Browse Definitions:

Browse File Extensions by Alphabet

WJF - WML

  • WJF - WinZip Job File
  • WJF - WinZip Job File Header
  • WJF - WinZip Job File ( WinZip...
  • WJR - ReGet Deluxe Data File
  • WK! - 1-2-3 Speadsheet (IBM)
  • WK! - Lotus Spreadsheet File
  • WK1 - Spreadsheet (Lotus 1-2-3...
  • WK2 - Lotus 2 Worksheet
  • WK2 - Lotus 1-2-3 Spreadsheet ...
  • WK3 - Spreadsheet (Lotus 1-2-3...
  • WK4 - Spreadsheet (Lotus 1-2-3...
  • WK5 - Lotus 1-2-3 Spreadsheet ...
  • WK5 - Lotus 5 Worksheet
  • WKB - Document file (...
  • WKE - Spreadsheet (Lotus 1-2-3...
  • WKF - Workbook Folders ...
  • WKF - KF Web Server Default ...
  • WKF - VISI - Series CAD Work ...
  • WKI - Spreadsheet format - ...
  • WKI - Lotus 1-2-3 version 2 ...
  • WKI - Lexmark PhotoCenter ...
  • WKO - RippedPro Workout ...
  • WKQ - Spreadsheet (Quattro Pro)
  • WKS - Spreadsheet file (...
  • WKS - Worksheet spreadsheet (...
  • WKS - Spreadsheet (Symphony ...
  • WKS - Workspace file (Xlisp)
  • WKSP - Workspace Macro Macro ( ...
  • WKU - Lotus 1-2-3 Spreadsheet ...
  • WKU - Lotus 1-2-3 Spreadsheet
  • WKZ - Compressed Spreadsheet
  • WKZ - Wingz spreadsheet
  • WL - WISCO Word Power Word ...
  • WL2 - Well Logger v2.x
  • WL3 - Wolfenstein 3D ...
  • WL6 - Wolfenstein 3D ...
  • WL6 - Wolfenstein 3D ( ...
  • WLB - WinLabel Ver. 1.0-2.02 ...
  • WLB - Wgt file
  • WLC - WISCO Word Power word ...
  • WLC - Microsoft Live Mesh file
  • WLD - REND386/AVRIL file
  • WLF - Upload file (Argo Upload...
  • WLG - Dr. Watson Log
  • WLG - DrWatson LoG file
  • WLI - Who Likes Puzzles ? ...
  • WLK - Graphics file (Virtus ...
  • WLL - Add-In file (Microsoft)
  • WLMP - Movie Maker ( beta ) ...
  • WLP - Who Likes Puzzles ? ...
  • WLR - VRML Page
  • WLR - Virtual Reality Modeling...
  • WLS - Web Log Storming Log ...
  • WLS - 602Tab document
  • WLS - 602PC SUITE Worksheet ...
  • WLT - WaveL Wavelet Compressed...
  • WLT - Subsembly Wallet ...
  • WLT - eWallet File
  • WLT - words of worship file
  • WLV - Web Link Validator File
  • WLX - FileMaker Pro Plug -in
  • WLX - Live Mesh Placeholder or...
  • WLX - Total Commander Lister ...
  • WLX - Total / Windows ...
  • WLZ - WinImage File
  • WLZ - WinImage
  • WM - Working Model Motion ...
  • WM - Working Model 2D data ...
  • WM - Windows Media A/V File (...
  • WM - Windows Media Audio or ...
  • WM2D - Working Model 2D data ...
  • WM2D - Working Model Motion ...
  • WM3 - MSC Nastran Desktop ...
  • WM3 - VisualNastran file
  • WM3 - Working Model 3D Document
  • WMA - Audio file in Microsoft ...
  • WMASCOT - Otaku Mascot Mascot ( ...
  • WMB - 3D GameStudio Map Entity...
  • WMC - Macro file (WordPerfect ...
  • WMC - Backup files for startup...
  • WMC - Text file (WordMARC)
  • WMD - WaveMaker design file
  • WMD - Windows Media Download ...
  • WMD - Windows Media Download ...
  • WMD - Windows Media Player ...
  • WME - Crazy Talk Windows Media...
  • WMF - Metafile (Microsoft ...
  • WMF2 - Embedded Bitmap Metafile
  • WMF_ - Mac File Type
  • WMG - SecureDoc Encrypted Hard...
  • WMK - Oc2. 316s cakit file

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • computer exploit

    A computer exploit, or exploit, is an attack on a computer system, especially one that takes advantage of a particular ...

  • cyberwarfare

    Cyberwarfare is computer- or network-based conflict involving politically motivated attacks by a nation-state on another ...

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • OpenStack Block Storage (Cinder)

    OpenStack Block Storage (Cinder) is open source software designed to create and manage a service that provides persistent data ...

  • SATA Express (SATAe)

    SATA Express (SATAe or Serial ATA Express) is a bus interface to connect storage devices to a computer motherboard, supporting ...

  • DIMM (dual in-line memory module)

    A DIMM (dual in-line memory module) is the standard memory card used in servers and PCs.

SearchSolidStateStorage

  • hybrid flash array

    A hybrid flash array is a solid-state storage system that contains a mix of flash memory drives and hard disk drives.

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close