Browse Definitions:

Browse File Extensions by Alphabet

ATR - AVP

  • ATR - MicroSim PCBoard ...
  • ATR - Lightscape Material ...
  • ATR - Atari Disk Image File ( ...
  • ATR - Atari 8-bit disk image
  • ATRAC - Sony ATRAC Audio File
  • ATS - Attityd survey program
  • ATS - Unrelated Inventions ...
  • ATS - Audiotools file
  • ATT - Data file commonly used ...
  • ATT - AT&T Group 4 bitmap
  • ATTR - Apple iPhoto image ...
  • ATTR - iPhoto image data Header
  • ATW - AnyTime Deluxe for ...
  • ATX - Animation Master Plugin ...
  • ATX - Alphasoft Trueterm 2001 ...
  • ATX - Texture plugin ( ...
  • ATX - A ZIP- formatted ...
  • ATY - Association Placeholder ...
  • ATY - 3D Topicscape File
  • ATY - 3D Topicscape ...
  • ATYP - FileTYPE _ AutoTYPE
  • ATZ - Aston Compiled Theme ( ...
  • ATZ - Aston compiled theme
  • ATZ - Atomic Time Zone File
  • AU - uLaw /AU Audio File
  • AU - Sun/NeXT/DEC/UNIX sound ...
  • AU - Audio File
  • AU - ?-law sound file
  • AU - Audio U-law (pronounced ...
  • AU - Sun Microsystems audio ...
  • AU - NeXT /Sun uLaw / AUdio ...
  • AU - Audacity audio block
  • AU3 - AutoIt v3 file
  • AU3 - AutoIt v3 Script
  • AUC - Advanced URL Catalog ...
  • AUCD - AppleCD Audio Player
  • AUD - Audio file (Westwood ...
  • AUDIOCD - Audio CD file
  • AUF - Hansen Information ...
  • AUF - Alphacam User Font ( ...
  • AUF - Audacity block file
  • AUF - ASAUpdaterV2 Update File...
  • AUM - Adobe Update Manager ...
  • AUM - Adobe Update Manager ...
  • AUP - Audacity project file
  • AUPD - Windows Update File
  • AUPF - Audio CD Player ...
  • AUR - AutoREALM map file
  • AUR - Sheffield Thesaurus file
  • AUR - AutoREALM Map Header
  • AURL - MAC file type
  • AUS - Agnitum Outpost Firewall...
  • AUS - AutoREALM Symbols Header
  • AUS - AutoREALM Symbols
  • AUST - Self - extracting archive
  • AUT - AutoIt Script File
  • AUT - Descent Manager Mission ...
  • AUT - AutoIt (pre Ver. 3) ...
  • AUT - IPIX automation
  • AUT - GPSMan - autoMapic File
  • AUT - Authentication File
  • AUT - Signwave Auto - ...
  • AUT - Xitami Webserver Admin ...
  • AUT - Microcraft AUTHOR ...
  • AUTOCONF - Autoconfiguration file ...
  • AUTOCONF - UNIX File
  • AUTOPLAY - AutoPlay Media Studio ...
  • AUTOREG - Mozilla ( Netscape ) ...
  • AUX - ChiWriter Auxilliary ...
  • AUX - TeX/LaTeX Auxilliary ...
  • AUZ - Ableton Live File - ...
  • AV - Final Draft AV document ...
  • AV - Final Draft AV Document ...
  • AV2 - Avatar2 model file ( ...
  • AVA - Avagio Publication
  • AVASTLIC - Avast ! License File
  • AVATAR - Avatar
  • AVB - Inculan Anti-Virus virus...
  • AVC - Advanced Video Coding ( ...
  • AVC - Kaspersky Anti - virus ...
  • AVC - Kaspersky Anti - virus ...
  • AVD - AVD Video File
  • AVD - Movie Edit Pro Video ...
  • AVD - DOS7 File
  • AVE - ArcView Avenue script
  • AVF - Video information
  • AVF - AccountsVision Workbook
  • AVF - AccountsVision Workbook ...
  • AVG - AVG Virus Information ...
  • AVI - Microsoft Audio Video ...
  • AVIC - AVI to QT Utility
  • AVL - Video fun file
  • AVL - ArcView Legend File
  • AVL - ArcView Theme Legend ...
  • AVM - Map file
  • AVM - AVISO Geographic ...
  • AVM - AVG Incremental ...
  • AVN - altaVENTE Application ...
  • AVP - AntiVir Scanner ...
  • AVP - ArcView Pallet File ( ...

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • black hat

    Black hat refers to a hacker who breaks into a computer system or network with malicious intent.

  • copyright

    Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

SearchStorage

  • non-volatile memory (NVM)

    Non-volatile memory (NVMe) is a semiconductor technology that does not require a continuous power supply to retain the data or ...

  • hybrid hard drive (HHD)

    A hybrid hard drive (HHD), sometimes known as a solid-state hybrid drive (SSHD), is a mass storage device that combines a ...

  • USB flash drive

    A USB flash drive -- also known as a stick, thumb or pen drive -- is a plug-and-play portable storage device that uses flash ...

SearchSolidStateStorage

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close