IT Terms beginning with 'N'
- N Port ID Virtualization (NPIV)
- N-tier
- N-Tier Architecture
- N_Port
- NaaS
- NAC
- NACHA
- Nagware
- Naive Bayes
- Name Resolution
- Name Server
- Named Pipe
- Named User License
- Named-Entity Recognition (NER)
- Namespace
- Naming Convention
- NaN
- NAN
- NAND Flash Memory
- NAND Gate
- Nano Kernel
- Nanobot
- Nanochip
- Nanocomputer
- Nanofabrication
- Nanography
- Nanolithography
- NanoManipulator
- Nanomaterial Supercapacitor
- Nanometer
- Nanopaint
- Nanophotonics
- Nanosecond (ns)
- Nanotechnology
- Nanotechnology, Biotechnology, Information Technology, Cognitive Science (NBIC)
- Nanotube
- Nanowire
- NAP
- NAP
- Napster
- NAPT
- Narrow AI
- Narrow Artificial Intelligence (Narrow AI)
- Narrowband
- Narrowcast
- NAS
- NAS
- NAS Data Recovery
- NAS Drive
- NAS Server
- Nastygram
- NAT
- NAT64
- National Automated Clearing House Association (NACHA)
- National Climatic Data Center (NCDC)
- National Cyber Security Division (NCSD)
- National Cybersecurity and Communications Integration Center (NCCIC)
- National Geophysical Data Center (NGDC)
- National Information Assurance Partnership (NIAP)
- National Initiative for Cybersecurity Education (NICE)
- National Institute Of Standards And Technology (NIST)
- National Protection and Programs Directorate (NPPD)
- National Science Foundation (NSF)
- National Science Foundation Network (NSFNet)
- National Security Agency (NSA)
- National Strategy for Trusted Identities in Cyberspace (NSTIC)
- National Television System Committee (NTSC)
- National Vulnerability Database (NVD)
- Native Audit
- Native Cloud Application (NCA)
- Native Code
- Native Code Compiler for Java (NCCJ)
- Native Command Queuing (NCQ)
- Native Compiler
- Native Distributed Analytics Architecture (NDAA)
- Native File Format
- Native Mobile App
- Natural Language Generation (NLG)
- Natural Language Processing (NLP)
- Natural Language Toolkit (NLTK)
- Natural Language Understanding (NLU)
- Natural Search
- NAU
- Navigation Bar
- Navy Knowledge Online (NKO)
- NBA
- NBAD
- NBAR
- NBD
- NBI
- NBIC
- NBMA
- NBSP
- NBSS
- NC
- NCA
- NCCIC
- NCCJ
- NCM
- NCP
- NCP
- NCQ
- NCSD
- NDAA
- NDC
- NDIS
- NDP
- NDR
- Near Field Communication (NFC)
- Near Field Communication Tag (NFC Tag)
- Near-Line Storage
- Nearable
- NEAT
- Neats Vs Scruffies
- NEBS
- NEBS Compliance
- Negawatt
- Neighbor Discovery Protocol (NDP)
- Neighborhood Area Network (NAN)
- Neo FreeRunner
- NeoM
- NER
- NERC CIP
- Nerd Sniping
- Nested Type
- Net Neutrality
- Net PC
- Net Send
- Net-Liberated Organization
- Net-Results
- NetApp Storage
- NetBeans
- NetBEUI
- NetBIOS
- NetBIOS Extended User Interface (NetBEUI)
- NetBIOS Session Service (NBSS)
- Netbook
- Netbus
- Netfinity
- NetFlow
- Netiquette
- Netmask
- NetMeeting
- NetRexx
- Netscape Communications
- Netscape Communicator
- Netscape Navigator
- Netsplit
- Netwar
- Netware Core Protocol (NCP)
- NetWare Link (NWLink)
- NetWeaver
- Network
- Network Access Control (NAC)
- Network Access Point (NAP)
- Network Access Server (NAS)
- Network Adapter
- Network Address
- Network Address Port Translation (NAPT)
- Network Address Translation (NAT)
- Network Addressable Unit (NAU)
- Network Administration
- Network Administrator
- Network Analyst
- Network Architect
- Network Architecture
- Network as a Service (NaaS)
- Network Attached Storage (NAS)
- Network Attached Storage Drive (NAS Drive)
- Network Attached Storage Server (NAS Server)
- Network Auditing
- Network Auditing Software
- Network Automation
- Network Backup
- Network Backup Software
- Network Based Application Recognition (NBAR)
- Network Basic Input Output System (NetBIOS)
- Network Behavior Analysis (NBA)
- Network Behavior Anomaly Detection (NBAD)
- Network Block Device (NBD)
- Network Bottleneck
- Network Capacity Planning
- Network Coding
- Network Computer (NC)
- Network Computing
- Network Configuration
- Network Configuration Management (NCM)
- Network Connectivity
- Network Control Protocol (NCP)
- Network Convergence
- Network Database
- Network Degradation
- Network Design
- Network Diagnostic Software
- Network Diagram
- Network Diagram Software
- Network Disaster Recovery Plan
- Network Discovery
- Network Discovery Software
- Network Drive
- Network Driver Interface Specification (NDIS)
- Network Encryption
- Network Enumeration
- Network Equipment-Building System (NEBS)
- Network File System (NFS)
- Network File Transfer (NFT)
- Network Forensics
- Network Functions Virtualization (NFV)
- Network ID
- Network Identity (Network ID)
- Network Information Service (NIS)
- Network Infrastructure
- Network Intelligence (NI)
- Network Interface Card (NIC)
- Network Interface Device
- Network Inventory Management
- Network Latency
- Network Layer
- Network Load Balancing (NLB)
- Network Management
- Network Management Protocol (NMP)
- Network Management System (NMS)
- Network Map
- Network Mapping
- Network Mapping Software
- Network Meltdown
- Network Model
- Network Monitoring
- Network Monitoring Software
- Network Node Manager (NNM)
- Network on a Chip (NoC)
- Network Operating System (NOS)
- Network Operations Center (NOC)
- Network Optimization
- Network Outsourcing
- Network PC (Net PC)
- Network Performance
- Network Performance Management
- Network Performance Monitoring
- Network Performance Test
- Network Port
- Network Processor (NPU)
- Network Protocols
- Network Recovery
- Network Redundancy
- Network Scanning
- Network Science
- Network Security
- Network Security Administrator
- Network Security Architectrue
- Network Security Key
- Network Security Policy
- Network Security Protocols
- Network Security Scanner
- Network Security Software
- Network Segment
- Network Segmentation
- Network Server
- Network Service Provider (NSP)
- Network Sharing
- Network Slicing
- Network Software
- Network Support Engineer
- Network Surveillance
- Network Tap
- Network Termination Unit (NTU)
- Network Theory
- Network Time Protocol (NTP)
- Network Topology
- Network Tracking Tool
- Network Traffic
- Network Traffic Analysis
- Network Traffic Monitoring
- Network Transparency
- Network Troubleshooting
- Network Usage Monitor
- Network Video Recorder (NVR)
- Network Virtualization
- Network Vulnerability Assessment
- Network-based Intrusion Detection System (NIDS)
- Network-based Intrusion Prevention System (NIPS)
- Network-to-Network Interface (NNI)
- Networked Data Center (NDC)
- Networking
- Neural Turing Machine (NTM)
- Neuralink
- NeuroEvolution of Augmenting Topologies (NEAT)
- Neuroimaging
- Neuroinformatics
- Neuromorphic Computing
- Neurotechnology
- New Enterprise Operating Model (NeoM)
- New Media
- New Product Development (NPD)
- New Technology File System (NTFS)
- News Server
- Newsgroup
- NewSQL
- Newton
- Next Generation Internet (NGI)
- Next Generation Nationwide Broadband Network (NGNBN)
- Next Generation Network (NGN)
- Next Hop
- Next Issue Avoidance (NIA)
- Next-Generation Firewalls
- Next-Generation Telematics Protocol (NGTP)
- Nexus One
- NF
- NFC
- NFC Tag
- NFS
- NFT
- NFV
- NGDC
- NGI
- NGN
- NGNBN
- NGTP
- NI
- NIA
- NIAP
- Nibble
- NIC
- NiCd or NiCad
- NICE
- Nickel-Cadmium Battery (NiCd or NiCad)
- Nickel-Metal Hydride Battery (NiMH)
- Nickelbacking
- NIDS
- NiFi
- NIHS
- Nikola Tesla
- NiMH
- Nimrod Routing Architecture
- Ninety-Ninety Rule
- NIP
- NIPS
- NIS
- NIST
- NIST 800 Series
- NIST 800-53
- NIST Cloud Computing Program
- Nit
- NKO
- NLB
- NLE
- NLG
- NLOS
- NLP
- NLTK
- NLU
- NMI
- NMP
- NMS
- NNI
- NNM
- No Operation (NOP)
- No-Email Initiatives
- NOC
- NoC
- Node
- Node Pole
- Node Port (N_Port)
- Node.js
- Nodezilla
- Nofollow
- Noise
- Noise Figure (NF)
- Nokia N8
- Nomad Software
- Nomadic Computing
- Nomadic Wireless
- Nomophobia
- Non Return to Zero Inverted (NRZI)
- Non-Breaking Space (NBSP)
- Non-Broadcast Multiple Access (NBMA)
- Non-Delivery Report (NDR)
- Non-Deterministic Algorithm
- Non-Deterministic Polynomial Time (NP)
- Non-Deterministic Turing Machine (NTM)
- Non-Impact Printer (NIP)
- Non-Line Of Sight (NLOS)
- Non-Linear Editing (NLE)
- Non-Maskable Interrupt (NMI)
- Non-Persistent Desktop
- Non-Photorealistic Rendering (NPR)
- Non-Player Character (NPC)
- Non-Preemptive Multitasking
- Non-Printable Characters
- Non-Relational Database
- Non-Uniform Memory Access (NUMA)
- Non-Uniform Rational Basis Spline (NURBS)
- Non-Virtual Hosting
- Non-Volatile Memory (NVM)
- Non-Volatile Memory Express (NVMe)
- Non-Volatile Random Access Memory (NVRAM)
- Non-Volatile Register
- Non-Volatile Storage (NVS)
- Nonce
- Nonlinearity
- Nonproprietary Software
- Nonrepudiation
- Noob
- NOP
- NOR Gate
- Normalization
- Northbound Interface (NBI)
- Northbridge
- NOS
- NoSQL
- Not a Number (NaN)
- Not Invented Here Syndrome (NIHS)
- NOT Operator
- Not Ready For Prime Time
- Not Safe for Work (NSFW)
- Not-Null Constraint
- Novelty Detection
- NP
- NPC
- NPD
- NPIV
- NPPD
- NPR
- NPU
- Nroff
- NRZI
- ns
- NSA
- NSA Line Eater
- NSF
- NSFNet
- NSFW
- NsLookup
- NSP
- NSTIC
- NTFS
- NTLM
- NTM
- NTM
- NTP
- NTSC
- NTU
- Nubus
- Nuker
- Null
- Null Character
- Null Modem
- Null-Coalescing Operator
- Null-Modem Cable
- Num Lock
- NUMA
- Numa Numa Dance
- Number Lock (Num Lock)
- Number of Tiers (N-tier)
- Number Sign
- Numbering Plan
- NumPy
- NURBS
- NVD
- NVM
- NVMe
- NVR
- NVRAM
- NVS
- NWLink
- nym
- Nym Server
- Nymwar
- Nyquist Frequency
- Nyquist's Law