Browse Definitions:

Browse File Extensions by Alphabet

NOK - NRF

  • NOKIA - Nokia proprietary ...
  • NOKTXT - Nokia proprietary ...
  • NOL - Nokia Operator Logo
  • NOL - Nokia Operator Logo ...
  • NON - NONogram puzzle
  • NOR - ATI Radeon driver file
  • NOR - Personal Paint Norwegian...
  • NOT - Broderbund Note Card ...
  • NOT - Note -It note file
  • NOT - Acrobat Spelling File ( ...
  • NOT - Musical Notation File
  • NOT - ActiveNote Post -It- ...
  • NOT - e- Sword Study Note File...
  • NOT - Notation
  • NOT - Notation or note file
  • NOTE - WordPerfect for ...
  • NOTE - Unknown Apple II File
  • NOTEBOOK - SMART Notebook ( SMART ...
  • NOTEBOOK - SMART Notebook File
  • NOTES - R? viseur de notes Notes...
  • NOTES - Memento Notes File
  • NOTEWORTHY - Noteworthy 2 File Format
  • NOTZ - Mac File Type
  • NOVS - Mac File Type
  • NOW - UN- HTML15 file
  • NOW - Readme File
  • NOW - Text File
  • NOW - Unknown Apple II File
  • NP - Project schedule (Visual...
  • NP - Project schedule (Nokia ...
  • NPA - ReliaSoft Weibull ++ 6
  • NPAC - NeoEngine Resource ...
  • NPB - Navicat for MySQL backup...
  • NPC - Jagged Alliance 2 Non- ...
  • NPC - QuickBooks online ...
  • NPD - Navicat for MySQL data ...
  • NPD - Noder File
  • NPD - Ultra Network Sniffer ...
  • NPD - Netrosoft Presentation ...
  • NPDT - NotePad
  • NPDT - Mac File Type
  • NPE - NVIDIA ntune overclock ...
  • NPE - Navicat for MySQL export...
  • NPEQ - Navicat for MySQL export...
  • NPEV - Navicat for MySQL export...
  • NPEXT - Newspilot External ...
  • NPF - Nick -O- Matic Design ...
  • NPF - Nero SoundTrax project ...
  • NPF - NTI Backup
  • NPG - NextPlay game data
  • NPG - Die Hard - Nakatomi ...
  • NPG - Magentic content ...
  • NPI - Source for interpreter (...
  • NPIMG - Newspilot Image Metadata...
  • NPJ - Navicat for MySQL batch ...
  • NPJ - Nova Logic game mission ...
  • NPJOB - Newspilot Job ...
  • NPK - n- Track Studio ...
  • NPK - n- Track Studio peak file
  • NPK - MikroTik RouterOS ...
  • NPK - MicroTik RouterOS ...
  • NPL - Core Media Player ...
  • NPL - Nokia Playlist File
  • NPL - Xilinx Integrated ...
  • NPL - DART Pro 98 Noiseprint ...
  • NPL - Allplan Plot Layout File...
  • NPL - Xilinx Integrated ...
  • NPL - Nokia Audio File ( Nokia...
  • NPM - Norton 360 Identity Safe...
  • NPM - Nokia Phone Picture ...
  • NPM - Corel Graphics Ver 10 ...
  • NPM - Neopaint Mask
  • NPM - Corel Custom Natural ...
  • NPP - Art Explosion Publisher ...
  • NPP - Art Explosion Publisher ...
  • NPR - NPR Viewer file
  • NPR - Lotus Notes Reporter File
  • NPR - Nuendo Project File
  • NPS - Lotus Agenda File
  • NPS - NeroMix ( Nero AG)
  • NPT - Portfolio NetPublish ...
  • NPT - Navicat for MySQL data ...
  • NPT - DART Pro 98 noiseprint ...
  • NPT - Portfolio NetPublish Pre...
  • NPV - Pixbend Player Pixbend ...
  • NPZ - nProtect GameGuard ...
  • NQI - NOD32 Quarantined File ...
  • NQST - (MAC CREATOR CODE ) ...
  • NR3 - Nero - MP3 Compliation ...
  • NR3 - Nero MP3 CD-ROM ...
  • NR4 - Nero AAC CD Compilation ...
  • NRA - Nero Audio -CD ...
  • NRA - Nero Audio -CD ...
  • NRA - Nero Audio -CD ...
  • NRB - Nero CD-ROM Boot ...
  • NRB - Nero CD-ROM Boot ...
  • NRC - Nero UDF/ISO CD-ROM ...
  • NRD - Nero DVD- Video ...
  • NRE - Nero CD Extra ...
  • NRF - Data file (NICOLET)

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

  • ransomware

    Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is ...

  • hacker

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close