Browse Definitions:

Browse File Extensions by Alphabet

TIC - TLT

  • TIC - ArcInfo coordinates file
  • TIC - Lotto Pro 2002 ticket ...
  • TIC - ALLFIX FTN special file
  • TIC - FTN special file with ...
  • TID - AVCHD Thumbnail Index
  • TID - AVCHD Thumbnail Index ...
  • TID - IBM Voice Type languages...
  • TIE - X- wing Alliance Game ...
  • TIF - Tag image bitmap file (...
  • TIFENX - egis Encrypted TIF File ...
  • TIFF - Tag image bitmap file (...
  • TIFFENX - egis Encrypted TIFF File...
  • TIG - Map file (Tiger) (Used ...
  • TII - TI Interactive Workbook ...
  • TII - Apache Lucene term info ...
  • TIK - Script File for Game ...
  • TIL - Fuzzy Logic knowledge ...
  • TILE - Eclipse image file
  • TIM - Texture/Image file (...
  • TIN - MapInfo Professional ...
  • TINF - Mac File Type
  • TIP - Startup Tip File
  • TIP - Tip of the day for ...
  • TIP - TuneUp utilities icon ...
  • TIPROGRAM - TI- Basic Program File
  • TIS - Tile set (MahJongg 3.0)
  • TISV - WabbitDS Save File ( ...
  • TIT - Train Simulator track ...
  • TIX - DivX Video Download ...
  • TIX - Tix Widgets
  • TIX - DivX Video Download ...
  • TIX - ASA for UNIX Terminfo ...
  • TJF - backup files (VAXTPU ...
  • TJL - Backup file - VAXTPU ...
  • TJL - Backup File
  • TJM - Crazy Talk Model File ( ...
  • TJN - Karaoke Song ( ...
  • TJN - Taijin Media Net karaoke...
  • TJP - TaskJuggler Project File
  • TJP - Tiled JPEG File
  • TJS - TRACKJOY - Gravis ...
  • TJS - Sound
  • TK - Tk Script
  • TK - TK Solver File
  • TK - Tk Language Script
  • TK1 - Wintec Tools GPS log
  • TK2 - Take Two/ Easy CD ...
  • TK2 - Roxio / Take Two backup ...
  • TK3 - TK3 eBook ( Night ...
  • TK3 - TK3 Multimedia eBook
  • TKC - tKC Cracking Tutorial ...
  • TKFL - TKLinks Saver Favorite ...
  • TKL - Takeoff Live PDF working...
  • TKL - Holux MapShow305 track ...
  • TKM - Panasonic SD Voice ...
  • TKN - Liberty BASIC ...
  • TKN - Token Redeemer Download ...
  • TKO - DodgeView Take -Off File
  • TKP - MicroImages SML Script ...
  • TKS - TK8 Safe Master Password...
  • TKT - TK Solver File
  • TKW - TK Solver File
  • TL5 - TimeLiner 5.0 Timeline (...
  • TL_ - Doko Compressed Install ...
  • TLA - TuneUp Utilities Startup...
  • TLA - TLA - The Temporal Logic...
  • TLB - OLE type library files (...
  • TLB - Text library (VAX)
  • TLB - Reference table (Bubble ...
  • TLBACKUP - True Launch Bar backup ...
  • TLC - Compiled tool command ...
  • TLD - Disk Image - Teledisk
  • TLD - Teledisk Disk Image
  • TLD - Trellix Document Design ...
  • TLD - Tag Library Descriptor
  • TLE - Two-Line element set (...
  • TLF - Short Message Service ...
  • TLF - Opengl Stonehenge file
  • TLF - Turnpike SCORE link file
  • TLF - Gear Track List File
  • TLF - Avant ! Memory Compiler ...
  • TLG - Trellix WebGem
  • TLG - Beast 2.02 Trojan File
  • TLG - QuickBooks Transaction ...
  • TLH - Typelib generated C/C++ ...
  • TLH - Adder100 Source Code
  • TLH - Adder100 source file
  • TLI - Adder100 Source Code
  • TLI - Adder100 source file
  • TLK - Lands of Lore archive
  • TLK - BioWare Aurora Engine ...
  • TLK - Infinity Game Engine ...
  • TLK - Bioware Infinity game ...
  • TLM - Timeline Maker Timeline ...
  • TLO - SPSS Table Look Header
  • TLO - SPSS user table lookup ...
  • TLP - Project timeline file (...
  • TLS - Zortech 21 Readme file
  • TLS - Timeless Time & Expense ...
  • TLS - Piles 'O' Tiles ...

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • phishing

    Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication ...

  • vulnerability disclosure

    Vulnerability disclosure is the practice of publishing information about a computer security problem, and a type of policy that ...

  • incident response

    Incident response is an organized approach to addressing and managing the aftermath of a security breach or cyberattack, also ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • flash memory

    Flash memory, also known as flash storage, is a type of nonvolatile memory that erases data in units called blocks.

  • NAND flash memory

    NAND flash memory is a type of nonvolatile storage technology that does not require power to retain data.

  • NOR flash memory

    NOR flash memory is one of two types of nonvolatile storage technologies.

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close