The GEEKtionary.
Our complete dictionary of tech terms. Helping to translate the geek speak and give simplicity to somewhat complex challenges of software understanding. Our team have decades of experience in translating geek, so we felt it was important to provide this on TSI

- 10Base-T
- abstraction
- access
- Access Point
- access time
- Accessibility
- accident
- accuracy
- accuracy study processor
- Activex
- actuator
- adaptive maintenance
- ADC
- Address
- address
- addressing exception
- AES
- algorithm
- algorithm analysis
- Alias
- All-flash Array
- alphanumeric
- ALU
- ALUA
- Amazon Web Services (AWS)
- American National Standards Institute
- American Standard Code for Information Interchange
- analog
- analog device
- analog-to-digital converter
- analysis
- anomaly
- Anonymous Ftp
- ANSI
- Anti-Spam
- API
- Applet
- Application
- Application
- application program
- Application Programming Interface (API)
- application software
- architectural design
- architecture
- archival database
- archive
- archive file
- arithmetic logic unit
- arithmetic overflow
- arithmetic underflow
- array
- as built
- ASCII
- Ascii File
- assemble
- assembler
- assembling
- assembly code
- assembly language
- assertion
- assertion checking
- asynchronous
- asynchronous transmission
- At Command Set
- Attachment
- audit
- audit trail
- Authentication
- auxiliary storage
- Azure
- Backbone
- Backend database
- band
- Bandwidth
- bandwidth
- bar code
- baseline
- BASIC
- basic input/output system
- batch
- batch processing
- baud
- BCP
- benchmark
- BI
- bias
- Big Data
- binary
- Binary File
- Binhex
- BIOS
- Bit
- bit
- bits per second
- black-box testing
- Blended Learning
- block
- block check
- block diagram
- block length
- block transfer
- blocking factor
- Blog
- blueprint
- Bluetooth
- Bmp
- bomb
- Bookmark
- boolean
- Boolean Logic
- boot
- bootstrap
- Bounce
- boundary value
- boundary value analysis
- box diagram
- bps
- branch
- branch analysis
- branch coverage
- Bridge
- Broadband Connection
- Browser
- bubble chart
- Buffer
- buffer
- Buffered
- bug
- bus
- Business Continuity
- Business Continuity Plan
- Byod
- Byte
- byte
- C
- C++
- Cable Modem
- Cache
- CAD
- calibration
- call graph
- CAM
- Captcha
- Carrier Services
- CASE
- Case-Sensitive
- cathode ray tube
- cause effect graph
- cause effect graphing
- Cbt
- CCITT
- Cd-R Drive
- Cd-Rom
- CD-ROM
- Cd-Rw, Cd-R Disk
- central processing unit
- certification
- Cgi
- change control
- change tracker
- Chat
- check summation
- checksum
- chip
- CIFS
- CISC
- Client
- client-server
- Client-Server Technology
- clock
- Cloud
- Cloud Application
- Cloud Backup
- Cloud Computing
- Cloud Computing
- Cloud Management Platform (CMP)
- Cloud Marketplace
- Cloud Migration
- Cloud Native
- Cloud Service Provider (CSP)
- Cloud Sourcing
- Cloud Storage
- Cloud Washing
- CMOS
- Cms
- CO-AX
- coaxial cable
- COBOL
- code
- code audit
- code auditor
- code inspection
- code review
- code walkthrough
- coding
- coding standards
- comment
- compact disc - read only memory
- comparator
- compatibility
- compilation
- compile
- compiler
- compiling
- complementary metal-oxide semiconductor
- completeness
- complex instruction set computer
- complexity
- component
- Compress
- computer
- computer aided design
- computer aided manufacturing
- computer aided software engineering
- computer instruction set
- computer language
- computer program
- computer science
- computer system
- computer system audit
- computer system security
- computer word
- computerized system
- concept phase
- condition coverage
- configurable, off-the-shelf software
- configuration
- configuration audit
- configuration control
- configuration identification
- configuration item
- configuration management
- Connect
- consistency
- consistency checker
- constant
- constraint analysis
- Consultive Committee for International Telephony and Telegraphy
- Container
- Content Delivery Network (CDN)
- control bus
- control flow
- control flow analysis
- control flow diagram
- Control Program for Microcomputers
- controller
- conversational
- Cookie
- coroutine
- corrective maintenance
- correctness
- COTS
- Courseware
- coverage analysis
- CP/M
- Cpu
- CPU
- crash
- CRC
- critical control point
- critical design review
- criticality
- criticality analysis
- cross-assembler
- cross-compiler
- CRT
- Csp
- Css
- Cursor
- cursor
- Customer Relationship Management (CRM)
- Cyberspace
- cyclic redundancy [check] code
- cyclomatic complexity
- Daas
- DAC
- Daemon
- data
- data analysis
- data bus
- Data Center
- data corruption
- data dictionary
- data element
- data exception
- data flow analysis
- data flow diagram
- data integrity
- data item
- Data Migration
- data set
- data sink
- data structure
- data structure centered design
- data structure diagram
- data validation
- Database
- database
- Database
- database analysis
- database security
- dead code
- debugging
- decision coverage
- decision table
- Decompress
- default
- default value
- defect
- defect analysis
- Defragmentation
- Degauss
- delimiter
- demodulate
- demodulation
- dependability
- design
- design description
- design level
- design of experiments
- design phase
- design requirement
- design review
- design specification
- design standards
- desk checking
- Desktop
- detailed design
- developer
- development methodology
- development standards
- DevOps
- DFD
- Dhcp
- diagnostic
- Dial-Up Adapter
- Dial Up Connection
- Dialog Box
- different software system analysis
- digital
- Digital Asset
- digital-to-analog converter
- Digitize
- Dimm
- direct memory access
- directed graph
- Directory
- Disaster Recovery
- Disaster Recovery Planning
- Discussion Group
- disk
- disk drive
- disk operating system
- diskette
- Distance Education
- Distance Learning
- Dither
- DMA
- Dns
- documentation
- documentation, level of
- documentation plan
- documentation, software
- Domain
- DOS
- Download
- Dpi
- Draas
- DRaaS
- Drag And Drop
- drift
- driver
- Dsl
- duplex transmission
- Dvd
- Dvd-Rw, Dvd-R Disk
- dynamic analysis
- E-Mail Archiving
- Eap
- EBCDIC
- ECB
- editing
- EEPROM
- Ega
- Elasticity
- Elearning
- electrically erasable programmable read only memory
- electromagnetic interference
- electronic media
- electrostatic discharge
- embedded computer
- embedded software
- EMI
- Emoticon
- Emulation
- emulation
- emulator
- encapsulation
- Encryption
- end user
- enhanced small device interface
- Enterprise Application
- Enterprise Resource Planning (ERP)
- entity relationship diagram
- environment
- EPROM
- Eps
- equivalence class partitioning
- erasable programmable read only memory
- error
- error analysis
- error detection
- error guessing
- error seeding
- ESD
- ESDI
- Ethernet
- Ethernet Card
- event table
- evolutionary development
- exception
- exception conditions/responses table
- execution trace
- Expansion Card
- extended ASCII
- extended binary coded decimal interchange code
- Extensibility
- Extension
- extremal test data
- Fagan inspection
- fail-safe
- failure
- failure analysis
- Failure Modes and Effects Analysis
- Failure Modes and Effects Criticality Analysis
- FAT
- fault
- fault seeding
- Fault Tree Analysis
- FC
- FDD
- feasibility study
- Federal Information Processing Standards
- Federated Database
- FedRAMP
- Female Connector
- fiber optics
- Field
- field
- File
- file
- file maintenance
- file transfer protocol
- Filter
- Finger
- FIPS
- Firewall
- Firewire
- firmware
- flag
- Flash Drive
- Flash Memory
- flat file
- floppy disk
- floppy disk drive
- flowchart or flow diagram
- FMEA
- FMECA
- Folder
- Font
- formal qualification review
- FORTRAN
- Fragmentation
- Frames
- Freeware
- FRU
- FTA
- Ftp
- FTP
- full duplex
- function
- functional analysis
- functional configuration audit
- functional decomposition
- functional design
- functional requirement
- GB
- GDPR
- geeks
- Gif
- gigabyte
- Gigabyte (Gig Or Gb)
- Google Cloud Platform (GCP)
- Gps
- graph
- graphic software specifications
- Greyware
- Guest Machine
- Gui
- half duplex
- handshake
- Handshaking
- hard copy
- Hard Disk
- hard disk drive
- hard drive
- Hardware
- hardware
- hazard
- hazard analysis
- hazard probability
- hazard severity
- HDD
- HDD
- Header
- Help Desk
- Helper Application
- hertz
- hexadecimal
- hierarchical decomposition
- hierarchy of input-processing-output
- hierarchy of input-processing-output chart
- high-level language
- HIPAA
- HIPO
- Home Page
- Host
- Host Machine
- HPC
- Html
- Http
- Hybrid Cloud
- Hyperlink
- Hypertext
- Hypervisor
- Hypervisor
- Hz
- I/0
- I/O port
- Iaas
- IC
- Icon
- Ics
- IDE
- IEC
- IEEE
- Ieee 1394 Port
- Image Map
- Imap
- implementation
- implementation phase
- implementation requirement
- incremental development
- incremental integration
- industry standard
- infeasible path
- information hiding
- Infrastructure
- Infrastructure as a Service (IaaS)
- input/output
- input-process-output chart
- input-processing-output
- inspection
- installation
- installation and checkout phase
- installation qualification
- Institute of Electrical and Electronic Engineers
- instruction
- instruction set
- instrumentation
- integrated circuit
- Integrated Development environment (IDE)
- integrated drive electronics
- interactive
- interface
- interface analysis
- interface requirement
- International Electrotechnical Commission
- International Organization for Standardization
- International Standards Organization
- International Telecommunications Union - Telecommunications Standards Section
- Internet
- Internet Domain Management
- Internet Explorer
- Internet Radio
- interpret
- interpreter
- interrupt
- interrupt analyzer
- invalid inputs
- IOPS
- Ip Address
- Irc
- Irq
- iSCSI
- iSER
- ISO
- ISO27001
- Isp
- It Assessment
- ITU-TSS
- Iv&V
- Java
- Javascript
- JCL
- job
- job control language
- Jpeg
- Justified
- K
- KB
- Kbps
- Kerberos
- Kermit
- Kerning
- key
- key element
- Keyword
- kilobyte
- Kilobyte (K, Kb, Or Kb)
- KLOC
- Knowledge Base
- ladder logic
- Lan
- LAN
- language
- large scale integration
- Laser Printer
- latency
- latent defect
- Leading
- Learning Management System (Lms)
- Learning Object
- life cycle
- life cycle methodology
- Link
- linkage editor
- Linux
- Linux
- Listprocessor
- Listserv, Listserver
- Load Balancing
- loader
- local area network
- Log In, Log On
- logic analysis
- longitudinal redundancy check
- low-level language
- LSI
- Maas
- Mac
- machine code
- machine language
- Macintosh
- macro
- macroinstruction
- Mail Server
- Mailing List
- Main Memory
- main memory
- main program
- Mainframe
- mainframe
- maintainability
- maintenance
- Male Connector
- Malware
- MAN
- Managed Service Provider (MSP)
- Managed Workstations
- Mapi
- MarTech
- MB
- Mdm
- mean time between failures
- mean time to failure
- mean time to repair
- measurable
- measure
- measurement
- medium scale integration
- megabit
- megabyte
- Megabyte (Meg Or Mb)
- megahertz
- memory
- Menu
- menu
- metal-oxide semiconductor
- metal-oxide semiconductor field effect transistor
- metric based test data generation
- metric, software quality
- metropolitan area network
- MHz
- Mhz Or Mhz
- microcode
- microcomputer
- microprocessor
- Microservices
- Microsoft Azure
- Microsoft Exchange
- Microsoft Windows
- Middleware
- million instructions per second
- Mime
- minicomputer
- MIPS
- mishap
- mnemonic
- modeling
- Modem
- modem
- modem access
- Moderator
- modifiability
- modular decomposition
- modular software
- modularity
- modulate
- modulation
- module
- module interface table
- Monitor
- MOS
- MOSFET
- Mouse
- Mpeg
- Mrb
- MSI
- Msp
- MTBF
- MTTF
- MTTR
- Multi-Cloud
- multi-processing
- multi-programming
- multi-tasking
- Multi-Tenancy
- Multimedia
- multiple condition coverage
- multiplexer
- multipurpose systems
- Multitasking
- mutation analysis
- n-channel MOS
- Naas
- Nameserver
- NAS
- Nat
- National Bureau of Standards
- National Institute for Standards and Technology
- NBS
- NERC
- Network
- network
- Network Adapter
- network database
- Network Hub
- Network Monitoring
- Network Security
- NFS
- nibble
- NIST
- NIST
- NMI
- NMOS
- Nntp
- no-code
- no-code-platform
- no-code-platform
- no-code-platform
- node
- non-maskable interrupt
- noncritical code analysis
- nonincremental integration
- NTFS
- null
- null data
- null string
- NVMe
- object
- object code
- object oriented design
- object oriented language
- object oriented programming
- object program
- Object storage
- Ocr
- OCR
- octal
- OEM
- OLTP
- On-Cloud
- On-Demand Self Service
- on-line
- On-Premise
- On-Site
- Online
- OOP
- Open Source
- Open Stack
- Opentype
- operating system
- operation and maintenance phase
- operation exception
- operator
- optical character recognition
- optical fiber
- optimization
- Oracle
- original equipment manufacturer
- overflow
- overflow exception
- Paas
- PaaS
- Packet
- Page
- paging
- PAL
- Palette
- parallel
- Parallel Port
- parallel processing
- parameter
- parity
- parity bit
- parity check
- Pascal
- Password
- password
- patch
- path
- path analysis
- path coverage
- Pc
- PC
- PCB
- PCI DSS
- Pda
- PDL
- Peer-To-Peer
- perfective maintenance
- performance requirement
- peripheral device
- peripheral equipment
- Perl
- Personal Cloud
- personal computer
- Personality
- Pgp
- Ph
- Phishing
- physical configuration audit
- physical requirement
- Ping
- Pixel
- pixel
- PLA
- platform
- Platform
- Platform as a Service (PaaS)
- PLD
- Plug And Play
- Plug-In
- PMOS
- polling
- Pop
- Pop-Up Blocker
- positive channel MOS
- Post
- Postscript
- Postscript Fonts
- Ppp
- precision
- preliminary design
- preliminary design review
- printed circuit board
- Privacy Shield
- Private Cloud
- Private Cloud
- production database
- Program
- program
- program design language
- program mutation
- programmable array logic
- programmable logic array
- programmable logic device
- programmable read only memory
- programming language
- programming standards
- programming style analysis
- project plan
- PROM
- PROM programmer
- proof of correctness
- protection exception
- Protocol
- protocol
- prototyping
- Proxy
- pseudocode
- Public Cloud
- Public Domain Software
- Pull
- Push
- QA
- QC
- Qos
- qualification, installation
- qualification, operational
- qualification, process performance
- qualification, product performance
- quality assurance
- quality assurance, software
- quality control
- Quicktime
- radiofrequency interference
- Ram
- RAM
- random access memory
- range check
- rapid prototyping
- RDMA
- read only memory
- real time
- real time processing
- Record
- record
- record of change
- recursion
- reduced instruction set computer
- region
- register
- Registry
- regression analysis and testing
- relational database
- release
- reliability
- reliability assessment
- Remote Backup
- Remote Desktop
- Remote Login
- Remote Monitoring
- Remote Support
- requirement
- requirements analysis
- requirements phase
- requirements review
- Resource
- REST
- retention period
- retrospective trace
- revalidation
- review
- revision number
- RFI
- Rgb
- RISC
- risk
- risk assessment
- Rj-45 Connector
- robustness
- Rom
- ROM
- Router
- routine
- RPO
- RS-232-C
- Rtf
- RTO
- Saas
- Safe Mode
- safety
- safety critical
- safety critical computer software components
- San
- SAN
- SAS
- Sata
- SATA
- Satellite Transmission
- Scalability
- Screen Reader
- Scroll Bar
- SCSI
- SDS
- Search Engine
- Section 508
- Secure Server
- security
- Security Token
- Self-Extracting File
- sensor
- serial
- Serial Port
- Server
- server
- Service Level Agreement (SLA)
- service program
- servomechanism
- severity
- Shared Resources
- Shareware
- side effect
- Signature
- Simm
- simulation
- simulation analysis
- simulator
- sizing
- sizing and timing analysis
- small computer systems interface
- small scale integration
- SMB
- Smtp
- SOC
- software
- Software as a Service (SaaS)
- software audit
- software characteristic
- software configuration item
- software design description
- software developer
- Software Development Kit (SDK)
- software development notebook
- software development plan
- software development process
- software diversity
- software documentation
- software element
- software element analysis
- software engineering
- software engineering environment
- software hazard analysis
- software item
- software life cycle
- software reliability
- software requirements specification
- software review
- software safety change analysis
- software safety code analysis
- software safety design analysis
- software safety requirements analysis
- software safety test analysis
- Software Stack
- SOPs
- source code
- source program
- SOX
- spaghetti code
- Spam
- SPC
- special test data
- specification
- specification analysis
- specification, design
- specification, formal
- specification, functional
- specification, interface
- specification, performance
- specification, product
- specification, programming
- specification, requirements
- specification, system
- specification, test case
- specification tree
- spiral model
- Spyware
- SQL
- SSA
- SSD
- SSI
- Ssid
- SSL
- ST-506
- standard operating procedures
- state
- state diagram
- state-transition table
- statement coverage
- static analysis
- static analyzer
- stepwise refinement
- Storage as a Service (STaaS)
- storage device
- Streaming (Streaming Media)
- string
- structure chart
- structured design
- structured programming
- structured query language
- stub
- Subdirectory
- subprogram
- subroutine
- subroutine trace
- Support
- support software
- Support365®
- Svga
- SWIFT
- symbolic execution
- symbolic trace
- synchronous
- synchronous transmission
- syntax
- system
- system administrator
- system analysis
- system design
- system design review
- system documentation
- system integration
- system life cycle
- system manager
- system safety
- system software
- T-1 Carrier
- T-3 Carrier
- Table
- tape
- TB
- Tcp/Ip
- TCP/IP
- telecommunication system
- Telephony
- Telnet
- terabyte
- terminal
- Terminal Emulation
- test
- test case
- test case generator
- test design
- test documentation
- test driver
- test harness
- test incident report
- test item
- test log
- test phase
- test plan
- test procedure
- test readiness review
- test report
- test result analyzer
- testability
- testing
- testing, 100%
- testing, acceptance
- testing, alpha []
- testing, assertion
- testing, beta []
- testing, boundary value
- testing, branch
- testing, compatibility
- testing, component
- testing, design based functional
- testing, development
- testing, exhaustive
- testing, formal
- testing, functional
- testing, integration
- testing, interface
- testing, interphase
- testing, invalid case
- testing, mutation
- testing, operational
- testing, parallel
- testing, path
- testing, performance
- testing, qualification
- testing, regression
- testing, special case
- testing, statement
- testing, storage
- testing, stress
- testing, structural
- testing, system
- testing, unit
- testing, usability
- testing, valid case
- testing, volume
- testing, worst case
- Tiff
- time sharing
- timing
- timing analyzer
- timing and sizing analysis
- TLS
- Token
- Tool Bar
- top-down design
- Total Software Info
- touch screen
- touch sensitive
- trace
- traceability
- traceability analysis
- traceability matrix
- transaction
- transaction analysis
- transaction flowgraph
- transaction matrix
- transform analysis
- translation
- transmission control protocol/Internet protocol
- Trojan Horse
- trojan horse
- Truetype
- truth table
- tuning
- Tweet
- twisted pair
- Twisted Pair Cable
- Two-Factor Authentication
- unambiguous
- underflow
- underflow exception
- unit
- Unix
- UNIX
- Upload
- Url
- usability
- Usb
- Usb Port
- user
- User Experience (UX)
- User Interface (UI)
- User Space
- Username
- user's guide
- Utility
- utility program
- utility software
- Uuencode
- valid
- valid input
- validate
- validation
- validation, process
- validation, prospective
- validation protocol
- validation, retrospective
- validation, software
- validation, verification, and testing
- variable
- variable trace
- VAX
- Vdi
- vendor
- Vendor Lock-in
- verifiable
- verification, software
- verify
- version
- version number
- Vertical Cloud
- very large scale integration
- virtual address extension
- Virtual Classroom
- Virtual Desktop Infrastructure (VDI)
- Virtual Hosting
- Virtual Machine (VM)
- Virtual Memory
- virtual memory system
- Virtual Reality
- Virtualization
- Virus
- virus
- VMS
- Voip
- volume
- Vpn
- VSS
- Vt100
- V&V
- VV&T
- Wais
- walkthrough
- Wan
- WAN
- Wap
- watchdog timer
- waterfall model
- WebDAV
- WebDAV
- WebDAV
- Wep
- white-box testing
- Wi-Fi
- wide area network
- Wild Card
- Window
- Windows
- Wireless (Networking)
- Wizard
- Wlan
- word
- workaround
- Workstation
- workstation
- World Wide Web
- Worm
- worm
- Wpa
- Wysiwyg
- X2
- Xhtml
- Xml
- Xmodem
- Ymodem
- Zero-Day
- Zip
- Zip Drive
- Zmodem
- Zoom
Citations
The team at TSI have a vast knowledge of geek terms. Even with this knowledge we do refer to leading providers of content to ensure the quality of our GEEKTionary is useful and relevant with the software info we provide.
Below are the following additional sources we refer to at times for content