Browse Definitions:

Browse File Extensions by Alphabet

KLB - KRI

  • KLB - KidPix sticker stamp ...
  • KLB - F- Secure anti - virus ...
  • KLB - Klemmbretter file
  • KLB - GraphicWorks Album
  • KLB - Klemmbretter
  • KLD - Dungeon Keeper 2 ...
  • KLI - KalKulator linear ...
  • KLIP - KlipFolio Klip ( serence...
  • KLM - Google Earth path file
  • KLN - COLOGNE Multilingual ...
  • KM - BMC Patrol file
  • KM - COOL Biz Database ...
  • KM2 - ActiveModeler ...
  • KM3 - Kernel MetaMetaModel
  • KM_ - Midiprg Seqmax Seqprest ...
  • KM_ - Seqmax Seqprest ...
  • KMA - Video Hoster Karaoke ...
  • KMA - Kodak Memory Album ( ...
  • KMA - Correlate Archive ...
  • KMAP - lyx Keymap
  • KMC - Kinemac Animation File
  • KMC - Correlate ( Correlate AS...
  • KMCOBJ - Kinemac Sprite Object
  • KMD - Knowledge model, data
  • KMDR - Kommander (KDE Web Dev ...
  • KMF - Kwalitan Memo
  • KML - Google Earth Placemark ...
  • KML - Emu48 Emulator Keyboard ...
  • KMM - K- Meleon Macro Module
  • KMN - SIL Hebrew Font System ...
  • KMP - KeyMaP (Korg Trinity)
  • KMS - Knowledge model, shortcut
  • KMV - Knowledge model, visual
  • KMY - KMyMoney XML data ( ...
  • KMY - data - KMyMoney
  • KMZ - Google Earth Saved ...
  • KND - NEPLAN NEPLAN -DOS ...
  • KNDB - Mac File Type
  • KNF - Orchida Knitting System ...
  • KNF - Universal Flat Knitting ...
  • KNN - Clarion for Windows ...
  • KNN - Clarion : Database key ...
  • KNNK - Mac File Type
  • KNO - Personal Knowbase Data (...
  • KNO - Personal Knowbase File
  • KNT - KeyNote Note File
  • KNT - KeyNote notes Header
  • KNT - KeyNote Note File ( ...
  • KNW - Known problems
  • KO - IBM/ tools / updater file
  • KOA - Image Koala Paint
  • KOA - Koala Paint C64 Bitmap
  • KODAK - Kodak Photo CD File
  • KOE - Turbo Pascal Dos file
  • KOE - Turbo Pascal DOS File ( ...
  • KOK - DEL MP3 Karaoke
  • KOM - Kit-O-Mat 3D Model File ...
  • KON - Konfabulator Widget Code...
  • KON - Yahoo ! Widget XML File
  • KOR - Corean text file
  • KOR - Correction File
  • KOR - Korean localization ...
  • KOS - MicroType Pro document
  • KOSIMA - Kosima file
  • KOZ - Audiokoz Music File
  • KOZ - Bell Music File
  • KOZ - Sprint Music Store audio...
  • KOZ - Sprint Music Store music...
  • KPDX - KeePass Password database
  • KPF - Komodo Project File ( ...
  • KPF - Komodo Project File
  • KPF - Kapere
  • KPG - Kai's Power Goo Graphic
  • KPJ - K Database Magic Project...
  • KPL - Kids Programming Language
  • KPP - Toolpad (SmartPad)
  • KPPX - Keypoint Presentation ( ...
  • KPR - Kwalitan Project
  • KPR - Fifa World Cup Game Data...
  • KPR - KPresenter Presentation
  • KPR - KOffice KPresenter ...
  • KPS - Bitmap graphic (IBM KIPS)
  • KPT - KPresenter Template ( ...
  • KPX - Kid Pix project Header
  • KPX - Kid Pix Deluxe Data File...
  • KPX - Kid Pix Picture
  • KPZ - Komodo Template File
  • KQBA - (MAC CREATOR CODE ) ...
  • KQL - Kyle 's Quest Level ...
  • KQP - Native Camera file (...
  • KR1 - Sample (multi-floppy) ...
  • KR2 - Kurzweil 2000 sample ...
  • KRAK - Hacker 's Helper Mac file
  • KRAW - BRSTM Audio Stream ( ...
  • KRAW - Macintosh OS X Kernel -...
  • KRAW - kRAW Audio Stream Header
  • KRC - Mouse and Key Recorder ...
  • KRIS - Kris Tracker / ...
  • KRIS - Kris tracker format aka ...
  • KRISTAL - KRISTAL Audio Engine ...

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

  • ransomware

    Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is ...

  • hacker

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close