Browse Definitions:

Browse File Extensions by Alphabet

TIC - TLT

  • TIC - ArcInfo coordinates file
  • TIC - Lotto Pro 2002 ticket ...
  • TIC - ALLFIX FTN special file
  • TIC - FTN special file with ...
  • TID - AVCHD Thumbnail Index
  • TID - AVCHD Thumbnail Index ...
  • TID - IBM Voice Type languages...
  • TIE - X- wing Alliance Game ...
  • TIF - Tag image bitmap file (...
  • TIFENX - egis Encrypted TIF File ...
  • TIFF - Tag image bitmap file (...
  • TIFFENX - egis Encrypted TIFF File...
  • TIG - Map file (Tiger) (Used ...
  • TII - TI Interactive Workbook ...
  • TII - Apache Lucene term info ...
  • TIK - Script File for Game ...
  • TIL - Fuzzy Logic knowledge ...
  • TILE - Eclipse image file
  • TIM - Texture/Image file (...
  • TIN - MapInfo Professional ...
  • TINF - Mac File Type
  • TIP - Startup Tip File
  • TIP - Tip of the day for ...
  • TIP - TuneUp utilities icon ...
  • TIPROGRAM - TI- Basic Program File
  • TIS - Tile set (MahJongg 3.0)
  • TISV - WabbitDS Save File ( ...
  • TIT - Train Simulator track ...
  • TIX - DivX Video Download ...
  • TIX - Tix Widgets
  • TIX - DivX Video Download ...
  • TIX - ASA for UNIX Terminfo ...
  • TJF - backup files (VAXTPU ...
  • TJL - Backup file - VAXTPU ...
  • TJL - Backup File
  • TJM - Crazy Talk Model File ( ...
  • TJN - Karaoke Song ( ...
  • TJN - Taijin Media Net karaoke...
  • TJP - TaskJuggler Project File
  • TJP - Tiled JPEG File
  • TJS - TRACKJOY - Gravis ...
  • TJS - Sound
  • TK - Tk Script
  • TK - TK Solver File
  • TK - Tk Language Script
  • TK1 - Wintec Tools GPS log
  • TK2 - Take Two/ Easy CD ...
  • TK2 - Roxio / Take Two backup ...
  • TK3 - TK3 eBook ( Night ...
  • TK3 - TK3 Multimedia eBook
  • TKC - tKC Cracking Tutorial ...
  • TKFL - TKLinks Saver Favorite ...
  • TKL - Takeoff Live PDF working...
  • TKL - Holux MapShow305 track ...
  • TKM - Panasonic SD Voice ...
  • TKN - Liberty BASIC ...
  • TKN - Token Redeemer Download ...
  • TKO - DodgeView Take -Off File
  • TKP - MicroImages SML Script ...
  • TKS - TK8 Safe Master Password...
  • TKT - TK Solver File
  • TKW - TK Solver File
  • TL5 - TimeLiner 5.0 Timeline (...
  • TL_ - Doko Compressed Install ...
  • TLA - TuneUp Utilities Startup...
  • TLA - TLA - The Temporal Logic...
  • TLB - OLE type library files (...
  • TLB - Text library (VAX)
  • TLB - Reference table (Bubble ...
  • TLBACKUP - True Launch Bar backup ...
  • TLC - Compiled tool command ...
  • TLD - Disk Image - Teledisk
  • TLD - Teledisk Disk Image
  • TLD - Trellix Document Design ...
  • TLD - Tag Library Descriptor
  • TLE - Two-Line element set (...
  • TLF - Short Message Service ...
  • TLF - Opengl Stonehenge file
  • TLF - Turnpike SCORE link file
  • TLF - Gear Track List File
  • TLF - Avant ! Memory Compiler ...
  • TLG - Trellix WebGem
  • TLG - Beast 2.02 Trojan File
  • TLG - QuickBooks Transaction ...
  • TLH - Typelib generated C/C++ ...
  • TLH - Adder100 Source Code
  • TLH - Adder100 source file
  • TLI - Adder100 Source Code
  • TLI - Adder100 source file
  • TLK - Lands of Lore archive
  • TLK - BioWare Aurora Engine ...
  • TLK - Infinity Game Engine ...
  • TLK - Bioware Infinity game ...
  • TLM - Timeline Maker Timeline ...
  • TLO - SPSS Table Look Header
  • TLO - SPSS user table lookup ...
  • TLP - Project timeline file (...
  • TLS - Zortech 21 Readme file
  • TLS - Timeless Time & Expense ...
  • TLS - Piles 'O' Tiles ...

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • black hat

    Black hat refers to a hacker who breaks into a computer system or network with malicious intent.

  • copyright

    Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

SearchStorage

  • non-volatile memory (NVM)

    Non-volatile memory (NVMe) is a semiconductor technology that does not require a continuous power supply to retain the data or ...

  • hybrid hard drive (HHD)

    A hybrid hard drive (HHD), sometimes known as a solid-state hybrid drive (SSHD), is a mass storage device that combines a ...

  • USB flash drive

    A USB flash drive -- also known as a stick, thumb or pen drive -- is a plug-and-play portable storage device that uses flash ...

SearchSolidStateStorage

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close