Browse Definitions:

Browse File Extensions by Alphabet

J - JCL

  • J - Java source code
  • J - Image JPEG / JFIF
  • J - JAR Compressed Archive (...
  • J - JAR Compressed File
  • J - JPEG / JFIF Image
  • J - JAR archive
  • J1 - EDIT Compiler JEDEC ...
  • J2A - Jazz Jackrabbit 2 ...
  • J2B - Jazz Jackrabbit 2 Music ...
  • J2C - Joint Photographic ...
  • J2C - JPEG 2000 image
  • J2D - Jazz Jackrabbit Data ...
  • J2E - Jazz Jackrabbit 2 ...
  • J2H - Jazz Jackrabbit 2 High ...
  • J2I - Jazz Jackrabbit 2 ...
  • J2I - Jazz 2 Internet Link File
  • J2K - JPEG 2000 Image
  • J2K - JPEG - 2000 JP2 File
  • J2L - Jazz Jackrabbit 2 Level ...
  • J2L - Jaxx Creation Station ...
  • J2M - Jazz Jackrabbit 2 ...
  • J2S - Jazz Jackrabbit 2 ...
  • J2T - Jazz Jackrabbit 2 Tile ...
  • J2V - Jazz Jackrabbit 2 ...
  • J3D - Atari Jaguar 3D object ...
  • J62 - Ricoh camera format file
  • J6I - Ricoh Digital Camera ...
  • J6I - Ricoh Digital Camera ...
  • JA - Trainz Railroad ...
  • JA - IBM tools updater file
  • JACKSUM - Jacksum Fingerprint ( ...
  • JAD - Java Application ...
  • JAG - Atari Jaguar JPEG ...
  • JAK - Jack compressed archive ...
  • JAM - Leisure Suite Larry : ...
  • JAM - Misc
  • JAM - E- mail file
  • JAM - Image Microprose
  • JAM - JamTracker module : Music
  • JAM - Jam messagebase - FTN ...
  • JAM - FTN Software Jam ...
  • JAM - Jam music score - Jam
  • JAM - JAM Musical Score
  • JAM - Unknown Apple II File
  • JAM - Joaquim - Andrew - Mats ...
  • JAM - JamTracker Music Module
  • JAM - E- mail
  • JAMMIX - Jammix Enhacer Music ...
  • JAP - jalbum Project Header
  • JAP - Fifa World Cup Game Data...
  • JAP - JAlbum album file
  • JAR - Java Archive (a ...
  • JAS - Graphic (Generic)
  • JAV - Java Source File
  • JAV - Java language source ...
  • JAV - Internet Program : JAVA ...
  • JAVA - Source code (Java)
  • JAW - IchiTaro Web Japanese ...
  • JBA - Jabaco Source Code ...
  • JBB - JobEditor32 Binary Job ...
  • JBC - BestCrypt file
  • JBC - BestCrypt Container ( ...
  • JBC - Jam byte - code hex file
  • JBD - Datafile (SigmaScan)
  • JBF - Image browser file (...
  • JBG - Image JBIG 1-bit raster
  • JBG - JBIG File
  • JBI - Motoman Robot Job File
  • JBI - JobEditor32 ASCII Job ...
  • JBIG - Joint Bilevel Image Group
  • JBIG - 1-bit raster image ...
  • JBIG - JBIG raster image ...
  • JBK - Jot + Notes Backup File
  • JBK - Juno Backup File
  • JBL - Doom scene add-on file
  • JBL - Add-on : DOOM scene
  • JBP - DJ Jukebox Project
  • JBR - Paint Shop Pro Brush ( ...
  • JBR - Paint Shop Pro Brushes ...
  • JBS - Binary file with data ...
  • JBX - Project file (Project ...
  • JC - FlashGet Intermediate ...
  • JC - Watcom Source File
  • JC - Watcom src file
  • JC! - FlashGet incomplete ...
  • JC! - FlashGet File
  • JCAMP - Misc
  • JCB - CB- JCBrooke Song / ...
  • JCB - CB- JCBrooke module / ...
  • JCC - Japan Crossword Dmitry ...
  • JCC - Code Crusader Project ...
  • JCC - Japan Crossword File ( ...
  • JCD - FlashGet File
  • JCD - FlashGet Download ...
  • JCE - JWPce ( Glenn Rosenthal )
  • JCF - JAWS for Windows ...
  • JCF - JAWS config file
  • JCK - Liquid Motion JACK Scene...
  • JCL - Job Control Language IBM
  • JCL - IBM Job Control Language...

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

  • ransomware

    Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is ...

  • hacker

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close