Browse Definitions:

Browse File Extensions by Alphabet

3DW - 45

  • 3DW - Cadai 3D World ...
  • 3DX - Rhino 3D Model File
  • 3DX - Rhino 3D graphic
  • 3DXML - Dassault Systemes 3D XML...
  • 3DXML - 3D XML files ( zipped ) ...
  • 3DXML - 3D XML file
  • 3DZ - Easy 3D Creator Project ...
  • 3F - Advent 3B2 Template
  • 3F - Advent 3B2 template file
  • 3F - Al- Arabi Publisher ...
  • 3FR - Hasselblad 3F RAW image
  • 3FX - CorelChart 3D effects
  • 3FX - Effect - CorelChart
  • 3FX - 3D effects
  • 3G2 - 3GPP2 multimedia audio /...
  • 3G2 - 3GPP2 Multimedia File
  • 3GGP2 - 3GPP2 Multimedia File
  • 3GN - Imaging Fax image file
  • 3GP - 3GPP Multimedia File
  • 3GP - Multimedia files for ...
  • 3GP - Nokia 7650 Video ...
  • 3GP2 - 3GPP Multimedia File
  • 3GP2 - 3GPP2 Multimedia File
  • 3GPP - 3GPP Media File
  • 3GPP - 3GPP Multimedia File
  • 3GPP - 3GPP Third generation ...
  • 3GPP2 - 3GPP2 Multimedia File
  • 3GR - 386 Grabber File - Win
  • 3GR - Device Driver
  • 3GR - Windows Screen Grabber ...
  • 3GR - VGA Graphics driver / ...
  • 3H - Al- Arabi Publisher tag ...
  • 3H - Advent 3B2 Tag Header
  • 3IN - Configuration MSN Setup ...
  • 3IN - MSN Setup Information
  • 3K - Advent 3B2 keyboard ...
  • 3K - Advent 3B2 Keyboard ...
  • 3K - Al- Arabi Publisher ...
  • 3M - Al- Arabi Publisher Macro
  • 3M - Advent 3B2 Macro
  • 3ME - TurboTax Form File
  • 3MM - 3D Movie Maker ( generic...
  • 3MM - Microsoft 3D Movie Maker...
  • 3MM - 3D Movie Maker Movie ...
  • 3MP - TTCN -3 Toolbox Source ...
  • 3NG - AT Time ! Internal Log (...
  • 3O - Advent 3B2 Object Graphic
  • 3O3 - STABCAL ( stability ...
  • 3O5 - STABCAL ( stability ...
  • 3P - Advent 3B2 Document ...
  • 3P2 - 3GPP Multimedia File
  • 3PE - TurboTax 2008 Form File
  • 3PG - 3D Digital Gallery file
  • 3PI - ShapeGrabber scanner file
  • 3PI - 3rd PlanIt file
  • 3PI - 3rd PlanIt
  • 3R - Al- Arabi Publisher ...
  • 3R - Advent 3B2 Raster Image
  • 3RF - Advent 3B2 Extensions ...
  • 3S - Advent 3B2 Paragraph ...
  • 3T - Unknown Apple II File
  • 3T - Advent 3B2 Text
  • 3T - Often man file
  • 3T4 - Binary file converter to...
  • 3T4 - Util3 binary file ...
  • 3TA - Triple -T Animation
  • 3TF - Crystal Reports ( ...
  • 3TH - 3D Movie Maker Thumbnail...
  • 3TH - 3D Movie Maker ( generic...
  • 3TP - Triple -T Plug -in
  • 3X - Advent 3B2 Entity
  • 3X - cygwin man file
  • 3X5 - 3x5 Knowledge base file
  • 3X5 - 3 x 5 Knowledge Base
  • 3XE - 3DLinX Entity
  • 3~6 - Win3 System file
  • 3~6 - Windows 3.xx System file
  • 4 - Salt Lake City Game ...
  • 4 - IBM Embedded ViaVoice ...
  • 4 - Screen Log File
  • 4 - Unformatted manual page ...
  • 40 - AOL 4 Organizer File
  • 40 - Aol40 organizer file
  • 400 - Designer graphics file
  • 4000 - Unknown Apple II File
  • 4001 - Unknown Apple II File
  • 402 - Unknown Apple II File
  • 404 - FruityLoops Channel ...
  • 404 - Fruitypro Samples Ts404 ...
  • 404 - Muon DS404 patch file
  • 41 - Unknown Apple II File
  • 411 - Data file
  • 411 - Sony Mavica picture ...
  • 411 - Sony Mavica Data File
  • 42 - Salt Lake City Game ...
  • 42 - Unknown Apple II File
  • 426 - Speed Touch DSL Modem ...
  • 44 - CWCDATA file
  • 44 - Clipstream 32 Kb Stream

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • computer exploit

    A computer exploit, or exploit, is an attack on a computer system, especially one that takes advantage of a particular ...

  • cyberwarfare

    Cyberwarfare is computer- or network-based conflict involving politically motivated attacks by a nation-state on another ...

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close