Browse Definitions:

Browse File Extensions by Alphabet

NIM - NOD

  • NIM - Game File
  • NIM - Nokia Phone Game File ( ...
  • NIMBLEGEN - ArrayScribe = NimbleGen ...
  • NINDEX - Newsgroup Index File
  • NIP - Microsoft DRM ( Digital ...
  • NIP - Network interface plug -...
  • NIS - Homeworld Non- ...
  • NISI - (MAC CREATOR CODE ) ...
  • NIST - Audio (NIST Sphere)
  • NIT - ArcView INFO Table ...
  • NITF - National Imagery ...
  • NITF - National Imagery ...
  • NIV - TheWord & Bible ...
  • NIX - REF file
  • NIX - Rational XDE (IBM)
  • NJB - Nikon Photo Index File
  • NJB - Nikon Digital SLR Camera...
  • NJI - Nero BackItUp job file
  • NJP - njPipes Compiler File
  • NJT - Nero BackItUp job ...
  • NK2 - Outlook 2002 Nickname ...
  • NK2 - Microsoft Outlook ...
  • NK2 - Outlook AutoComplete ...
  • NK2 - e- mail address ...
  • NKC - ECG Viewer ( Nihon ...
  • NKI - KONTAKT Instrument File
  • NKI - Native Instruments ...
  • NKJV - TheWord & Bible ...
  • NKM - KONTAKT ( Native ...
  • NKS - Archive file
  • NKS - Native Instruments ...
  • NKY - NUMROTOplus Keyfile (NUM...
  • NL - Norton Desktop Icon ...
  • NL - Unknown Apple II File
  • NLB - Data (Oracle 7)
  • NLC - NeroLINUX Compilation ( ...
  • NLD - WINXP SYSTEM32 file
  • NLD - ATI Radeon Video Driver
  • NLF - MicroSim PCBoard Netlist...
  • NLM - Loadable Module (Netware)
  • NLO - NetG Skill Builder file
  • NLP - Newsletter Profi 2001
  • NLP - Newsletter Profi 2001 ...
  • NLR - NLREG Nonlinear ...
  • NLS - National Language ...
  • NLTRACK - NoLimits Roller Coaster ...
  • NLTRACK - NoLimits Rollercoaster ...
  • NLU - E-Mail Trigger file (...
  • NLV - Nikon Capture LCHE ...
  • NLX - Form (FormWorx 3.0)
  • NM - RM Number Magic Data ...
  • NM2 - Navitel Navigator Ver ...
  • NM2 - Navitel 3.1 Map Header
  • NMA - Normalised Extinction ...
  • NMA - NMEA GPS log data Header
  • NMA - GPS Log Data file
  • NMAT - NeoEngine ( Reality Rift...
  • NMD - SwordSearcher File
  • NMD - Nero miniDVD Compilation...
  • NMDAR - Connectivity Memory ...
  • NMEA - GPS Log Data file
  • NMF - Nuzzler Basic Rule ...
  • NMF - NICE Media Player audio ...
  • NMF - Nuzzler Basic Message ...
  • NMF - Lightwave Narmal map file
  • NMF - Note - Mate Question Set...
  • NMGF - 2D Graphic
  • NMI - SwordSearcher File
  • NMIND - NovaMind Mind Map File
  • NMK - Oc2. 316s cakit file
  • NML - News Markup Language file
  • NML - NML Language Source File...
  • NML - NewsMail 2.0 E- mail ...
  • NML - NEURO ONE Static Neuron ...
  • NML. - nugthat Compiler Source ...
  • NMO - Virtools behavioral ...
  • NMP - Neopaint Mask image ...
  • NMS - Note - Mate save file
  • NMS - Virtools Graphical ...
  • NMS - Unknown Apple II File
  • NMS - Numega Softice 's Loader...
  • NMU - Unknown file extension
  • NMV - Nintendulator Movie ...
  • NMW - Microsoft NetMeeting ...
  • NMW - Netmeeting T126 ...
  • NN - Nero CD File List
  • NNB - ANNI Batch File
  • NNG - Unknown file extension
  • NNI - ANNI Archive
  • NNN - News about smth with ext...
  • NNN - Arj archive volumes up ...
  • NNP - ANNI Portfolio File
  • NNR - Nikon Capture Noise ...
  • NNVS - NextNine VNC Player ...
  • NOA - Nancy Codec video Header
  • NOA - Cell Phone Video Clip
  • NOB - Vampire : La Mascarade ...
  • NOB - Silver game data and ...
  • NOB - VersaPro Word Exchange ...
  • NOD - File (Netobject Fusion)

-ADS BY GOOGLE

SearchCompliance

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces.

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

SearchSecurity

  • FIDO (Fast Identity Online)

    FIDO (Fast ID Online) is a set of technology-agnostic security specifications for strong authentication. FIDO is developed by the...

  • cryptanalysis

    Cryptanalysis is the study of ciphertext, ciphers and cryptosystems with the aim of understanding how they work and finding and ...

  • Trojan horse (computing)

    In computing, a Trojan horse is a program that appears harmless, but is, in fact, malicious.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • wear leveling

    Wear leveling is a process that is designed to extend the life of solid-state storage devices.

  • storage area network (SAN)

    A storage area network (SAN) is a dedicated high-speed network or subnetwork that interconnects and presents shared pools of ...

  • SSD TRIM

    SSD TRIM is an Advanced Technology Attachment (ATA) command that enables an operating system to inform a NAND flash solid-state ...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close