Browse Definitions:

Browse File Extensions by Alphabet

DRY - DST

  • DRY - Net2000 Executable
  • DRY - XAIRON Organizer Diary ...
  • DRY - Executable ( Net2000 )
  • DRZ - DReport compressed ...
  • DRZ - Draz Paint image format
  • DRZ - Draz Paint
  • DS - Chemistry software file
  • DS - Desktop Korn Shell file
  • DS - DMDScript File ( Digital...
  • DS - Dynamics Solver Problem ...
  • DS - Dialog Studio file
  • DS - TWAIN Data Source (DLL)
  • DS - SQL Server Data Source (...
  • DS - PhotoMax Drive
  • DS - Furcadia DragonSpeak ...
  • DS - HP OfficeJet T series ...
  • DS - TWAIN Data Source
  • DS - Chemisty Software
  • DS1 - Map file - Diablo II
  • DS2 - Olympus DSS Pro format
  • DS2RES - Dungeon Siege 2 Data ( ...
  • DS4 - Vector Graphics (...
  • DS4 - Micrografx Designer Image
  • DS_ - Compr. Scanner us driver...
  • DS_STORE - Mac OS X file describing...
  • DS_STORE - Mac OS X Folder Settings...
  • DS_STORE - Macintosh OS X Folder ...
  • DSA - DasyTec DASYLab File ...
  • DSA - PKCS7 signature DSA
  • DSASAVE - Dungeon Siege File ( ...
  • DSB - DasyTec DASYLab File
  • DSB - Orchida Embroidery File
  • DSB - Embroidery File
  • DSB - Tajima embroidery file
  • DSB - DiscSafe Backup ( ...
  • DSB - Orchida Embroidery ...
  • DSB - Rayman2 play
  • DSC - Discard file (Oracle)
  • DSCE - Diagnosis Scenario
  • DSCMD - Desktop Sidebar Command ...
  • DSD - Database file (...
  • DSDF - Smart Manager ...
  • DSDICT - DS Dictionary Dictionary...
  • DSDLL - Dungeon Siege Resource ...
  • DSE - WhatsUp Gold Virtual ...
  • DSE - WhatsUp Gold Virtual ...
  • DSES - Diagnosis Session
  • DSF - Micrografx Designer v7.x...
  • DSG - DooM saved game
  • DSH - Dashboard PDA Wallpaper
  • DSI - R- Studio Hard Disk Scan...
  • DSI - DESI Labeling System ...
  • DSI - Digital Sound Module ...
  • DSI - DAZ Studio Layered Image...
  • DSJ - Director 5 Resources ...
  • DSK - Driver file (Novell ...
  • DSK - Project Desktop file (...
  • DSKIN - DockX Skin
  • DSKP - Desktop Patterns
  • DSL - DSSSL Style Sheet
  • DSL - Critical Seeker game file
  • DSL - CriticalSeeker Picture ...
  • DSL - Lingvo User Feature ...
  • DSL - Product Compass Suite ...
  • DSL - Lingvo User Feature ...
  • DSLSETUP - Domain Specific Language...
  • DSM - Digital Sound Module (...
  • DSM - Dynamic Studio music ...
  • DSM - Music module file (DSIK)
  • DSMAP - Dungeon Siege File ( ...
  • DSMR - Mac File Type
  • DSN - Design (Object System ...
  • DSN - Schematic file (Orcad ...
  • DSN - ODBC Data source
  • DSN6 - Ribbons FRODO Map
  • DSO - Tribes 2 file
  • DSO - DataFlex Data _Set
  • DSO - MS Visc 6 Dev studio ...
  • DSP - Display parameters (...
  • DSP - Graphics Display driver ...
  • DSP - Microsoft Developer ...
  • DSPACKAGE - Desktop Sidebar ...
  • DSPACKAGE - Desktop Sidebar Skin / ...
  • DSPARTY - Dungeon Siege File ( ...
  • DSPLUGIN - Desktop Sidebar Plug -in...
  • DSQ - Corel QUERY
  • DSQSAVE - Dungeon Siege File ( ...
  • DSR - Visual Basic Active ...
  • DSR - Driver Resource (...
  • DSRES - Dungeon Siege Resource ...
  • DSS - Screensaver file (DCC)
  • DSS - Digital Sound file (...
  • DSSAVE - Dungeon Siege Saved Game...
  • DSSL - DSSL SGML Style Sheet
  • DSSL - DSSL style sheet SGML ( ...
  • DSSLIDESHOW - Desktop Sidebar ...

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • black hat

    Black hat refers to a hacker who breaks into a computer system or network with malicious intent.

  • copyright

    Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

SearchStorage

  • non-volatile memory (NVM)

    Non-volatile memory (NVMe) is a semiconductor technology that does not require a continuous power supply to retain the data or ...

  • hybrid hard drive (HHD)

    A hybrid hard drive (HHD), sometimes known as a solid-state hybrid drive (SSHD), is a mass storage device that combines a ...

  • USB flash drive

    A USB flash drive -- also known as a stick, thumb or pen drive -- is a plug-and-play portable storage device that uses flash ...

SearchSolidStateStorage

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close