Browse Definitions:

Browse File Extensions by Alphabet

STK - SUN

  • STK - RankTracker data file
  • STK - HyperStudio stacks
  • STK - Rail3D 2KD/2k3 Stock and...
  • STK - eBook - Starebook
  • STK - Stickfigure Animator File
  • STK - Personal Stock Monitor ...
  • STK - CRiSP Harvest File
  • STK - Sticker Store Sticker
  • STK - Pivot Stickfigure ...
  • STK - MetaMorph software stack
  • STKX - Personal Stock Streamer ...
  • STL - Stereolithography file
  • STM - Shorter suffix for .shtml
  • STM - Music module (MOD) (...
  • STM - Music file (Scream ...
  • STM - State transition diagram...
  • STMB - Synclavier Timbre File
  • STMI - (MAC CREATOR CODE ) ...
  • STMI - HTML files created by ...
  • STMI - (MAC CREATOR CODE ) HTML...
  • STMI - PageMill
  • STML - HTML server side include...
  • STML - SSI HTML File
  • STML - See STM HTML
  • STN - ArcView Geocoding ...
  • STN - Microsoft Flight ...
  • STN - Genuine Fractals ...
  • STN - Sting File
  • STN - ArcView : geocoding ...
  • STO - Pascal stub OBJ file (...
  • STP - Standardized graphic ...
  • STP - STP stands for STandard ...
  • STQ - Text file (Statistica) (...
  • STR - Screensaver file
  • STR - Structure list OBJ file ...
  • STRINGS - Text Strings File
  • STRINGS - Apple Safari translation...
  • STRN - HyperCard Stack Converter
  • STS - Song file (Music) (...
  • STS - Project status ...
  • STSP - ScanTango scanner Plug -...
  • STT - Taci Pixia palette file
  • STU - Tarantella Enterprise 3 ...
  • STU - Pinnacle Studio Video ...
  • STU - xyALGEBRA file
  • STU - Studio Video Project ( ...
  • STU - Pinnacle Studio Project ...
  • STUB - Mac File Type
  • STUFF - EVE Online Game Contents...
  • STUFF - Black & White II jokey ...
  • STUFF - Unknown Apple II File
  • STV - sofTV authoring file
  • STVINI - Multiple Programs ...
  • STW - Data file (SmartTerm for...
  • STW - OpenOffice.org 1.0 Text ...
  • STX - Electronic book file (...
  • STX - Tax form (CA-Simply Tax)
  • STY - Audio file for ...
  • STY - Style sheet (Ventura ...
  • STY - Style sheet (Generic ...
  • STYK - Stykz Stick Figure
  • STYKZ - Stykz Animation
  • STYLE - Html style file
  • STYLE - ArcGIS Style Manager File
  • STYLE - Unknown Apple II File
  • STYXML - Inventor Style Library (...
  • STZ - Screamtracker 2 Module ...
  • SU - Unknown Apple II File
  • SUA - SeeYou Airspace ( ...
  • SUB - SubTerra Level File ( ...
  • SUB - IBM Rational Rose ...
  • SUB - CloneCd Related File
  • SUB - SubTerra level file
  • SUB - CaSat Suite Subtitling ...
  • SUB - SubmitWolf File
  • SUB - DivX movie subtitle file...
  • SUB - Subtitle format - ...
  • SUB - Insight II subset ...
  • SUB - CloneCD sub channel data...
  • SUB - Divx Subtitles
  • SUBS - Homeworld Subsystem Data...
  • SUBTITLE - TMPGEnc DVD Author 3 ...
  • SUC - Softrans Gmbh Hello ...
  • SUC - Softrans Hello Engines !...
  • SUD - Super Project Analyzer ...
  • SUD - Sudoku Puzzle File
  • SUD - WISCO Word Power Sudoku ...
  • SUD - sud Super Project ...
  • SUD - Symantec Undodata file
  • SUE - System Enhancement ...
  • SUF - Ccrypt Encrypted File
  • SUF - Sony camera ...
  • SUI - Suit library (Simple ...
  • SUIT - MacBench Test Suite
  • SUIT - Apple Font File ( Apple ...
  • SUITE - Theme Manager / ...
  • SUITE - Winstyles Suite ( ...
  • SUL - GFA Ray- Trace
  • SUL - Gfa Raytrace image
  • SUM - Summary file (Generic)

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • phishing

    Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication ...

  • vulnerability disclosure

    Vulnerability disclosure is the practice of publishing information about a computer security problem, and a type of policy that ...

  • incident response

    Incident response is an organized approach to addressing and managing the aftermath of a security breach or cyberattack, also ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • flash memory

    Flash memory, also known as flash storage, is a type of nonvolatile memory that erases data in units called blocks.

  • NAND flash memory

    NAND flash memory is a type of nonvolatile storage technology that does not require power to retain data.

  • NOR flash memory

    NOR flash memory is one of two types of nonvolatile storage technologies.

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close