Browse Definitions:

Browse File Extensions by Alphabet

WFB - WJF

  • WFB - Bank file (Maui/Rio/...
  • WFC - Wink Flash Control Bar (...
  • WFC - Windows Wireless Network...
  • WFC - War FTP client file
  • WFD - Audio waveform (WaveForm...
  • WFD - Drum set (Maui/Rio/...
  • WFE - Crossword Express Word ...
  • WFK - Delphi Runimage Delphi ...
  • WFL - Flowchart file (Winflow)
  • WFM - Windows form (Virtual ...
  • WFN - Symbol (Corel Draw)
  • WFO - Delphi Runimage Delphi ...
  • WFP - Program file (Turtle ...
  • WFS - Microsoft Windows ...
  • WFT - Data file (NICOLET (Old ...
  • WFV - DataSet Vision query ...
  • WFX - Data file (WinFax)
  • WG - Fifa2000 Be File
  • WG1 - Worksheet (Lotus 1-2-3/G)
  • WG2 - Worksheet (Lotus 1-2-3 ...
  • WGL - Wingate License File
  • WGM - Citizen Watch Hyper ...
  • WGP - Data file (Wild Board ...
  • WGS - Walk - Graph Segment
  • WGT - XNBC Synaptic Weights ...
  • WGT - Worms Armageddon teams ...
  • WGT - XNBC V8 biological ...
  • WGT - Opera widgets
  • WGT - IMPS Data File
  • WGV - WeatherGuard Vehicle ...
  • WGX - Watchguard Mobile User ...
  • WGZ - S60 Web Runtime Widget ...
  • WGZ - Nokia S60 Web Runtime ...
  • WHE - Dawn of War File ( Games...
  • WHM - Dawn of War Model Format...
  • WHMTHEME - WebHost Manager Theme ( ...
  • WHS - WinHex Script (X- Ways ...
  • WHT - NetMeeting Old ...
  • WHT - Microsoft Net Meeting ...
  • WHTEKO - WebHub Marked -up HTML (...
  • WHTT - WinHTTrack Website Copier
  • WHTT - HTTrack Website Copier ...
  • WHV - VS Ver 1.0 Session Data ...
  • WI - Wavelet compressed ...
  • WIC - Garbage
  • WIC - J Wavelet Image Codec ...
  • WIC - J Wavelet Image Codec ...
  • WIC - J Wavelet Image
  • WIC - Garbage file
  • WICDEMO - World in Conflict Saved ...
  • WICSAVEGAME - World in Conflict saved ...
  • WID - Width table (Ventura ...
  • WIDGET - Konfabulator widget ...
  • WIDGET - Yahoo ! Widget
  • WIDGET - Konfabulator Widget File...
  • WIDGET - Yahoo ! Widget file
  • WIF - Wavelet image file (see ...
  • WII - Nintendo WII raw disk ...
  • WIL - WinImage file
  • WILD - HyperCard
  • WIM - Wireless identity module...
  • WIMP - Microsoft Windows icon ...
  • WIN - Window preference file (...
  • WIN - Window file (dBase)
  • WIN - Window file (Microsoft ...
  • WIN32 - Vc6 ( make -) file
  • WINCE - EXE = Windowsce ...
  • WINDOWS9X - Winhttrack Source File
  • WINDOWS9X - Winhttrack src file
  • WINDOWSLIVECONT - Windows Live Contacts ...
  • WINDOWSLIVECONTACT - Windows Live Messenger ...
  • WINDOWSLIVECONTACT - Microsoft Live Messenger...
  • WINGS - Wings 3D Mesh File ( ...
  • WINPOINT - Winpoint Mortgage loan ...
  • WINS - Makefile for WINS ...
  • WINS - EPOC Makefile for WINS ...
  • WINWARE - WinWare Windows Applet
  • WIP - CyberScrub Privacy Suite...
  • WIP - Windows Installer ...
  • WIPEINFO - Norton Utilities Sendto ...
  • WIPEINFO - Norton Utilities Sendto ...
  • WIPESLACK - Norton Utilities Sendto ...
  • WIPESLACK - Norton Utilities Sendto ...
  • WIRE - Alias Wire CAD data file...
  • WIRE - Wavefront Studio ...
  • WIREFRAME - Data - EMSE mesh
  • WIS - wIntegrate Basic Script ...
  • WIS - IBM wIntegrate basic ...
  • WIX - wIntegrate compiled ...
  • WIX - Windows Installer XML - ...
  • WIX - Xara Internal Graphics ...
  • WIXLIB - Windows Installer XML (...
  • WIXPROJ - Windows Installer XML (...
  • WIZ - Wizard file (Microsoft ...
  • WIZ - Page wizard (Microsoft ...
  • WIZ! - Mac File Type
  • WIZARD - StormC Wizard File ( ...
  • WIZHTML - MS Access HTML Template
  • WJ - Fifa2000 Be File

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

  • ransomware

    Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is ...

  • hacker

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close