Browse Definitions:

Browse File Extensions by Alphabet

CLK - CML

  • CLK - ClickFORMS Data ( ...
  • CLK - Corel R.A.V.E. Animation...
  • CLK - WatchGuard cloaked file ...
  • CLK - ClickFORMS data Header
  • CLK - WatchGuard Cloaked File ...
  • CLK - Corel R.A.V.E. Animation...
  • CLKK - Clicker Keyboard ( Crick...
  • CLKK - Clicker Keyboard
  • CLKT - Clicker Template ( Crick...
  • CLKT - Clicker Template
  • CLKW - Clicker Word Bank
  • CLKW - Clicker Word Bank ( ...
  • CLKX - Crick Software Clicker ...
  • CLKX - Clicker Grid Set ( Crick...
  • CLKZ - Date Preferences
  • CLL - Cricket Software Clicker...
  • CLM - GenePattern CEL ...
  • CLM - Micrografx Picture ...
  • CLM - MagicJack call log
  • CLMOV - Clan Lord Movie - ...
  • CLN - CLT file
  • CLN - Backup Configuration File
  • CLO - Cloe Image
  • CLOE - Cloe Ray- Tracer image
  • CLOE - Cloe Ray- Tracer
  • CLOG - SpreadMaster Client Log ...
  • CLOUD - GOM Atos Scanner File
  • CLOUD - Homeworld Cloud Data ( ...
  • CLP - Windows Clipboard
  • CLP - Quattro Pro Clip art
  • CLP - Clipper 5 Compiler Script
  • CLPI - Blu-Ray Clip Information
  • CLPI - Blu-ray Clip AV Stream ...
  • CLPI - Blu-ray Clip AV stream ...
  • CLPP - Mac File Type
  • CLPS - Mac File Type
  • CLPT - Mac File Type
  • CLR - 1st Reader Binary color ...
  • CLR - PhotStyler Color ...
  • CLS - C++ Class Definition
  • CLS - Visual Basic Class Module
  • CLSS - Java Class Filegcodiclass
  • CLSS - Metrowerks Java Class
  • CLT - VisualBoyAdvance cheat ...
  • CLT - Autodesk culvert data ...
  • CLU - Cluster File
  • CLU - XNBC V8 cluster name file
  • CLU - Clusse Node File ( ...
  • CLU - Phantasmagoria 2 8-bit ...
  • CLU - CLUCalc CLUScript file
  • CLU - IBM PCI cryptographic ...
  • CLU - Broken Sword 2 Dialog ...
  • CLUT - Color Lookup table / ...
  • CLV - Yamaha Cool Voices file
  • CLV - QIP visible list
  • CLV - Vbox current language ...
  • CLV - Clovis for Outlook ...
  • CLW - Clarion for Windows ...
  • CLW - Visual C++ Class Wizard ...
  • CLW - MFC Class Wizard ...
  • CLW - Class Wizard file
  • CLX - Adobe file
  • CLX - Rational XDE file
  • CLX - Macro ToolsWorks Macro ...
  • CLY - Corel Graphics Custom ...
  • CLY - Corel Graphics10 Custom ...
  • CLY - ACT! Graphic Layout File
  • CM - Craftman Data
  • CM1 - CaseMap Version 1.x Case...
  • CM2 - Unknown Apple II File
  • CM2 - Poser Camera Set File
  • CM2 - CaseMap Version 2.x Case...
  • CM3 - CaseMap Version 3.x Case...
  • CM4 - CaseMap case analysis ...
  • CM4 - Championship Manager 4 ...
  • CM4 - ClipMate Data File
  • CM5 - CaseMap Version 5.x Case...
  • CM6 - CaseMap Version 6.x Case...
  • CM7 - CaseMap Version 7.x Case...
  • CMA - Database file in plain ...
  • CMAP - CmapTools Concept Map ( ...
  • CMB - Reason Combinator ...
  • CMB - Chromeleon backup ...
  • CMB - XTree for Windows button...
  • CMB - Chromeleon Backup Archive
  • CMB - Reason Combinator ...
  • CMBL - Logger PRO Data
  • CMBL - Logger Pro Data ( ...
  • CMBX - # develop ( SharpDevelop...
  • CMC - Collectorz.com Comic ...
  • CMC - PowerFront File
  • CMC - CosmoCaller : Remote ...
  • CMD - Command file for Windows...
  • CMD - DOS CP/M command file
  • CMD - dBase-II program file
  • CMD - 1st Reader External ...
  • CMD5 - CrystalMaker Data format...
  • CMD5 - CrystalMaker Data ( ...
  • CMDF - CrystalMaker Data format...
  • CMDF - CrystalMaker Data ( ...

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

  • ransomware

    Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is ...

  • hacker

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close