Browse Definitions:

Browse File Extensions by Alphabet

T - TAE

  • T - IRIS Spreadsheet ( ...
  • T - Tape archive (TAR) (...
  • T - Alchemy chemical ...
  • T - terse Language Source ...
  • T - Tads Source File
  • T - TADS source
  • T - Tester symbol file
  • T - Tester symbol file (...
  • T - Paradox Database File
  • T - roff / troff unformatted...
  • T - Turing Programming ...
  • T - Source file (TADS)
  • T - Timber Compiler Source ...
  • T - TAR Tape Archive Without...
  • T - Turing Source Code File
  • T - Microsoft Windows ...
  • T - ReaGeniX Code Generator ...
  • T$ - Modem Bitware Fax disk5 ...
  • T$2A - Mac File Type
  • T$AB - Mac File Type
  • T$M - Found in Windows ( Vista...
  • T$M - AVG Temporary File (AVG ...
  • T$M - AVG Internet Security ...
  • T00 - Unknown file extension
  • T01 - TAXWIZ Deluxe tax file
  • T01 - TaxCut 2001 Tax Return ...
  • T01 - TaxCut 2001 File
  • T01 - Tonline Netscape File
  • T02 - Tonline Netscape File
  • T02 - TaxCut 2002 File
  • T02 - TaxCut 2002 tax return ...
  • T02 - TAXWIZ Deluxe Canadian ...
  • T03 - TaxCut 2003 Tax Return ...
  • T03 - TaxCut 2003 File
  • T04 - TaxCut 2004 File
  • T04 - TaxCut 2004 Tax Return ...
  • T05 - TaxCut 2005 Tax Return ...
  • T05 - TaxCut 2005 Tax Return
  • T06 - TaxCut 2006 Tax Return ...
  • T06 - TaxCut 2006 Tax Return
  • T07 - TaxCut Tax Return File
  • T07 - TaxCut 2007 tax return ...
  • T08 - TaxCut 2008 tax return ...
  • T08 - TaxCut 2008 Tax Return
  • T09 - At Home 2009 tax return ...
  • T09 - At Home 2009 Tax Return
  • T1 - EARS Component File
  • T1 - Male MRI image format
  • T10 - IRIG 106 Data Transfer ...
  • T2 - TrueType Font
  • T2 - Textease 2000 File
  • T2 - Unknown Apple II File
  • T2 - Male MRI image format
  • T2B - Bookeen Cybook thumbnail...
  • T2K - Teach2000 document file
  • T2K - VISIA image file
  • T2K - Mirror Suite Image ( ...
  • T2KS - Teach2000 Exam Results ...
  • T2KT - Teach2000 Exam File (bas...
  • T2L - True2Life file format - ...
  • T2T - Modeling software file (...
  • T2W - Ntgraph Turbo Pascal file
  • T3 - Tarshare file
  • T3 - TADS 3 game
  • T3001 - TARGET 3001 ! Circuit ...
  • T32 - Drive Image5 file
  • T3D - Swift 3D 3D Graphic ( ...
  • T3D - TicTacTi Advertisement ...
  • T3D - Epic Unreal engine 3D ...
  • T3D - Game : FiFa2000 ...
  • T3D - Unreal Engine 3D Brush ...
  • T3M - Swift 3D Material ( ...
  • T3X - TYPO3 Compressed ...
  • T4 - TerrAlign alignment ...
  • T44 - Temporary file for ...
  • T4G - Tscad4 file
  • T4G - Tommy Software CAD Draw ...
  • T64 - Emulator tape image file...
  • T65 - Adobe PageMaker Template
  • T65 - PageMaker Template ( ...
  • T98 - Kiplinger Tax Cut File (...
  • TA0 - TaxACT Tax Year 2000 ...
  • TA1 - TaxACT Tax Year 2001 ...
  • TA2 - TaxACT Tax Year 2002 ...
  • TA3 - TaxACT Tax Year 2003 ...
  • TA4 - TaxACT Tax Year 2004 ...
  • TA5 - TaxACT Tax Year 2005 ...
  • TA6 - TaxACT Tax Year 2006 ...
  • TA8 - TaxACT Tax Year 1998 ...
  • TA9 - TaxACT Tax Year 1999 ...
  • TAAC - Sun TAAC bitmap image
  • TAAC - Sun TAAC File
  • TAB - Table file (MapInfo GIS)
  • TAB - Guitar Tablature file
  • TAC - JSim Time Activity Curve...
  • TACO - TacoSoft System File ( ...
  • TAD - TA Demo Saved Game Data ...

-ADS BY GOOGLE

SearchCompliance

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

  • conduct risk

    Conduct risk is the prospect of financial loss to an organization that is caused by the actions of an organization's ...

SearchSecurity

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

  • security

    Security, in information technology (IT), is the defense of digital information and IT assets against internal and external, ...

  • insider threat

    An insider threat is a malicious hacker (also called a cracker or a black hat) who is an employee or officer of a business, ...

SearchHealthIT

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

  • HIPAA business associate agreement (BAA)

    Under the U.S. Health Insurance Portability and Accountability Act of 1996, a HIPAA business associate agreement (BAA) is a ...

  • telemedicine

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

SearchDisasterRecovery

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

  • fault-tolerant

    Systems with integrated fault tolerance are designed to withstand multiple hardware failures to ensure continuous availability.

SearchStorage

  • data deduplication

    Deduplication retains one unique data instance to reduce storage and bandwidth consumed by remote backups, replication and ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • Secure Digital card (SD card)

    SD cards use flash memory to provide nonvolatile storage. They are more rugged than traditional storage media and are used in ...

SearchSolidStateStorage

  • flash file system

    Flash file systems are designed specifically for memory devices. A well-designed flash device and flash file system ensure ...

  • IOPS (input/output operations per second)

    IOPS measures the maximum number of reads and writes to non-contiguous storage. It is not an actual benchmark since vendor ...

  • eMMC (embedded MultiMediaCard)

    An embedded MultiMediaCard (eMMC) is a small storage device made up of NAND flash memory and a simple storage controller.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close