Browse Definitions:

Browse File Extensions by Alphabet

S - SAB

  • S - Source code file (Scheme)
  • S - Assembler source code (...
  • S!D - Shuffle ! Direct Video ...
  • S$$ - Temporary sort file
  • S$$ - Sprint temporary sort ...
  • S01 - Microstation file
  • S01 - MicroStation ...
  • S01 - ZipSplitter Part 2 ...
  • S01 - WordPerfect Distribution...
  • S02 - ZipSplitter Part 3 ...
  • S02 - WordPerfect Distribution...
  • S02 - Corel WordPerfect ...
  • S03 - Corel WordPerfect ...
  • S03 - WordPerfect S03 ...
  • S08 - TaxCalc Tax File ( ...
  • S1 - Free Pascal Assembler ...
  • S11 - Sealed MPEG -1 Video ( ...
  • S12 - SPIRIT Drawing File (STI...
  • S14 - Sealed MPEG -4 Video ( ...
  • S17 - SubSeven Saved Settings ...
  • S19 - Motorola S19 File Record
  • S19 - Motorola ASCII format of...
  • S19 - Motorola EEPROM ...
  • S1A - Sealed Acrobat Document ...
  • S1E - Sealed Excel Worksheet (...
  • S1G - Sealed GIF Image ( ...
  • S1H - Sealed HTML Document ( ...
  • S1J - Sealed file
  • S1M - Sealed MP3 Audio ( ...
  • S1N - Sealed PNG Graphic ( ...
  • S1P - Sealed PowerPoint ...
  • S1Q - Sealed QuickTime Movie (...
  • S1V - Yamaha EX- series ...
  • S1W - Sealed Word Document ( ...
  • S1Y - Yamaha EX- series ...
  • S2 - Stranded II Mapfile ...
  • S2 - Stranded II map file
  • S2 - Motorola S- record format
  • S28 - Genesis or Sega32X ROM ...
  • S2K - Subtitle file
  • S2M - Stronghold 2 Map File
  • S2MA - Starcraft 2 map file
  • S2MV - Starcraft 2 map preview ...
  • S2P - Sonnet S- device ...
  • S2P - Sonnet File
  • S2R - RegMagiK Registry Editor...
  • S2S - SRT2SUP native subtitle ...
  • S2S - Spike2 Script ( ...
  • S2WDH - HP Share to Web Upload ...
  • S2Z - S2Games Savage game ...
  • S3 - Motorola S- record format
  • S3D - Micrografx Simply 3D ...
  • S3D - EverQuest ( Sony )
  • S3D - Shape3d Surfboard Design...
  • S3D - Philips 3D Solutions 3D ...
  • S3DF - Sealed CAD File ( ...
  • S3I - Instrument file (Scream ...
  • S3M - 16 channel music file (...
  • S3P - AKAI MESA II/PC S- ...
  • S3R - Rtl Ski Jump Replay File
  • S3Z - Amiga and Pc Tracker ...
  • S3Z - ScreamTracker v3 File
  • S4T - S4/ TEXT and Tagless ...
  • S57 - vector image ( ' ...
  • S5D - Step5 Program ( Siemens ...
  • S6BN - Mac File Type
  • S7 - Sibelius Music Notation ...
  • S70 - Xilinx Libraries Library...
  • S7I - Seed7 library / include ...
  • S7P - SubSeven Trojan File
  • S7Z - 7-Zip Compressed File ( ...
  • S7Z - 7-zip compressed file
  • S8 - Simul8 Simulation
  • S85 - SABRE Chart or Graph ( ...
  • S85 - Sabre Airline Solutions ...
  • S8BN - Mac File Type
  • SA - UNIX stub library
  • SA - System Sa51swe file
  • SA1 - Panasonic AAC Data ...
  • SA1 - Audio Encryption File
  • SA2 - Time Stamp project grid ...
  • SA2 - Surprise ! AdLib Tracker...
  • SA2 - Suprise ! adlib tracker ...
  • SA2B - A2B Player Stream ( ...
  • SA4 - STABCAL ( stability ...
  • SA5 - street atlas document ...
  • SA5 - SecretAgent archive file
  • SA6 - Street Atlas Ver. 6 Map ...
  • SA7 - Street Atlas Ver 7 Map ...
  • SA8 - Street Atlas Ver 8 Map ...
  • SA9 - Hue and Cry Photoshop ...
  • SA9 - Hue and Cry Photoshop / ...
  • SAA - SecretAgent Auto - ...
  • SAB - Saber file - Star Wars :...
  • SAB - ALSong album file
  • SAB - ACIS Solid Binary File
  • SAB - NVision 3D Scanner File
  • SAB - 3D ACIS binary file
  • SAB - ModelMaker File
  • SAB2 - NVision 3D Scanner File

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • principle of least privilege (POLP)

    The principle of least privilege (POLP), an important concept in computer security, is the practice of limiting access rights for...

  • identity management (ID management)

    Identity management (ID management) is the organizational process for identifying, authenticating and authorizing individuals or ...

  • zero-day (computer)

    A zero-day vulnerability, also known as a computer zero day, is a flaw in software, hardware or firmware that is unknown to the ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close