Browse Definitions:

Browse File Extensions by Alphabet

MI - MKL

  • MI - Data file (Cocreate ME10)
  • MI - Miscellaneous file (...
  • MI4 - Audio Player Firmware ...
  • MIA - MusicIndiaOnline Trident...
  • MIA - Babya bMix / Logic Music...
  • MIB - MyInfo Topic File Backup...
  • MIB - Management Information ...
  • MIB - SNMP MIB file
  • MIC - Image Composer file (...
  • MICRO - Micro World chemical ...
  • MICRO - Micro World chemical ...
  • MID - MIDI music
  • MIDD - audio / midi
  • MIDI - See MID
  • MIDI - Musical Instrument ...
  • MIDI - MIDI - sequention sound
  • MIDNAM - MIDI patch name Header
  • MIF - Interchange format (...
  • MIFF - Machine Independent File...
  • MIG - Mighty Draw Drawing ( ...
  • MIG - Mighty Draw drawing ...
  • MIG - Windows Easy Transfer ...
  • MII - Datafile (MicroStat-II)
  • MIL - Micro Illustrator ...
  • MIL - Group 4 fax file ( ...
  • MIL - Micro Illustrator ...
  • MILK - MilkDrop Winamp Plugin ...
  • MILK - MilkDrop Winamp ...
  • MIM - Multi - Purpose Internet...
  • MIM - Multi - Purpose Internet...
  • MIM - A MIME file
  • MIME - See MIM.
  • MIMG - Multi - Channel Server
  • MIN - Gen minimum file
  • MINGW - ( make -) file for Mingw
  • MINGW32 - Mingw compiler file
  • MINIGSF - Winamp Gameboy Advance ...
  • MINIPSF - Playstation Sound Format
  • MINIPSF2 - Playstation 2 Sound ...
  • MINIUSF - Nintendo 64 Song File
  • MINIUSF - Nintendo Ultra 64 Sound ...
  • MINT - Linux Mint mintInstall ...
  • MINT - Linux Mint Installer File
  • MIO - Iphoto 4 Programs Fio ...
  • MIO - MIO Compressed Audio
  • MIO - MyInfo Topic File ( ...
  • MIO - MIO compressed audio ...
  • MIO - Mio technology generic ...
  • MIO - MyInfo Topic Header
  • MIO - Iphoto4 Programs Fio File
  • MIO - mexReader multimedia file
  • MIO - MioMotion movie Header
  • MIP - Multiple Image Print File
  • MIP - MODDE Project ( Umetrics...
  • MIR - Mirage Project File ( ...
  • MIS - Tribes 2 Game File ( ...
  • MIS - McGrath Information ...
  • MIS - 3WayPack Missing Data ...
  • MIS - MagicInstall ...
  • MIS - Delta Force Land Warrior...
  • MIS - MISsion file ( many ...
  • MIS - Mission, used by many ...
  • MIS - Tom Clancey 's Ghost ...
  • MIS - Game Mission File
  • MISS - Homeworld Missle Data ( ...
  • MISSION - Vega Strike Mission File
  • MITSU - Mitsubishi S340 -10 ...
  • MITSU - Bitmap image ( ...
  • MIX - Picture file (Microsoft ...
  • MIX - Resource archive (...
  • MIX - Picture file (Microsoft ...
  • MIX - Object file (Power C)
  • MIXN - Apple Guide Addition
  • MIZ - Winamp Compressed MIDI ...
  • MJ - MovieJack DVD Ripper File
  • MJ2 - Motion JPEG 2000 Video
  • MJ2 - Motion JPEG - 2000
  • MJB - PDA Mystery Juke Box ...
  • MJF - Audio file similar to ...
  • MJP - Media Center plug -in
  • MJP - VTech MJP Video
  • MJP - Media Jukebox
  • MJP - MJPEG Video File
  • MJP - J. River Media Center ...
  • MJPEG - Motion JPEG video
  • MJPG - SMJPEG video
  • MJPG - Motion JPEG Video File
  • MJR - Media Jukebox ...
  • MJV - MJuice Voucher File
  • MK - Makefile (Generic)
  • MKA - Audio File
  • MKA - Matroska stream Header
  • MKA - Matroska audio file
  • MKE - Makefile (Microsoft ...
  • MKEXT - Mac OS X Mach kernel ...
  • MKG - Make File
  • MKG - Makefile
  • MKH - WinMark Pro Mark File ( ...
  • MKI - Graphic Image (MagView ...

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

  • ransomware

    Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is ...

  • hacker

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close