Browse Definitions:

Browse File Extensions by Alphabet

8XL - @@@

  • 8XL - TI-82- Plus List ( Texas...
  • 8XM - TI-82- Plus Matrix ( ...
  • 8XN - TI-82- Plus Real ( Texas...
  • 8XP - TI-83 Plus Calculator ...
  • 8XP - Executable program for ...
  • 8XP - TI-83 Plus Calculator ...
  • 8XQ - TI-82- Plus Certificate ...
  • 8XS - TI-82- Plus String ( ...
  • 8XT - TI-82- Plus Text ( Texas...
  • 8XU - TI-83 Plus Operating ...
  • 8XU - Texas Instruments TI-8x ...
  • 8XV - TI-82- Plus Application ...
  • 8XW - TI-82- Plus Window Setup...
  • 8XY - TI-82- Plus ( Texas ...
  • 8XZ - TI-82- Plus Zoom ( Texas...
  • 9 - Screen Log File
  • 9 - Salt Lake City Game ...
  • 9 - Unknown Apple II File
  • 9 - IBM Embedded ViaVoice ...
  • 900 - NCBridge NC900 Series ...
  • 906 - Calcomp Plotter File
  • 906 - Calcomp plotter
  • 906 - Vector graphics
  • 907 - Vector graphics ( ...
  • 907 - Calcomp Plotter File
  • 91 - Ventura Publisher 91x91 ...
  • 91 - 91x91 dpi display font -...
  • 91 - Unknown Apple II File
  • 911 - Config 911s file
  • 915 - Config 915e file
  • 917 - Trend Antivirus File
  • 92A - TI-92 Figure ( Texas ...
  • 92B - TI-92 Backup ( Texas ...
  • 92C - TI-92 Data ( Texas ...
  • 92D - Texas Instruments TI-92 ...
  • 92E - TI-92 Expression ( Texas...
  • 92F - TI-92 Function ( Texas ...
  • 92G - TI-92 Group ( Texas ...
  • 92I - TI-92 Bitmap ( Texas ...
  • 92I - TI bitmap Header
  • 92K - TI-92 Application ( ...
  • 92L - TI-92 List ( Texas ...
  • 92M - TI-92 Matrix ( Texas ...
  • 92N - TI-92 ( Texas ...
  • 92P - TI-92 Calculator Program...
  • 92Q - TI-92 Certificate ( ...
  • 92R - TI-92 ( Texas ...
  • 92S - TI-92 String ( Texas ...
  • 92T - TI-92 Text ( Texas ...
  • 92U - TI-92 OS Upgrade ( Texas...
  • 92X - TI-92 Macro ( Texas ...
  • 92Y - TI-92 ( Texas ...
  • 92Z - TI-92 Assembly Program (...
  • 96 - 96x96 dpi display font -...
  • 96 - Ventura Publisher 96x96 ...
  • 96 - Unknown Apple II File
  • 98 - Dll Directx Migrate file
  • 994 - Symantec LiveUpdate ...
  • 995 - Symantec LiveUpdate ...
  • 999 - Sage Backup ( Sage ...
  • 999 - Sage Backup Header
  • 999 - Multipass Security File
  • 99_ - Casino Game File
  • 9DK - OS/2 Saved SKF Format ...
  • 9KP - Doom Archived TGA ...
  • 9M1 - WinRAR split archive ...
  • 9XA - TI-92 Plus Figure ( ...
  • 9XB - TI-92 Plus Backup ( ...
  • 9XC - TI-92 Plus Data ( Texas ...
  • 9XD - TI-92 Plus GDB ( Texas ...
  • 9XE - TI-92 Plus Expression ( ...
  • 9XF - Texas Instruments TI-92 ...
  • 9XG - TI-92 Plus Group ( Texas...
  • 9XI - Texas Instruments TI-92 ...
  • 9XK - TI-92 Plus Application (...
  • 9XL - TI-92 Plus List ( Texas ...
  • 9XM - TI-92 Plus Matrix ( ...
  • 9XN - TI-92 Plus Application (...
  • 9XP - TI-92 Plus Calculator ...
  • 9XQ - TI-92 Plus Certificate (...
  • 9XR - TI-92 Plus ( Texas ...
  • 9XS - TI-92 Plus String ( ...
  • 9XT - TI-92 Plus Text ( Texas ...
  • 9XU - TI-92 Plus OS Upgrade ( ...
  • 9XX - TI-92 Plus Macro ( Texas...
  • 9XY - TI-92 Plus Archived ...
  • 9XZ - TI-92 Plus Calculator ...
  • ??$ - Compressed Archive File
  • ??? - Audio file
  • ??_ - Stirling Technologies ...
  • ??_ - Compressed Archive File
  • ??_ - Microsoft KWAJ ...
  • ??MPE - MP3 Digital Player ...
  • ??Z - LoseThos compressed file
  • ??Z - Compress / Gzip Unix ...
  • ?Q? - SQ Squeeze archive file
  • ?RS - WordPerfect Support File
  • @@1 - HiDownload temporary file
  • @@2 - HiDownload temporary file

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

  • ransomware

    Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is ...

  • hacker

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close