Browse Definitions:

Browse File Extensions by Alphabet

EDQ - EIN

  • EDQ - Ensoniq SQ1/SQ2/KS32 ...
  • EDR - Embird Plus Color ...
  • Edraw XML file - Graphics file created ...
  • EDRW - eDrawings File ( ...
  • EDRW - SolidWorks eDrawing File
  • EDS - Ensoniq SQ80 disk image
  • EDT - Default settings (VAX ...
  • EDTV - Mac File Type
  • EDU - Unknown file extension
  • EDV - Ensoniq VFX-SD disk image
  • EDW - eDrawings SolidWorks Corp
  • EDX - Editor Dictionary File (...
  • EE - Encrypt Easy encrypted ...
  • EEA - Attachment Decoder ...
  • EEB - Button Bar for Equation ...
  • EEE - EEEWin Archive ( Remia ...
  • EEE - 3eee Triple Encryption ...
  • EEG - SleepScan and Ceegraph ...
  • EENV - Mac File Type
  • EEP - Evidence Eliminator file
  • EEP - EEPROM Data File
  • EER - Lahey Fortran execution ...
  • EES - Empire Earth Scenario ...
  • EF2 - Internet Download ...
  • EFA - Ensoniq ASR file
  • EFAX - New Contact Fax Form file
  • EFC - Effect
  • EFC - EFCoins File
  • EFC - FAIRCOPY encrypted fair ...
  • EFC - Technics Sx KN 6000 ...
  • EFD - EARS filter definition ...
  • EFDEMO - Star Trek Voyager Elite ...
  • EFE - Ensoniq EPS file
  • EFF - Bioware Infinity game ...
  • EFF - eFileFolders file format
  • EFF - EverQuest effects file
  • EFG - Gambit Extensive Form ...
  • EFI - Extensible Firmware ...
  • EFI - Microsoft Windows 7 file
  • EFK - Ensoniq KT file
  • EFL - Encryptafile Encrypted ...
  • EFL - Encryptafile encrypted ...
  • EFL - External Format Language...
  • EFM - Equation FontMetrics
  • EFP - Exchange Forms Designer ...
  • EFQ - Ensoniq SQ1/SQ2/KS32 file
  • EFR - Encrypted Private Key ...
  • EFR - Encryptafile Private Key...
  • EFS - Ensoniq SQ80 file
  • EFT - High Resolution Screen ...
  • EFTX - Office 2007 Theme Effect...
  • EFU - Encryptafile Public Key ...
  • EFV - Ensoniq VFX-SD file
  • EFW - Renamed Zip or ...
  • EFW - CA Security Center ...
  • EFX - Fax Document (Everex ...
  • EFX - Fax document (Efax ...
  • EG - Image It Backup Disk ...
  • EG1 - Unknown file extension
  • EG2 - IBM eGatherer collected ...
  • EG2 - eGatherer Collected ...
  • EGA - EGA Display font (...
  • EGD - GIS Software Encrypted ...
  • EGG - Ducks add-on level file
  • EGG - Wer Wird Millionaer Data...
  • EGG - EGG Solution 360RealTour...
  • EGG - Explosion Graphics ...
  • EGG - Panda3D Model File
  • EGG - Panda3D transform ...
  • EGGP - Adobe After Effects ...
  • EGISENC - egis encrypted data ...
  • EGISENX - Egis encryped file
  • EGL - EagleCheck Encrypted ...
  • EGM - Bentley Systems drawing ...
  • EGN - Daqarta Extended Audio ...
  • EGO - Rollback Rx drive image ...
  • EGON - Egon animation Header
  • EGP - Easy Grade Pro Gradebook...
  • EGP - Easy Grade Pro Data ( ...
  • EGP - EGrid32 Form properties ...
  • EGR - Egrid32 Form ( Elias ...
  • EGRP - Explorations RPG Game ...
  • EGS - GIS Software Encrypted ...
  • EGT - EGT universal document
  • EGWARSAVE - War! Age of Imperialism ...
  • EHELP - Emperor Help Language ...
  • EHP - HelpLogic Project ( ...
  • EHTML - Enhanced HTML
  • EI - Electric Image
  • EI - EARS Component File
  • EI - Electric Image image ...
  • EID - IBM ViaVoice Vocabulary ...
  • EID - Faena MyID Encrypted File
  • EID - Seiko Epson Internet ...
  • EIDI - Electric Image EIDI File
  • EIDI - Bitmap image ( Electric ...
  • EIF - Epson Installation ...
  • EIF - Eroiica graphic file
  • EIG - Easy Index Generator ...
  • EIN - Skyplot Settings File ( ...

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

  • ransomware

    Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is ...

  • hacker

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close