Browse Definitions:

Browse File Extensions by Alphabet

DGR - DIT

  • DGR - DART Pro 98 File Group ...
  • DGR - Keeptool ER diagrammer
  • DGR - PhoneTools Internal ...
  • DGR - MicroStation CAD design ...
  • DGR - Pivot Graphic Fax
  • DGR - Design CAD ( ...
  • DGR - DeltaGraph Documen
  • DGR - PhoneTools Internal ...
  • DGR - Format Pivot Graphic (...
  • DGRH - DeltaGraph
  • DGS - Diagnostics Report
  • DGSCHEME - DigiGuide Scheme ( ...
  • DGSCHEME-WEB - DigiGuide Scheme ( ...
  • DGSS - DigiGuide Smart Search ...
  • DGT - Digital Gallery
  • DGTOOLBAR - DigiGuide Toolbar ( ...
  • DGW - Digi - Watcher ...
  • DGX - Rational XDE (IBM)
  • DH - Dependency Information ...
  • DH2 - Pursuit CRM Report ...
  • DHCD - DHCD Computing Program ...
  • DHE - Help Workshop Dialog Box...
  • DHE - Visual Basic Dialog Box ...
  • DHE - Dialog Box Hep Editor ...
  • DHF - AMIGA emulator disk ...
  • DHF - Help Maker File
  • DHG - Direct Hit Graphics ...
  • DHP - Graphic file (Dr. Halo ...
  • DHR - Image Apple IIe / Apple ...
  • DHR - Unknown Apple II File
  • DHRP - Image Apple IIe / Apple ...
  • DHS - Shadowgrounds Savegame ...
  • DHT - Datafile (Gauss)
  • DHTML - Dynamic HTML file
  • DHY - Adobe Bridge file
  • DI - D Programming Language ...
  • DI - Digital Illusion format
  • DI - Sound file
  • DI - Sound
  • DI - Atari Disk Image ( Atari...
  • DI_ - Doko Compressed Install ...
  • DIA - Microsoft Sharepoint ...
  • DIAG - DIAGNOTICS chemical ...
  • DIB - Device-independent bitmap
  • DIC - Dictionary file
  • DIC - Dictionary file (Lotus ...
  • DICM - Digital imaging and ...
  • DICOM - Medicine image file ...
  • DICOM - DICOM Digital Imaging ...
  • DICPROOF - Dictionary Proofing File...
  • DICPROOF - Microsoft Dictionary ...
  • DICT - Dicts file
  • DICT - Sunnysoft InterWrite file
  • DICT - Microsoft Virtual PC ...
  • DID - Adobe Bridge file
  • DID - BullsEye file
  • DID - IKON DISC image document...
  • DID - Acrobat Distiller ( ...
  • DIESEL - Bandits - Phoenix Rising...
  • DIF - Data Interchange Output ...
  • DIF - Database file (VisiCalc)
  • DIF - Data Interchange Format ...
  • DIF - Text file (Output from ...
  • DIFF - Difference data file
  • DIFF - Patch script : ...
  • DIG - Digilink file
  • DIG - Sound Designer I audio
  • DIGI - DIGIBooster module format
  • DII - Summation Batch Load File
  • DII - CT Summation Document ...
  • DII - TrialDirector Load File ...
  • DIL - WordExpress2.0 File
  • DIL - Delphi file
  • DIL - Dialog LOTUS or HighEdit...
  • DIM - DIME File
  • DIM - XMap Symbol File ( ...
  • DIM - Active @ File Recovery ...
  • DIME - Direct Internet Message ...
  • DIME - Direct Internet Message ...
  • DIMG - Disk Image Drawing
  • DIMG - Mac File Type
  • DIN - ADC Labs eWave File
  • DIN - Unknown Apple II File
  • DIN - DataEase file
  • DINERDASHSAVEDGAME - Diner Dash Saved Game ( ...
  • DINFO - DivX Temporary Video ...
  • DIP - Graphics file
  • DIR - Movie (MacroMind ...
  • DIR - Dialing Directory (...
  • DIR - Directory (VAX) (DEC)
  • DIR - Macromedia Director file
  • DIRECT - Unknown Apple II File
  • DIRECT - Thoroughbred basic ...
  • DIRECTORY - KDE Folder Parameters (...
  • DIRECTORY - Unknown Apple II File
  • DIS - Thesaurus file (...
  • DIS - Distribution file (VAX ...
  • DIS - Ray Tracer file
  • DISABLED - SpyBot S& D Disabled ...
  • DISCO - Microsoft Visual Studio ...

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • principle of least privilege (POLP)

    The principle of least privilege (POLP), an important concept in computer security, is the practice of limiting access rights for...

  • identity management (ID management)

    Identity management (ID management) is the organizational process for identifying, authenticating and authorizing individuals or ...

  • zero-day (computer)

    A zero-day vulnerability, also known as a computer zero day, is a flaw in software, hardware or firmware that is unknown to the ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • SAS SSD (Serial-Attached SCSI solid-state drive)

    A SAS SSD (Serial-Attached SCSI solid-state drive) is a NAND flash-based storage or caching device designed to fit in the same ...

  • MTTR (mean time to repair)

    MTTR (mean time to repair) is the average time required to fix a failed component or device and return it to production status.

  • OpenStack Swift

    OpenStack Swift, also known as OpenStack Object Storage, is an open source object storage system that is licensed under the ...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close