Browse Definitions:

Browse File Extensions by Alphabet

CDL - CF1

  • CDL - CADKey CADL Language - ...
  • CDL - CADKey CAD language file
  • CDL - Common Data Language file
  • CDL - NetCDF CDL Metadata ( ...
  • CDL - SignLab vector graphics ...
  • CDL - CAD Advanced Design ...
  • CDL - SignLab vector graphic ...
  • CDL - CaseWare Working Papers ...
  • CDL - CD Label Pro CD Label ...
  • CDM - Conceptual model file (...
  • CDM - Conceptual data model ...
  • CDM - Visual dBASE custom data...
  • CDMM - ConceptDraw MINDMAP Mind...
  • CDMP - WCS CDMP
  • CDN - Click 'N Design 3D CD ...
  • CDO - California 7.5 Minute DEM
  • CDO - CADAM Overlay ( Dassault...
  • CDO - Cdo Navigator file
  • CDP - Trainz Simulator Content...
  • CDP - CD Architect Project
  • CDP - CD/ Spectrum Pro file
  • CDP - CD/ Spectrum Pro
  • CDP - Ca Visual Objects ...
  • CDP2 - Trainz Classics Content ...
  • CDPRJ - CD Menu Creator Project ...
  • CDPX - ConceptDraw PROJECT ...
  • CDPZ - ConceptDraw MINDMAP ...
  • CDQ - CD Indexer
  • CDR - Corel Vector Graphic ...
  • CDR - Raw Audio-CD data file
  • CDR - Corel Draw Vector ...
  • CDR3 - Toast v. 3
  • CDR3 - Corel Draw 3 drawing
  • CDR4 - Corel Draw 4 drawing
  • CDR5 - Corel Draw 5 drawing
  • CDR6 - Corel Draw 6 drawing
  • CDRW - Corel Draw file
  • CDRW - Claris Works - ...
  • CDRZIP - DICOM Images zipped ...
  • CDS - United States Postal ...
  • CDS - TrialDirector input file
  • CDS - Delphi TClientDataset ...
  • CDS - Copy protected CD format
  • CDS - ChemDraw stationery ...
  • CDSG - DrawMusic Chord Song ( ...
  • CDT - CorelDraw Data file
  • CDT - Corel Draw template
  • CDT2 - CD-ROM Toolkit
  • CDT6 - CorelDraw 6 Template
  • CDT_ - CorelDraw Template
  • CDTR - CDT Remot
  • CDU - CDU Paint image format
  • CDU - CDU Paint
  • CDV - CatDV Media Catalog ( ...
  • CDV - CatDV Catalog File (www....
  • CDV - Unknown Apple II File
  • CDW - CADKEY Organized Dialog ...
  • CDW - CeledyDraw Drawing ( ...
  • CDW - CeledyDraw drawing Header
  • CDW - KOMPAS drawing
  • CDX - Microsoft's Visual ...
  • CDX - Corel Draw compressed ...
  • CDXL - Old Amiga Movie Format
  • CDXML - ChemDraw XML ChemDraw ...
  • CDZ - ROM With a View Project ...
  • CDZ - ROM With a View Project
  • CDZ - Cadenzo Music File ( ...
  • CE - The FarSide Computer ...
  • CE - ComputerEyes Image
  • CE - Main.ce - The FarSide ...
  • CE - CA Clipper workbench ...
  • CE - FarSide Computer ...
  • CE - Computer Eyes - ...
  • CE1 - Computer Eyes Raw Low ...
  • CE1 - Computer Eyes Raw image ...
  • CE2 - Computer Exes RAW image ...
  • CE2 - Computer Eyes Raw Medium...
  • CE3 - Calendar Creator 3.x 4.x...
  • CEB - Microsoft Certified ...
  • CEB - Apabi eBook File
  • CEB - Apabi eBook Header
  • CEC - Colombia en Cifras ...
  • CEF - Cruzer encrypted file (...
  • CEG - Tempra Show Bitmap ...
  • CEI - CRiSP Harvest File
  • CEL - CIMFast Event Language ...
  • CEL - AutoDesk Animator Cel ...
  • CELP - Sound
  • CELX - Celestia 3D Rendering ...
  • CEM - Empire Earth game file
  • CEM - Computer Graphics ...
  • CEM - Computer Graphics Meta -...
  • CEN - Master Tracker Financial...
  • CEO - E- mail Worm File.
  • CEP - CostOS Estimating ...
  • CER - Certificate file (MIME ...
  • CERI - Mac File Type
  • CERT - Netscape Certificate ...
  • CES - Sheffield Dictionary File
  • CES - Sheffield dic file

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

  • ransomware

    Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is ...

  • hacker

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close