Browse Definitions:

Browse File Extensions by Alphabet

TOA - TPM

  • TOAD - www. FunkyToad.net ...
  • TOAST - Toast CD Image File ( ...
  • TOAST - Unknown Apple II File
  • TOAST - Toast Disc Image
  • TOB - ZEMAX object data file
  • TOC - Adobe FrameMaker table ...
  • TOC - Table of contents file (...
  • TOC - User interface ...
  • TOCF - Eudora TOC
  • TOD - Crysis game file
  • TOD - MPEG -2 transport stream
  • TOD - JVC Camcorder Video File
  • TOD - JVC Everio Video Capture...
  • TODO - Simple Project ToDo ...
  • TOF - Mr. Photo Temporary ...
  • TOH - Infinity Game Engine ...
  • TOK - Borland C 4.x reserved ...
  • TOK - Borland C++ 4.x external...
  • TOL - Image file (Kodak Photo ...
  • TOM - Total Office Manager (...
  • TOM - Unknown Apple II File
  • TOM - MediGraph Database ( ...
  • TOMBRAIDER - 3 Tomb raider 3 save game
  • TON - FMS32 -PRO ZVEI Protocol...
  • TON - Wave Siggen -2.1 file
  • TONE - SOFT - TECH Alarm Clock ...
  • TOOLS - Dos djgpp tools file
  • TOP - Unknown Apple II File
  • TOP - NetSim Topology Diagram ...
  • TOP - IBM netfinity Rack ...
  • TOP - Topocad Drawing ( Chaos ...
  • TOP - INMOS Transputer ...
  • TOP - QuickVerse File
  • TOP - Waltop Digital Ink-pad ...
  • TOP - Evernote Handwritten ...
  • TOP - ZEMAX tolerance settings...
  • TOPAZ3D - Topaz 3D Model Data ( ...
  • TOPC - TopicCrunch SEO- project...
  • TOPC - TopicCrunch Stored ...
  • TOPC - TopicCrunch Project File
  • TOR - Guitar Musik Trainer ...
  • TOR - NBA 99 Art Ingame Anims ...
  • TORRENT - BitTorrent file
  • TOS - The Operation System for...
  • TOS - Self-Extracting archive ...
  • TOT - Infinity Game Engine ...
  • TOUR - Unknown Apple II File
  • TOUR-PROJECT - Vadosity Toolkit Project...
  • TOY - Catz & Dogz Toy File ( ...
  • TOYS - Script Editor ToyS text
  • TOYS - (MAC CREATOR CODE ) ...
  • TP - Configuration file (...
  • TP - TinkerPlots document ...
  • TP - Sesson - state file
  • TP - Beyond TV Transport ...
  • TP - MPEG -2 TV recorded file
  • TP - Turbo Pascal ...
  • TP - PerfectTablePlan table ...
  • TP - Sesson-state file (Turbo...
  • TP - Turbo Profiler session -...
  • TP - EROSION 3D Relief ...
  • TP - TinkerPlots Document (...
  • TP - Turbo Pascal cfg file - ...
  • TP2 - FalCon eXtra Video ( ...
  • TP3 - Template file (Harvard ...
  • TP4 - Saved picture file (...
  • TP6 - Top Producer System 6/6i...
  • TPA - GROMACS portable binary ...
  • TPA - Palm data import template
  • TPA - Corel Graphics10 Custom ...
  • TPA - Corel Graphics custom ...
  • TPB - Downloadable PCL Soft ...
  • TPC - Rtfgen file
  • TPC - Topicscape Placeholder ...
  • TPC - 3D TopicScape exported ...
  • TPC - Topic Connection ...
  • TPC - 3D Topicscape Export File
  • TPD - TreePad hypertext ...
  • TPD - EDIUS EffectPreset file
  • TPD - Cyberlink TOD Video File
  • TPE - Clarion for Windows ...
  • TPF - Downloadable PCL Soft ...
  • TPG - TREAT Project File ( ...
  • TPG - TOPO ! Sync Data File ( ...
  • TPH - Help file (Turbo Pascal)
  • TPI - Visual Test Shell File
  • TPI - Tonline file
  • TPI - EDIUS Plugin File
  • TPIC - Mac File Type
  • TPIC - TrueVision TARGA
  • TPJ - TestStand Project
  • TPJ - Nova Logic game terrain ...
  • TPL - Template file (Harvard ...
  • TPL - Template file (DataCAD)
  • TPL - Encrypted lesson file (...
  • TPL - Residents units library ...
  • TPM - TeX Package Management
  • TPM - Trusted Platform Module ...
  • TPM - Transformation ...
  • TPM - TextPad Macro

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

  • ransomware

    Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is ...

  • hacker

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close