Browse Definitions:

Browse File Extensions by Alphabet

NTM - NWV

  • NTM - Navitel Navigator Ver ...
  • NTM - Navitel 2.0 Map Header
  • NTN - NOTION Song File
  • NTN - NOTION Performance Score...
  • NTP - NovoTrade Packer Music ...
  • NTP - Neato CD Labels file
  • NTP - Mediaface Design ...
  • NTR - Executable ASCII text ...
  • NTRK - IL2 Track File ( Ubisoft...
  • NTS - Executable ASCII text ...
  • NTS - Tutorial (Norton)
  • NTT - Neato MediaFACE label ...
  • NTT - CD Label Template
  • NTV - PatternSmith Import File...
  • NTW - Lode Data Network ( Lode...
  • NTW - LVNet - Low Voltage ...
  • NTX - Index file (CA-Clipper)
  • NTZ - InVircible antivirus ...
  • NTZ - InVircible Directory ...
  • NU3 - Symantec Norton ...
  • NU4 - Norton Utilities DLL ...
  • NU4 - Norton Utilities Dll ...
  • NU6 - Norton Utilities System ...
  • NU6 - Norton utility system ...
  • NUF - Message for new users (...
  • NUG. - nugthat Player Nugget ...
  • NUM - Nikon Capture Unsharp ...
  • NUM - Dos7 file
  • NUM - DOS 7 File
  • NUMBERS - Numbers Spreadsheet File
  • NUMBERS - iWork Numbers spreadsheet
  • NUMBERS - Numbers spreadsheet file...
  • NUNIT - NUnit project Header
  • NUP - ESET Nod32 Antivirus ...
  • NUP - Smart Security Update ...
  • NUP - NOD32 Digitally Signed ...
  • NURBS - 3D Graphic / Spatial data
  • NUT - NUT Open Container ...
  • NUT - Lucas Arts Animation
  • NUT - NUT open container
  • NUT - Star Fox: Assault ...
  • NUT. - nugthat Player ( Nuggets...
  • NUV - MythTV NuppelVideo Video...
  • NUV - NuppelVideo ( MythTV ) ...
  • NV - NewViews accounting ...
  • NV - Juno address book Header
  • NV - Juno Access Number Info ...
  • NV - Visicontrol MVS-20 non- ...
  • NV! - Net Transport Partial ...
  • NV2 - NewViews Accounting ...
  • NV3 - Visicontrol MVS-30/35/40...
  • NVAVI - Splitted AVI Audio video...
  • NVB - NVIDIA Scene ( NVIDIA ...
  • NVC - Nikon Vignette ...
  • NVC - NeroVision Express ...
  • NVC - Net Vampire job file
  • NVC - Nero Vision Express ...
  • NVC - NeroVision Express ...
  • NVD - NetworkView Network ...
  • NVD - AOLpress Help
  • NVD - Aolpress Help file
  • NVF - Nomad II Voice File ( ...
  • NVF - Creative Labs Nomad ...
  • NVF - Visicontrol MVS-20 Non- ...
  • NVL - Netviewer Meet Session ...
  • NVL - UniChem Results File
  • NVM - Aolpress Help file
  • NVM - AOLpress Help
  • NVP - Nero Effects Filter ( ...
  • NVR - NeverForget Reminder File
  • NVR - NeverForget file
  • NVRAM - VMware BIOS state Header
  • NVSG - NVIDIA SceniX scene ...
  • NVU - NVIDIA Graphics Card ...
  • NVV - NVIDIA Vertex Shader ( ...
  • NVX2 - The Nebula Device 2 Mesh...
  • NW - Dispatch Northwest ...
  • NW - GraalOnline level Header
  • NW - Noweb File ( Norman ...
  • NW3 - Netware.3x file
  • NW4 - Netware.4x file
  • NW_ - Midiprg Noteworthy ...
  • NW_ - Noteworthy Compressed ...
  • NWA - Natural Windows Animati
  • NWB - Nikon Capture White ...
  • NWC - Song file (Noteworthy ...
  • NWCTXT - NoteWorthy Composer 2 ...
  • NWF - NavisWorks file
  • NWF - Nero WaveEditor file
  • NWID - NeoEngine ( Reality Rift...
  • NWK - Nano Wiki Engine Wiki ...
  • NWM - Sony NWM Display Screen ...
  • NWN - BioWare Aurora Engine ...
  • NWP - NEC-Win Plus proprietary...
  • NWP - Magnetic Wallpaper File
  • NWP - Neo Content file Header
  • NWP - File Type Associated ...
  • NWPD - VivaNWP Designer ...
  • NWS - News message (MIME ...
  • NWUT - Mac File Type

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • black hat

    Black hat refers to a hacker who breaks into a computer system or network with malicious intent.

  • copyright

    Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close