Browse Definitions:

Browse File Extensions by Alphabet

ATR - AVP

  • ATR - MicroSim PCBoard ...
  • ATR - Lightscape Material ...
  • ATR - Atari Disk Image File ( ...
  • ATR - Atari 8-bit disk image
  • ATRAC - Sony ATRAC Audio File
  • ATS - Attityd survey program
  • ATS - Unrelated Inventions ...
  • ATS - Audiotools file
  • ATT - Data file commonly used ...
  • ATT - AT&T Group 4 bitmap
  • ATTR - Apple iPhoto image ...
  • ATTR - iPhoto image data Header
  • ATW - AnyTime Deluxe for ...
  • ATX - Animation Master Plugin ...
  • ATX - Alphasoft Trueterm 2001 ...
  • ATX - Texture plugin ( ...
  • ATX - A ZIP- formatted ...
  • ATY - Association Placeholder ...
  • ATY - 3D Topicscape File
  • ATY - 3D Topicscape ...
  • ATYP - FileTYPE _ AutoTYPE
  • ATZ - Aston Compiled Theme ( ...
  • ATZ - Aston compiled theme
  • ATZ - Atomic Time Zone File
  • AU - uLaw /AU Audio File
  • AU - Sun/NeXT/DEC/UNIX sound ...
  • AU - Audio File
  • AU - ?-law sound file
  • AU - Audio U-law (pronounced ...
  • AU - Sun Microsystems audio ...
  • AU - NeXT /Sun uLaw / AUdio ...
  • AU - Audacity audio block
  • AU3 - AutoIt v3 file
  • AU3 - AutoIt v3 Script
  • AUC - Advanced URL Catalog ...
  • AUCD - AppleCD Audio Player
  • AUD - Audio file (Westwood ...
  • AUDIOCD - Audio CD file
  • AUF - Hansen Information ...
  • AUF - Alphacam User Font ( ...
  • AUF - Audacity block file
  • AUF - ASAUpdaterV2 Update File...
  • AUM - Adobe Update Manager ...
  • AUM - Adobe Update Manager ...
  • AUP - Audacity project file
  • AUPD - Windows Update File
  • AUPF - Audio CD Player ...
  • AUR - AutoREALM map file
  • AUR - Sheffield Thesaurus file
  • AUR - AutoREALM Map Header
  • AURL - MAC file type
  • AUS - Agnitum Outpost Firewall...
  • AUS - AutoREALM Symbols Header
  • AUS - AutoREALM Symbols
  • AUST - Self - extracting archive
  • AUT - AutoIt Script File
  • AUT - Descent Manager Mission ...
  • AUT - AutoIt (pre Ver. 3) ...
  • AUT - IPIX automation
  • AUT - GPSMan - autoMapic File
  • AUT - Authentication File
  • AUT - Signwave Auto - ...
  • AUT - Xitami Webserver Admin ...
  • AUT - Microcraft AUTHOR ...
  • AUTOCONF - Autoconfiguration file ...
  • AUTOCONF - UNIX File
  • AUTOPLAY - AutoPlay Media Studio ...
  • AUTOREG - Mozilla ( Netscape ) ...
  • AUX - ChiWriter Auxilliary ...
  • AUX - TeX/LaTeX Auxilliary ...
  • AUZ - Ableton Live File - ...
  • AV - Final Draft AV document ...
  • AV - Final Draft AV Document ...
  • AV2 - Avatar2 model file ( ...
  • AVA - Avagio Publication
  • AVASTLIC - Avast ! License File
  • AVATAR - Avatar
  • AVB - Inculan Anti-Virus virus...
  • AVC - Advanced Video Coding ( ...
  • AVC - Kaspersky Anti - virus ...
  • AVC - Kaspersky Anti - virus ...
  • AVD - AVD Video File
  • AVD - Movie Edit Pro Video ...
  • AVD - DOS7 File
  • AVE - ArcView Avenue script
  • AVF - Video information
  • AVF - AccountsVision Workbook
  • AVF - AccountsVision Workbook ...
  • AVG - AVG Virus Information ...
  • AVI - Microsoft Audio Video ...
  • AVIC - AVI to QT Utility
  • AVL - Video fun file
  • AVL - ArcView Legend File
  • AVL - ArcView Theme Legend ...
  • AVM - Map file
  • AVM - AVISO Geographic ...
  • AVM - AVG Incremental ...
  • AVN - altaVENTE Application ...
  • AVP - AntiVir Scanner ...
  • AVP - ArcView Pallet File ( ...

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

  • ransomware

    Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is ...

  • hacker

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close