Glossary of Terms
Cyber Security
VOIP and Telecome
Internet Glossary
IT Glossary
Cyber Security
[glossary]
VOIP and Telecome
- Abandoned Cable
- Abandoned Call
- Abnormal Termination Report
- ACCESS CHARGE
- ACD -Automatic Call Distributor
- Acoustic Coupler
- Acoustic Echo Canceller
- Acoustic Echo Return Loss Enhancement
- Acoustic Modem
- Agent
- Agent out call
- Air Blown Fiber (ABF)
- Analog
- Analog
- ANALOG SIGNAL
- Analog Transmission
- ANI – Automatic Number Identification
- Announcement
- Answer wait time
- Answered call
- API
- Appointment reminders
- Area code
- Asterisk
- Asynchronous Transfer Mode (ATM)
- ATA – Analog Telephone Adapter
- ATB – All Trunks Busy
- Attendant
- Attenuation
- Audio Bridge
- Audio Teleconferencing
- Audiographic
- Automatic location identification (ALI)
- Automatic number identification (ANI)
- Automatic Ring Back
- Auxiliary Disconnect Outlet (ADO)
- B-ISDN
- Backbone Cabling
- Balance
- Balanced Signal Transmission
- BANDWIDTH
- Basic Rate Interface
- Bonding
- Break Test Access
- BRI – Basic Rate Interface
- Bridge
- Bridged Tap
- Bridges, Gateway, Routers
- Bridging
- Bridging Amplifier
- BROADBAND
- Broadband (Wideband) distribution systems
- Broadband Network
- Bufferbloat
- Building Distributor
- Bundled Cable
- Bus Topology
- Busy Lamp Field
- Busy Override
- Cabling
- Call Blocking
- Call Detail Record (CDR)
- Call Forwarding on Absence
- Call Forwarding on Busy
- Call Logging
- Call on Hold
- Call Park
- Call Pick Up
- Call Routing
- Call Threshold Monitoring
- Call Timer
- Call Transfer
- Call Waiting
- Caller ID
- Caller-ID (CNAM)
- CALLING PARTY PAYS
- Camera
- Camp
- Campus Backbone
- Campus Distributor
- Card
- Carrier
- Carrier Number Service
- Category
- CELLULAR TECHNOLOGY
- CentOS Community ENTerprise Operating System –
- Central Office (CO)
- Channel
- Circuit
- Class of Service Restrictions
- Classification
- CLEC (Competitive Local Exchange Carrier)
- CLID
- CLID – Calling Line ID
- CLOSED CAPTIONING
- Cloud Contact Center
- CO – Central Office
- CO Lines
- Codec
- Codec (Coder/Decoder)
- Collapsed Backbone
- Combination Trunk
- COMMERCIAL LEASED ACCESS
- COMMON CARRIER
- Common Carrier s
- COMMUNICATIONS ASSISTANT
- COMMUNITY ANTENNA TELEVISION (CATV)
- Competitive Local Exchange Carrier (CLEC)
- Computer Conferencing
- Computer Telephone Integration
- Conference Call
- Consolidation Point
- Consult Hold
- Contact Center
- Convergence
- CRAMMING
- Cross Connect
- Crosstalk
- CSD (Circuit Switched Data)
- CSV (Circuit Switched Voice)
- Custom Greetings
- Custom ISDN
- D Channel
- Daisy Chain
- Data Communications
- Data Compression
- Dedicated Line
- Dedicated System
- Delay Skew
- Demarcation Point (DP or Demarc)
- Demo10
- Desired Due Date (DDD)
- Desktop Click
- DHCP – Dynamic Host Configuration Protocol
- DHCP / DNS Phone Activation
- Dial
- DIAL AROUND
- DID – Direct Inward Dialing
- DID Extension or DID Station
- DID Number
- DID Trunk
- Digital Switch
- DIGITAL TELEVISION (DTV)
- DIRECT BROADCAST SATELLITE (DBS/DISH)
- Direct Inward Dialing
- Direct Inward Dialing (DID)
- Direct Inward System Access
- Distributor
- DNS – Dynamic Name Service
- Do Not Disturb
- DSL – Digital Subscriber Line
- DTMF – Dual-Tone Multi-Frequency
- DTMF Tones (Dual-Tone Multi-Frequency Tones)
- Ducting (Pathway)
- Duplex
- Dynamic Number Insertion (DNI)
- E.164
- EN BANC
- Encoder/Decoder
- ENHANCED SERVICE PROVIDERS
- Entrance Facility
- Equipment Cable
- Equipment Room, Telecommunications
- Ethernet
- Facilities
- Fax
- FC Connector
- FDDI Fiber Distributed Data Interface
- Fiber Optic Transmission
- Fiber Optics
- Firestop
- Floor Distributor
- Four
- Frame Relay
- FreePBX
- FREQUENCY MODULATION (FM)
- FSX Foreign eXchange Subscriber
- FXO Foreign eXchange Office
- Gain
- Gateway
- General Packet Radio Service (GPRS)
- GLOBAL POSITIONING SYSTEM (GPS)
- Ground
- H.323
- Hands
- Headset Options
- Hertz
- High Availability
- HIGH DEFINITION TELEVISION (HDTV)
- Home
- Horizontal Cabling
- Horizontal Cross
- Hosted VoIP
- Hot Desk (Hotelling)
- Hub
- Hunt Group
- Hybrid
- Hybrid Cable
- IAX – Inter-Asterisk eXchange protocol
- ILEC (Incumbent Local Exchange Carrier)
- Inbound
- Incumbent Local Exchange Carrier (ILEC)
- INSTRUCTIONAL TELEVISION FIXED SERVICE (ITFS)
- Integrated Services Digital Network (ISDN)
- Intelligent Hub
- Inter
- INTERACTIVE VIDEO DATA SERVICE (IVDS)
- Interactive Voice Response (IVR)
- Interbuilding Backbone
- Intercom
- Intercom Groups
- Interconnect
- Interconnection
- Intermediate Cross
- Internet Telephony Service Provider (ITSP)
- ISDN – Integrated Services Digital Network
- IVR – Interactive Voice Response
- Jack
- Jitter
- Jumper Wire
- Key System
- Key Telephone System
- Lag
- LAND MOBILE SERVICE
- LANDLINE
- Last Number Redial
- LATA
- Latency
- Leased Lines
- LEC
- LEC – Local Exchange Carrier
- LERG – Local Exchange Routing Guide
- Line
- Line Appearance
- Line Card
- Link
- LNP – Local Number Portability
- Local Access Transport Area (LATA)
- Local Area Network (LAN)
- Local Exchange Carrier
- Local Exchange Carrier (LEC)
- Local Exchange Routing Guide (LERG)
- Local Loop
- Local Service Request (LSR)
- Location Routing Number (LRN)
- Long Code
- Loop Start
- LOW POWER FM RADIO (LPFM)
- Main Cross
- Masked Calling
- Masked Phone Numbers
- Measured Service
- Meet-Me Bridge or Meet-Me Teleconferencing
- Message Detail Record (MDR)
- Message Rate
- Message Waiting Indicator
- MMS
- Modem (Modulator)
- Modular Jack / Plug
- MPLS – Multi-Protocol Label Switching
- Multiple Mailbox Greetings
- Multiplexed Channel
- Multiplexing
- Music On Hold
- MUST-CARRY (Retransmission)
- Name Announcement
- NANP (North American Numbering Plan)
- NAT – Network Address Translation
- NETWORK
- Network Address Translation (NAT)
- Network Architecture
- Network Demarcation Point
- Network Interface
- Network Service Provider (NSP)
- Night Service
- North American Numbering Plan Administration
- NUMBER PORTABILITY
- Off Hook
- Off Line
- Off Premises System
- On Hook
- On Line
- On-Premise Contact Center
- OPEN VIDEO SYSTEMS
- Operating Company Number (OCN)
- OPERATOR SERVICE PROVIDER (OSP)
- Order notifications
- Outbound
- Outbound Call Restrictions
- Outbound Caller ID number DID or Company
- Outlet / Connector
- PABX
- Packet Loss
- Packet Switched Network
- Packet Switching
- Paging
- PAGING SYSTEM
- Patch Cord
- Patch Panel
- PBX- Private Branch eXchange
- Perceptual Evaluation of Speech Quality (PESQ)
- PERSONAL COMMUNICATIONS SERVICE (PCS)
- Personally Identifiable Information (PII)
- Phone Menu
- Plenum
- POE – Power over Ethernet
- Point to Multipoint
- Port
- Port Order Number (PON)
- POTS – Plain Old Telephone Service
- POTS Lines (Plain Old Telephone Service Lines)
- Power Back
- PRESCRIBED INTEREXCHANGE CHARGE (PICC)
- PRI
- Private Branch Exchange (PBX)
- Prompt
- Propagation Delay
- PSTN- Public Switched Telephone Network
- Public Switched Network
- Punch Down
- Push Notification
- QOS – Quality of Service
- Queue
- Real-time Transport Protocol (RTP)
- Redundancy
- Remote / Duplicate Extensions
- Remote Access
- Remote Call Forwarding
- Remote Location
- REST API
- RFC- Request for Comments
- Ring Conductor
- Ring Network
- Ring Tones
- ROAMING
- Router
- RTP – Real Time Transport Protocol
- SATELLITE
- SATELLITE HOME VIEWER IMPROVEMENT ACT OF 1999 (SHVIA)
- SATELLITE MASTER ANTENNA TELEVISION (SMATV)
- SCANNER
- SD-WAN Software Defined WAN –
- Secretary Functions
- Serial Transmission
- Serverless Architecture
- SERVICE PLAN
- SERVICE PROVIDER
- Service Provider ID (SPID)
- Session Description Protocol (SDP)
- Session Initiation Protocol (SIP)
- Shared Message Boxes
- Shielded Twisted
- Singlemode Optical Fiber
- SIP – Session Initiation Protocol
- SIP Trunking
- SLAMMING
- Small Form Factor
- SMDR (Station Message Detail Reporting)
- SMS
- SMS API
- SMS Character Limit
- SMS Delivery
- SMS Gateway
- SMS Notifications
- Software Development Kit (SDK)
- Speaker Phone
- Special Event Teleconferencing
- SPECTRUM
- Speed Dial
- Station
- Station Hunting
- Structured Cabling
- SUBSCRIBER LINE CHARGE (SLC)
- Switch
- Switched Line
- Switching
- T1
- T3
- TARIFF
- TCPA
- Telecommunications
- TELECOMMUNICATIONS RELAY SERVICE (TRS)
- Telecommunications Room (TR)
- Teleconference
- TELEPHONY
- Telephony
- Terminal
- Tie Line
- Time & Date Display
- Tip Conductor
- Token Ring
- Toll Restriction
- Topology
- Transfer: Announce / Consult
- Transfer: Blind / Ringing
- Transition Point (TP)
- Trunk
- Trunk Group
- TTY
- Turnkey
- Twin
- Twisted Pair
- Two
- Two Factor Authentication (2FA)
- UCaaS
- UNBUNDLING
- Unicode
- Unified Communications UC
- Uniform Resource Identifier (URI)
- UNIVERSAL SERVICE
- Unshielded Twisted
- VERY HIGH FREQUENCY (VHF)
- Video conferencing is a live, visual link over the internet between two or more remote individuals that simulates a face-to-face conference.
- VIDEO DESCRIPTION
- Video Teleconference
- Virtual Number
- Virtual Phone Number
- VM Forwarding
- VM Message Archiving
- VM Remote Access
- VM Time / Date Stamp
- Voice API
- Voice Digitization
- Voice Mail
- Voice Mail Broadcasting List
- Voice Mail System
- Voice Mailbox Group
- Voice Paging
- Voice Proxy
- Voice Response
- VoIP – Voice over Internet Protocol
- VoIP (Voice Over IP)
- VPN – Virtual Private Network
- WAN (Wide Area Network)
- WATS Line
- Webhooks
- WebRTC
- WebSockets
- Work Area Cable
- Work Order
Internet Glossary
- @ (at pronounce)
- Anchor
- Anonymous FTP
- Bandwidth
- Baud
- BBS (Bulletin Board System)
- Bit
- BITNET (Because It’s Time Network)
- Browser
- Byte
- Client
- Cyberspace
- Demo10
- DNS
- Domain Name
- Dot
- Down
- Download
- Element (HTML)
- Emoticon
- End Tag
- FAQ (Frequently Asked Questions)
- File Transfer Protocol (FTP)
- Finger
- Follow
- Freeware
- FTP
- FTP (File Transfer Protocol)
- Get a life
- GIF (Graphic Interchange Format)
- Gopher
- Handshake
- Hang
- Helper Application
- Holy war
- Home Page
- Homepage
- Host
- HTML
- HTML (Hypertext Markup Language)
- HTTP (Hypertext Transport Protocol)
- Hypertext
- Hypertext Transfer Protocol (HTTP)
- IMHO (In My Humble Opinion)
- Internet
- Internet Protocol (IP) Address
- InterNic
- IP Number or IP Address
- IRC (Internet Relay Chat)
- Java
- JavaScript
- JPEG
- Jscript
- LAN
- Link or Hypertext Link
- Listserv
- Login or Logon
- Logoff
- Lurk
- Maillist or Mailing List
- Modem
- MOO (Mud, Object Oriented)
- Mosaic
- MUD
- Multimedia
- Net.god
- Net.personality
- Net.police
- Netiquette
- Network
- Newbie
- Newsgroups
- NIC (Network Information Center)
- Offline
- Online
- Packet Switching
- Ping
- POP
- Port
- Post
- Postmaster
- PPP (Point to Point Protocol)
- Prompt
- Protocol
- README files
- RFC (Request For Comments)
- Robots
- Server
- Shareware
- SLIP (Serial Line Internet Protocol)
- Smiley
- SMTP (Simple Mail Transfer Protocol)
- Snail mail
- Sysop
- Tag (HTML)
- TCP/IP (Transmission Control Protocol/lnternet Protocol)
- TelNet
- telnet://info.comentum.com
- Terminal
- UNIX
- Upload
- URL
- Usenet
- User name
- Veronica (Very Easy Rodent Oriented Net
- WAIS (Wide Area Information Servers)
- WAN (Wide Area Network)
- World Wide Web
- WWW (World Wide Web)
IT Glossary
- Abstraction
- Access point
- Access Time
- Accident
- Accuracy
- Accuracy Study Processor
- Actuator
- Adaptive Maintenance
- ADC
- Address
- Addressing Exception
- Adobe Acrobat Reader
- ADSL
- Algorithm
- Algorithm Analysis
- Alias
- Alphanumeric
- ALU
- Amazon Web Services
- American National Standards Institute
- American Standard Code for Information Interchange
- analog
- analog device
- Analog to digital converter
- Analogue
- Analysis
- Anomaly
- ANSI
- Application program
- Application Programming Interface (API)
- Application software
- APT Threats
- Architectural design
- Architecture
- Archival database
- Archive
- Archive file
- Arithmetic logic Unit
- Arithmetic Overflow
- Arithmetic Underflow
- Array
- as built
- ASCII
- Assemble
- Assembler
- Assembling
- assembly code
- Assembly language
- Assertion
- Assertion Checking
- Assistive technology
- Asynchronous
- Asynchronous Transmission
- Attachment
- Audit
- Audit trail
- Authentication
- Auxiliary Storage
- Back-end
- Backward compatible
- Band
- Bandwidth
- Bar Code
- Baseline
- BASIC
- Basic input/output system
- Batch
- Batch processing
- Baud
- Benchmark
- Bias
- Binary
- BIOS
- Bit
- Bits Per Second
- Black Box Testing
- Block
- Block Check
- Block Diagram
- Block Length
- Block Transfer
- Blockchain
- Blocking Factor
- Blueprint
- Bluetooth
- bomb
- Bookmark
- Boolean
- Boolean operators
- Boot
- Boot (re-boot)
- Bootstrap
- Bounce back
- Boundary Value
- Boundary Value Analysis
- Box Diagram
- BPS
- Branch
- Branch Analysis
- Branch Coverage
- Break/Fix
- Bubble Chart
- Buffer
- Bug
- Bus
- Business Continuity
- BYOD
- Byte
- C
- C++
- Cache
- CAD
- Calibration
- Call Graph
- CAM
- CASE
- Cause Effect Graph
- Cause Effect Graphing
- CCITT
- CD-ROM
- Central Processing Unit
- Certification
- Change Control
- Change Tracker
- Check Summation
- Checksum
- Chip
- CISC
- Client Server
- Clock
- CMOS
- CO-AX
- Coaxial Cable
- COBOL
- Code
- Code Audit
- Code Auditor
- Code Inspection
- Code Review
- Code Walkthrough
- Coding
- Coding Standards
- Comment
- Compact Disc – Read only memory
- Comparator
- Compatibility
- Compilation
- Compile
- Compiler
- Compiling
- Complementary Metal Oxide Semiconductor
- Completeness
- Complex Instruction Set Computer
- Complexity
- Component
- Computer
- Computer Aided Design
- Computer Aided Manufacturing
- Computer Aided Software Engineering
- Computer Instruction Set
- Computer Language
- Computer Program
- Computer Science
- Computer System
- Computer System Audit
- Computer System Security
- Computer Word
- Computerized System
- Concept Phase
- Condition Coverage
- Configurable, off-the-shelf software
- Configuration
- Configuration Audit
- Configuration Control
- Configuration Identification
- Configuration Item
- Configuration Management
- Consistency
- Consistency Checker
- Constant
- Constraint Analysis
- Consultive Committee for International Telephony and Telegraphy
- Content
- Content Management
- Contrast with software item
- Control Bus
- Control Flow
- Control Flow Analysis
- Control Flow Diagram
- Control Program for Microcomputers
- Controller
- Conversational
- Cookie
- Coroutine
- Corrective Maintenance
- Correctness
- COTS
- Coverage Analysis
- CP/M
- CPU
- Crash
- CRC
- Critical Control Point
- Critical Design Review
- Criticality
- Criticality Analysis
- Cross-Assembler
- Cross-Compiler
- Cross-Platform
- Crowdsourcing
- CRT
- CRT – cathode ray tub
- CSP
- CSS
- Cursor
- Customer Relationship Management
- Cyber Physical Attacks
- Cybercrime
- Cybersecurity
- Cyclic Redundancy [check] Code
- Cyclomatic Complexity
- DAC
- data
- Data Analysis
- Data Bus
- Data Center
- Data Corruption
- Data Dictionary
- Data Element
- Data Exception
- Data Flow Analysis
- Data Flow Diagram
- Data Integrity
- Data Item
- Data Loss Prevention (DLP)
- Data Set
- Data Sink
- Data Structure
- Data Structure Centered Design
- Data Structure Diagram
- Data Validation
- Database
- Database Analysis
- Database Security
- DDoS Attacks
- Dead Code
- Debugging
- Decision Coverage
- Decision Table
- Default
- Default Value
- Defect
- Defect Analysis
- Delimiter
- Demo10
- Demodulate
- Demodulation
- Dependability
- Design
- Design Description
- Design Level
- Design of Experiments
- Design Phase
- Design Requirement
- Design Review
- Design Specification
- Design Standards
- Desk Checking
- Desktop
- Detailed Design
- Developer
- Development Methodology
- Development Standards
- Device driver
- Devices
- DevOps
- DFD
- DHCP
- Diagnostic
- Dialog box
- Different Software System Analysis
- Digital
- Digital-To-Analog Converter
- Direct Memory Access
- Directed Graph
- Disaster Recovery
- Disk
- Disk Drive
- Disk Operating System
- Diskette
- Disruptive Technology
- DMA
- Documentation
- Documentation Plan
- Documentation, level of
- Documentation, Software
- Domain
- Domain Name
- DOS
- Download
- Drift
- Driver
- Duplex Transmission
- DV
- Dynamic Analysis
- EBCDIC
- Edge Computing
- Editing
- EEPROM
- EHR
- EHR/EMR/PHR (Electronic Health Record/Electronic Health Record/Personal Health Record)
- Electrically Erasable Programmable Read Only Memory
- Electromagnetic Interference
- Electronic Media
- Electrostatic Discharge
- Embedded Computer
- Embedded Software
- EMI
- EMR
- Emulation
- Emulator
- Encapsulation
- Encryption
- End User
- Endpoint Security
- Enhanced small Device Interface
- Entity Relationship Diagram
- Environment
- EPROM
- Equivalence Class Partitioning
- Erasable Programmable Read Only Memory
- Error
- Error Analysis
- Error Detection
- Error Guessing
- Error Seeding
- ESD
- ESDI
- Ethernet
- Ethernet Card
- Event Table
- Evolutionary Development
- Exception
- Exception Conditions/Responses Table
- Execution Trace
- Exploit Kits
- Extended ASCII
- Extended binary coded decimal interchange code
- Extremal Test Data
- Fagan Inspection
- Fail-Safe
- Failure
- Failure Analysis
- Failure Modes and Effects Analysis
- Failure Modes and Effects Criticality Analysis
- Fault
- Fault Seeding
- Fault Tree Analysis
- FDD
- Feasibility Study
- Federal Information Processing Standards
- Female connector
- Fiber Optics
- Field
- File
- File Maintenance
- File Transfer Protocol
- Filter
- FIPS
- Firewall
- Firmware
- Flag
- Flash Drive
- Flat File
- Floppy disk
- Floppy Disk Drive
- Flowchart or Flow Diagram
- FMEA
- FMECA
- Formal Qualification Review
- FORTRAN
- FTA
- FTP
- Full Duplex
- Function
- Functional Analysis
- Functional Configuration Audit
- Functional Decomposition
- Functional Design
- Functional Requirement
- Gateway
- GB
- GIF
- Gigabyte (Gig or GB)
- Graph
- Graphic Software Specifications
- Half Duplex
- Handshake
- Hard Copy
- Hard disk
- Hard Disk Drive
- Hard Drive
- Hardware
- Hazard
- Hazard Analysis
- Hazard Probability
- Hazard Severity
- HDD
- Help desk
- Hertz
- Hexadecimal
- Hierarchical Decomposition
- Hierarchy of Input Processing Output
- Hierarchy of Input Processing Output Chart
- High Level Language
- HIPO
- Home page
- Hostnames
- HTTP
- Hyperconverged Infrastructure (HCI)
- Hz
- I/0
- I/O port
- IaaS
- IC
- IDE
- IEC
- IEEE
- implementation
- implementation phase
- implementation requirement
- incremental development
- incremental integration
- industry standard
- information hiding
- Information Security Policy
- input-process-output chart
- input-processing-output
- input/output
- inspection
- installation
- installation and checkout phase
- installation qualification
- Institute of Electrical and Electronic Engineers
- instruction
- instruction set
- instrumentation
- integrated circuit
- integrated drive electronics
- interactive
- interface
- interface analysis
- interface requirement
- International Electrotechnical Commission
- International Organization for Standardization
- International Standards Organization
- International Telecommunications Union – Telecommunications Standards Section
- Internet
- Internet of Everything (IoE)
- Internet of Things (IoT)
- interpret
- interpreter
- interrupt
- Interrupt Analyzer
- Intranet
- Invalid Inputs
- IP Address
- ISO
- ISP
- ITIL®
- ITU-TSS
- Java
- JCL
- Job
- Job Control Language
- KB
- Kermit
- Key
- Key Element
- Kilobyte
- KLOC
- Ladder Logic
- Language
- large Scale Integration
- latency
- latent Defect
- life Cycle
- life Cycle Methodology
- linkage editor
- loader
- local area network
- Localhost
- logic analysis
- longitudinal redundancy check
- low-level language
- LSI
- MAC
- MAC Address
- machine code
- machine language
- Machine Learning
- macro
- macroinstruction
- Mail server
- main memory
- main program
- mainframe
- maintainability
- maintenance
- Male connector
- Malware
- MAN
- Managed Antivirus
- Managed Security Service Provider (MSSP)
- Mb
- MB
- MDM
- MDR
- mean time between failures
- mean time to failure
- mean time to repair
- measurable
- measure
- measurement
- medium scale integration
- megabit
- Megabyte
- Megabyte (Meg or MB)
- Megahertz
- memory
- menu
- metal-oxide semiconductor
- metal-oxide semiconductor field effect transistor
- metric based test data generation
- metric, software quality
- metropolitan area network
- MHz
- microcode
- microcomputer
- microprocessor
- Microsoft Azure
- Microsoft Exchange
- Microsoft Teams
- Microsoft Windows
- million instructions per second
- MIME
- minicomputer
- MIPS
- mishap
- mnemonic
- modeling
- Modem
- modem access
- modifiability
- modular decomposition
- modular software
- modularity
- modulate
- modulation
- module
- module interface table
- Monitor
- MOS
- MOSFET
- MSI
- MSP
- MTBF
- MTTF
- MTTR
- Multi-Factor Authentication (MFA)
- multi-processing
- multi-programming
- multi-tasking
- multiple condition coverage
- multipurpose systems
- mutation analysis
- n-channel MOS
- Nameserver
- NAT
- National Bureau of Standards
- National Institute for Standards and Technology
- NBS
- Network
- Network adapter
- network database
- Network hub
- Network Interface / Network Adapter
- Network Operations Center (NOC)
- Network Switch Managed
- Network Switch Unmanaged
- nibble
- NIST
- NMI
- NMOS
- NNTP
- node
- non-maskable interrupt
- noncritical code analysis
- nonincremental integration
- null
- null data
- null string
- object
- object code
- object oriented design
- object oriented language
- object oriented programming
- object program
- OCR
- octal
- OEM
- on-line
- On-site
- Online
- OOP
- Operating system
- operation and maintenance phase
- operation exception
- operator
- optical character recognition
- optical fiber
- optimization
- Oracle
- original equipment manufacturer
- overflow
- overflow exception
- paging
- PAL
- parallel
- parallel processing
- parameter
- parity
- parity bit
- parity check
- Pascal
- password
- Patch
- path analysis
- path coverage
- PC
- PCB
- PDL
- perfective maintenance
- performance requirement
- peripheral device
- peripheral equipment
- personal computer
- Personally Identifiable Information (PII)
- Phishing
- PHR
- physical configuration audit
- physical requirement
- pixel
- PLA
- platform
- Platform as a Service (PaaS)
- PLD
- Plug-in
- PMOS
- polling
- POP
- Port
- positive channel MOS
- PPM
- precision
- preliminary design
- preliminary design review
- printed circuit board
- Proactive Monitoring
- Processor
- production database
- Professional Services Automation (PSA)
- program
- program design language
- program mutation
- programmable array logic
- programmable array logic
- programmable logic array
- programmable logic device
- programmable read only memory
- programming language
- programming standards
- programming style analysis
- project plan
- PROM
- PROM programmer
- proof of correctness
- protection exception
- Protocol
- Protocol – TCP, UDP, ICMP, etc.
- prototyping
- pseudocode
- QA
- QC
- qualification, installation
- qualification, operational
- qualification, process performance
- qualification, product performance
- quality assurance
- quality assurance, software
- quality control
- radiofrequency interference
- RAM
- random access memory
- range check
- Ransomware
- rapid prototyping
- read only memory
- Read-only
- real time
- real time processing
- record
- record of change
- Recovery Point Objective (RPO)
- Recovery Time Objective (RTO)
- recursion
- reduced instruction set computer
- region
- register
- regression analysis and testing
- relational database
- release
- reliability
- reliability assessment
- Remote desktop
- Remote login
- Remote Monitoring and Management (RMM)
- requirement
- requirements analysis
- requirements phase
- requirements review
- requirements review
- Resolution
- retention period
- retrospective trace
- revalidation
- review
- revision number
- RFI
- RISC
- risk
- Risk Assessment
- Risk Management
- robustness
- ROM
- Router
- routine
- RS-232-C
- SAAS
- safety
- safety critical
- safety critical computer software components
- SAN
- SCSI
- SD-WAN
- Search engine
- security
- Security Operations Center (SOC)
- sensor
- SEO
- serial
- Serial port
- Server
- Service Level Agreement (SLA)
- service program
- servomechanism
- severity
- SID
- side effect
- SIEM
- simulation
- simulation analysis
- simulator
- sizing
- sizing and timing analysis
- small computer systems interface
- small scale integration
- SMB
- SMPT
- SMTP
- SOC-as-a-service
- Social Engineering
- Software
- Software as a Service (SaaS)
- software audit
- software characteristic
- software configuration item
- software design description
- software developer
- software development notebook
- software development plan
- software development process
- software diversity
- software documentation
- software element
- software element analysis
- software engineering
- software engineering environment
- software hazard analysis
- software item
- software life cycle
- software reliability
- software requirements specification
- software review
- software safety change analysis
- software safety code analysis
- software safety design analysis
- software safety requirements analysis
- software safety test analysis
- Software-defined data center
- Software-defined networking
- Software-defined security
- SOPs
- Source Code
- source program
- spaghetti code
- Spam
- Spear Phishing
- special test data
- specification
- specification analysis
- specification tree
- specification, design
- specification, formal
- specification, functional
- specification, interface
- specification, performance
- specification, product
- specification, programming
- specification, requirements
- specification, system
- specification, test case
- spiral model
- SQL
- SSI
- SSL
- ST-506
- standard operating procedures
- state
- state diagram
- state-transition table
- statement coverage
- static analysis
- static analyzer
- stepwise refinement
- storage device
- string
- structure chart
- structured design
- structured programming
- structured query language
- stub
- subprogram
- subroutine
- subroutine trace
- support software
- Switch
- symbolic execution
- symbolic trace
- synchronous
- synchronous transmission
- syntax
- system
- system administrator
- system analysis
- system design
- system design review
- system documentation
- System Hardening
- system integration
- system life cycle
- system manager
- system safety
- system software
- tape
- TB
- TCP/IP
- Teams / Microsoft Teams
- telecommunication system
- terabyte
- test
- test case
- test case generator
- test design
- test documentation
- test driver
- test harness
- test incident report
- Test Item
- test log
- test phase
- Test Plan
- test procedure
- test readiness review
- Test Report
- test result analyzer
- testability
- testing
- Testing Path
- Testing Performance
- Testing Qualification
- testing, 100%
- testing, acceptance
- testing, alpha []
- testing, assertion
- testing, beta []
- testing, boundary value
- testing, branch
- testing, compatibility
- testing, component
- testing, design based functional
- testing, development
- testing, exhaustive
- testing, formal
- testing, functional
- testing, integration
- testing, interface
- testing, interphase
- testing, invalid case
- testing, mutation
- testing, operational
- testing, parallel
- testing, regression
- testing, special case
- testing, statement
- testing, storage
- testing, stress
- testing, structural
- testing, system
- testing, unit
- testing, usability
- testing, valid case
- testing, volume
- testing, worst case
- time sharing
- timing
- timing analyzer
- timing and sizing analysis
- top-down design
- touch screen
- touch sensitive
- trace
- traceability
- traceability analysis
- traceability matrix
- transaction
- transaction analysis
- transaction flowgraph
- transaction matrix
- transform analysis
- translation
- transmission control protocol/Internet protocol
- trojan horse
- truth table
- tuning
- twisted pair
- Two-factor authentication (2FA)
- unambiguous
- underflow
- underflow exception
- Unified Threat Management (UTM)
- unit
- UNIX
- Unzip
- URL
- usability
- USB
- USB port
- user
- user’s guide
- Username
- utility program
- utility software
- V&V
- valid
- valid input
- validate
- validation
- validation protocol
- validation, process
- validation, prospective
- validation, retrospective
- validation, software
- validation, verification, and testing
- variable
- variable trace
- VAX
- vendor
- verifiable
- verification, software
- verify
- version
- version number
- very large scale integration
- Viral
- virtual address extension
- virtual memory system
- Virtualization
- Virus
- VLSI
- VMS
- VoIP
- volume
- VPN
- VV&T
- walkthrough
- WAN
- WAP
- watchdog timer
- waterfall model
- WEP
- white-box testing
- Wi-Fi
- wide area network
- Window
- Windows
- Wireless (networking)
- WLAN
- word
- workaround
- workstation
- worm
- WPA
- Xmodem
- Ymodem
- Zip
- Zmodem