Browse Definitions:

Browse File Extensions by Alphabet

EDQ - EIN

  • EDQ - Ensoniq SQ1/SQ2/KS32 ...
  • EDR - Embird Plus Color ...
  • Edraw XML file - Graphics file created ...
  • EDRW - eDrawings File ( ...
  • EDRW - SolidWorks eDrawing File
  • EDS - Ensoniq SQ80 disk image
  • EDT - Default settings (VAX ...
  • EDTV - Mac File Type
  • EDU - Unknown file extension
  • EDV - Ensoniq VFX-SD disk image
  • EDW - eDrawings SolidWorks Corp
  • EDX - Editor Dictionary File (...
  • EE - Encrypt Easy encrypted ...
  • EEA - Attachment Decoder ...
  • EEB - Button Bar for Equation ...
  • EEE - EEEWin Archive ( Remia ...
  • EEE - 3eee Triple Encryption ...
  • EEG - SleepScan and Ceegraph ...
  • EENV - Mac File Type
  • EEP - Evidence Eliminator file
  • EEP - EEPROM Data File
  • EER - Lahey Fortran execution ...
  • EES - Empire Earth Scenario ...
  • EF2 - Internet Download ...
  • EFA - Ensoniq ASR file
  • EFAX - New Contact Fax Form file
  • EFC - Effect
  • EFC - EFCoins File
  • EFC - FAIRCOPY encrypted fair ...
  • EFC - Technics Sx KN 6000 ...
  • EFD - EARS filter definition ...
  • EFDEMO - Star Trek Voyager Elite ...
  • EFE - Ensoniq EPS file
  • EFF - Bioware Infinity game ...
  • EFF - eFileFolders file format
  • EFF - EverQuest effects file
  • EFG - Gambit Extensive Form ...
  • EFI - Extensible Firmware ...
  • EFI - Microsoft Windows 7 file
  • EFK - Ensoniq KT file
  • EFL - Encryptafile Encrypted ...
  • EFL - Encryptafile encrypted ...
  • EFL - External Format Language...
  • EFM - Equation FontMetrics
  • EFP - Exchange Forms Designer ...
  • EFQ - Ensoniq SQ1/SQ2/KS32 file
  • EFR - Encrypted Private Key ...
  • EFR - Encryptafile Private Key...
  • EFS - Ensoniq SQ80 file
  • EFT - High Resolution Screen ...
  • EFTX - Office 2007 Theme Effect...
  • EFU - Encryptafile Public Key ...
  • EFV - Ensoniq VFX-SD file
  • EFW - Renamed Zip or ...
  • EFW - CA Security Center ...
  • EFX - Fax Document (Everex ...
  • EFX - Fax document (Efax ...
  • EG - Image It Backup Disk ...
  • EG1 - Unknown file extension
  • EG2 - IBM eGatherer collected ...
  • EG2 - eGatherer Collected ...
  • EGA - EGA Display font (...
  • EGD - GIS Software Encrypted ...
  • EGG - Ducks add-on level file
  • EGG - Wer Wird Millionaer Data...
  • EGG - EGG Solution 360RealTour...
  • EGG - Explosion Graphics ...
  • EGG - Panda3D Model File
  • EGG - Panda3D transform ...
  • EGGP - Adobe After Effects ...
  • EGISENC - egis encrypted data ...
  • EGISENX - Egis encryped file
  • EGL - EagleCheck Encrypted ...
  • EGM - Bentley Systems drawing ...
  • EGN - Daqarta Extended Audio ...
  • EGO - Rollback Rx drive image ...
  • EGON - Egon animation Header
  • EGP - Easy Grade Pro Gradebook...
  • EGP - Easy Grade Pro Data ( ...
  • EGP - EGrid32 Form properties ...
  • EGR - Egrid32 Form ( Elias ...
  • EGRP - Explorations RPG Game ...
  • EGS - GIS Software Encrypted ...
  • EGT - EGT universal document
  • EGWARSAVE - War! Age of Imperialism ...
  • EHELP - Emperor Help Language ...
  • EHP - HelpLogic Project ( ...
  • EHTML - Enhanced HTML
  • EI - Electric Image
  • EI - EARS Component File
  • EI - Electric Image image ...
  • EID - IBM ViaVoice Vocabulary ...
  • EID - Faena MyID Encrypted File
  • EID - Seiko Epson Internet ...
  • EIDI - Electric Image EIDI File
  • EIDI - Bitmap image ( Electric ...
  • EIF - Epson Installation ...
  • EIF - Eroiica graphic file
  • EIG - Easy Index Generator ...
  • EIN - Skyplot Settings File ( ...

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • black hat

    Black hat refers to a hacker who breaks into a computer system or network with malicious intent.

  • copyright

    Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

SearchStorage

  • non-volatile memory (NVM)

    Non-volatile memory (NVMe) is a semiconductor technology that does not require a continuous power supply to retain the data or ...

  • hybrid hard drive (HHD)

    A hybrid hard drive (HHD), sometimes known as a solid-state hybrid drive (SSHD), is a mass storage device that combines a ...

  • USB flash drive

    A USB flash drive -- also known as a stick, thumb or pen drive -- is a plug-and-play portable storage device that uses flash ...

SearchSolidStateStorage

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close