IT Terms beginning with 'P'
- P-Code Machine
- P2P
- P2P
- P2P Architecture
- P2P File Sharing
- P2P Network
- P2PE
- P2V
- P3P
- PA
- PA-DSS
- PA-QSA
- PaaS
- PAB
- PABX
- Pacemaker Hacker
- Package
- Package Size
- Packet
- Packet Analyzer
- Packet Buffer
- Packet Capture
- Packet Collision Rate
- Packet Filtering
- Packet Loss
- Packet Monkey
- Packet Reservation Multiple Access (PRMA)
- Packet Switched Network (PSN)
- Packet Switching
- PACS
- PACTOR
- Pad Character
- PADSL
- page
- Page Hijacking
- Page Setup
- Page View (PV)
- Pagejacking
- PageRank
- Pages Per Minute (PPM)
- Pages Per Visit (Pages/Visit)
- Pages/Visit
- Paging
- Paid Search
- Painting Tool
- PAL
- Palm
- PalmPilot
- Palo Alto Research Center (PARC)
- PAM
- PAM
- PAMA
- PAN
- Pandas
- Pandora
- Pango
- Pantone Matching System (PMS)
- PAP
- Paper Tape
- Paperless Office
- Paradox
- Parallax Scrolling
- Parallel Computing
- Parallel Data Analysis
- Parallel Functional Programming
- Parallel Interface
- Parallel Method Invocation (PMI)
- Parallel Port
- Parallel Processing
- Parallel Processing Software
- Parallel Query
- Parallel Virtual Machine (PVM)
- param
- Parameter (param)
- Parameterized Query
- Parametric Polymorphism
- Parasite Hosting
- Parasiteware
- Paravirtualization
- Paravirtualized Operating System
- PARC
- Parent Partition
- Parental Control Software
- Parity
- Parity Check
- Parity Error
- Parse
- Parser
- Partial Document Encryption (PDE)
- Partially Observable Markov Decision Process (POMDP)
- Particle Swarm Optimization (PSO)
- Partition
- Partitioning Code
- Partner Portal
- Partner Relationship Management (PRM)
- Pascal
- Passive Attack
- Passive Component
- Passive Fault Management
- Passive File Transfer Protocol (PASV FTP)
- Passive Network
- Passive Optical Network (PON)
- Passive Reconnaissance
- Passive Surveillance
- Passphrase
- Password
- Password Authentication Protocol (PAP)
- Password Breaker
- Password Cracking
- Password Generator
- Password Hardening
- Password Manager
- Password Protection
- Password Salting
- Password Sniffer
- Password Vault
- Pasta Theory
- PASV FTP
- PAT
- Patch
- Patch and Pray
- Patch Antenna
- Patch Cord
- Patch Management
- Patch Panel
- Patch Tuesday
- Patent
- Patent Pending
- Patent Troll
- Path Coverage Testing
- Pathname
- PathPing
- Patient Relationship Management
- Pattern Matching
- Pattern Recognition
- Paul Allen
- Paul Baran
- Pay As You Go (PAYG)
- Pay Per Click (PPC)
- Pay Per Lead (PPL)
- Pay to Play (P2P)
- PAYG
- Payload
- Payment Application Data Security Standard (PA-DSS)
- Payment Application Qualified Security Assessor (PA-QSA)
- Payment Card Industry (PCI)
- Payment Card Industry Data Security Standard (PCI DSS)
- Payment Card Industry Security Standards Council (PCI SSC)
- Payment Gateway
- PayPal
- Paywall
- PB
- Pb
- PB Cache
- PBX
- PC
- PC
- PC Card
- PC Demo
- PC Game
- PC Load Letter
- PC Recovery
- PC-on-a-Stick
- PCA
- PCB
- PCD
- PCF
- PCI
- PCI Bus
- PCI Compliance
- PCI Compliance Audit
- PCI DSS
- PCI Extended (PCI-X)
- PCI Mezzanine Card (PMC)
- PCI Modem
- PCI Slot
- PCI SSC
- PCI-Compliant Hosting
- PCI-E
- PCI-X
- PCL
- PCM
- PCM
- PCS
- PDA
- PDE
- PDH
- PDK
- PDM
- PDP
- PDU
- PDU
- Peak-to-Peak (pk-pk)
- PEAP
- PEBCAK Error
- Pebibit (Pibit or Pib)
- Pebibyte
- PEEK and POKE
- Peer Discovery
- Peer-To-Peer (P2P)
- Peer-to-Peer Architecture (P2P Architecture)
- Peer-To-Peer File Sharing (P2P File Sharing)
- Peer-To-Peer Network (P2P Network)
- Peering
- Peering Agreement
- Peering Exchange
- Peltier Effect
- Pen-Testing
- Pending Larry Quote
- Penetration Testing (Pen-Testing)
- Penetration Testing Tool
- Pentium
- Pentium 4
- Pentium II (PII)
- Pentium III
- Peopleware
- Peppermint
- Perceptron
- Perceptual Computing
- Percussive Maintenance
- Perfect Forward Secrecy (PFS)
- Perfect RAM
- Performance Counter
- Performance Management
- Performance Management System
- Performance Reference Model (PRM)
- Performance Testing
- Performant
- Perimeter Security
- Peripheral
- Peripheral Component Interconnect Bus (PCI Bus)
- Peripheral Component Interconnect Express - PCI Express (PCI-E)
- Peripheral Component Interconnect Modem (PCI Modem)
- Peripheral Device
- Peripheral Equipment
- Peripheral Interface Controller (PIC)
- Perl
- Permalink
- Permanent Link (Permalink)
- Permanent Virtual Circuit (PVC)
- Permanently Assigned Multiple Access (PAMA)
- Permission Marketing
- Persistence
- Persistent Cookie
- Persistent Desktop
- Persistent URL (PURL)
- Persistent-State World (PSW)
- Persona
- Personal Access Communications System (PACS)
- Personal Address Book (PAB)
- Personal Area Network (PAN)
- Personal Cloud
- Personal Communications Service (PCS)
- Personal Computer (PC)
- Personal Computer Game (PC Game)
- Personal Digital Assistant (PDA)
- Personal Firewall
- Personal Health Information (PHI)
- Personal Health Record (PHR)
- Personal Identification Number (PIN)
- Personal Identity Verification Card (PIV Card)
- Personal Information Manager (PIM)
- Personal Java (PJ)
- Personal Supercomputer (PSC)
- Personal System/2 (PS/2)
- Personal VPN
- Personal Web Server (PWS)
- Personalization
- Personalized Marketing
- Personally Identifiable Financial Information (PIFI)
- Personally Identifiable Information (PII)
- PERT
- PERT Chart
- Pervasive Computing
- Petabit (Pb)
- Petabyte (PB)
- Petabyte Age
- Petaflop
- Peterson's Algorithm
- Petri Net
- PFS
- PGA
- PGP
- Phablet
- Phage Virus
- Phantom Vibration Syndrome
- Pharming
- Phase Alternating Line (PAL)
- Phase Change Memory (PCM)
- Phase Shift
- Phase-Change Cooling
- Phase-Locked Loop (PLL)
- Phase-Of-The-Moon Bug
- Phase-Shift Keying (PSK)
- Phased Array
- PHC
- PHI
- PHI
- Phishing
- Phishing Kit
- Phlashing
- Phone Stacking
- Phonetography
- Phong Shading
- Photo CD (PCD)
- Photo Lurking
- Photoblog (Plog)
- Photobomb
- Photodiode
- Photonic Crystal Display
- Photonic Crystal Fiber (PCF)
- Photosensor
- Photovoltaic Cell (PV Cell)
- PHP
- PHP 3
- PHP 4
- PHP: Hypertext Preprocessor (PHP)
- PHP: Hypertext Preprocessor 3.0 (PHP 3)
- PHP: Hypertext Preprocessor 4.0 (PHP 4)
- PHR
- Phrack
- Phreaking
- Phubbing
- Physical Access
- Physical Address
- Physical Computer
- Physical Data Model
- Physical Drive
- Physical Layer
- Physical Neural Network
- Physical Security
- Physical To Virtual (P2V)
- Physical Topology
- Physical Unit Number (PUN)
- PI
- Pibit or Pib
- PIC
- Picasa
- Pico Projector
- Picocell
- Piconet
- Picosecond (ps)
- PictBridge
- PICTIVE
- Pierre Salinger Syndrome
- Piezoelectric Accelerometer
- Piezoelectricity
- PIFI
- Pig Latin
- Piggyback Email
- Piggybacking
- Pigpen Cipher
- Pigs And Chickens
- PII
- PII
- PIM
- PIM
- PIM
- PIM
- PIN
- Pin Grid Array (PGA)
- Ping
- Ping
- Ping Of Death
- Ping Pong Virus
- Pink Contract
- Pink Noise
- Pinout
- PIPA
- Pipe
- Pipeline
- Pipeline Burst Cache (PB Cache)
- Pipelining
- Piracy
- PIV Card
- Pivot Table
- Pixel
- Pixel Art
- Pixel Pipelines
- Pixelation
- Pixels Per Inch (PPI)
- Pizza Box
- PJ
- pk-pk
- PKC
- PKCS
- PKI
- PKI Certificate
- PL
- PL/I
- PL/I
- PL/S
- PL/SQL
- PLA
- PLA
- Place Shifting
- Plain Old Telephone Service (POTS)
- Plain Old XML (POX)
- Plan File
- Planck's Constant
- Planking
- Planned Downtime
- Planned Obsolescence
- Planning Board
- Planning Game
- Plasma Display
- Platform
- Platform Agnostic
- Platform as a Service (PaaS)
- Platform Development Kit (PDK)
- Platform For Privacy Preferences Project (P3P)
- Platform Security
- Platter
- Play Mechanics
- Player Versus Environment (PvE)
- Player Versus Player (PvP)
- Playfair Cipher
- PlayStation
- Playtesting
- PLC
- PLED
- Plenum Cable
- Plesiochronous Digital Hierarchy (PDH)
- PLL
- PLM
- Plog
- Plotter
- Plug and Play (PnP)
- Plug and Pray
- Plug Computer
- Plug-In
- Pluggable Authentication Module (PAM)
- Plumbing
- PM
- PM
- PMC
- PMI
- PMI
- PMML
- PMO
- PMP
- PMP
- PMS
- PMS
- PMS
- PN
- PNA
- PNG
- PnP
- POC
- PoC
- Pocket Calculator
- Pocket Dialing
- Pocket PC (PPC)
- POD
- Pod Slurping
- Podcast
- PoE
- PoI
- Point and Shoot
- Point of Presence (POP)
- Point of Sale (POS)
- Point of Sale Terminal (POS Terminal)
- Point-to-Multipoint Communication (PMP)
- Point-to-Point Encryption (P2PE)
- Point-to-Point Protocol (PPP)
- Point-to-Point T1
- Point-to-Point Tunneling Protocol (PPTP)
- Point-To-Point Videoconference
- Point-to-Point Wireless Bridge
- Pointing Stick
- Pointy-Haired
- Poka-Yoke
- Policy Awareness
- Polish Notation (PN)
- Polled Interrupt
- POLP
- Polyfill
- Polygon Mesh
- Polylactic Acid (PLA)
- Polymer LED (PLED)
- Polymer Memory
- Polymorphic Malware
- Polymorphic Virus
- Polymorphism
- Polymorphism
- Polyphonic Ringtone
- POMDP
- PON
- Pooled Table
- POP
- POP
- Pop-Up Ad
- Pop-Up Blocker
- Port (an Application)
- Port 80
- Port Address Translation (PAT)
- Port Forwarding
- Port Knocking
- Port Mapper
- Port Mirroring
- Port Multiplier
- Port Number
- Port Replicator
- Port Scanner
- Port Scanning
- Port Triggering
- Port-to-Application Mapping
- Portability
- Portable Computer
- Portable Device
- Portable Document Format (PDF)
- Portable Mesh Repeater
- Portable Network Graphics (PNG)
- Portable Operating System Interface (POSIX)
- Portable Software
- Portal (Internet)
- Portal Application
- Portal Fabric
- Portico
- Porting
- POS
- PoS
- POS Terminal
- POSIX
- POST
- Post Office Protocol (POP)
- Post-Processing Deduplication (PPD)
- Postal Numeric Encoding Technique (POSTNET)
- Postcardware
- Postel's Prescription
- PostgreSQL
- Postini
- POSTNET
- PostScript (PS)
- PostScript Printer
- Pot
- Potentially Unwanted Program (PUP)
- Potentiometer (Pot)
- POTS
- PoW
- Power Adaptive Algorithms
- Power Amplifier (PA)
- Power Conditioner
- Power Control
- Power Cycling
- Power Distribution Unit (PDU)
- Power Inverter
- Power Leveling (PL)
- Power Line Communications (PLC)
- Power Line Ethernet Bridge
- Power Mac
- Power Macintosh (Power Mac)
- Power Management
- Power Off
- Power Outage
- Power Over Ethernet (PoE)
- Power Strip
- Power Supply
- Power Surge
- Power Usage Effectiveness (PUE)
- Power User
- Power-On Self Test (POST)
- Power-Up
- Power-Up In Standby (PUIS)
- PowerBuilder
- Powermat
- PowerPC
- PowerPoint Singalong
- PowerPoint Slideshow (PPT)
- PowerShell
- POX
- PPC
- PPC
- PPD
- PPI
- PPL
- PPM
- PPM
- PPP
- PPT
- PPTP
- PPTP VPN
- PQM
- Practical Extraction and Report Language (Perl)
- Practice Management Software (PMS)
- Pre-Emption
- Preboot Execution Environment (PXE)
- Precedence
- PRECISE Act of 2011
- Precision Cooling
- Predictive Alerting
- Predictive Analytics
- Predictive Analytics Tools
- Predictive Data Mining
- Predictive Dialer
- Predictive Maintenance
- Predictive Model Markup Language (PMML)
- Predictive Modeling
- Predictive Technology
- Predictive Text
- Preemptive Multitasking
- Prefetching
- Premium Content
- Prepend
- Prepress
- Preprocessor Directive
- Prescriptive Analytics
- Presence
- Presentation Layer
- Presentation Manager (PM)
- Presentation Software
- Presidential Policy Directive (PPD-8)
- Pressure Sensor
- Pretexting
- Pretty Good Privacy (PGP)
- Pretty Printer
- Prettyprint
- PRI
- Primary Key
- Primary Memory
- Primary Rate Interface (PRI)
- Primary Server
- Primary Storage Device
- Primitive
- Primitive Data Type
- Primitive Type
- PRINCE2
- Principal Component Analysis (PCA)
- Principle of Least Privilege (POLP)
- Print Job
- Print Management
- Print Management Software (PMS)
- Print on Demand (POD)
- Print Preview
- Print Quality
- Print Queue
- Print Screen Key (PRTSC)
- Print Server (PSERVER)
- Print Server Management
- Print Spooler
- Printed Circuit Board (PCB)
- Printer Buffer
- Printer Cable
- Printer Command Language (PCL)
- Printer Driver (.PRD)
- Printer Head
- Printer Sharing
- Priority Scheduling
- Prism
- PRISM
- PRISM Program
- Privacy International (PI)
- Privacy Management Tools
- Privacy Policy
- Private
- Private Access DSL (PADSL)
- Private Automatic Branch Exchange (PABX)
- Private Branch Exchange (PBX)
- Private Browsing
- Private Cloud
- Private Cloud Computing
- Private Cloud In A Box
- Private Cloud Storage
- Private File Sharing
- Private Key
- Private Network
- Privilege
- Privoxy
- PRM
- PRM
- PRMA
- PRNG
- Problem Management
- Problem Program
- Procedural Language
- Procedural Language/Structured Query Language (PL/SQL)
- Procedural Programming
- Procedure
- Process Manufacturing Enterprise Resource Planning (Process Manufacturing ERP)
- Process Manufacturing ERP
- Process Owner
- Process Specification
- Processing Capacity
- Processing In Memory (PIM)
- Processor
- Processor Emulation
- Processor Register
- Procure-to-Pay
- Product Activation
- Product Data Management (PDM)
- Product Information Management (PIM)
- Product Introduction
- Product Key
- Product Life Cycle
- Product Lifecycle Management (PLM)
- Product Management
- Product Manager
- Product Obsolescence
- Product Quality Management (PQM)
- Product Release
- Production Environment
- Production Grade
- Production Server
- Professional Services Automation (PSA)
- Proggy
- Program Counter (PC)
- Program Evaluation and Review Technique (PERT)
- Program Evaluation Review Technique Chart (PERT Chart)
- Program Files
- Program Layer
- Program Manager
- Programmable Logic Array (PLA)
- Programmable Network Access (PNA)
- Programmable Read-Only Memory (PROM)
- Programmatic Advertising
- Programmed Data Processor (PDP)
- Programmer
- Programmer's Day
- Programming
- Programming Language
- Programming Language Generations
- Programming Language I (PL/I)
- Programming Language One (PL/I)
- Programming Language/System (PL/S)
- Programming Logic
- Programming Tool
- Progression Gameplay
- Progressive Download
- Progressive Video
- Progressive Web App (PWA)
- Project Administrator
- Project Analyst
- Project Control Officer
- Project Director
- Project Health Checks (PHC)
- Project Loon
- Project Management
- Project Management Institute (PMI)
- Project Management Office (PMO)
- Project Management Professional (PMP)
- Project Management Software
- Project Manager (PM)
- Project Plan
- Project Planning
- Project Portfolio Management (PPM)
- PRojects IN Controlled Environments (PRINCE2)
- Prolog
- PROM
- Promiscuous Mode
- Promoting and Enhancing Cybersecurity and Information Sharing Effectiveness Act of 2011 (PRECISE Act of 2011)
- Proof of Concept (POC)
- Proof of Importance (PoI)
- Proof of Stake (PoS)
- Proof of Work (PoW)
- Proof-of-Concept Virus
- Propeller Head
- Proprietary Software
- Prosumer
- PROTECT IP Act of 2011 (PIPA)
- Protected
- Protected Extensible Authentication Protocol (PEAP)
- Protected Health Information (PHI)
- Protected Mode
- Proteus Effect
- Protocol
- Protocol Buffer
- Protocol Conversion
- Protocol Converter
- Protocol Data Unit (PDU)
- Protocol Stack
- Protocol-Independent Multicast (PIM)
- Protocol-Transparent
- Prototype
- Prototype-Based Programming
- Prototyping
- Provisioning (Computer Networking)
- Provisioning (Computing)
- Provisioning (Telecommunications)
- Proximity Marketing
- Proximity Sensor
- Proxy Agent
- Proxy Hacking
- Proxy Server
- Proxy Service
- Proxy Surfing
- Proxy Trojan
- PRTSC
- PS
- ps
- PS/2
- PS/2
- PS/2 Connector (PS/2)
- PSA
- PSAP
- PSC
- PSERVER
- Pseudo Random Number Generator (PRNG)
- Pseudocode
- Pseudonym (nym)
- Pseudoprime
- Pseudowire (PW)
- PSK
- PSN
- PSO
- PSPP
- PSTN
- PSW
- PTT
- Public
- Public
- Public Cloud
- Public Cloud Storage
- Public Domain Software
- Public Folder
- Public Key
- Public Key Cryptography (PKC)
- Public Key Cryptography Standards (PKCS)
- Public Key Infrastructure (PKI)
- Public Network
- Public Safety Answering Point (PSAP)
- Public Switched Telephone Network (PSTN)
- Public VPN
- Public-Key Infrastructure Certificate (PKI Certificate)
- Publishers Requirements for Industry Standard Metadata (PRISM)
- PUE
- PUIS
- Pull Media
- Pulse Amplitude Modulation (PAM)
- Pulse Code Modulation (PCM)
- Pulse Width Modulation (PWM)
- Pulsing Zombie
- PUN
- Punch Card
- Punchdown Block
- PUP
- PURL
- Purple Wire
- Push Alert
- Push Media
- Push Technology
- Push to Talk Over Cellular (PoC)
- Push-to-Talk (PTT)
- PuTTY
- PV
- PV Cell
- PVC
- PvE
- PVM
- PvP
- PW
- PWA
- PWM
- Pwn
- PWS
- PXE
- Python