Browse Definitions:

Browse File Extensions by Alphabet

ATR - AVP

  • ATR - MicroSim PCBoard ...
  • ATR - Lightscape Material ...
  • ATR - Atari Disk Image File ( ...
  • ATR - Atari 8-bit disk image
  • ATRAC - Sony ATRAC Audio File
  • ATS - Attityd survey program
  • ATS - Unrelated Inventions ...
  • ATS - Audiotools file
  • ATT - Data file commonly used ...
  • ATT - AT&T Group 4 bitmap
  • ATTR - Apple iPhoto image ...
  • ATTR - iPhoto image data Header
  • ATW - AnyTime Deluxe for ...
  • ATX - Animation Master Plugin ...
  • ATX - Alphasoft Trueterm 2001 ...
  • ATX - Texture plugin ( ...
  • ATX - A ZIP- formatted ...
  • ATY - Association Placeholder ...
  • ATY - 3D Topicscape File
  • ATY - 3D Topicscape ...
  • ATYP - FileTYPE _ AutoTYPE
  • ATZ - Aston Compiled Theme ( ...
  • ATZ - Aston compiled theme
  • ATZ - Atomic Time Zone File
  • AU - uLaw /AU Audio File
  • AU - Sun/NeXT/DEC/UNIX sound ...
  • AU - Audio File
  • AU - ?-law sound file
  • AU - Audio U-law (pronounced ...
  • AU - Sun Microsystems audio ...
  • AU - NeXT /Sun uLaw / AUdio ...
  • AU - Audacity audio block
  • AU3 - AutoIt v3 file
  • AU3 - AutoIt v3 Script
  • AUC - Advanced URL Catalog ...
  • AUCD - AppleCD Audio Player
  • AUD - Audio file (Westwood ...
  • AUDIOCD - Audio CD file
  • AUF - Hansen Information ...
  • AUF - Alphacam User Font ( ...
  • AUF - Audacity block file
  • AUF - ASAUpdaterV2 Update File...
  • AUM - Adobe Update Manager ...
  • AUM - Adobe Update Manager ...
  • AUP - Audacity project file
  • AUPD - Windows Update File
  • AUPF - Audio CD Player ...
  • AUR - AutoREALM map file
  • AUR - Sheffield Thesaurus file
  • AUR - AutoREALM Map Header
  • AURL - MAC file type
  • AUS - Agnitum Outpost Firewall...
  • AUS - AutoREALM Symbols Header
  • AUS - AutoREALM Symbols
  • AUST - Self - extracting archive
  • AUT - AutoIt Script File
  • AUT - Descent Manager Mission ...
  • AUT - AutoIt (pre Ver. 3) ...
  • AUT - IPIX automation
  • AUT - GPSMan - autoMapic File
  • AUT - Authentication File
  • AUT - Signwave Auto - ...
  • AUT - Xitami Webserver Admin ...
  • AUT - Microcraft AUTHOR ...
  • AUTOCONF - Autoconfiguration file ...
  • AUTOCONF - UNIX File
  • AUTOPLAY - AutoPlay Media Studio ...
  • AUTOREG - Mozilla ( Netscape ) ...
  • AUX - ChiWriter Auxilliary ...
  • AUX - TeX/LaTeX Auxilliary ...
  • AUZ - Ableton Live File - ...
  • AV - Final Draft AV document ...
  • AV - Final Draft AV Document ...
  • AV2 - Avatar2 model file ( ...
  • AVA - Avagio Publication
  • AVASTLIC - Avast ! License File
  • AVATAR - Avatar
  • AVB - Inculan Anti-Virus virus...
  • AVC - Advanced Video Coding ( ...
  • AVC - Kaspersky Anti - virus ...
  • AVC - Kaspersky Anti - virus ...
  • AVD - AVD Video File
  • AVD - Movie Edit Pro Video ...
  • AVD - DOS7 File
  • AVE - ArcView Avenue script
  • AVF - Video information
  • AVF - AccountsVision Workbook
  • AVF - AccountsVision Workbook ...
  • AVG - AVG Virus Information ...
  • AVI - Microsoft Audio Video ...
  • AVIC - AVI to QT Utility
  • AVL - Video fun file
  • AVL - ArcView Legend File
  • AVL - ArcView Theme Legend ...
  • AVM - Map file
  • AVM - AVISO Geographic ...
  • AVM - AVG Incremental ...
  • AVN - altaVENTE Application ...
  • AVP - AntiVir Scanner ...
  • AVP - ArcView Pallet File ( ...

-ADS BY GOOGLE

SearchCompliance

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces.

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

SearchSecurity

  • FIDO (Fast Identity Online)

    FIDO (Fast ID Online) is a set of technology-agnostic security specifications for strong authentication. FIDO is developed by the...

  • cryptanalysis

    Cryptanalysis is the study of ciphertext, ciphers and cryptosystems with the aim of understanding how they work and finding and ...

  • Trojan horse (computing)

    In computing, a Trojan horse is a program that appears harmless, but is, in fact, malicious.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • SSD TRIM

    SSD TRIM is an Advanced Technology Attachment (ATA) command that enables an operating system to inform a NAND flash solid-state ...

  • cloud storage service

    A cloud storage service is a business that maintains and manages its customers' data and makes that data accessible over a ...

  • cloud hosting

    Cloud hosting is the process of outsourcing an organization's computing and storage resources to a service provider that offers ...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close