Browse Definitions:

Browse File Extensions by Alphabet

T - TAF

  • T - IRIS Spreadsheet ( ...
  • T - Tape archive (TAR) (...
  • T - Alchemy chemical ...
  • T - terse Language Source ...
  • T - Tads Source File
  • T - TADS source
  • T - Tester symbol file
  • T - Tester symbol file (...
  • T - Paradox Database File
  • T - roff / troff unformatted...
  • T - Turing Programming ...
  • T - Source file (TADS)
  • T - Timber Compiler Source ...
  • T - TAR Tape Archive Without...
  • T - Turing Source Code File
  • T - Microsoft Windows ...
  • T - ReaGeniX Code Generator ...
  • T$ - Modem Bitware Fax disk5 ...
  • T$2A - Mac File Type
  • T$AB - Mac File Type
  • T$M - Found in Windows ( Vista...
  • T$M - AVG Temporary File (AVG ...
  • T$M - AVG Internet Security ...
  • T00 - Unknown file extension
  • T01 - TAXWIZ Deluxe tax file
  • T01 - TaxCut 2001 Tax Return ...
  • T01 - TaxCut 2001 File
  • T01 - Tonline Netscape File
  • T02 - Tonline Netscape File
  • T02 - TaxCut 2002 File
  • T02 - TaxCut 2002 tax return ...
  • T02 - TAXWIZ Deluxe Canadian ...
  • T03 - TaxCut 2003 Tax Return ...
  • T03 - TaxCut 2003 File
  • T04 - TaxCut 2004 File
  • T04 - TaxCut 2004 Tax Return ...
  • T05 - TaxCut 2005 Tax Return ...
  • T05 - TaxCut 2005 Tax Return
  • T06 - TaxCut 2006 Tax Return ...
  • T06 - TaxCut 2006 Tax Return
  • T07 - TaxCut Tax Return File
  • T07 - TaxCut 2007 tax return ...
  • T08 - TaxCut 2008 tax return ...
  • T08 - TaxCut 2008 Tax Return
  • T09 - At Home 2009 tax return ...
  • T09 - At Home 2009 Tax Return
  • T1 - EARS Component File
  • T1 - Male MRI image format
  • T10 - IRIG 106 Data Transfer ...
  • T2 - TrueType Font
  • T2 - Textease 2000 File
  • T2 - Unknown Apple II File
  • T2 - Male MRI image format
  • T2B - Bookeen Cybook thumbnail...
  • T2K - Teach2000 document file
  • T2K - VISIA image file
  • T2K - Mirror Suite Image ( ...
  • T2KS - Teach2000 Exam Results ...
  • T2KT - Teach2000 Exam File (bas...
  • T2L - True2Life file format - ...
  • T2T - Modeling software file (...
  • T2W - Ntgraph Turbo Pascal file
  • T3 - Tarshare file
  • T3 - TADS 3 game
  • T3001 - TARGET 3001 ! Circuit ...
  • T32 - Drive Image5 file
  • T3D - Swift 3D 3D Graphic ( ...
  • T3D - TicTacTi Advertisement ...
  • T3D - Epic Unreal engine 3D ...
  • T3D - Game : FiFa2000 ...
  • T3D - Unreal Engine 3D Brush ...
  • T3M - Swift 3D Material ( ...
  • T3X - TYPO3 Compressed ...
  • T4 - TerrAlign alignment ...
  • T44 - Temporary file for ...
  • T4G - Tscad4 file
  • T4G - Tommy Software CAD Draw ...
  • T64 - Emulator tape image file...
  • T65 - Adobe PageMaker Template
  • T65 - PageMaker Template ( ...
  • T98 - Kiplinger Tax Cut File (...
  • TA0 - TaxACT Tax Year 2000 ...
  • TA1 - TaxACT Tax Year 2001 ...
  • TA2 - TaxACT Tax Year 2002 ...
  • TA3 - TaxACT Tax Year 2003 ...
  • TA4 - TaxACT Tax Year 2004 ...
  • TA5 - TaxACT Tax Year 2005 ...
  • TA6 - TaxACT Tax Year 2006 ...
  • TA8 - TaxACT Tax Year 1998 ...
  • TA9 - TaxACT Tax Year 1999 ...
  • TAAC - Sun TAAC bitmap image
  • TAAC - Sun TAAC File
  • TAB - Table file (MapInfo GIS)
  • TAB - Guitar Tablature file
  • TAC - JSim Time Activity Curve...
  • TACO - TacoSoft System File ( ...
  • TAD - TA Demo Saved Game Data ...

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

  • ransomware

    Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is ...

  • hacker

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close