Browse Definitions:

Browse File Extensions by Alphabet

PRI - PRW

  • PRI - Printer definitions (...
  • PRIVY - PrivyPad ( SlavaSoft Inc...
  • PRJ - Project file (3D Studio)...
  • PRJPCB - Altium Designer Project ...
  • PRJZIP - Maestro Compressed ...
  • PRK - CampgroundMaster / ...
  • PRK - Campground Master / ...
  • PRK - Thrillville Park File
  • PRK - Tony Hawk 's Pro Skater ...
  • PRKLOG - Campground Master / ...
  • PRL - Perl Script
  • PRL - Process Revolution ...
  • PRL - Paint Shop Pro Rough ...
  • PRL - Paint Shop Pro Presets ...
  • PRM - MYOB Premier file
  • PRM - Adobe Premiere plug-in ...
  • PRM - Parameter file (Generic)
  • PRMR - Mac File Type
  • PRN - Windows Printer file (...
  • PRN - Print Table (space ...
  • PRN - Printer driver (...
  • PRN - Text file (Lotus 1-2-3-...
  • PRND - PageMaker 7.0 file
  • PRNX - Developer Express XML ...
  • PRO - Graphics profile file (...
  • PRO - Alphacet Program XML ...
  • PRO - Project file (Terramodel)
  • PRO - Configuration file (Pro/...
  • PRO - Source code file (Prolog)
  • PRO2 - Euphoria time profile ...
  • PRODUCT - Norton Ghost file
  • PROF - ColorSync Profile
  • PROF - MW Profiler
  • PROFILE - FastTrack Client Profile
  • PROFILE - Unknown Apple II File
  • PROFILES - Amaya Configuration
  • PROFILES - Amaya config file
  • PROFIMAIL - ProfiMail Settings File
  • PROG - Unknown Apple II File
  • PROG - CD Remote Program File
  • PROJ - Insight II NMR Project (...
  • PROJ - Mac File Type
  • PROJ - NeXT Interface Builder ...
  • PROJ - NeXT : Project File ( ...
  • PROJ - THINK Project
  • PROJ - Poseidon for UML Project...
  • PROJECT - Zend Studio generally ...
  • PROJECT - Apple Project Builder ...
  • PROMIZER - Promizer v0.1/v1.0c/...
  • PROP - Application ...
  • PROP - Spore Property File ( ...
  • PROPACKER - ProPacker v1.0/v2.1/v3.0...
  • PROPDESC - Property Description
  • PROPDESC - Microsoft Property ...
  • PROPERTIES - HSQLDB Configuration File
  • PROPERTIES - HSQLDB configuration ...
  • PROPERTIES - Java Properties File (...
  • PROPERTIES - Java properties file
  • PROPERTIES - Netscape Communicator ...
  • PROPERTIES - Properties file
  • PROPERTIES - Mozilla Firefox settings...
  • PROPS - Microsoft Visual Studio ...
  • PRORUNNER - ProRunner v1/v2 formats ...
  • PROTO - Message specification - ...
  • PROTO - Windows Amaya File
  • PROVXML - Microsoft Windows Mobile...
  • PROXY - Proxy configuration file
  • PRP - Data conversion saved ...
  • PRPRESET - Premiere Preset ( Adobe ...
  • PRPROJ - Adobe Premiere Pro ...
  • PRPROJ - Premiere Pro Project
  • PRPROJ - Premiere Project Header
  • PRR - Perfect Resume Data
  • PRR - Office Password Recovery...
  • PRR - Perfect Resume : The ...
  • PRS - Presentation file (...
  • PRS - Printer resource font ...
  • PRS - Procedure file (dBase IV)
  • PRS1 - Mac File Type
  • PRS2 - Mac File Type
  • PRSL - Premiere Style ( Adobe ...
  • PRST - Mac File Type
  • PRT - Part file (CADkey)
  • PRT - Unigraphics CAD file
  • PRT - Part file (Pro/Engineer)
  • PRT - A print-formatted file
  • PRT - Printer driver (Dr. Halo)
  • PRT1 - Aldus Persuasion 1 slide
  • PRT2 - Unknown Apple II File
  • PRT2 - Mac File Type
  • PRTC - Mac File Type
  • PRTDOT - Solidworks Part Template...
  • PRTL - Adobe Premiere title file
  • PRTPRP - SolidWorks part custom ...
  • PRU2 - Prorunner 2.0 Music ...
  • PRV - Internet provider ...
  • PRVKR - Pretty Good Privacy ...
  • PRVKR - Pretty Good Privacy (PGP...

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • computer exploit

    A computer exploit, or exploit, is an attack on a computer system, especially one that takes advantage of a particular ...

  • cyberwarfare

    Cyberwarfare is computer- or network-based conflict involving politically motivated attacks by a nation-state on another ...

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • OpenStack Block Storage (Cinder)

    OpenStack Block Storage (Cinder) is open source software designed to create and manage a service that provides persistent data ...

  • SATA Express (SATAe)

    SATA Express (SATAe or Serial ATA Express) is a bus interface to connect storage devices to a computer motherboard, supporting ...

  • DIMM (dual in-line memory module)

    A DIMM (dual in-line memory module) is the standard memory card used in servers and PCs.

SearchSolidStateStorage

  • hybrid flash array

    A hybrid flash array is a solid-state storage system that contains a mix of flash memory drives and hard disk drives.

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close