Experience (QoE or QoX) - Quality of Experience (QoE or QoX) is a measure of the overall level of customer satisfaction with a vendor.
  • quality of service (QoS) - Quality of service (QoS) refers to any technology that manages data traffic to reduce packet loss, latency and jitter on a network.
  • quant (quantitative analyst) - A quant (quantitative analyst) is a financial services professional whose qualifications also include advanced mathematics and and computer skills.
  • quantum - Quantum is the Latin word for amount and, in modern understanding, means the smallest possible discrete unit of any physical property such as energy or matter.
  • quantum as a service (QaaS) - Quantum as a service (QaaS) is the offering of quantum compute facilities as an on demand service.
  • quantum computing - Quantum computing is an area of study focused on the development of computer technologies based on the principles of quantum theory.
  • quantum cryptography - Quantum cryptography is a method of encryption that uses the naturally occurring properties of quantum mechanics to secure and transmit data.
  • quantum interference - Quantum interference is one of the most challenging principles of quantum theory.
  • quantum internet - The quantum internet is a theoretical system of interconnected quantum computers that uses quantum signals to send information rather than radio waves.
  • quantum key distribution (QKD) - Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties.
  • quantum microphone - A quantum microphone is an extremely device that detects the smallest particles of sound, such as packets of vibrational energy called phonons.
  • quantum supremacy - Quantum supremacy is the experimental demonstration of a quantum computer's dominance and advantage over classic computers by performing calculations that were previously impossible at unmatched speeds.
  • quantum theory - Quantum theory is the theoretical basis of modern physics that explains the nature and behavior of matter and energy on the atomic and subatomic level.
  • qubit - A qubit is a quantum bit, the counterpart in quantum computing to the binary digit or bit of classical computing.
  • queries-per-second (QPS) - Queries-per-second (QPS) (or the query-per-second rate) is a measure of how much traffic a particular query server is handling at a given time.
  • query - A query is a question or a request for information expressed in a formal manner.
  • Query by Example (QBE) - Query by Example (QBE) is a method of query creation that allows the user to search for documents based on an example in the form of a selected text string or in the form of a document name or a list of documents.
  • querystring - A querystring is a set of characters input to a computer or Web browser and sent to a query program to recover specific information from a database.
  • queue - In general, a queue is a line of people or things waiting to be handled, usually in sequential order starting at the beginning or top of the line or sequence.
  • queue depth - Queue depth, in storage, is the number of pending input/output (I/O) requests that a storage resource can handle at any one time.
  • Quicktime - Quicktime is a multimedia development, storage, and playback technology from Apple.
  • quiet period - A quiet period is a measure of time during which corporate insiders are restricted from disclosing information relative to the performance or prospective performance of a company before that information is made public.
  • Quiz: Customers and Call Centers - How to take the quiz: - After reading the question, click on the answer that you think iscorrect to go to the whatis.
  • Quiz: Mobile Device Security -- Who else can hear me now? - Mobile device security and compliance regulations can be as hard to pin down as a strong connection for your smartphone.
  • Quiz: Who Done IT? A Murder Mystery - How to take the quiz: - After reading the question, click on the answer that you think is correct.
  • Qumulo - Qumulo is a Seattle-based storage vendor that specializes in selling its data-aware storage software application called the Qumulo Core.
  • QWERTY keyboard - The QWERTY (pronounced KWEHR-tee) keyboard is the standard typewriter and computer keyboard in countries that use a Latin-based alphabet.
  • QXGA (Quantum Extended Graphics Array) - QXGA (Quantum Extended Graphics Array) is a display mode in which the resolution is 2048 pixels horizontally by 1536 pixels vertically (2048 x 1536).
SearchNetworking
SearchSecurity
  • man in the browser (MitB)

    Man in the browser (MitB) is a security attack where the perpetrator installs a Trojan horse on the victim's computer that is ...

  • Patch Tuesday

    Patch Tuesday is the unofficial name of Microsoft's monthly scheduled release of security fixes for the Windows operating system ...

  • parameter tampering

    Parameter tampering is a type of web-based cyber attack in which certain parameters in a URL are changed without a user's ...

SearchCIO
  • e-business (electronic business)

    E-business (electronic business) is the conduct of business processes on the internet.

  • business resilience

    Business resilience is the ability an organization has to quickly adapt to disruptions while maintaining continuous business ...

  • chief procurement officer (CPO)

    The chief procurement officer, or CPO, leads an organization's procurement department and oversees the acquisitions of goods and ...

SearchHRSoftware
SearchCustomerExperience
  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

  • clickstream data (clickstream analytics)

    Clickstream data and clickstream analytics are the processes involved in collecting, analyzing and reporting aggregate data about...

Close