Browse Definitions:

Browse File Extensions by Alphabet

IS - ITM

  • IS - Unknown Apple II File
  • IS - Modula -3 Intermediate ...
  • IS - InStereo audio file
  • IS2 - IRT Cronista Infrared ...
  • ISA - Adobe Photoshop file
  • ISB - IS- Builder Link File (...
  • ISBN - HM3 Tutorial Software
  • ISC - Xilinx Device ...
  • ISC - GRDSOZ4W ISCII File
  • ISC - RVS-COM Prepaid SMS ...
  • ISC - Xilinx Integrated ...
  • ISC - Internet Servide ...
  • ISC - iScreensaver Designer ...
  • ISD - Spell checker dictionary...
  • ISE - Installshield Express ...
  • ISF - Tektronix instrument ...
  • ISF - Inspiration Concept Map ...
  • ISF - Inspiration Mind Mapping...
  • ISF - InfoNet Snapshot File ( ...
  • ISF - ModelPress highly ...
  • ISF - ZerOS Saved Show ( Zero ...
  • ISF - Inspiration Software ...
  • ISFF - Intergraph Standard File...
  • ISFF - Intergraph Standard File...
  • ISH - Compressed archive (ISH)
  • ISK - Command File
  • ISL - The Universal game ...
  • ISL - InstallShield temporary ...
  • ISL - Inno Setup 1.3 file
  • ISL - DB- MAIN Scheme File
  • ISM - ITI SimulationX ...
  • ISM - MySQL ISAM Table Handler...
  • ISM - InstallShield Project ...
  • ISM - ArchiCAD Geometric ...
  • ISM - Image System ( ...
  • ISM - SimulationX Encrypted ...
  • ISMA - Output Video file - ...
  • ISN - Installer Source Files
  • ISO - Lists the files on a ...
  • ISO - ISO (International ...
  • ISO-11172 - mpeg 1 spec.(iso 11172 )
  • ISOD - CloneDVD ISO Image ( ...
  • ISP - Sign-up file(X-Internet)
  • ISQ - MicroCT Image ( SCANCO ...
  • ISR - Streets & Trips Route ...
  • ISR - Go- Moku game file
  • ISS - ISS image format
  • ISS - InstallShield Response ...
  • ISS - ISS Audio Header
  • ISS - Inno Setup Script
  • ISS - The Longest Journey ...
  • ISS - Inno Setup Script ( ...
  • ISS - Caseware IDEA IDEAScript
  • ISS - InstallShield Silent ...
  • ISSP - Internet Search Sitelesrc
  • IST - Instrument file (...
  • ISTG - Imagine Staging Stage ...
  • ISTG - Imagine Stage Edit
  • ISTR - IsoStar Library of ...
  • ISTR - IsoStar Library of ...
  • ISU - Uninstall script (...
  • ISYM - ArchiCAD for MAC ...
  • ISZ - ISo Zipped format Header
  • ISZ - Compressed disk image ...
  • ISZ - WinMount Compressed ISO ...
  • ISZ - Zipped ISO Disk Image
  • IT - Settings file (intalk)
  • IT - Music module (MOD) (...
  • IT3 - Internet Timer 3 Log File
  • ITA - Italian localization ...
  • ITA - Personal Paint user ...
  • ITA - IconTweaker Theme Archive
  • ITA - IconTweaker theme
  • ITA - Italian README File
  • ITC - Uthscsa Imagetool ...
  • ITC - Image File
  • ITC - iTunes CoverFlow data ...
  • ITC - iTunes Cover Flow Data ...
  • ITC2 - iTunes Cover Flow Data ...
  • ITCL - tcl 00 Extension
  • ITCL - cygwin iwidgets3.0.0 ...
  • ITD - SDL Trados Translation ...
  • ITD - System Dll file
  • ITDB - iTunes Database File
  • ITE - E- Tabs Reader File
  • ITE - Iterare project file
  • ITF - Interface file (JPI ...
  • ITG - Intergraph format bitmap...
  • ITG - Intergraph Format ( ...
  • ITH - InTether Receiver File (...
  • ITH - InTether technology ...
  • ITHMB - iPod photo Thumbnail ...
  • ITHMB - Apple iPod / iPhone ...
  • ITI - Instrument file (Impulse...
  • ITK - Cygwin itk3.0 file
  • ITL - iTunes Library File
  • ITL - iTunes Music Library ...
  • ITL - ITEM ToolKit Library ( ...
  • ITL - IntelliTipster League ...
  • ITL - iTunes music database ...

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • phishing

    Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication ...

  • vulnerability disclosure

    Vulnerability disclosure is the practice of publishing information about a computer security problem, and a type of policy that ...

  • incident response

    Incident response is an organized approach to addressing and managing the aftermath of a security breach or cyberattack, also ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • flash memory

    Flash memory, also known as flash storage, is a type of nonvolatile memory that erases data in units called blocks.

  • NAND flash memory

    NAND flash memory is a type of nonvolatile storage technology that does not require power to retain data.

  • NOR flash memory

    NOR flash memory is one of two types of nonvolatile storage technologies.

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close