Browse Definitions:

Browse File Extensions by Alphabet

FMO - FP

  • FMO - Compiled format (dBase ...
  • FMORC - FlexiMusic Orchestra
  • FMP - Database file (FileMaker...
  • FMP3 - (MAC CREATOR CODE ) ...
  • FMP3 - Mac File Type
  • FMP3 - FileMaker Pro 3 Database
  • FMPR - FileMaker Pro Mac file
  • FMR - Family Medical Records ...
  • FMS - FMS32 protocol file
  • FMS - Lotus Frelance file
  • FMS - FantaMorph skin file
  • FMS - 1-2-3 Impress Add-in (...
  • FMSG - CompuServe Filed Messag
  • FMT - Style sheet (Sprint)
  • FMT - Print file (Microsoft ...
  • FMT - Text format for form ...
  • FMT - Format file (Microsoft ...
  • FMTR - FileMaker Transfer File
  • FMU - fuzzy system modelling ...
  • FMV - FrameMaker Picture ( ...
  • FMV - Bink Tools Full Motion ...
  • FMV - Full Motion Video file
  • FMV - Adobe FrameMaker picture
  • FMV - Famtasia movie capture
  • FMV - FME Viewspace File
  • FMV - Frame Vector Metafile
  • FMW - FME Workbench Workspace ...
  • FMX - Executable form, (Oracle...
  • FMXLIST - FME Transformer List File
  • FMXT - FileMaker Extension
  • FMZ - form *Z Project File ( ...
  • FN3 - Font (Harvard Graphics)
  • FNA - FASTA Format DNA and ...
  • FNB - PFS: 1st Publisher Font
  • FNC - Functions file in a ...
  • FNC - Fixed neighbors ...
  • FND - Saved Search (Find ...
  • FNDF - Find File
  • FNDR - Finder File
  • FNDR - Mac File Type
  • FNET - FileMaker Network File
  • FNG - Font group (Font ...
  • FNI - FileNet Native Document ...
  • FNK - Module (FunkTracker)
  • FNL - Microsoft Live Mesh file
  • FNM - Apache Lucene field file
  • FNN - DOS screen text font - ...
  • FNO - Folio Infobase
  • FNO - Atlast File Notes ...
  • FNT - Font (Microsoft Windows)
  • FNTA - Aleph One Font File
  • FNW - FLARENET Model Data ( ...
  • FNX - Inactive font (Exact)
  • FO - XSL-FO Form
  • FO - 602XML Form Server Form ...
  • FO$ - Ballade Compressed Audio...
  • FO$ - Midiprg Ballade ...
  • FO1 - Font (Borland Turbo C)
  • FO2 - Font (Borland Turbo C)
  • FOB - Dynamics NAV Object ...
  • FOB - Navision Attain Object ...
  • FOC - FOCUS / WebFOCUS ...
  • FOCF - Folder Organizer Folder ...
  • FOD - EZ- Forms ULTRA ...
  • FOF - EZ- Forms Filled Out ...
  • FOG - Fontographer font
  • FOL - Saved message folder (...
  • FOLD - LockedFolder Encrypted ...
  • FOLD - Open Folder List
  • FOLDER - Windows Explorer folder ...
  • FOLDER - Mac folder extension file
  • FOM - EZ- Forms Fill Out ...
  • FON - Call log (Procomm Plus)
  • FON - Font (Generic)
  • FON - System font (Generic)
  • FON - Dialing directory (Telix)
  • FONT - Font data - unix
  • FONT - Font data
  • FONT - UNIX Font Data
  • FOO - Foobar2000 Audio ...
  • FOOTER - Unknown Apple II File
  • FOP - Freedom of Press bitmap ...
  • FOP - Freedom of the Press ...
  • FOP - InfoZoom Protected Data ...
  • FOPX - Mac File Type
  • FOR - FORTRAN source code
  • FOR - Form (WindowBase)
  • FORCE - Microsoft Visual Studio ...
  • FORGE - Assassin's Creed Game ...
  • FOS - Fallout 3 save game ...
  • FOS - Fallout 3 saved game file
  • FOT - Installed TrueType font ...
  • FOT - Font-related file (...
  • FOUR - Unknown Apple II File
  • FOW - Family Origins File
  • FOX - FoxBase / FoxPro + ...
  • FOX - Foxbase executable ( ...
  • FOX - InfoZoom Data File
  • FOXX - FoxPro
  • FP - Configuration file (...

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

  • ransomware

    Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is ...

  • hacker

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close