Browse Definitions:

Browse File Extensions by Alphabet

DOT - DPS

  • DOT - Line-Type definition (...
  • DOT - Word Document Template (...
  • DOTHTML - Word View HTML Template
  • DOTHTML - Microsoft Word HTML ...
  • DOTM - Word 2007 XML macro - ...
  • DOTM - Microsoft Office Word ( ...
  • DOTM - Word Open XML Macro - ...
  • DOTMENX - egis Encrypted DOTM ( ...
  • DOTX - Microsoft Word 2007 XML ...
  • DOTX - Word Microsoft Office ...
  • DOTX - Microsoft Office Word ( ...
  • DOTXENX - egis Encrypted DOTX ( ...
  • DOUG - Mac File Type
  • DOV - Temporary File
  • DOV - Temp file
  • DOV - Actuate Query Definition...
  • DOW - TAPCIS Download Command ...
  • DOWNLOAD - Partially Downloaded File
  • DOWNLOAD - Apple Safari partial ...
  • DOWNLOAD - Chrome partial download ...
  • DOWNLOAD - Mozilla partial download...
  • DOWNLOADED - ICQ 6 hash file
  • DOWNLOADHOST - MSN Explorer Download ...
  • DOWNLOADHOST - MSN Download Settings ...
  • DOX - User document binary ...
  • DOX - Text file (MultiMate 4.x)
  • DOZ - Description out of Zip (...
  • DP - Datafile (DataPhile)
  • DP - Calendar file (Daily ...
  • DP$ - Ntgraph Visual c wizzard...
  • DP4 - Analytics Cube Profile (...
  • DPA - Archive
  • DPA - Serif DrawPlus Animation
  • DPA - Archive file format
  • DPB - DPB Fax master file
  • DPB - Fax Master File
  • DPB - ProWORX Nxt Descriptor ...
  • DPB - DataPilot Database ( ...
  • DPB - Dataplore signals file
  • DPC - Twisted Metal 2 texture ...
  • DPC - Uefa Champions League ...
  • DPC - DiscPlay collection file
  • DPC - OrCAD Design Rule Check ...
  • DPC - Source dependency file
  • DPC - " Uefa Champions League ...
  • DPC - Delphi package collection
  • DPD - Dish Network DVD ...
  • DPD - OvationPro document
  • DPD - ABC programming language...
  • DPD - Dekart Private Disk ...
  • DPD - Ovation Pro document ...
  • DPD - OmniServer file
  • DPD - ABC Programming Language...
  • DPD - Document Processor ...
  • DPDB - Dock PDB chemical ...
  • DPE - Swimming Pools & Tanks
  • DPEDUS - HP Scanner / Print File
  • DPF - Dynamic Process Format ...
  • DPF - Speedy Printed Circuit ...
  • DPF - F- Secure default policy...
  • DPF - Dictaphone Walkabout ...
  • DPF - Dataplore Figure
  • DPF - COMPRESS Vessel Drafting...
  • DPG - Deleted Program group (...
  • DPG - Windows applications ...
  • DPG - Nintendo DS MPEG Video ...
  • DPG - nDs- mPeG Video
  • DPG - DPGraph : Mathematical ...
  • DPGRAPH - DPGraph : Mathematical ...
  • DPI - Pointline bitmap
  • DPJ - DeskProto CAM Project ...
  • DPJ - Java source dependency ...
  • DPJ - Delphi Project ( Borland...
  • DPJ - Borland Delphi : Project
  • DPK - Delphi Package
  • DPK - Lemon Interactive ...
  • DPK - Pascal file
  • DPK - Deleted package Windows ...
  • DPK - Delphi Package File
  • DPKG - Proprietary file used to...
  • DPL - Borland Delphi 3 packed ...
  • DPLM - DPLM - Digital Path ...
  • DPLT - AppleScript Droplet
  • DPM - DataPilot ring tone file
  • DPM - Pro Tools Plugin File
  • DPM - Darkplaces Engine Game ...
  • DPMI - DOS Protected - Mode ...
  • DPN - Depiction file
  • DPN - Depiction Data File
  • DPO - Delphi Object Repository...
  • DPO - DECAdry Express Business...
  • DPP - DrawPlus Drawing File
  • DPP - Serif DrawPlus Drawing
  • DPP - Document Processor CORE ...
  • DPR - Project header (Borland ...
  • DPRO - Mac File Type
  • DPRO - (MAC CREATOR CODE ) ...
  • DPROJ - Delphi project file

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • computer exploit

    A computer exploit, or exploit, is an attack on a computer system, especially one that takes advantage of a particular ...

  • cyberwarfare

    Cyberwarfare is computer- or network-based conflict involving politically motivated attacks by a nation-state on another ...

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • OpenStack Block Storage (Cinder)

    OpenStack Block Storage (Cinder) is open source software designed to create and manage a service that provides persistent data ...

  • SATA Express (SATAe)

    SATA Express (SATAe or Serial ATA Express) is a bus interface to connect storage devices to a computer motherboard, supporting ...

  • DIMM (dual in-line memory module)

    A DIMM (dual in-line memory module) is the standard memory card used in servers and PCs.

SearchSolidStateStorage

  • hybrid flash array

    A hybrid flash array is a solid-state storage system that contains a mix of flash memory drives and hard disk drives.

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close