Browse Definitions:

Browse File Extensions by Alphabet

NRG - NTM

  • NRG - Image file (Nero)
  • NRH - Nero Hybrid CD-ROM ...
  • NRH - Nero Hybrid CD-ROM ...
  • NRI - Nero ISO CD compilation ...
  • NRJ - Nero JukeBox Compilation...
  • NRL - Template (Microsoft ...
  • NRL - iManage infoRite ...
  • NRM - Apache Lucene norms file
  • NRM - Nero Mixed - Mode -CD ...
  • NRS - NovaBACKUP Restore Script
  • NRS - Nero CD-ROM (EFI Boot ) ...
  • NRSV - TheWord & Bible ...
  • NRT - Nokia RingTone
  • NRT - Nokia Phone Ring Tone ( ...
  • NRU - Nero UDF/ISO CD-ROM ...
  • NRU - Nero UDF CD-ROM ...
  • NRV - Nero Video -CD ...
  • NRV - Nero Video -CD ...
  • NRW - Nero WMA CD-ROM ...
  • NRW - Nero - WMA Compliation ...
  • NRW - Nikon RAW Image ( Nikon ...
  • NRX - NeatReceipts SCANALIZER ...
  • NS1 - NetStumbler NS1 Log
  • NS2 - Database (Lotus Notes ...
  • NS3 - Database (Lotus Notes ...
  • NS4 - Database (Lotus Notes ...
  • NS5 - Lotus Notes v5 Database
  • NSA - media - Nullsoft ...
  • NSA - Nullsoft Streaming Audio...
  • NSB - Novaschem School Schedule
  • NSBCA - Nintendo DS Model ...
  • NSBMD - Nintendo DS Model File
  • NSBTX - Nintendo DS Model ...
  • NSC - Noder File
  • NSC - Netscape Conference Call
  • NSC - Windows Media Station ...
  • NSCE - NeoEngine Scene File ( ...
  • NSD - Norton System Doctor ...
  • NSD - Nero Super Video CD ...
  • NSD - Norton System Doctor ...
  • NSD - NRG Site Database
  • NSDF - NevoSoftDB Standard ...
  • NSE - Nmap Security Scanner ...
  • NSF - Database (Lotus Notes)
  • NSG - Nessie NES emulator file
  • NSG - Lotus Notes database
  • NSG - Notes Database ( Older ...
  • NSH - Lotus Notes database
  • NSH - Notes Database ( Older ...
  • NSI - Install System Script ( ...
  • NSI - NewsStand Reader file
  • NSI - Symantec Shared File ( ...
  • NSI - Symantec shared file
  • NSK - NaShrinK Archive ( ...
  • NSL - Nokia Logo File
  • NSL - Nokia Phone Startup Logo...
  • NSM - NESticle Movie
  • NSO - Document file (NetObject...
  • NSOF - NoteStar v1.2a + Options...
  • NSP - Multi - Speech sound file
  • NSP - Computerized Speech Lab ...
  • NSP - Computerized Speech Lab ...
  • NSPL - Mac File Type
  • NSR - Nessus Project
  • NSRD - SH&E NetWorks Report ...
  • NSS - Norton screensaver ...
  • NSS - Norton ScreenSaver Module
  • NSS - Bioware Aurora / ...
  • NSS - Magentic screensaver file
  • NST - Music module (MOD) (...
  • NSU - NVIDIA nTune Command ...
  • NSV - Nullsoft streaming video...
  • NSX - Apollo Database Engine ...
  • NSX - SuccessWare SIX 3.00 ...
  • NSX - HiPer -Six Index File
  • NSX - Compound index file of ...
  • NSZ - Benchmark data file used...
  • NT - Startup files (Microsoft...
  • NT0 - Adressmn file
  • NT0 - Adressmn
  • NT1 - Adressmn
  • NT1 - Adressmn file
  • NT2 - Adressmn
  • NT2 - Adressmn file
  • NT3 - Adressmn file
  • NT3 - Adressmn
  • NT6 - Orchida Knitting System ...
  • NT7 - Orchida Knitting System ...
  • NTC - Nikon Capture Custom ...
  • NTC - Nikon Capture Camera ...
  • NTD - Netrosoft Word Processor...
  • NTE - Holonote Note
  • NTF - National Imagery ...
  • NTH - ImageMagick VisualMagick...
  • NTH - Series 60 Theme Studio ...
  • NTH - Nokia Theme Studio File
  • NTH - ImageMagick Ver. 5.3.2 ...
  • NTH - Nokia series 60 Theme ...
  • NTI - Disk image related file

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • principle of least privilege (POLP)

    The principle of least privilege (POLP), an important concept in computer security, is the practice of limiting access rights for...

  • identity management (ID management)

    Identity management (ID management) is the organizational process for identifying, authenticating and authorizing individuals or ...

  • zero-day (computer)

    A zero-day vulnerability, also known as a computer zero day, is a flaw in software, hardware or firmware that is unknown to the ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close