Browse Definitions:

Browse File Extensions by Alphabet

APK - ARC

  • APK - Microsoft Train ...
  • APK - Android Package ( Open ...
  • APK - GameSpy Arcade service ...
  • APK - Android Package Header
  • APK - Android Package File
  • APK - Train Simulator Packaged...
  • APK - Active Tutor Project (4C...
  • APL - APL Workspace file
  • APL - Application library file...
  • APLC - Anarchie Placeholder
  • APLN - Adobe InDesign 3rd party...
  • APLT - AppleScript Applet
  • APM - Adobe Aldus PageMaker ...
  • APM - StudioM file
  • APM - DBApp developer model
  • APM - Pro/ ENGINEER ...
  • APM - Authorware Macintosh - ...
  • APM - Application Manager ...
  • APM - ArcPad Ver. 6
  • APM - Alphacam punch parameter...
  • APM - Linux file
  • APM - Aldus Placeable ...
  • APM - Aldus Placeable Metafile...
  • APM3 - Authorware
  • APN - APN Wallpaper ( Alpine ...
  • APN - ApneaGraph data file
  • APN - Wallpaper graphics file
  • APNG - Animated portable ...
  • APNG - Animated PNG File
  • APO - Apollo scripts
  • APO - Abacre Paperless Office
  • APP - Generated application or...
  • APP - Normal mode application ...
  • APP - dBase Application ...
  • APP - DR-DOS Executable ...
  • APP - Symphony Add-in ...
  • APPC - Control Panel Application
  • APPD - Desk Accessory
  • APPE - Application Extension
  • APPL - Application
  • APPL - Self - extracting archive
  • APPLESCRIPT - AppleScript File
  • APPLESCRIPT - AppleScript Script ( ...
  • APPLICATION - ClickOnce Deployment ...
  • APPLICATION - ClickOnce application ...
  • APPLICATION - ClickOnce Deployment ...
  • APPLOCALIZE - AppLocalize. Document ...
  • APPM - APPM Gereedschapskist ...
  • APPREF-MS - Microsoft Application ...
  • APPREF-MS - Application Reference ...
  • APPT - Authentica Secure Office...
  • APR - ArcView project file
  • APR - Employee Appraiser ...
  • APR - Lotus Approach 97 View ...
  • APREF-MS - Application reference ...
  • APRJ - ApacheConf Project ( ...
  • APS - Advanced patching ...
  • APS - Microsoft Visual C++ file
  • APT - Lotus Approach Data view...
  • APT - Text mode application ...
  • APU - Linux file
  • APU - Canon RAW file
  • APU_ - Apple Printer Utility
  • APUP - Apple Printer Prep Fi
  • APV - ApiViewer API database
  • APV - Speedy Printed circuit ...
  • APV - EdiAPV.exe (VP PRECISION...
  • APV - API Viewer Database ...
  • APV - Acerose password file
  • APW - Adobe Authorware ...
  • APW - Forte Science data ...
  • APW - Authorware Packaged FIle...
  • APW - Any Password Password ...
  • APW - Linux file
  • APW - Unknown Apple II File
  • APX - Borland C++ Appexpert ...
  • APX - Lotus Approach ...
  • APZ - Autoplay Media Studio ...
  • APZ - AMS shared project file
  • AQ - Applix data
  • AQ1 - AptiQuiz quiz data Header
  • AQ1 - AptiQuiz test file
  • AQA - AptiQuiz result file
  • AQF - Aquifer - Generated web ...
  • AQL - AOL Windows DLL ( ...
  • AQL - America On- line (AOL) ...
  • AQM - CP/M Information File
  • AQQ - AQQ Plug -in (AQQ Team )
  • AR - AIX Small indexed ...
  • AR - Midtown Madness City ...
  • AR - Javasoft JRE 1.3 Library...
  • AR - Linux / Unix command ...
  • AR - AIX small indexed archive
  • AR - Unix Archive File
  • AR - Unix Static Library
  • AR7 - Archive - AR7
  • ARA - ATI Radeon Video Driver
  • ARB - ARB Sequence Database ( ...
  • ARB - Alphacam Router VB Macro...

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

  • ransomware

    Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is ...

  • hacker

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close