Browse Definitions :

Browse Definitions by Alphabet

QUI - QZO

  • Quiz: Winter Blues - Test yourself.
  • Quiz: Wireless - Test yourself.
  • Quiz: Wireless LANs - Wireless LAN quiz testing key terms related to WLANs and wireless technologies, such as 802.
  • Quiz: Wireless Standards and Protocols - Test yourself.
  • Quiz: Workstations - Test yourself.
  • Quiz: Writing for business - Is your prose as good as your code? Quiz.
  • Quizzes - Test yourself.
  • Qumulo - Qumulo is a Seattle-based storage vendor that specializes in selling its data-aware storage software application called the Qumulo Core.
  • QVGA - QVGA (Quarter Video Graphics Array) is a small-screen display mode in which the resolution is 320 pixels horizontally by 240 pixels vertically (320 x 240).
  • QWERTY - The QWERTY (pronounced KWEHR-tee) keyboard is the standard typewriter and computer keyboard in countries that use a Latin-based alphabet.
  • QWERTY keyboard - The QWERTY (pronounced KWEHR-tee) keyboard is the standard typewriter and computer keyboard in countries that use a Latin-based alphabet.
  • QXGA - QXGA (Quantum Extended Graphics Array) is a display mode in which the resolution is 2048 pixels horizontally by 1536 pixels vertically (2048 x 1536).
  • QXGA (Quantum Extended Graphics Array) - QXGA (Quantum Extended Graphics Array) is a display mode in which the resolution is 2048 pixels horizontally by 1536 pixels vertically (2048 x 1536).
  • Qzone - Qzone is a Chinese social networking site and blogging platform for self-expression and content sharing.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • threat modeling

    Threat modeling is a procedure for optimizing application, system or business process security by identifying objectives and ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • bare-metal cloud

    Bare-metal cloud is a public cloud service that offers dedicated hardware resources without any installed operating systems or ...

  • race condition

    A race condition is an undesirable situation that occurs when a device or system attempts to perform two or more operations at ...

  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

Close