Browse Definitions:

Browse File Extensions by Alphabet

TAF - TBR

  • TAF - ADRIFT Text Adventure ( ...
  • TAF - Rational ClearCase ...
  • TAF - Birdstep Technologies ...
  • TAF - Tonline Db file
  • TAG - Query tag name file (...
  • TAGS - MIME Tag types site
  • TAH - Turbo assembler help ...
  • TAI - INMOS Transputer ...
  • TAJIMA - Tajima DST file format (...
  • TAK - Tom's lossless Audio ...
  • TAL - Text illustration file (...
  • TALK - Text to speech
  • TAM - Tame Program Settings ...
  • TAM - Tame Program Settings
  • TAN - Amazon Kindle file
  • TAO - Duplicator CD File
  • TAO - IsoBuster file
  • TAP - ZX Spectrum Tape image ...
  • TAP - Embroidery file
  • TAP - ZX Spectrum tape file ( ...
  • TAP - Geopath editor file
  • TAP - Oric Atmos snapshot file
  • TAP - Commodore 64 Cassette ...
  • TAP - Oric Atmos snapshot ...
  • TAP - C64 Raw Cassette Tape ...
  • TAP - Tape File
  • TAP - Tape file - ZX Spectrum ...
  • TAP - Wave Sound Action Wave
  • TAP - Jupiter Ace Tape image
  • TAR - Tape Archive
  • TAR - Compressed archive (TAR)
  • TAR-GZ - Gzip compressed TAR ...
  • TARGA - Truevision Targa Bitmap
  • TARGA - Truevision TarGA bitmap ...
  • TAS - ADRIFT Text Adventure ...
  • TAS - ADRIFT Text Adventure ...
  • TASP - TASP Strategy Planner ...
  • TAT - Grafic TWAIN Toolkit File
  • TAT - Geographic Text ...
  • TAT - Text File
  • TAX - TurboTax return file ...
  • TAX - TurboTax Tax Return
  • TAX - TurboTax data file
  • TAX2008 - TurboTax 2008 Tax Return...
  • TAX2008 - TurboTax 2008 Tax Return
  • TAX2009 - Turbotax 2009 Tax Return
  • TAXX - Dr. Tax Open XML Format ...
  • TAZ - Compressed ASCII archive...
  • TAZ - Compressed ASCII archive...
  • TAZ - Gzip/Tape archive (Unix)
  • TB - Tabbery Tab File
  • TB - Tab file ( Virtual ...
  • TB - Rhino 3D Toolbar ...
  • TB1 - Font file (Borland Turbo...
  • TB2 - Font file (Borland Turbo...
  • TB3 - Intel VTune Performance ...
  • TB5 - Intel VTune Performance ...
  • TB_ - Visc15 Adressen Setup ...
  • TBA - PASSOLO Licensed ...
  • TBA - DB/ TextWorks Database ...
  • TBALIC400 - PASSOLO Translation ...
  • TBASICC - thinBasic Console Script...
  • TBASICCX - thinBasic Console Script...
  • TBASICX - thinBasic GUI Script ( ...
  • TBB - The Bat! Message Base ...
  • TBB - Microsoft Office toolbar...
  • TBB - The Bat! E- mail Hives (...
  • TBC - Formula 1 Car Race 2001 ...
  • TBC - Inovate Tool Bar ...
  • TBD - Microsoft Mse file
  • TBD - Document System Document...
  • TBD - Microsoft Visual Studio ...
  • TBD - Dansk System Industr ...
  • TBD - Visual Studio File ( ...
  • TBE - TMPGEnc List File
  • TBF - Fax document (Imavox ...
  • TBH - Mah Jongg for Windows ...
  • TBH - Turbo Basic Help File
  • TBI - Image for Windows Disk ...
  • TBI - Image for Windows Disk ...
  • TBI - Fifa 2001 Be Command File
  • TBI - The Bat! hive index
  • TBK - Memo backup file (...
  • TBK - Toolbook file (Asymetrix...
  • TBK - Memo backup file (dBase ...
  • TBK - Interactive multimedia ...
  • TBL - Graphics (Native format)...
  • TBL - Table of values (OS/2)
  • TBM - Tableau bookmark file
  • TBM - DB/ TextWorks Database ...
  • TBM - DB/ TextWorks Database ...
  • TBM - Toribash mod file
  • TBND - Communication Tool
  • TBO - Turbo Architecture ...
  • TBP - Look @Me Timbuktu plug -...
  • TBP - Toon Boom Studio file
  • TBP - The Bat! plug -in file
  • TBP - Tabbery plug -in file
  • TBP - TAS books accounts
  • TBPA - Tektronix Bluetooth ...

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

  • ransomware

    Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is ...

  • hacker

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close