IT Glossary - Q - ITU Online

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Quick Boot

A feature that allows a computer or device to start up faster than traditional boot processes by saving the system state or using optimized initialization procedures.

You will find this term commonly used in Operating Systems

Quick Charge

A technology developed to allow devices to charge faster than conventional charging methods. It's widely used in smartphones and other portable electronics to reduce charging time.

You will find this term commonly used in Hardware/Consumer Electronics

Quick Edit Mode in Command Line Interfaces

A feature in some command line interfaces (CLI) that allows users to easily select, copy, and paste text directly within the CLI window, enhancing usability and efficiency when interacting with the command line.

You will find this term commonly used in Software Development

Quick Fix Engineering (QFE)

A term used by Microsoft to describe a small update to software that addresses a specific issue. QFEs are typically made available to resolve specific problems before a broader update is released.

You will find this term commonly used in Software Development

Quick Response (QR) Codes in IT

Two-dimensional barcodes that store information accessible by scanning with a smartphone or other device, used in various IT applications for quick access to websites, authentication, and information dissemination.

You will find this term commonly used in General IT

Quick Response Code (QR Code)

A more detailed entry for QR Code emphasizing its encoding of information in a visual format that can be scanned from a display or printed material, facilitating actions like website visits, payments, or information retrieval.

You will find this term commonly used in General IT

Quick Response Manufacturing (QRM)

A companywide strategy aimed at reducing lead times in all phases of manufacturing and office operations. It emphasizes the rapid response to customer demands and can significantly reduce costs and increase efficiency in IT hardware production.

You will find this term commonly used in Operations Management

Quick UDP Internet Connections (QUIC)

A transport layer network protocol developed initially by Google. QUIC aims to provide reduced latency and improved security over traditional protocols such as TCP and UDP. It is designed for use over multiplexed connections and supports a streamlined approach to connection setup.

You will find this term commonly used in Networking

QuickPath Interconnect (QPI)

A communication protocol that allows the transfer of data between processors and other components within a computer. It was developed by Intel to create a faster interconnect between components in high-performance computing systems.

You will find this term commonly used in Computer Architecture

Quicksand Attack

A type of cyber attack that targets sandboxes (security mechanisms for separating running programs), attempting to escape the sandbox to access the underlying system or network.

You will find this term commonly used in Cybersecurity

Quicksilver (Software)

A macOS application that allows users to use the keyboard to locate and launch apps, files, and other resources, enhancing productivity by reducing reliance on mouse navigation.

You will find this term commonly used in Software/Application

QuickSort

A highly efficient sorting algorithm that, on average, makes O(n log n) comparisons to sort n items. It works by selecting a 'pivot' element from the array and partitioning the other elements into two groups based on the pivot.

You will find this term commonly used in Algorithms/Software

Quicksort Algorithm Complexity

The analysis of the computational complexity of the Quicksort algorithm, which, on average, has O(n log n) time complexity for sorting n elements but can degrade to O(n^2) in the worst-case scenario, depending on the choice of pivot.

You will find this term commonly used in Algorithms

QuickTime

A multimedia framework capable of handling various formats of digital video, media clips, sound, text, and a range of interactive panoramic images. It is developed by Apple Inc.

You will find this term commonly used in Multimedia

QuickTime VR

An image file format developed by Apple Inc. that allows the creation and viewing of photorealistic 360-degree virtual reality environments. Though less common today, it was an early step towards immersive multimedia content.

You will find this term commonly used in Multimedia

Quiesce

A state in which a computer, database, or application is put into a temporarily paused or inactive state to perform maintenance, backup, or apply updates safely without affecting active processes or risking data corruption.

You will find this term commonly used in Systems Management

Quiesce Point

A state in transaction processing where a system temporarily halts operations to reach a consistent state, often for purposes of backup, recovery, or applying system changes. This ensures data integrity during critical maintenance activities.

You will find this term commonly used in Database Management

Quiescent Consistency

A consistency model in distributed computing where a system is considered consistent if it is quiescent (i.e., no operations are taking place). It's a less strict form of consistency useful in certain types of distributed systems.

You will find this term commonly used in Distributed Systems

Quiescent State

A state of minimal activity or dormancy in a system, where operations are temporarily halted to achieve consistency, perform maintenance, or for safe reconfiguration. In distributed systems, reaching a quiescent state can be crucial for synchronization and consistency.

You will find this term commonly used in Distributed Systems

Quiescing Database

Temporarily pausing or suspending database activity to perform maintenance tasks such as backups or updates, ensuring that these tasks can be completed without the interference of ongoing transactions or changes.

You will find this term commonly used in Databases

Quiet Mode

A setting available in many software applications and operating systems that suppresses notifications, alerts, and other interruptions, typically to allow users to focus on tasks without distraction.

You will find this term commonly used in User Experience

Quiet Period

In networking, a quiet period is a designated time frame during which network activity is either reduced or halted to allow for maintenance, backups, or to ensure that critical operations can proceed without interference from routine traffic.

You will find this term commonly used in Networking

Quiet Time Policy

Policies set in IT environments to define periods during which notifications, updates, or backups are minimized or suspended to avoid disrupting users. This can be particularly important in 24/7 operations or when minimizing interruptions is critical.

You will find this term commonly used in IT Management

Quine (Program)

A computer program which takes no input and produces a copy of its own source code as its only output. Quines are considered a form of self-replicating program and are used in computer science to study recursion and the theory of computation.

You will find this term commonly used in Programming Theory

Quintillion Instructions Per Second (QUIPS)

A measure of a computer's processing power. Quintillion instructions per second (1 QUIPS = 10^18 instructions per second) indicate the ability of a computer to process quintillions of instructions each second.

You will find this term commonly used in Computing Performance

Quirks Mode

A mode in web browsers for the sake of maintaining backward compatibility with web pages designed for older browsers. It allows the browser to emulate a non-standard behavior in interpreting web pages.

You will find this term commonly used in Web Development

Quorum

In distributed computing, a quorum is the minimum number of members of a group or component that must be present to make the operations of that group valid, often used in the context of fault tolerance and consensus protocols.

You will find this term commonly used in Distributed Systems

Quorum Consensus in Blockchain

A consensus mechanism used in blockchain networks where a transaction is considered valid and can be added to the block only if it gets approval from a majority (quorum) of nodes, ensuring security and reliability in decentralized systems.

You will find this term commonly used in Blockchain/Cryptocurrency

Quorum Voting

A method used in distributed systems to achieve consensus or agreement among distributed processes or nodes, ensuring that a majority (or a specified subset) agrees on a given action before it is executed, thus maintaining consistency and reliability.

You will find this term commonly used in Distributed Systems

Quorum-based Replication

A method used in distributed computing and databases to ensure consistency among replicated data. A write or update operation is considered successful only if a specified minimum number of replicas, or a quorum, acknowledge the operation.

You will find this term commonly used in Distributed Systems

Quota

A limit set on the amount of resources that can be used by a system, user, or application. In IT, quotas are often applied to disk usage, memory usage, and CPU time.

You will find this term commonly used in Systems Management

Quota Allocation

The process of distributing or assigning limits on resources such as disk space, CPU usage, or network bandwidth among users or applications. This is done to ensure fair use and prevent any single user or application from monopolizing resources.

You will find this term commonly used in Systems Administration

Quota Enforcement

The act of implementing and maintaining limits (quotas) on resources such as disk space, number of transactions, or data transfer. This ensures that no single user or process can consume excessive resources to the detriment of others.

You will find this term commonly used in Systems Management

Quota Exceeded Error

An error that occurs when a user or process tries to use more of a particular resource (such as disk space or CPU time) than is allowed under their quota, common in multi-user computer systems and cloud storage services.

You will find this term commonly used in Systems Management

Quota Management

The practice of controlling the amount of disk space, bandwidth, or resources an individual user or application can consume, often used in shared environments like cloud services or corporate networks to ensure fair usage.

You will find this term commonly used in Cloud Computing

Quota Management Software

Software tools that enable the enforcement of usage quotas on resources such as disk space, network bandwidth, and CPU time, allowing administrators to control and optimize the allocation of resources within an IT environment.

You will find this term commonly used in Systems Management

Quota Monitoring

The practice of tracking the use of resources against established quotas to manage capacity, ensure fair usage, and prevent service degradation. It's commonly applied in cloud services, databases, and network management.

You will find this term commonly used in Cloud Computing/IT Management

Quota Sampling

A sampling method used in research where the sample is gathered in a way that the proportions of certain characteristics in the sample correspond to the proportions of those characteristics in the population.

You will find this term commonly used in Data Analysis

Quota System

A system that limits the amount of disk space or resources (such as CPU, memory, or network bandwidth) that users or applications can use. It helps in managing system resources in multi-user environments.

You will find this term commonly used in Systems Management

QVD (QlikView Data) File

A proprietary file format used by QlikView, a business intelligence and visualization software, to store data extracted from various sources. QVD files are optimized for fast data loading.

You will find this term commonly used in Data Management

What's Your
Career Path?
ON SALE 60% OFF
IT Project Manager

IT Project Manager Career Path

Explore the role of an IT Project Manager with our comprehensive IT Manager Career Path Series.
Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
AWS Cloud Practitioner

AWS Cloud Practitioner Career Path

Learn and get certified as an Amazon Web Services Cloud guru. From beginning ot avanced, this series is for you.
Total Hours
62 Hrs 59 Min
icons8-video-camera-58
473 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Google DevOps Engineer Career Path

Google DevOps Engineer Career Path

Expand your cloud knowledge or explore this career option as a Google DevOps Engineer.
Total Hours
41 Hrs 50 Min
icons8-video-camera-58
475 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Pentester Career Path

Pentester Career Path

Designed to equip aspiring professionals with the skills and knowledge essential for excelling in the field of penetration testing.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Career Path

Leadership Mastery: The Executive Information Security Manager

An advanced training series designed for those with prior experience in IT security disicplines wanting to advance into a management role.
Total Hours
95 Hrs 38 Min
icons8-video-camera-58
346 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
azure-administrator-career-path

AZ-104 Learning Path : Become an Azure Administrator

Master the skills needs to become an Azure Administrator and excel in this career path.
Total Hours
105 Hrs 42 Min
icons8-video-camera-58
421 On-demand Videos

$51.60$169.00

ON SALE 60% OFF
CEH Career Path

Certified Ethical Hacker Career Path

This advanced training series teaches you the skills needed to detect vulnerabilities and weaknesses in computer systems and networks. 
Total Hours
126 Hrs 41 Min
icons8-video-camera-58
804 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Information Security Analyst Career Path

Information Security Analyst Career Path

Dive into Cybersecurity with our Comprehensive Information Security Analyst training series.
Total Hours
54 Hrs 29 Min
icons8-video-camera-58
215 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Network Security Analyst

Network Security Analyst Career Path

Become a proficient Network Security Analyst with our comprehensive training series, designed to equip you with the skills needed to protect networks and systems against cyber threats. Advance your career with key certifications and expert-led courses.
Total Hours
96 Hrs 49 Min
icons8-video-camera-58
419 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
Data Analyst Career Path

Data Analyst Career Path

Become a crucial member of your team as a Data Analyst
Total Hours
56 Hrs 36 Min
icons8-video-camera-58
358 On-demand Videos

$51.60

Add To Cart
ON SALE 60% OFF
IT User Support Specialist Career Path

Comprehensive IT User Support Specialist Training: Accelerate Your Career

Advance your tech support skills and be a viable member of dynamic IT support teams.
Total Hours
121 Hrs 41 Min
icons8-video-camera-58
610 On-demand Videos

$51.60$169.00

ON SALE 61% OFF
ICD 9

ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

The Medical Billing Specialist training series is a comprehensive educational program designed to equip learners with the essential skills and knowledge required in the field of medical billing and coding.
Total Hours
37 Hrs 56 Min
icons8-video-camera-58
192 On-demand Videos

$39.00

Add To Cart