- Qualitative risk analysis A method of risk assessment that uses subjective judgment and expert opinions to evaluate the likelihood and impact of risks. It is used in risk management to prioritize risks and develop mitigation strategies. Examples include interviews, workshops, and scenario analysis.
- Quality Assurance (QA) A systematic process of ensuring that products and services meet specified requirements and are reliable, defect-free, and fit for purpose. QA practices involve the implementation of standards, testing, and review to uphold product quality and customer satisfaction.
- Quality (in IT) Refers to the degree to which an IT system, application, or process meets specified criteria, user requirements, and performs reliably and efficiently. Quality in IT is maintained through best practices, testing, and continuous improvement.
- Quality management system (QMS) A framework of policies, procedures, and processes that are used to plan, implement, and monitor the quality of a product or service. It is used in organizations to ensure customer satisfaction and compliance with standards. Examples include ISO 9001, CMMI, and Six Sigma.
- Quality of Service (QoS) The performance level of a network or internet connection that determines the speed and reliability of data transmission. It is used in networking and telecommunications to ensure that data is transmitted smoothly and efficiently. Examples include prioritizing certain types of data traffic, such as video streaming or voice calls, and implementing bandwidth allocation mechanisms to prevent network congestion.
- Quantitative Risk Analysis A systematic process used in risk management that quantifies the probabilities and potential consequences of risks. It typically involves the calculation of risk through the formula - Risk = Probability of Occurrence × Impact of Event. This technique allows organizations to assign monetary values to risks and to prioritize them based on their potential to affect business outcomes.
- Quantum cryptography The use of quantum mechanics principles to secure communication. It is used in the field of information security to provide secure, unbreakable encryption for data transmission. Examples include the use of quantum keys to encrypt messages, the use of quantum states to detect eavesdropping, and the use of quantum computers to break classical encryption schemes.
- Quarantine processing The isolation of potentially infected or malicious data or software from the rest of a system or network in order to prevent it from spreading or causing damage. It is used in cybersecurity to protect networks and systems from malware and other forms of cyberattack. Examples include using virtual machines or sandboxes to run untrusted software, using intrusion detection systems to identify and block suspicious traffic, and implementing access controls to prevent unauthorized access to quarantined data or systems.
- Query-based Attacks A category of cyber-attacks that involve the manipulation or exploitation of query processes within databases or applications. Specific examples include SQL injection, where malicious SQL queries are inserted into user input fields to manipulate databases, and DDoS attacks, which may flood a server with excessive network protocol queries to disrupt service.
- Queue A data structure that allows for the storage and retrieval of items in a specific order. It is used in the field of computer science to manage the flow of data and ensure efficient processing. Examples include the use of queues in operating systems to manage the execution of tasks, the use of queues in networks to manage the flow of packets, and the use of queues in databases to manage the flow of queries.
Share our FREE glossary with your friends and study buddies.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions, if you find errors please contact us.