Browse Definitions:

Browse File Extensions by Alphabet

TOA - TPM

  • TOAD - www. FunkyToad.net ...
  • TOAST - Toast CD Image File ( ...
  • TOAST - Unknown Apple II File
  • TOAST - Toast Disc Image
  • TOB - ZEMAX object data file
  • TOC - Adobe FrameMaker table ...
  • TOC - Table of contents file (...
  • TOC - User interface ...
  • TOCF - Eudora TOC
  • TOD - Crysis game file
  • TOD - MPEG -2 transport stream
  • TOD - JVC Camcorder Video File
  • TOD - JVC Everio Video Capture...
  • TODO - Simple Project ToDo ...
  • TOF - Mr. Photo Temporary ...
  • TOH - Infinity Game Engine ...
  • TOK - Borland C 4.x reserved ...
  • TOK - Borland C++ 4.x external...
  • TOL - Image file (Kodak Photo ...
  • TOM - Total Office Manager (...
  • TOM - Unknown Apple II File
  • TOM - MediGraph Database ( ...
  • TOMBRAIDER - 3 Tomb raider 3 save game
  • TON - FMS32 -PRO ZVEI Protocol...
  • TON - Wave Siggen -2.1 file
  • TONE - SOFT - TECH Alarm Clock ...
  • TOOLS - Dos djgpp tools file
  • TOP - Unknown Apple II File
  • TOP - NetSim Topology Diagram ...
  • TOP - IBM netfinity Rack ...
  • TOP - Topocad Drawing ( Chaos ...
  • TOP - INMOS Transputer ...
  • TOP - QuickVerse File
  • TOP - Waltop Digital Ink-pad ...
  • TOP - Evernote Handwritten ...
  • TOP - ZEMAX tolerance settings...
  • TOPAZ3D - Topaz 3D Model Data ( ...
  • TOPC - TopicCrunch SEO- project...
  • TOPC - TopicCrunch Stored ...
  • TOPC - TopicCrunch Project File
  • TOR - Guitar Musik Trainer ...
  • TOR - NBA 99 Art Ingame Anims ...
  • TORRENT - BitTorrent file
  • TOS - The Operation System for...
  • TOS - Self-Extracting archive ...
  • TOT - Infinity Game Engine ...
  • TOUR - Unknown Apple II File
  • TOUR-PROJECT - Vadosity Toolkit Project...
  • TOY - Catz & Dogz Toy File ( ...
  • TOYS - Script Editor ToyS text
  • TOYS - (MAC CREATOR CODE ) ...
  • TP - Configuration file (...
  • TP - TinkerPlots document ...
  • TP - Sesson - state file
  • TP - Beyond TV Transport ...
  • TP - MPEG -2 TV recorded file
  • TP - Turbo Pascal ...
  • TP - PerfectTablePlan table ...
  • TP - Sesson-state file (Turbo...
  • TP - Turbo Profiler session -...
  • TP - EROSION 3D Relief ...
  • TP - TinkerPlots Document (...
  • TP - Turbo Pascal cfg file - ...
  • TP2 - FalCon eXtra Video ( ...
  • TP3 - Template file (Harvard ...
  • TP4 - Saved picture file (...
  • TP6 - Top Producer System 6/6i...
  • TPA - GROMACS portable binary ...
  • TPA - Palm data import template
  • TPA - Corel Graphics10 Custom ...
  • TPA - Corel Graphics custom ...
  • TPB - Downloadable PCL Soft ...
  • TPC - Rtfgen file
  • TPC - Topicscape Placeholder ...
  • TPC - 3D TopicScape exported ...
  • TPC - Topic Connection ...
  • TPC - 3D Topicscape Export File
  • TPD - TreePad hypertext ...
  • TPD - EDIUS EffectPreset file
  • TPD - Cyberlink TOD Video File
  • TPE - Clarion for Windows ...
  • TPF - Downloadable PCL Soft ...
  • TPG - TREAT Project File ( ...
  • TPG - TOPO ! Sync Data File ( ...
  • TPH - Help file (Turbo Pascal)
  • TPI - Visual Test Shell File
  • TPI - Tonline file
  • TPI - EDIUS Plugin File
  • TPIC - Mac File Type
  • TPIC - TrueVision TARGA
  • TPJ - TestStand Project
  • TPJ - Nova Logic game terrain ...
  • TPL - Template file (Harvard ...
  • TPL - Template file (DataCAD)
  • TPL - Encrypted lesson file (...
  • TPL - Residents units library ...
  • TPM - TeX Package Management
  • TPM - Trusted Platform Module ...
  • TPM - Transformation ...
  • TPM - TextPad Macro

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • black hat

    Black hat refers to a hacker who breaks into a computer system or network with malicious intent.

  • copyright

    Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

SearchStorage

  • non-volatile memory (NVM)

    Non-volatile memory (NVMe) is a semiconductor technology that does not require a continuous power supply to retain the data or ...

  • hybrid hard drive (HHD)

    A hybrid hard drive (HHD), sometimes known as a solid-state hybrid drive (SSHD), is a mass storage device that combines a ...

  • USB flash drive

    A USB flash drive -- also known as a stick, thumb or pen drive -- is a plug-and-play portable storage device that uses flash ...

SearchSolidStateStorage

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close