Browse Definitions:

Browse File Extensions by Alphabet

CCJ - CDL

  • CCJ - Crossword Compiler ...
  • CCK - Corel Clipart Format ( ...
  • CCL - Intalk Communication ...
  • CCM - Lotus CC:Mail "box" file...
  • CCN - Multimedia Fusion ...
  • CCN - Vitalize ! Game File
  • CCN - Calendar Constructer ...
  • CCO - XBTX Graphics
  • CCO - CyberChat data file
  • CCP - CloneCD ( SlySoft Inc.)
  • CCP - CaptureCAM -PRO Screen ...
  • CCP - C Converter profiles file
  • CCP - Two Brothers Software ...
  • CCP - CalComp Color Palette ...
  • CCP - CloneCD profiles file
  • CCPR - CaptureCAM -PRO ( Click ...
  • CCR - Systems Management ...
  • CCR - ASTM Continuity of Care ...
  • CCR - Microsoft Internet Chat ...
  • CCR - HealthFrame ASTM ...
  • CCR - Atari Jaguar Cinepak film
  • CCRF - Calcomp Raster Bitmap
  • CCRF - Bitmap image
  • CCS - CableNut Configuration ...
  • CCS - CCS-lib File
  • CCS - CONKY CeZaR stribas ...
  • CCS - TrialDirector Clip ...
  • CCS - CableNut Custom Settings...
  • CCT - Macromedia Director ...
  • CCV - Crystal Vision Report ( ...
  • CCX - Corel compressed ...
  • CCX - CorelDraw File
  • CCX - Total Annihilation : ...
  • CCX - Multimedia Fusion plugin
  • CCX - Click & Create Extension
  • CCXML - Call Control eXtensible ...
  • CCZ - Client - Course Manager ...
  • CD - CD-i OptImage
  • CD - CD-i OptiImage CD image ...
  • CD - cdTree CD catalogue file
  • CD - Visual Studio Class ...
  • CD - CD description (DN) Disk...
  • CD - Class Diagram ( Unicode )
  • CD - Class diagram file
  • CD1 - Cafeteria Document ...
  • CD1 - DATAIR Cafeteria ...
  • CD2 - DATAIR Cafeteria ...
  • CD2 - Click 'N Design 3d File
  • CD2 - Cafeteria Document ...
  • CD4 - Dymo DiscPainter file
  • CD5 - Chasys Draw Image File
  • CDA - CD Audio Track
  • CDAA - AIFF Audio File
  • CDAT - Internet Security and ...
  • CDATA - Command & Conquer 3 ...
  • CDB - Conceptual model backup ...
  • CDB - CardScan Database (...
  • CDB - TCU Turbo C Utilities ...
  • CDB - Clipboard file
  • CDBK - SPSS Database File
  • CDC - CLAN Debug File ( Child ...
  • CDC - Chromeleon Driver ...
  • CDC - Canvastic Documnet / ...
  • CDC - Autodesk file
  • CDC - Nero CD Cover File ( ...
  • CDD - Chromeleon Device Driver
  • CDD - Chromeleon Device Driver...
  • CDD - Balder Multiboot ...
  • CDD - UML file
  • CDD - ConceptDraw document
  • CDD - Claris Draw document ...
  • CDD - CD- Architect Driver ...
  • CDD - CADEX drawing
  • CDD - CADAM Drawing ( Dassault...
  • CDD - Conceptdraw Drawing
  • CDD - Claris Draw v 1.2 ...
  • CDD - ConceptDraw drawing ...
  • CDD - Cadifra diagram file
  • CDDA - AIFF Audio
  • CDDS - Midtown Madness 3 Data
  • CDE - CADKEY Dynamic Extension...
  • CDE - Honeywell Hybrid Control...
  • CDEV - Mac File Type
  • CDF - Netcdf Graphic file
  • CDF - Microsoft Channel ...
  • CDFS - Compact Disk filing ...
  • CDG - CanoDraw Graph ( ...
  • CDG - DART Karaoke Studio CD+G...
  • CDG - Compact Disc Plus ...
  • CDI - Phillips Compact Disk ...
  • CDIC - Mac File Type
  • CDJ - Disc Juggler File
  • CDK - Atari Calamus Document
  • CDKEY - Protocol Used in ...
  • CDKEY - Access data ( ...

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • computer exploit

    A computer exploit, or exploit, is an attack on a computer system, especially one that takes advantage of a particular ...

  • cyberwarfare

    Cyberwarfare is computer- or network-based conflict involving politically motivated attacks by a nation-state on another ...

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • OpenStack Block Storage (Cinder)

    OpenStack Block Storage (Cinder) is open source software designed to create and manage a service that provides persistent data ...

  • SATA Express (SATAe)

    SATA Express (SATAe or Serial ATA Express) is a bus interface to connect storage devices to a computer motherboard, supporting ...

  • DIMM (dual in-line memory module)

    A DIMM (dual in-line memory module) is the standard memory card used in servers and PCs.

SearchSolidStateStorage

  • hybrid flash array

    A hybrid flash array is a solid-state storage system that contains a mix of flash memory drives and hard disk drives.

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close