Browse Definitions:

Browse File Extensions by Alphabet

TDP - TFR

  • TDP - Midiprg Thedrums ...
  • TDP - Thedrums Compressed ...
  • TDP - Sherif DrawPlus ...
  • TDPROJ - Tables Direct Project ...
  • TDR - Contents of Arvid Tape
  • TDR - Tina Pro for Windows ...
  • TDR - Medlin Accounting Tax ...
  • TDR - Contens of Arvid tape
  • TDS - Symbol table (Turbo ...
  • TDSL - TDSL Functional Testing ...
  • TDT - FirstBreak Concrete Test...
  • TDT - THOR Data Tree File
  • TDT - ASCII Data File in CSV ...
  • TDT - Unknown Apple II File
  • TDW - Configuration file (...
  • TDX - Tony Hawk 's Pro Skater ...
  • TDX - DIAdem Bulk Binary Data ...
  • TDX - Visual FoxPro Offline ...
  • TE2 - Conquest of the New World
  • TEB - TEAC firmware update file
  • TEB - HDL test bench file
  • TEC - " Tanner Ledit " Layout ...
  • TEC - PDP-10 TECO macro file
  • TED - Tribes 2 Game File ( ...
  • TED - Tribes 2 Game Data File
  • TED - Alamo Map File
  • TEE - TeeChart Office Graphic
  • TEF - TablEdit tablature file
  • TEF - Fax document (Relisys ...
  • TEI - TrackEye Image Sequence ...
  • TEK - ASITIC Technology File (...
  • TEL - Hostfile (Telnet)
  • TEM - Turbo Editor Macro ...
  • TEM - Input template (...
  • TEMP - Unknown Apple II File
  • TEMP - SWISH -E file
  • TEMP - Audiogalaxy Downloading ...
  • TEMP - Temporary ( Temp ) File
  • TEMPLATE - Worksheet template
  • TEMPLATE - Unknown Apple II File
  • TEMPLATE - C++ template file
  • Temporary - file & 0P
  • Temporary - file #& 6
  • Temporary - file #& A
  • Temporary - file #& $
  • TEMPORARYITEMS - Mac OS X temporary file
  • TEN - TeeChart for.NET Chart ...
  • TEO - TruTops Tube Tube ...
  • TER - Daylon Leveller ...
  • TER - Black & White II terrain...
  • TER - TerraGen TERrain Terrain
  • TER - CorelFlow line terminator
  • TER - Terragen Landscape File ...
  • TER - Black and White 2 ...
  • TERM - Terminal File
  • TERMS - cygwin tk8.0 demos file
  • TERRAIN - Terragen Terrain ( ...
  • TERRAIN - TerraGen Terrain
  • TES - Unknown Apple II File
  • TES - TECO macro file ( source...
  • TESTRUNCONFIG - Microsoft Visual Studio ...
  • TET - Tetris results
  • TET - Textease CT Template
  • TET - Textease Template
  • TET - Tetris results - DN
  • TEX - TEX text file (...
  • TEX - Texture file
  • TEX - Datasheet file (Idealist)
  • TEXI - TEX file format
  • TEXI - TEXinfo The GNU ...
  • TEXI - Texinfo Source (GNU ...
  • TEXINFO - Same as TEXI
  • TEXINFO - Texinfo source Header
  • TEXINFO - Texinfo Source (GNU ...
  • TEXT - ArchiCAD for MAC ...
  • TEXT - Text file
  • TEXT - yBook Text File ( ...
  • TEXT - ASCII Text
  • TEXTCLIPPING - Mac OS X text clipping ...
  • TEXTCLIPPING - OS X Text Clipping File
  • TEXTS - Ribbons texts file
  • TEXTUREPACK - Arena Wars texture pack
  • TF - Configuration file (...
  • TF10 - IRIG 106 Data Transfer ...
  • TFA - Area file (Turbo ...
  • TFC - Catalogue file (Tobi's ...
  • TFD - Tape Format Requirements...
  • TFF - Complete Works Form ...
  • TFF - self executing TansForm ...
  • TFH - Help file (Turbo ...
  • TFM - TeX font metrics file (...
  • TFM - Form file (Form Tool ...
  • TFM - Tagged font metric file ...
  • TFMX - Amiga Audio file
  • TFMX - Final Musicsystem ...
  • TFP - ProWORX Nxt Full Page ...
  • TFR - IBM client access file ...
  • TFR - 4th Dimension database ...
  • TFR - Star Wars Tie Fighter ...
  • TFR - 4th Dimension Database ...

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • black hat

    Black hat refers to a hacker who breaks into a computer system or network with malicious intent.

  • copyright

    Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close