Browse Definitions:

Browse File Extensions by Alphabet

TPO - TRN

  • TPO - Arena Template File ( ...
  • TPO - 3D graphic file
  • TPO - TOPO ! mapXchange ...
  • TPP - Project file (Teleport ...
  • TPP - Protected mode units (...
  • TPQ - TOPO !Pro Map Image ( ...
  • TPR - TMPEG Enc Video ...
  • TPR - GROMACS Portable Binary ...
  • TPR - Together Project ...
  • TPR - TMPGEnc Project File
  • TPR - TIGCC IDE Project File (...
  • TPR - Clarion for Windows ...
  • TPS - Multi Channel ...
  • TPS - Crazy Talk expression ...
  • TPS - Clarion TopSpeed Data ...
  • TPS - Micro Perfect Products
  • TPS - Clarion Topspeed Data ...
  • TPS - Clarion for Windows top ...
  • TPS - Multi Channel ...
  • TPS - Supposed compressed ...
  • TPT - ThumbsPlus thumbnail ...
  • TPT - Thumbs32 file
  • TPT - Sidekick 98 File
  • TPT - PCLTool Transformation ...
  • TPU - Turbo Pascal Unit (Turbo...
  • TPU - Command file (VAXTPU ...
  • TPV - Packed graphics file (...
  • TPW - Session-state file (...
  • TPW - Packed wave files (...
  • TPW - Turbo Pascal Unit (BGI) ...
  • TPX - Image file (ULead Photo ...
  • TPZ - Compressed archive (TAR)
  • TPZ - Compressed archive (...
  • TQD - Torq -DJ Song ...
  • TQF - Chemical test ( Chemical...
  • TQL - Microsoft SQL Server ...
  • TQL - Tree Query Language File
  • TQL - Insure ++ File
  • TQM - Session File
  • TR - Session-state settings (...
  • TR0 - SPICE Transient Analysis...
  • TR1 - 'IBM Voice Type ' ...
  • TR1 - Novell LANalyzer Capture...
  • TR2 - Session-state settings (...
  • TR3 - SPICE Transient Analysis...
  • TR3 - TomeRaider eBook ( ...
  • TR3 - TomeRaider eBook File
  • TR4 - SPICE Transient Analysis...
  • TR5 - Tree Professional File
  • TR5 - OnyxTree Professional ...
  • TR5 - TRIM reference file
  • TR6 - SPICE Transient Analysis...
  • TR7 - SPICE Transient Analysis...
  • TR8 - SPICE Transient Analysis...
  • TR9 - SPICE Transient Analysis...
  • TRA - Saved game file (Coaster)
  • TRACE - WebSTAR Mail Server ...
  • TRACE - Debugging File
  • TRACE - TcpDump Output File
  • TRADALOG - Tradalog Catalog File
  • TRAN - Document Convert
  • TRANS - Amaya file
  • TRANS - Amaya
  • TRASHINFO - Trash storage metadata ...
  • TRB - Animation Master ...
  • TRC - Debug support file (...
  • TRD - Datafile - 'file ...
  • TRD - TR Assistant dictionary
  • TRD - 'Definitions Package
  • TRD - Lingea Lexicon ...
  • TRD - TR-DOS Floppy Image
  • TRD - defs package Header
  • TRD - TR Assist Dictionary ...
  • TRE - Directory tree file (...
  • TRF - LFToolkit Transformation...
  • TRF - DocuMagix File
  • TRF - LFToolkit Transformation...
  • TRF - Train Simulator traffic ...
  • TRG - XMap Flight Plan or ...
  • TRG - Symantec LiveUpdate File...
  • TRH - Traverse PC Handheld ...
  • TRI - Trigram File
  • TRI - Cart3D triangulation
  • TRI - Alias Triangle
  • TRI - Alias TRIangle file
  • TRI - Ribbons FRODO Contours (...
  • TRI - LiveUpdate Product ...
  • TRI - 3D Space Triangulated ...
  • TRI - Quake texmake Utility ...
  • TRIA - Data - Greg Hood 's ...
  • TRIB - Data - Greg Hood 's ...
  • TRIF - Tiled Raster Interchange...
  • TRIPLE-S - Surveying file format
  • TRK - Script file (Kermit)
  • TRK3 - Rail3D 2KD/2k3 Layout ...
  • TRL - Topocad ( Chaos Systems ...
  • TRM - Terminal file (Generic)
  • TRM - Terminal settings file (...
  • TRN - Project usage log (MKS ...
  • TRN - Translation support file...

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

  • ransomware

    Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is ...

  • hacker

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close