Browse Definitions:

Browse File Extensions by Alphabet

TOA - TPM

  • TOAD - www. FunkyToad.net ...
  • TOAST - Toast CD Image File ( ...
  • TOAST - Unknown Apple II File
  • TOAST - Toast Disc Image
  • TOB - ZEMAX object data file
  • TOC - Adobe FrameMaker table ...
  • TOC - Table of contents file (...
  • TOC - User interface ...
  • TOCF - Eudora TOC
  • TOD - Crysis game file
  • TOD - MPEG -2 transport stream
  • TOD - JVC Camcorder Video File
  • TOD - JVC Everio Video Capture...
  • TODO - Simple Project ToDo ...
  • TOF - Mr. Photo Temporary ...
  • TOH - Infinity Game Engine ...
  • TOK - Borland C 4.x reserved ...
  • TOK - Borland C++ 4.x external...
  • TOL - Image file (Kodak Photo ...
  • TOM - Total Office Manager (...
  • TOM - Unknown Apple II File
  • TOM - MediGraph Database ( ...
  • TOMBRAIDER - 3 Tomb raider 3 save game
  • TON - FMS32 -PRO ZVEI Protocol...
  • TON - Wave Siggen -2.1 file
  • TONE - SOFT - TECH Alarm Clock ...
  • TOOLS - Dos djgpp tools file
  • TOP - Unknown Apple II File
  • TOP - NetSim Topology Diagram ...
  • TOP - IBM netfinity Rack ...
  • TOP - Topocad Drawing ( Chaos ...
  • TOP - INMOS Transputer ...
  • TOP - QuickVerse File
  • TOP - Waltop Digital Ink-pad ...
  • TOP - Evernote Handwritten ...
  • TOP - ZEMAX tolerance settings...
  • TOPAZ3D - Topaz 3D Model Data ( ...
  • TOPC - TopicCrunch SEO- project...
  • TOPC - TopicCrunch Stored ...
  • TOPC - TopicCrunch Project File
  • TOR - Guitar Musik Trainer ...
  • TOR - NBA 99 Art Ingame Anims ...
  • TORRENT - BitTorrent file
  • TOS - The Operation System for...
  • TOS - Self-Extracting archive ...
  • TOT - Infinity Game Engine ...
  • TOUR - Unknown Apple II File
  • TOUR-PROJECT - Vadosity Toolkit Project...
  • TOY - Catz & Dogz Toy File ( ...
  • TOYS - Script Editor ToyS text
  • TOYS - (MAC CREATOR CODE ) ...
  • TP - Configuration file (...
  • TP - TinkerPlots document ...
  • TP - Sesson - state file
  • TP - Beyond TV Transport ...
  • TP - MPEG -2 TV recorded file
  • TP - Turbo Pascal ...
  • TP - PerfectTablePlan table ...
  • TP - Sesson-state file (Turbo...
  • TP - Turbo Profiler session -...
  • TP - EROSION 3D Relief ...
  • TP - TinkerPlots Document (...
  • TP - Turbo Pascal cfg file - ...
  • TP2 - FalCon eXtra Video ( ...
  • TP3 - Template file (Harvard ...
  • TP4 - Saved picture file (...
  • TP6 - Top Producer System 6/6i...
  • TPA - GROMACS portable binary ...
  • TPA - Palm data import template
  • TPA - Corel Graphics10 Custom ...
  • TPA - Corel Graphics custom ...
  • TPB - Downloadable PCL Soft ...
  • TPC - Rtfgen file
  • TPC - Topicscape Placeholder ...
  • TPC - 3D TopicScape exported ...
  • TPC - Topic Connection ...
  • TPC - 3D Topicscape Export File
  • TPD - TreePad hypertext ...
  • TPD - EDIUS EffectPreset file
  • TPD - Cyberlink TOD Video File
  • TPE - Clarion for Windows ...
  • TPF - Downloadable PCL Soft ...
  • TPG - TREAT Project File ( ...
  • TPG - TOPO ! Sync Data File ( ...
  • TPH - Help file (Turbo Pascal)
  • TPI - Visual Test Shell File
  • TPI - Tonline file
  • TPI - EDIUS Plugin File
  • TPIC - Mac File Type
  • TPIC - TrueVision TARGA
  • TPJ - TestStand Project
  • TPJ - Nova Logic game terrain ...
  • TPL - Template file (Harvard ...
  • TPL - Template file (DataCAD)
  • TPL - Encrypted lesson file (...
  • TPL - Residents units library ...
  • TPM - TeX Package Management
  • TPM - Trusted Platform Module ...
  • TPM - Transformation ...
  • TPM - TextPad Macro

-ADS BY GOOGLE

SearchCompliance

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces.

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

SearchSecurity

  • FIDO (Fast Identity Online)

    FIDO (Fast ID Online) is a set of technology-agnostic security specifications for strong authentication. FIDO is developed by the...

  • cryptanalysis

    Cryptanalysis is the study of ciphertext, ciphers and cryptosystems with the aim of understanding how they work and finding and ...

  • Trojan horse (computing)

    In computing, a Trojan horse is a program that appears harmless, but is, in fact, malicious.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • SSD TRIM

    SSD TRIM is an Advanced Technology Attachment (ATA) command that enables an operating system to inform a NAND flash solid-state ...

  • cloud storage service

    A cloud storage service is a business that maintains and manages its customers' data and makes that data accessible over a ...

  • cloud hosting

    Cloud hosting is the process of outsourcing an organization's computing and storage resources to a service provider that offers ...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close