- 1U Server
- 3D Mouse
- 3D Printer
- 3D Printing
- 3D Scanner
- 3D Software
- 3-D Spreadsheet
- 3D Stereo
- 3-D TV
- 3ivx
- 3V’s
- 5-Tuple
- 6to4
- 8b/10b Encoding
- 8-Bit
- 8-Bit Unicode Transformation Format
- 9P
- 9wm
- 10BASE-2
- 10BASE5
- 10-Gigabit Ethernet
- 10x Developer
- 16-Bit
- 32-Bit
- 3.5 Inch Floppy Disk
- 40 Gigabit Ethernet
- 45 Nanometer
- 5.1 Surround Sound
- 64-bit
- 90 nanometer
- 100BASE-T
- 100 Gigabit Ethernet
- 128-Bit Encryption
- 133T Speak
- 24/7 Support
- 256-Bit Encryption
- 5.25 Inch Floppy Disk
- 5-4-3 Rule
- 1000Base-F
- 1000BASE-T
- 1000BASE-TX
- 1000BASE-X
- 1080 Interlaced
- Abnormal End
- Abstract Class
- Abstract IL
- Accelerated Graphics Port
- Accelerometer
- Access Control List
- Access Modifiers
- Accounting
- ACD Canvas
- ACID
- Active-Matrix Liquid Crystal Display
- ActiveX Data Object.NET
- ActiveX Data Objects
- Adaptive Software
- Add/Drop Multiplexer
- Address Resolution Protocol Spoofing
- Ad Hoc Polymorphism
- Adobe Acrobat
- Advanced Business Application Programming
- Agile Software Development
- Air Cooling
- Algorithm
- Alpha Testing
- AMD Virtualization
- Analog-to-Digital Converter
- Android
- Android Debug Bridge
- Android OS
- Android Platform
- Anisotropic Filtering
- Annual Change Traffic
- Anonymizer
- Anonymous (Computing)
- Anonymous Login
- Anonymous Post
- Answer-Only Modem
- Anti-Static Mat
- Anti-Virus Software
- Apache
- Application Lifecycle Management
- Application Programming Interface
- Application Programming Model
- Application Software
- Artificial Intelligence
- Artificial Neural Network
- Aspect-Oriented Programming
- Astronomical Instrument Markup Language
- Asymmetric Digital Subscriber Line
- Authentication
- Authorization
- Authorized Education Reseller
- Authorized Programming Analysis Report
- Auto-Answer
- Autodesk Animator
- Autodesk Inventor
- Automatic Document Feeder
- Automatic Identification and Data Capture
- Automatic Location Identification
- Autonomic Computing
- Availability
- Average Hold Time
- Back-End System
- Backup
- Backward Chaining
- Bad Sector
- Banner Rotator
- Base Class
- Base Station
- Batch File
- Batch Processing
- Best Practice
- Big Iron
- Big Red Switch
- Binary Digit
- Binary Number System
- Binary Runtime Environment for Wireless
- BIOS
- Bits Per Second
- BlackBerry
- Black Hole
- Blowfish
- Blu-Ray Disk
- Boolean Logical Operator
- Boot Disk
- Bootstrap Protocol
- Brand Advocate
- Breadcrumb Navigation
- Breakpoint
- BREW Applications
- Bridge Router
- Bridging
- Broadband
- Broadcast Storm
- Brush
- Bubble Sort
- Bug
- Bug Tracking
- Bump Mapping
- Burndown Chart
- Business Activity Monitoring
- Business Application Programming Interface
- Business Event Management
- Business Process Management
- Business-to-Business
- Business-to-Consumer
- Bytecode
- Cabinet File
- Cable Modem
- Candidate Key
- C# (C sharp)
- Centers for Medicare and Medicaid Services
- Certification Authority
- Certification Commission for Healthcare Information Technology
- Challenge Handshake Authentication Protocol
- Chatbot
- Chuck Norris Facts
- Click-Through Rate
- Clipboard
- Cloud Computing
- Cluster
- Cluster (Servers)
- Code 100 Continue
- Code 101 Switching Protocols
- Code 102 Processing
- Code 103 Early Hints
- Code 200 OK
- Code 201 Created
- Code 202 Accepted
- Code 203 Non-Authoritative Information
- Code 204 No Content
- Code 205 Reset Content
- Code 206 Partial Content
- Code 207 Multi-Status
- Code 208 Already Reported
- Code 226 IM Used
- Code 300 Multiple Choices
- Code 301 Moved Permanently
- Code 302 Found
- Code 302 Moved Temporarily
- Code 303 See Other
- Code 304 Not Modified
- Code 305 Use Proxy
- Code 306 (Unused)
- Code 307 Temporary Redirect
- Code 308 Permanent Redirect
- Code 400 Bad Request
- Code 401 Unauthorized
- Code 402 Payment Required
- Code 403 Forbidden
- Code 404 Not Found
- Code 405 Method Not Allowed
- Code 406 Not Acceptable
- Code 407 Proxy Authentication Required
- Code 408 Request Timeout
- Code 409 Conflict
- Code 410 Gone
- Code 411 Length Required
- Code 412 Precondition Failed
- Code 413 Payload Too Large
- Code 414 URI Too Long
- Code 415 Unsupported Media Type
- Code 416 Range Not Satisfiable
- Code 417 Expectation Failed
- Code 418 I’m a teapot
- Code 419 Authentication Timeout
- Code 421 Misdirected Request
- Code 422 Unprocessable Entity
- Code 423 Locked
- Code 424 Failed Dependency
- Code 425 Too Early
- Code 426 Upgrade Required
- Code 428 Precondition Required
- Code 429 Too Many Requests
- Code 431 Request Header Fields Too Large
- Code 449 Retry With
- Code 451 Unavailable For Legal Reasons
- Code 499 Client Closed Request
- Code 500 Internal Server Error
- Code 501 Not Implemented
- Code 502 Bad Gateway
- Code 503 Service Unavailable
- Code 504 Gateway Timeout
- Code 505 HTTP Version Not Supported
- Code 506 Variant Also Negotiates
- Code 507 Insufficient Storage
- Code 508 Loop Detected
- Code 509 Bandwidth Limit Exceeded
- Code 510 Not Extended
- Code 511 Network Authentication Required
- Code 520 Unknown Error
- Code 521 Web Server Is Down
- Code 522 Connection Timed Out
- Code 523 Origin Is Unreachable
- Code 524 A Timeout Occurred
- Code 525 SSL Handshake Failed
- Code 526 Invalid SSL Certificate
- Code Access Security
- Code Division Multiple Access
- Code Division Multiple Access
- Cold Standby
- Comma-Separated Values File
- Commerce Services Provider
- Commit
- Common Business Oriented Language
- Common Management Information Protocol
- Communication Software
- Computer Cluster
- Computer Graphics Metafile
- Computer Port
- Computer Security
- Computer Security Incident Response Team
- Computer Telephony Integration
- Computing Hub
- Connection Admission Control
- Content Management System
- Cookie
- Core Router
- Cost Management
- Cost Per Action
- Cost Per Click
- Critical Security Parameter
- Cross Site Scripting
- Cupcake
- Customer Data Integration
- Customer Relationship Management
- Cybersecurity
- Cyberthreat
- Dalvik
- Dalvik Debug Monitor Service
- Data
- Database Column
- Database Encryption and Decryption
- Database Object
- Database Report
- Database Row
- Database Trigger
- Data Definition Language
- Data De-Identification
- Data Encapsulation
- Data Encryption Standard
- Datagram
- Data Link Control
- Data Link Layer
- Data Manipulation Language
- Data Mirroring
- Data Modeling
- Data Obfuscation
- Data Over Cable Service Interface Specification
- Data Perturbation
- Data Replay
- Data Warehouse
- DBMS (Database Management System)
- Default Values – Database
- Demultiplex
- Dense Wavelength Division Multiplexing
- Design Pattern
- Desktop Administration
- Desktop Virtualization
- Development Data Platform
- Digital Commerce
- Digital Rights
- Digital Simultaneous Voice and Data
- Digital Versatile Disk Rewritable
- Digital Video Broadcasting – Cable
- Digital Visual Interface
- Direct-Connect Modem
- Directory Services
- Distributed Computing System
- Double Data Rate
- Drawing Exchange Format
- Dual Inline Package Switch
- Dynamic Random Access Memory
- Eclipse Platform
- E-Commerce Advisor
- E-commerce Hosting
- E-commerce Remarketing
- Edgar F. Codd
- EDGE
- Edge Router
- Electrically Programmable Logic Device
- Electronic Audit Trail
- Electronic Data Interchange
- Electronic Health Record
- Electronic Mail
- Electronic Medical Record
- Electronic Patient Release of Information Form
- Electronic Storefront
- Electrophoretic Ink
- Eligible Provider
- Elk Cloner
- Email Appending
- Endpoint Identifier
- Endpoint Security
- Engine
- Enhanced Messaging Service
- Enhancement
- Enterprise Feedback Management
- Enterprise Messaging System
- Enterprise Portal Software
- Enterprise Private Network
- Enterprise Relationship Management
- Enterprise Resource Planning
- Enterprise Software
- Enterprise Systems Connection
- Erlang Programming Language
- Error Code 0x0000000A
- Error Code 0x000000A0
- Error Code 0x000000A1
- Error Code 0x000000A2
- Error Code 0x000000A3
- Error Code 0x000000A4
- Error Code 0x000000A5
- Error Code 0x000000A7
- Error Code 0x000000AB
- Error Code 0x000000AC
- Error Code 0x000000AD
- Error Code 0x0000000B
- Error Code 0x000000B4
- Error Code 0x000000B8
- Error Code 0x000000B9
- Error Code 0x000000BA
- Error Code 0x000000BB
- Error Code 0x000000BC
- Error Code 0x000000BE
- Error Code 0x000000BF
- Error Code 0x0000000C
- Error Code 0x000000C1
- Error Code 0x000000C2
- Error Code 0x000000C4
- Error Code 0x000000C5
- Error Code 0x000000C6
- Error Code 0x000000C7
- Error Code 0x000000C8
- Error Code 0x000000C9
- Error Code 0x000000CA
- Error Code 0x000000CB
- Error Code 0x000000CC
- Error Code 0x000000CD
- Error Code 0x000000CE
- Error Code 0x000000CF
- Error Code 0x0000000D
- Error Code 0x000000D0
- Error Code 0x000000D1
- Error Code 0x000000D2
- Error Code 0x000000D3
- Error Code 0x000000D4
- Error Code 0x000000D5
- Error Code 0x000000D6
- Error Code 0x000000D7
- Error Code 0x000000D8
- Error Code 0x000000D9
- Error Code 0x000000DA
- Error Code 0x000000DB
- Error Code 0x000000DC
- Error Code 0x000000DE
- Error Code 0x000000DF
- Error Code 0x0000000E
- Error Code 0x000000E0
- Error Code 0x000000E1
- Error Code 0x000000E1
- Error Code 0x000000E2
- Error Code 0x000000E3
- Error Code 0x000000E4
- Error Code 0x000000E6
- Error Code 0x000000E7
- Error Code 0x000000E9
- Error Code 0x000000EA
- Error Code 0x000000EB
- Error Code 0x000000EC
- Error Code 0x000000ED
- Error Code 0x000000EF
- Error Code 0x0000000F
- Error Code 0x000000F1
- Error Code 0x000000F3
- Error Code 0x000000F4
- Error Code 0x000000F5
- Error Code 0x000000F6
- Error Code 0x000000F7
- Error Code 0x000000F8
- Error Code 0x000000F9
- Error Code 0x000000FA
- Error Code 0x000000FC
- Error Code 0x000000FD
- Error Code 0x000000FE
- Error Code 0x000000FF
- Error Code 0x00000001
- Error Code 0x0000001A
- Error Code 0x0000001B
- Error Code 0x0000001C
- Error Code 0x0000001D
- Error Code 0x0000001E
- Error Code 0x0000001F
- Error Code 0x00000002
- Error Code 0x0000002A
- Error Code 0x0000002B
- Error Code 0x0000002C
- Error Code 0x0000002D
- Error Code 0x0000002E
- Error Code 0x0000002F
- Error Code 0x00000003
- Error Code 0x0000003A
- Error Code 0x0000003B
- Error Code 0x0000003C
- Error Code 0x0000003D
- Error Code 0x0000003E
- Error Code 0x0000003F
- Error Code 0x00000004
- Error Code 0x0000004A
- Error Code 0x0000004B
- Error Code 0x0000004C
- Error Code 0x0000004D
- Error Code 0x0000004E
- Error Code 0x0000004F
- Error Code 0x00000005
- Error Code 0x0000005A
- Error Code 0x0000005B
- Error Code 0x0000005C
- Error Code 0x0000005D
- Error Code 0x0000005E
- Error Code 0x0000005F
- Error Code 0x00000006
- Error Code 0x0000006A
- Error Code 0x0000006B
- Error Code 0x0000006C
- Error Code 0x0000006D
- Error Code 0x0000006E
- Error Code 0x0000006F
- Error Code 0x00000007
- Error Code 0x0000007A
- Error Code 0x0000007B
- Error Code 0x0000007C
- Error Code 0x0000007D
- Error Code 0x0000007E
- Error Code 0x0000007F
- Error Code 0x00000008
- Error Code 0x0000008B
- Error Code 0x0000008E
- Error Code 0x0000008F
- Error Code 0x00000009
- Error Code 0x0000009A
- Error Code 0x0000009B
- Error Code 0x0000009E
- Error Code 0x0000009F
- Error Code 0x0000009С
- Error Code 0x00000010
- Error Code 0x0000010A
- Error Code 0x0000010C
- Error Code 0x0000010D
- Error Code 0x0000010E
- Error Code 0x0000010F
- Error Code 0x00000011
- Error Code 0x0000011A
- Error Code 0x0000011B
- Error Code 0x0000011C
- Error Code 0x0000011D
- Error Code 0x00000012
- Error Code 0x0000012B
- Error Code 0x0000012C
- Error Code 0x00000013
- Error Code 0x00000014
- Error Code 0x00000015
- Error Code 0x00000016
- Error Code 0x00000017
- Error Code 0x00000018
- Error Code 0x00000019
- Error Code 0x00000020
- Error Code 0x00000021
- Error Code 0x00000022
- Error Code 0x00000022
- Error Code 0x00000023
- Error Code 0x00000024
- Error Code 0x00000025
- Error Code 0x00000026
- Error Code 0x00000027
- Error Code 0x00000028
- Error Code 0x00000029
- Error Code 0x00000030
- Error Code 0x00000031
- Error Code 0x00000032
- Error Code 0x00000033
- Error Code 0x00000034
- Error Code 0x00000035
- Error Code 0x00000036
- Error Code 0x00000037
- Error Code 0x00000038
- Error Code 0x00000039
- Error Code 0x00000040
- Error Code 0x00000041
- Error Code 0x00000042
- Error Code 0x00000043
- Error Code 0x00000044
- Error Code 0x00000045
- Error Code 0x00000046
- Error Code 0x00000047
- Error Code 0x00000048
- Error Code 0x00000049
- Error Code 0x00000050
- Error Code 0x00000051
- Error Code 0x00000052
- Error Code 0x00000053
- Error Code 0x00000054
- Error Code 0x00000055
- Error Code 0x00000056
- Error Code 0x00000057
- Error Code 0x00000058
- Error Code 0x00000059
- Error Code 0x00000060
- Error Code 0x00000061
- Error Code 0x00000062
- Error Code 0x00000063
- Error Code 0x00000064
- Error Code 0x00000065
- Error Code 0x00000066
- Error Code 0x00000067
- Error Code 0x00000068
- Error Code 0x00000069
- Error Code 0x00000070
- Error Code 0x00000071
- Error Code 0x00000072
- Error Code 0x00000073
- Error Code 0x00000074
- Error Code 0x00000075
- Error Code 0x00000076
- Error Code 0x00000077
- Error Code 0x00000078
- Error Code 0x00000079
- Error Code 0x00000080
- Error Code 0x00000081
- Error Code 0x00000082
- Error Code 0x00000085
- Error Code 0x00000090
- Error Code 0x00000092
- Error Code 0x00000093
- Error Code 0x00000094
- Error Code 0x00000096
- Error Code 0x00000097
- Error Code 0x00000098
- Error Code 0x00000099
- Error Code 0x00000100
- Error Code 0x00000101
- Error Code 0x00000103
- Error Code 0x00000104
- Error Code 0x00000105
- Error Code 0x00000106
- Error Code 0x00000108
- Error Code 0x00000109
- Error Code 0x00000111
- Error Code 0x00000112
- Error Code 0x00000113
- Error Code 0x00000114
- Error Code 0x00000115
- Error Code 0x00000116
- Error Code 0x00000117
- Error Code 0x00000119
- Error Code 0x00000121
- Error Code 0x00000122
- Error Code 0x00000124
- Error Code 0x00000127
- Error Code 0x100000EA
- Error Code 0x1000007E
- Error Code 0x1000008E
- Error Code 0xC000021A
- Error Code 0xC0000218
- Error Code 0xC0000221
- Error Code 0xDEADDEAD
- EtherLoop
- Ethernet Networking Interface
- Event
- Event-Driven Architecture
- Event Router
- Evolution Data Only
- Executable
- Expansion Card
- Expansion Slot
- Extensible Markup Language
- External Modem
- Extreme Programming
- Fabric Ports
- FastIP
- Fault Management
- Fault Tolerance
- Fax Modem
- Fax Over Internet Protocol
- FCAPS
- Feature Creep
- Federal Desktop Core Configuration
- Federal Health Architecture
- Federal Information Processing Standards
- Federal Internet Exchange
- Federated Network Identity
- Federation Against Software Theft
- Few-Shot Learning
- Fiber Channel Over Ethernet
- Fiber Distributed Data Interface
- Fibre Channel over Internet Protocol
- Fifth-Generation Programming Language
- File Allocation Table
- File Transfer Protocol
- File Virtualization
- Financial Information System
- Firesheep
- Fire Walking
- FireWire
- Firmware
- First-Generation Programming Languages
- Fixed Routing
- Flash Memory
- Floating-Point Unit
- Floppy Disk Drive
- Flowchart
- Flow Control
- Foo
- Food and Drug Administration
- Fourth-Generation Programming Language
- Fourth Generation Wireless
- Frame Check Sequence
- Free and Open-Source Software
- Free Software
- Frequency Division Multiplexing
- Front-Ends and Back-Ends
- Frontside Bus
- FTP Trojan
- Functional Programming
- G3
- G.7xx
- G.711
- G.721
- G.723
- G.729
- Game Balance
- Gammima
- Garbage Collection
- Garbage In, Garbage Out
- Gateway
- Generic Access Network
- Generic Port
- Generics
- Geoport
- Geotagging
- Ghostball Virus
- Gigabit
- Gingerbread
- Global Area Network
- Globalization Management System
- Global Regular Expression Print
- Global System for Mobile Communications
- GNU
- GNU General Public License
- Gnutella
- Google Data Liberation Front
- Google Docs
- Google Health
- Google Phone
- Google Takeout
- Gordon Moore
- GPRS Tunneling Protocols
- Graffiti
- Graphical User Interface
- Graphics Device Interface +
- Graphics Processing Unit
- Gray Market
- Green Computing
- Greenfield Deployment
- Green Personal Computer
- Grid Computing
- Grinding
- Group 3 Protocols
- Group 4 Protocols
- Hacker
- Hacking
- Hacking Tool
- Hairpin
- Hammering
- Handoff
- Haptic
- Hard Disk Drive
- Hard Disk Loading
- Hardware Management Console
- Hardware Virtualization
- Hardware VPN
- Health Care Data Encryption
- Health Information Organization
- Health Level Seven Clinical Document Architecture
- Heat Sink
- Heavy Internet Use
- High-Energy Radio Frequency Weapon
- High-Gain Antenna
- High-Level Assembler
- High-Level Data Link Control
- High-Performance File System
- High-Speed Downlink Packet Access
- High-Speed Uplink Packet Access
- HIPAA Privacy Rule
- Hold Down Timer
- Honeynet
- Hop
- Host Identity Protocol
- Host Operating System
- Hot Plugging
- Hot Potato Routing
- Hot Site
- Hot Spare
- Hot Standby
- Hot Standby Router Protocol
- HPNA
- .htaccess
- HTML5
- HTTP Status Codes: Client Error (4xx)
- HTTP Status Codes: Informational (1xx)
- HTTP Status Codes: Redirection (3xx)
- HTTP Status Codes: Server Error (5xx)
- HTTP Status Codes: Success (2xx)
- Human Interface Device
- Hyperlink
- Hypertext Transfer Protocol
- HyperTransport Bus
- Hypervisor
- IEC Connector
- IEEE 1394
- iMac
- Image Scanner
- In-Betweening
- Information Assurance
- Information Security
- Information Systems Security
- Information Systems Security Engineer
- Infrastructure as a Service
- .INI Files
- Inline Frame
- Input/Output
- Integrated Development Environment
- Integrated Development Environment
- Intellectual Property
- Intelligent Device
- Intentional Programming
- Intentional Software
- Interactive Data Language
- Interactivity
- Internal Modem
- Internet Addiction
- Internet Assigned Numbers Authority
- Internet Explorer
- Internet Meme
- Internet Protocol
- Internet Protocol
- Internet Protocol Security
- Internet Protocol Switching
- Internet Security and Acceleration Server
- Internet Small Computer Systems Interface
- Internet Software Piracy
- Internetworking
- Internetworking Device
- Interrupt Request
- Intranet
- Intrusion Detection System
- Inverse Multiplexer
- I/O Virtualization
- IP Address
- iPhone
- IP Spoofing
- IPv4
- IPv6
- IT Certification
- Iteration
- J2EE Application Deployer and Administrator
- J2EE Client
- J2EE Product Provider
- JAD
- Jailbreak
- Jailbreak App
- Jammer
- JApplet
- Java
- Java 2 Platform, Enterprise Edition
- Java 2 Platform Micro Edition
- Java Applet
- JavaBeans
- Java Card
- Java Database Connectivity Interface
- Java Data Objects
- Java Development Kit
- Java HyperText Markup Language
- Java Management Extensions
- Java ME WTK
- Java Object
- Java Runtime Environment
- JavaScript
- JavaScript Object Notation
- Java Servlet
- JavaStation
- Java Swing
- Java Virtual Machine
- JBoss Application Server
- JDBC
- JenniCam
- Jigsaw
- JIM
- Jini
- JMS
- Job
- Job Control Language
- Joe Job
- John Draper
- Join
- JScript
- JSP
- JukeX
- Jumper
- Just-In-Time
- Jython
- Kademlia
- Kaizen
- Kanban
- Karnaugh Map
- Katmai
- Katmai (Pentium III Core)
- K Desktop Environment
- Kelvir Worm
- Ken's Law
- Kerberos
- Kernel
- Kernel-Based Virtual Machine
- Kerr Effect
- Kevin Mitnick
- Key
- Keyboard
- Keyboard Wedge
- Key Escrow
- Key Fob
- Keyhole Markup Language
- Key Length
- Keylogger
- Keypad
- Key Performance Indicators
- Keystroke Logger
- Key-Value Pair
- Keyword
- Kibibyte
- KidsRuby
- Killer Application
- Kilobit
- Kilobits Per Second
- Kilobyte
- Kindle
- Kindle Fire
- KISS Principle
- Knowledge Base
- Knowledge Discovery in Databases
- Knowledge Engineer
- Knowledge, Skills and Abilities
- KnowledgeTree
- Konrad Zuse
- Kriz Virus
- Kryder’s Law
- K Virtual Machine
- La Fonera
- LANDesk Client Manager
- LAN Switching
- Laptop
- Latency
- Latency
- LaTeX
- Layer 2 Tunneling Protocol
- Lean Programming
- Legacy Code
- Legacy Network
- Leisure Diving
- Level Design
- Lights Out Data Center
- Lightweight Directory Access Protocol
- LIMDOW
- LimeWire
- Linear Tape Open
- Linear Tape Open
- Link Control Protocol
- Link Farming
- Linux
- Linux Mobile Foundation
- Liquid Cooling System
- Live Support
- LMHOSTS File
- Load File
- Local Access
- Local Area Network
- Local Area Transport
- Localhost
- Local Multipoint Distribution Services
- Lock
- Logical Link Control
- Logical Topology
- Logic Bomb
- Log-Periodic Antenna
- Longevity Testing
- Loop
- Loopback Test
- Low Earth Orbit
- Low-Ping Bastard
- MAC
- Machine Binding
- Macro
- Main Distribution Frame (MDF)
- Mainframe
- Malicious Code
- Malicious Software
- Managed Print Service
- Manchester Encoding
- Man-in-the-Middle Attack
- Martian Address
- Maximum Transmission Unit
- Mbps
- MCPC
- .MDB File Format
- Meaningful Use
- Media Access Control
- Megabit
- Megabyte
- MERA VoIP Transit Softswitch
- Message Transfer Agent
- Metasyntactic Variable
- MH Message Handling System
- Micropayment
- Microsoft Excel
- Microsoft Office SharePoint Server
- Microsoft Transaction Server
- Middleware
- Middleweight Thread
- MIT License
- Mobile E-Commerce
- Mobile E-Commerce
- Mobile Marketing
- Mobile Middleware
- Mobile Phone Forensics
- Mobile VPN
- Modem
- Monad
- Motherboard
- MOU
- Mouse
- Multifunction Peripheral
- Multiplexer
- Multiplexing
- Multistation Access Unit
- MySQL
- Named User License
- NAS
- Natural Language Processing
- NetBeans
- .NET Framework
- Netiquette
- Net Neutrality
- NetRexx
- Netsplit
- Netware Core Protocol
- NetWeaver
- Network
- Network Address Translation
- Network Architecture
- Network Bottleneck
- Network Coding
- Network Computer
- Network Convergence
- Network Diagram
- Network Hub
- Network Identity
- Network Information Service
- Network Interface Device
- Network Layer
- Network Management
- Network Monitoring
- Network Operations Center
- Network PC
- Network Port
- Network Science
- Network Security
- Network Tap
- Network Theory
- Network Time Protocol
- Next Generation Network
- Next Hop
- Nexus One
- Nodezilla
- Noise
- Nonrepudiation
- Normalization
- Not Invented Here Syndrome
- Not-Null Constraint
- NTFS
- Nuker
- Numa Numa Dance
- Nym Server
- Obfuscator
- Object Code
- Object-Oriented Database
- Object-Oriented Database Management System
- Object-Oriented Programming
- Object-Relational Database Management System
- Object Request Broker
- Obsolete
- Office of the National Coordinator for Health Information Technology
- OLE for Process Control
- ONC-authorized testing
- One-Shot
- One-to-Many Relationship
- Online Advertising
- Online Analytical Processing
- Online Backup
- Online Marketing
- Online Transaction Processing
- Open Database Connectivity
- Open Digital Rights Language
- Open Document Format
- Open Net Environment
- Open Shortest Path First
- Open Source Hardening Project
- Open-Source Software
- Open Systems Interconnection Model
- Open Virtualization Format
- Operating System Security
- Operating System Virtualization
- Operation Shady Rat
- Operator Overloading
- Optical Burst Switching
- Optical Mesh Network
- Optical Scanner
- Opt-In Email
- Oracle Database
- Original Equipment Manufacturer
- Original Equipment Manufacturer Unbundling
- Orthogonal
- Orthogonal Frequency Division Multiplexing
- OSI Protocols
- Overclocking
- Overloading
- Overriding
- Owling
- Parallel Interface
- Parallel Processing Software
- Password Protection
- Pasta Theory
- Patent
- PayPal
- Pay-Per-Click
- Peppermint
- Performance Reference Model
- Peripheral Component Interconnect Express
- Perl
- Personal Area Network
- Personal Digital Assistant
- Personal Information Manager
- Personal System/2
- PERT Chart
- Pharming
- PHP
- Pierre Salinger Syndrome
- Pixel Pipelines
- Planking
- Platform
- Platform as a Service
- PL/I
- PL/SQL
- Point of Sale
- Port
- Portability
- Portal
- Porting
- Port Knocking
- PostgreSQL
- Practical Extraction and Report Language
- Practice Management Software
- Presence
- Primary Key
- Product Life Cycle
- Product Lifecycle Management
- Product Quality Management
- Programming Language
- Programming Language Generations
- Project Manager
- Protected Health Information
- Prototype
- Pseudocode
- Public Key Infrastructure
- Public Switched Telephone Network
- Python
- Q.931
- QHD
- Qi
- Qik
- Qi Wireless Charging
- QNX
- Q Signaling
- Qt
- Quad Band
- Quad-Core Processor
- Quadrature Amplitude Modulation
- Quadruple Bucky
- Qualified Identifier
- Qualified Security Assessor
- Quality Assurance
- Quality Control
- Quality In, Quality Out
- Quality In, Quality Out
- Quality of Experience
- Quality of Service
- QualityStage
- Quality Systems Regulations
- Quantcast
- Quantum Bogodynamics
- Quantum Computer
- Quantum Computing
- Quantum Dot
- Quarantine
- Quarter Common Intermediate Format
- Qubit
- Queries-per-Second
- Query
- Query Analysis
- Query By Example
- Query Language
- Query Optimizer
- Query Optimizer
- Query Plan Monitoring
- Query String
- Queue
- Queue
- Quick Access Toolbar
- QuickBooks
- Quick Response Code
- Quicksort
- QuickTime
- Quux
- QWERTY Keyboard
- Radio Frequency Field
- Radio Frequency Identification
- Radio Frequency Identification Tag
- Radio Frequency Monitoring
- Random Access Memory
- Rapid Application Development
- Rational Rose
- Read-Only Memory
- Reconfigurable Tactile Display
- Record
- RedBrowser Trojan
- Reduce, Reuse, Recycle
- Referential Integrity
- Regional Health Information Exchange
- Region of Interest
- Registered Jack-11
- Register of Known Spam Operations
- Regression Testing
- Relational Database Management System
- Relationship
- Relationship E-commerce
- RELAX NG
- Release Management
- Remote Office/Branch Office Backup and Recovery
- Remote Wake-Up
- Repeating Hub
- Replication
- @reply
- RFID Chip
- Rickrolling
- Rights Clearance
- Rights Expression Language
- Robo
- Role-Based Access Control
- Rollback
- Rollover
- Route Control
- Router
- Routing Information Protocol
- Routing Protocol
- Routing Switch
- RSA Identification Verification for Health Care
- RTCP
- RTP
- Ruby
- SaaS
- Samba
- Sarbanes-Oxley Act
- Schema
- Scripting Language
- Second-Generation Languages
- Security Information Management
- SELECT
- Self-Join
- Session Initiation Protocol for Business
- Shotgun Approach
- Single Inline Memory Module
- SLI
- Smartphone
- Smartwatch
- SMDS
- Smoke Testing
- Snapshot Replication
- Software Development Kit
- Software Development Process
- Software Modem
- Software Piracy
- Software Switch
- Sound Card
- SQL Agent
- SQL Injection
- SQL Profiler
- SQL Server
- Standard Generalized Markup Language
- Static Random Access Memory
- Steganography
- Stereoscopic Imaging
- Stop Motion Animation
- Stored Procedure
- Strongly Typed
- Structured Query Language
- Stuxnet
- Superkey
- Symbian
- Synthetic Backup
- System Development Lifecycle
- Systems Network Architecture
- Table
- Tablet
- Tap (Digital Input Method)
- TAPI
- Taskbar
- Tech Secondary Market
- Telecommunications
- Telecommunications Closet
- Telecommunications Equipment Manufacturer
- Telephone Company
- Telephony
- TEMPEST
- Teradata
- Terminal Access Controller Access Control System
- Terminal Emulation
- Terminal Node Controller
- Text Messaging
- The Green Grid
- Third Generation Programming Language
- Third Generation Wireless
- Three-Tier Architecture
- Three-Tier Architecture
- Thumbing
- Tiger
- Time Division Multiplexing
- Time-Domain Reflectometry
- TKIP
- Toaster
- Token Ring Network
- Tool Provider
- Total Cost of Ownership
- Traffic Contract
- Transaction
- Transactional Replication
- Transaction Processing Monitor
- Transact-SQL
- Transmission Control Protocol
- Transport Area
- Transport Right
- Triple DES
- Triple DES
- Trojan Horse
- Troll
- Trust Anchor
- Tunneling
- Tuple
- Two-Phase Commit
- UAS
- Ubuntu
- Ubuntu Cloud
- Ultra-Mobile Personal Computer
- Unbundled Network Element
- Undelete
- Unicast Address
- Unified Communications
- Unified Computing System
- Unified Modeling Language
- Unified Process
- Uniform Resource Identifier
- Uniform Resource Locator
- Uninterruptible Power Supply
- Unique Constraint
- Universal Business Language
- Universally Unique Identifier
- Universal Mobile Telecommunications System
- Universal Plug and Play
- Universal Serial Bus
- Universal Serial Bus 2.0
- Universal Terrestrial Radio Access
- University-Based Training
- Unix
- Unix-to-Unix Copy
- Unlocked Cellphone
- Unsafe
- Unsolicited Bulk Email
- Unsolicited Commercial Email
- UPDATE
- Upgrade
- Upload
- Upstream
- URL Redirect
- URL Shortening
- Usability
- USB 3.0
- Use Case
- User Acceptance Testing
- User Agent Client
- User Datagram Protocol
- User Exit
- User-Level Security
- Utility Right
- Variable (Mathematics)
- Vertical Blanking Interval
- Vertical Sync
- Very-High-Bitrate Digital Subscriber Line
- Vi
- Video
- Video Card
- Video Conferencing
- Video Graphics Array (VGA) Connector
- Video on Demand
- Virtual Appliance
- Virtual Data Room
- Virtual Internet Service Provider
- Virtual I/O
- Virtualization
- Virtualization Sprawl
- Virtualization Stack
- Virtual Machine
- Virtual Memory
- Virtual Network Computing
- Virtual Private Network
- Virtual Private Network Appliance
- Virtual Private Server
- Virtual Reality Modeling Language
- Virus
- Visual Studio Team System
- VLAN
- VMware
- VMware ESX
- Vmware Fusion
- Vmware Player
- Vmware Server
- VMware Thinapp
- VMware Virtual Machine File System
- VMware Workstation
- Voice Call Continuity
- Voice Commerce
- Voice Over Internet Protocol
- Voice Over IP Security Alliance
- VoIP Caller ID
- VoIP Gateways
- VoIP Packet Loss
- VoIP Trunk Gateway
- VPN
- Vulcan Nerve Pinch
- Vulnerability
- VxWorks
- Wallpaper
- Warm Standby
- Watchdog Timer
- Wavelength Division Multiplexing
- Web Accessibility Initiative
- Web Analytics
- Web Application Security
- Web-Based Training
- Webby
- Web Components
- Web Content Management
- Web Development
- WebFOCUS
- Web Host
- Web Log Software
- Web Services Description Language
- Web Services Security
- What You See Is What You Get
- Wide Area Network Mini Port
- Widget
- Wi-Fi Protected Access
- Wi-Fi Protected Access II
- Wiki
- Wildcard Character
- Windows 2000
- Windows Driver Model
- Windows Internet Name Service
- Windows Vista
- WIPO
- Wireless Fidelity
- Wireless Internet Service Provider
- Wireless Markup Language
- Wireless Network
- Wirth's Law
- Word Processor
- Word Wrap
- Workaround
- Work Flow
- Workgroup Productivity Package
- Workstation
- World Roaming
- Worm
- Wormhole Switching
- WSN
- X2
- X.25
- X86
- x86 Architecture
- x264
- X.400
- X.500
- X.509
- X.509 Certificate
- Xanadu
- Xavier Initialization
- Xbox
- X Client
- xDSL
- Xen Hypervisor
- Xenodochial
- Xerography
- Xerox Network Systems
- XLR Connector
- XML Bomb
- XML Database
- XML Data Island
- XML Query Language
- XML Schema
- XML User Interface Language
- XMODEM
- XNA Game Studio
- XON/XOFF
- X.Org Foundation
- X.Org Server
- XPath
- XPath Injection
- XProtect
- X Server
- XSS Hole
- X Terminal
- XUL
- Xvid
- X Window System
- X-Y Matrix
- X-Y-Z Matrix
- Yagi Antenna
- Yak Shaving
- Year 2000 Problem
- Yet Another Hierarchically Officious Oracle
- YMODEM
- Yobibyte
- Yoda Condition
- Yottabyte
- YouTube
- Yoyo Mode
- Zachman Framework
- Zebibyte
- Zend Framework
- Zend Optimizer
- Zenware
- Zerg
- Zerg Rush
- Zero Administration for Windows
- Zero-Bit Insertion
- Zero Client
- Zero-Configuration Network
- Zero Day
- Zero Day Attack
- Zero-Day Exploit
- Zero-Day Malware
- Zero-Day Threat
- Zero Day Virus
- Zero Day Vulnerability
- Zero Filling
- Zero-Shot
- Zero Trust
- Zettabyte
- Zettaflop
- Zeus Trojan
- ZFS
- ZIF Sockets
- ZigBee
- Zip Disk
- Zip Drive
- ZIP File
- ZKP
- zkSTARK
- Zlib
- Z Object Publishing Environment
- Zoho Office Suite
- Zombie Cookie
- Zombie Network
- Zombie Process
- Zombie VM
- Zoning
- Zoopraxiscope
- Zope
- Zucked
- Z-Wave
- Сode 201 Created