Browse Definitions:

Browse File Extensions by Alphabet

TOA - TPM

  • TOAD - www. FunkyToad.net ...
  • TOAST - Toast CD Image File ( ...
  • TOAST - Unknown Apple II File
  • TOAST - Toast Disc Image
  • TOB - ZEMAX object data file
  • TOC - Adobe FrameMaker table ...
  • TOC - Table of contents file (...
  • TOC - User interface ...
  • TOCF - Eudora TOC
  • TOD - Crysis game file
  • TOD - MPEG -2 transport stream
  • TOD - JVC Camcorder Video File
  • TOD - JVC Everio Video Capture...
  • TODO - Simple Project ToDo ...
  • TOF - Mr. Photo Temporary ...
  • TOH - Infinity Game Engine ...
  • TOK - Borland C 4.x reserved ...
  • TOK - Borland C++ 4.x external...
  • TOL - Image file (Kodak Photo ...
  • TOM - Total Office Manager (...
  • TOM - Unknown Apple II File
  • TOM - MediGraph Database ( ...
  • TOMBRAIDER - 3 Tomb raider 3 save game
  • TON - FMS32 -PRO ZVEI Protocol...
  • TON - Wave Siggen -2.1 file
  • TONE - SOFT - TECH Alarm Clock ...
  • TOOLS - Dos djgpp tools file
  • TOP - Unknown Apple II File
  • TOP - NetSim Topology Diagram ...
  • TOP - IBM netfinity Rack ...
  • TOP - Topocad Drawing ( Chaos ...
  • TOP - INMOS Transputer ...
  • TOP - QuickVerse File
  • TOP - Waltop Digital Ink-pad ...
  • TOP - Evernote Handwritten ...
  • TOP - ZEMAX tolerance settings...
  • TOPAZ3D - Topaz 3D Model Data ( ...
  • TOPC - TopicCrunch SEO- project...
  • TOPC - TopicCrunch Stored ...
  • TOPC - TopicCrunch Project File
  • TOR - Guitar Musik Trainer ...
  • TOR - NBA 99 Art Ingame Anims ...
  • TORRENT - BitTorrent file
  • TOS - The Operation System for...
  • TOS - Self-Extracting archive ...
  • TOT - Infinity Game Engine ...
  • TOUR - Unknown Apple II File
  • TOUR-PROJECT - Vadosity Toolkit Project...
  • TOY - Catz & Dogz Toy File ( ...
  • TOYS - Script Editor ToyS text
  • TOYS - (MAC CREATOR CODE ) ...
  • TP - Configuration file (...
  • TP - TinkerPlots document ...
  • TP - Sesson - state file
  • TP - Beyond TV Transport ...
  • TP - MPEG -2 TV recorded file
  • TP - Turbo Pascal ...
  • TP - PerfectTablePlan table ...
  • TP - Sesson-state file (Turbo...
  • TP - Turbo Profiler session -...
  • TP - EROSION 3D Relief ...
  • TP - TinkerPlots Document (...
  • TP - Turbo Pascal cfg file - ...
  • TP2 - FalCon eXtra Video ( ...
  • TP3 - Template file (Harvard ...
  • TP4 - Saved picture file (...
  • TP6 - Top Producer System 6/6i...
  • TPA - GROMACS portable binary ...
  • TPA - Palm data import template
  • TPA - Corel Graphics10 Custom ...
  • TPA - Corel Graphics custom ...
  • TPB - Downloadable PCL Soft ...
  • TPC - Rtfgen file
  • TPC - Topicscape Placeholder ...
  • TPC - 3D TopicScape exported ...
  • TPC - Topic Connection ...
  • TPC - 3D Topicscape Export File
  • TPD - TreePad hypertext ...
  • TPD - EDIUS EffectPreset file
  • TPD - Cyberlink TOD Video File
  • TPE - Clarion for Windows ...
  • TPF - Downloadable PCL Soft ...
  • TPG - TREAT Project File ( ...
  • TPG - TOPO ! Sync Data File ( ...
  • TPH - Help file (Turbo Pascal)
  • TPI - Visual Test Shell File
  • TPI - Tonline file
  • TPI - EDIUS Plugin File
  • TPIC - Mac File Type
  • TPIC - TrueVision TARGA
  • TPJ - TestStand Project
  • TPJ - Nova Logic game terrain ...
  • TPL - Template file (Harvard ...
  • TPL - Template file (DataCAD)
  • TPL - Encrypted lesson file (...
  • TPL - Residents units library ...
  • TPM - TeX Package Management
  • TPM - Trusted Platform Module ...
  • TPM - Transformation ...
  • TPM - TextPad Macro

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • phishing

    Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication ...

  • vulnerability disclosure

    Vulnerability disclosure is the practice of publishing information about a computer security problem, and a type of policy that ...

  • incident response

    Incident response is an organized approach to addressing and managing the aftermath of a security breach or cyberattack, also ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • flash memory

    Flash memory, also known as flash storage, is a type of nonvolatile memory that erases data in units called blocks.

  • NAND flash memory

    NAND flash memory is a type of nonvolatile storage technology that does not require power to retain data.

  • NOR flash memory

    NOR flash memory is one of two types of nonvolatile storage technologies.

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close