Browse Definitions:

Browse File Extensions by Alphabet

NOK - NRF

  • NOKIA - Nokia proprietary ...
  • NOKTXT - Nokia proprietary ...
  • NOL - Nokia Operator Logo
  • NOL - Nokia Operator Logo ...
  • NON - NONogram puzzle
  • NOR - ATI Radeon driver file
  • NOR - Personal Paint Norwegian...
  • NOT - Broderbund Note Card ...
  • NOT - Note -It note file
  • NOT - Acrobat Spelling File ( ...
  • NOT - Musical Notation File
  • NOT - ActiveNote Post -It- ...
  • NOT - e- Sword Study Note File...
  • NOT - Notation
  • NOT - Notation or note file
  • NOTE - WordPerfect for ...
  • NOTE - Unknown Apple II File
  • NOTEBOOK - SMART Notebook ( SMART ...
  • NOTEBOOK - SMART Notebook File
  • NOTES - R? viseur de notes Notes...
  • NOTES - Memento Notes File
  • NOTEWORTHY - Noteworthy 2 File Format
  • NOTZ - Mac File Type
  • NOVS - Mac File Type
  • NOW - UN- HTML15 file
  • NOW - Readme File
  • NOW - Text File
  • NOW - Unknown Apple II File
  • NP - Project schedule (Visual...
  • NP - Project schedule (Nokia ...
  • NPA - ReliaSoft Weibull ++ 6
  • NPAC - NeoEngine Resource ...
  • NPB - Navicat for MySQL backup...
  • NPC - Jagged Alliance 2 Non- ...
  • NPC - QuickBooks online ...
  • NPD - Navicat for MySQL data ...
  • NPD - Noder File
  • NPD - Ultra Network Sniffer ...
  • NPD - Netrosoft Presentation ...
  • NPDT - NotePad
  • NPDT - Mac File Type
  • NPE - NVIDIA ntune overclock ...
  • NPE - Navicat for MySQL export...
  • NPEQ - Navicat for MySQL export...
  • NPEV - Navicat for MySQL export...
  • NPEXT - Newspilot External ...
  • NPF - Nick -O- Matic Design ...
  • NPF - Nero SoundTrax project ...
  • NPF - NTI Backup
  • NPG - NextPlay game data
  • NPG - Die Hard - Nakatomi ...
  • NPG - Magentic content ...
  • NPI - Source for interpreter (...
  • NPIMG - Newspilot Image Metadata...
  • NPJ - Navicat for MySQL batch ...
  • NPJ - Nova Logic game mission ...
  • NPJOB - Newspilot Job ...
  • NPK - n- Track Studio ...
  • NPK - n- Track Studio peak file
  • NPK - MikroTik RouterOS ...
  • NPK - MicroTik RouterOS ...
  • NPL - Core Media Player ...
  • NPL - Nokia Playlist File
  • NPL - Xilinx Integrated ...
  • NPL - DART Pro 98 Noiseprint ...
  • NPL - Allplan Plot Layout File...
  • NPL - Xilinx Integrated ...
  • NPL - Nokia Audio File ( Nokia...
  • NPM - Norton 360 Identity Safe...
  • NPM - Nokia Phone Picture ...
  • NPM - Corel Graphics Ver 10 ...
  • NPM - Neopaint Mask
  • NPM - Corel Custom Natural ...
  • NPP - Art Explosion Publisher ...
  • NPP - Art Explosion Publisher ...
  • NPR - NPR Viewer file
  • NPR - Lotus Notes Reporter File
  • NPR - Nuendo Project File
  • NPS - Lotus Agenda File
  • NPS - NeroMix ( Nero AG)
  • NPT - Portfolio NetPublish ...
  • NPT - Navicat for MySQL data ...
  • NPT - DART Pro 98 noiseprint ...
  • NPT - Portfolio NetPublish Pre...
  • NPV - Pixbend Player Pixbend ...
  • NPZ - nProtect GameGuard ...
  • NQI - NOD32 Quarantined File ...
  • NQST - (MAC CREATOR CODE ) ...
  • NR3 - Nero - MP3 Compliation ...
  • NR3 - Nero MP3 CD-ROM ...
  • NR4 - Nero AAC CD Compilation ...
  • NRA - Nero Audio -CD ...
  • NRA - Nero Audio -CD ...
  • NRA - Nero Audio -CD ...
  • NRB - Nero CD-ROM Boot ...
  • NRB - Nero CD-ROM Boot ...
  • NRC - Nero UDF/ISO CD-ROM ...
  • NRD - Nero DVD- Video ...
  • NRE - Nero CD Extra ...
  • NRF - Data file (NICOLET)

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • black hat

    Black hat refers to a hacker who breaks into a computer system or network with malicious intent.

  • copyright

    Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

SearchStorage

  • non-volatile memory (NVM)

    Non-volatile memory (NVMe) is a semiconductor technology that does not require a continuous power supply to retain the data or ...

  • hybrid hard drive (HHD)

    A hybrid hard drive (HHD), sometimes known as a solid-state hybrid drive (SSHD), is a mass storage device that combines a ...

  • USB flash drive

    A USB flash drive -- also known as a stick, thumb or pen drive -- is a plug-and-play portable storage device that uses flash ...

SearchSolidStateStorage

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close