Technology words that start with P
List of Technology words that start with “P”.
- P
- Platform as a Service
- Project Manager
- Product Life Cycle
- Practical Extraction and Report Language
- Parallel Interface
- Port Knocking
- Primary Key
- Portal (Internet)
- Patent
- Performance Reference Model
- PostgreSQL
- Procedural Language/Structured Query Language
- Port (an Application)
- PayPal
- Personal Information Manager
- Pseudocode
- Programming Language One
- Prototype
- Password Protection
- Platform
- Personal System/2
- Peppermint
- Peripheral Component Interconnect Express – PCI Express
- Public Switched Telephone Network
- Program Evaluation and Review Technique
- Programming Language Generations
- Programming Language
- Pixel Pipelines
- Personal Digital Assistant
- Personal Area Network
- Product Lifecycle Management
- Practice Management Software
- Planking
- Parallel Processing Software
- Protected Health Information
- Product Quality Management
- Pay Per Click
- Public Key Infrastructure
- Program Evaluation Review Technique Chart
- Point of Sale
- Pierre Salinger Syndrome
- Pharming
- Presence
- Porting
- Pasta Theory
- Portability
- Portable Software
- Planning Game
- Private Automatic Branch Exchange
- Planning Board
- Private Branch Exchange
- Public Safety Answering Point
- Protocol Stack
- Patch Panel
- Programming Language/System
- Pipe
- Program Layer
- Parameter
- Product Activation
- Patch
- PS/2 Connector
- Peripheral Component Interconnect Modem
- Principle of Least Privilege
- PHP: Hypertext Preprocessor 3.0
- PHP: Hypertext Preprocessor 4.0
- Personal Java
- Parallel Port
- Problem Program
- Push to Talk Over Cellular
- Power Usage Effectiveness
- Protocol Data Unit
- Packet
- Prism
- Patch Cord
- Power Cycling
- Plain Old Telephone Service
- Phreaking
- PC Card
- Paravirtualization
- PCI Extended
- Push Technology
- Publishers Requirements for Industry Standard Metadata
- Proof of Concept
- Print Server
- Phishing (Phishing Attack)
- Point-to-Point Protocol
- Protocol
- Presentation Layer
- Packet Analyzer
- Packet Collision Rate
- Plesiochronous Digital Hierarchy
- Picasa
- Pop-Up Blocker
- Physical Layer
- Packet Switching
- Protected Mode
- Player Versus Player
- Proxy Server
- Parameterized Query
- Progressive Download
- PostScript
- Ping
- Pages Per Minute
- Packet Buffer
- Policy Awareness
- Piggyback Email
- Password Cracking
- Pseudonym
- Passive Reconnaissance
- Power-On Self Test
- Paradox
- Port Scanning
- Predictive Dialer
- Public Key Cryptography
- Private Key
- Public Key
- Pulsing Zombie
- Portal Application
- Pay to Play
- PictBridge
- Port Address Translation
- Parser
- Piconet
- Pagejacking
- Packet Capture
- Pentium III
- PowerBuilder
- Peer-to-Peer Architecture
- Parallel Processing
- Pre-Emption
- Paravirtualized Operating System
- Port Replicator
- Preboot Execution Environment
- Parity Check
- Packet Filtering
- Preprocessor Directive
- Passive File Transfer Protocol
- PlayStation
- Programming Language I
- Player Versus Environment
- Progression Gameplay
- Processor Register
- Project Plan
- Portable Mesh Repeater
- Pervasive Computing
- Peering
- Performance Testing
- Playtesting
- Personal Identification Number
- Patent Pending
- Ping Pong Virus
- Project Portfolio Management
- Pointing Stick
- Polymorphic Virus
- Public Cloud
- Private Cloud
- Project Management
- Perfect RAM
- Problem Management
- Pentium 4
- Project Planning
- Private Access DSL
- PC Demo
- Plug and Play
- Physical Topology
- Pigs And Chickens
- Persistent-State World
- Personal Computer
- Push-to-Talk
- Power Supply
- Polyphonic Ringtone
- Polled Interrupt
- Peer-to-Peer (P2P) Network
- PageRank
- Pascal
- Python
- PHP: Hypertext Preprocessor
- Polymorphism
- Pulse Code Modulation
- Peripheral Component Interconnect Bus
- PICTIVE
- Power Conditioner
- Pseudo Random Number Generator
- Play Mechanics
- Passive Component
- Partition
- Penetration Testing
- Point of Sale Terminal
- Payment Card Industry
- Production Grade
- Photonic Crystal Fiber
- Pay As You Go
- Phase Change Memory
- Power Line Communications
- Punchdown Block
- Port-to-Application Mapping
- Programmer’s Day
- Pinout
- PRojects IN Controlled Environments
- Pages Per Visit
- Phase-Shift Keying
- Postini
- Personalization
- Predictive Model Markup Language
- Primitive
- PowerShell
- Physical Computer
- Phase-Change Cooling
- Private
- Proxy Surfing
- PROTECT IP Act of 2011
- Passive Attack
- Parasite Hosting
- Public
- Protected
- Pluggable Authentication Module
- Product Release
- Package
- Provisioning (Computing)
- Provisioning (Telecommunications)
- Provisioning (Computer Networking)
- PEBCAK Error
- Print on Demand
- Perfect Forward Secrecy
- Plug Computer
- Print Queue
- Photo Lurking
- Performant
- Photobomb
- PowerPoint Singalong
- Process Owner
- Parse
- Precedence
- Private Cloud Storage
- Public Cloud Storage
- Patch Tuesday
- Page View
- Processor
- Product Management
- Permalink
- Product Manager
- Phage Virus
- Pixel
- Post Office Protocol
- Partner Relationship Management
- Palo Alto Research Center
- Programming
- Product Obsolescence
- Product Introduction
- Pivot Table
- PACTOR
- Privoxy
- Personal Cloud
- Patent Troll
- Professional Services Automation
- Password Salting
- Pulse Amplitude Modulation
- Project Management Office
- Project Management Software
- Petabyte
- Pebibyte
- Project Health Checks
- Project Management Institute
- Project Management Professional
- Production Environment
- Physical Access
- Procedural Language
- Process Specification
- Power Macintosh
- Peopleware
- Package Size
- Primitive Type
- Predictive Analytics
- Pretty Printer
- Planned Downtime
- Petaflop
- Potentially Unwanted Program
- Payload
- Page Hijacking
- Paid Search
- Petabyte Age
- Peterson’s Algorithm
- Penetration Testing Tool
- Point-to-Multipoint Communication
- Privacy International
- PowerPC
- Pocket Dialing
- Pooled Table
- Promoting and Enhancing Cybersecurity and Information Sharing Effectiveness Act of 2011
- Parental Control Software
- Procedure
- Pending Larry Quote
- Phablet
- Privacy Policy
- Paywall
- Product Data Management
- Personally Identifiable Financial Information
- Pacemaker Hacker
- Product Information Management
- Personally Identifiable Information
- Password
- Parasiteware
- Project Director
- Peering Agreement
- Platform Agnostic
- Pretty Good Privacy
- Parallax Scrolling
- Parallel Computing
- Point of Presence
- Password Sniffer
- Project Analyst
- Piracy
- Process Manufacturing Enterprise Resource Planning
- Peripheral Device
- Planned Obsolescence
- Printed Circuit Board
- Power Management
- Peering Exchange
- Pretexting
- Programmer
- Passive Network
- Platform Development Kit
- Parallel Virtual Machine
- Parent Partition
- Physical To Virtual
- Permanent Virtual Circuit
- Power User
- Primary Memory
- Power-Up In Standby
- Podcast
- Port Number
- Port 80
- Port Triggering
- Port Forwarding
- Plenum Cable
- Personal Identity Verification Card
- Predictive Text
- Port Mirroring
- Peripheral Interface Controller
- Parametric Polymorphism
- Place Shifting
- Packet Switched Network
- Preemptive Multitasking
- Programming Tool
- Punch Card
- Proprietary Software
- Primary Server
- Physical Drive
- Project Administrator
- Ping Of Death
- Private Cloud In A Box
- Peripheral
- Pixels Per Inch
- Polylactic Acid
- Portable Device
- Primary Storage Device
- Portable Network Graphics
- Processing In Memory
- Plug and Pray
- Patch Management
- Primitive Data Type
- Prototyping
- Printer Head
- Proof-of-Concept Virus
- Propeller Head
- Post-Processing Deduplication
- Private Network
- Public Network
- Predictive Modeling
- Presidential Policy Directive (PPD-8)
- Port Scanner
- Polyfill
- Physical Unit Number
- Peer Discovery
- Point-To-Point Videoconference
- Prescriptive Analytics
- Production Server
- PRISM Program
- Phlashing
- Password Authentication Protocol
- Protocol-Independent Multicast
- Programmable Network Access
- Password Hardening
- Passive Fault Management
- Print Spooler
- Printer Buffer
- Proxy Hacking
- Print Preview
- Piezoelectric Accelerometer
- Pebibit
- Platform Security
- Print Screen Key
- Phubbing
- Phone Stacking
- Prosumer
- Processing Capacity
- Pink Contract
- Proteus Effect
- Pipeline Burst Cache
- Precision Cooling
- Petabit
- Personal Health Information
- Pentium
- Plug-In
- Portable Document Format
- Persistent Cookie
- Point-to-Point Tunneling Protocol
- Personal Health Record
- Promiscuous Mode
- Physical Security
- Public Key Cryptography Standards
- Phonetography
- Personal Firewall
- Protected Extensible Authentication Protocol
- Pentium II
- Playfair Cipher
- Password Breaker
- Persistence
- Persistent URL
- Picosecond
- Public-Key Infrastructure Certificate
- Picocell
- Personal Supercomputer
- Prototype-Based Programming
- Path Coverage Testing
- Pink Noise
- Purple Wire
- Private File Sharing
- Pigpen Cipher
- Programmable Read-Only Memory
- PC Recovery
- Paperless Office
- Project Control Officer
- Programming Logic
- Pig Latin
- PCI Slot
- Paging
- Pseudowire
- Proxy Trojan
- Peripheral Equipment
- Performance Management
- Passive Surveillance
- Portable Computer
- Parallel Method Invocation
- Parallel Query
- Permanently Assigned Multiple Access
- Parallel Data Analysis
- Packet Reservation Multiple Access
- Photosensor
- Power Distribution Unit
- Personal VPN
- Public VPN
- PPTP VPN
- Payment Card Industry Data Security Standard
- Physical Data Model
- Private Cloud Computing
- Patient Relationship Management
- Polymorphic Malware
- Point-to-Point Encryption
- Polymer LED
- Point-to-Point Wireless Bridge
- Performance Management System
- Pulse Width Modulation
- Print Server Management
- Print Management
- Pwn
- Procure-to-Pay
- Pocket Calculator
- Priority Scheduling
- Pull Media
- Push Media
- PCI Mezzanine Card
- Perceptron
- Physical Address
- Pandora
- Personal Computer Game
- Patch and Pray
- Predictive Data Mining
- PCI Compliance
- Power Off
- PCI Compliance Audit
- PCI-Compliant Hosting
- Privacy Management Tools
- Public Domain Software
- Procedural Programming
- Phantom Vibration Syndrome
- Proximity Sensor
- Protocol Converter
- Printer Cable
- Pressure Sensor
- Power Line Ethernet Bridge
- Power Surge
- Printer Sharing
- Program Files
- Print Quality
- Public Folder
- Print Job
- Premium Content
- Power Control
- Pipeline
- Pipelining
- Prepress
- Primary Rate Interface
- Power Strip
- Potentiometer
- Port Mapper
- Photovoltaic Cell
- Printer Driver
- Portico
- Plasma Display
- Power Outage
- Phased Array
- Power Amplifier
- Presentation Software
- Piezoelectricity
- Personal Communications Service
- Permission Marketing
- Phishing Kit
- Pixel Art
- Personal Address Book
- Print Management Software
- Perceptual Computing
- Payment Gateway
- Packet Loss
- Partner Portal
- Personalized Marketing
- Page Setup
- Predictive Technology
- Program Manager
- Printer Command Language
- Pizza Box
- Platform For Privacy Preferences Project
- Pocket PC
- Planck’s Constant
- Power Leveling
- Power-Up
- Postal Numeric Encoding Technique
- Presentation Manager
- Painting Tool
- Point and Shoot
- Plotter
- Personal Web Server
- Photo CD
- PowerPoint Slideshow
- Photoblog
- PalmPilot
- Product Key
- Payment Card Industry Security Standards Council
- Payment Application Data Security Standard
- Phase Shift
- Patch Antenna
- Peak-to-Peak
- Pattern Recognition
- Pin Grid Array
- Peltier Effect
- Pop-Up Ad
- Passive Optical Network
- Powermat
- Pango
- Phase-Locked Loop
- Palm
- Pay Per Lead (PPL)
- PuTTY
- PostScript Printer
- Plain Old XML
- Polymer Memory
- Power Adaptive Algorithms
- Parity
- Poka-Yoke
- Payment Application Qualified Security Assessor
- Pico Projector
- Photonic Crystal Display
- Proxy Agent
- Protocol Conversion
- PC-on-a-Stick
- Protocol-Transparent
- Portal Fabric
- Pantone Matching System
- Point-to-Point T1
- Partitioning Code
- PC Load Letter
- Partial Document Encryption
- Password Generator
- Password Vault
- Processor Emulation
- Project Loon
- Plan File
- Port Multiplier
- Platter
- Password Manager
- Private Browsing
- Personal Access Communications System
- Prepend
- Postcardware
- Pixelation
- Programmable Logic Array
- PEEK and POKE
- Polygon Mesh
- Plumbing
- Phase Alternating Line
- Pointy-Haired
- Peer-To-Peer
- Packet Monkey
- PathPing
- Photodiode
- Portable Operating System Interface
- Percussive Maintenance
- Proxy Service
- Persistent Desktop
- Progressive Video
- Paul Baran
- Paper Tape
- Pad Character
- Prettyprint
- Proggy
- Pattern Matching
- Predictive Analytics Tools
- Postel’s Prescription
- Phase-Of-The-Moon Bug
- Pseudoprime
- Paul Allen
- Parity Error
- Persona
- Predictive Maintenance
- Privilege
- Predictive Alerting
- Performance Counter
- Programmed Data Processor
- Phrack
- Push Alert
- Programming Concurrency
- Peer-To-Peer File Sharing
- Prolog
- PSPP
- Program Counter
- Power Inverter
- Protocol Buffer
- Polish Notation
- Prefetching
- Phong Shading
- Petri Net
- Principal Component Analysis
- Passphrase
- Programmatic Advertising
- Power Over Ethernet
- Proximity Marketing
- Piggybacking
- Particle Swarm Optimization
- Physical Neural Network
- Progressive Web App
- Pathname
- Proof of Work
- Proof of Stake (PoS)
- Proof of Importance
- Perimeter Security
- Pandas
- P-Code Machine
- Parallel Functional Programming
- Partially Observable Markov Decision Process
- Pygmalion
- Passive Biometrics
- Pegasus
- Polkadot
- Passwordless Authentication
- Prompt-Based Learning
- Privilege Escalation
- Pepe Coin ($PEPE)
- Play-to-Earn (P2E)
- Prompt Engineering
- Passkey (Passkey Authentication)
- Polygon (MATIC)
- Pump-And-Dump
- Pepe 2.0 ($PEPE2)
- Permissionless
- Proof-of-Authority (PoA)
- Proof-of-Attendance Protocol (POAP)
- Play-to-Own (P2O)
- Privileged Access Management
- Pull Request
- Phishing Awareness Training
- Ponzi Scheme
- Proof of Personhood (PoP)
- Proof of Reserves (PoR)
- Prompt Injection Attack
- Pi Network, Pi Coin (PI)
- Proto-Danksharding
- Proposer-Builder Separation (PBS)
- Pyth Network (PYTH)
- Phi Network (PHI)
- PTO
- Prompt Chaining
- Physical Resource Networks (PRNs)
- Portfolio Investment
- Point-to-Point Protocol over Ethernet (PPPoE)
- Payroll Software
- Payroll Tax
- Payroll Deductions
- Programming Hooks
- Pascal Case
- Post-Quantum Cryptography (PQC)
- Public Data