Browse Definitions:

Browse File Extensions by Alphabet

ATR - AVP

  • ATR - MicroSim PCBoard ...
  • ATR - Atari 8-bit disk image
  • ATR - Lightscape Material ...
  • ATR - Atari Disk Image File ( ...
  • ATRAC - Sony ATRAC Audio File
  • ATS - Unrelated Inventions ...
  • ATS - Attityd survey program
  • ATS - Audiotools file
  • ATT - AT&T Group 4 bitmap
  • ATT - Data file commonly used ...
  • ATTR - Apple iPhoto image ...
  • ATTR - iPhoto image data Header
  • ATW - AnyTime Deluxe for ...
  • ATX - Alphasoft Trueterm 2001 ...
  • ATX - A ZIP- formatted ...
  • ATX - Animation Master Plugin ...
  • ATX - Texture plugin ( ...
  • ATY - Association Placeholder ...
  • ATY - 3D Topicscape File
  • ATY - 3D Topicscape ...
  • ATYP - FileTYPE _ AutoTYPE
  • ATZ - Aston Compiled Theme ( ...
  • ATZ - Atomic Time Zone File
  • ATZ - Aston compiled theme
  • AU - Sun Microsystems audio ...
  • AU - ?-law sound file
  • AU - Audio U-law (pronounced ...
  • AU - Audio File
  • AU - Sun/NeXT/DEC/UNIX sound ...
  • AU - uLaw /AU Audio File
  • AU - Audacity audio block
  • AU - NeXT /Sun uLaw / AUdio ...
  • AU3 - AutoIt v3 Script
  • AU3 - AutoIt v3 file
  • AUC - Advanced URL Catalog ...
  • AUCD - AppleCD Audio Player
  • AUD - Audio file (Westwood ...
  • AUDIOCD - Audio CD file
  • AUF - Hansen Information ...
  • AUF - Alphacam User Font ( ...
  • AUF - Audacity block file
  • AUF - ASAUpdaterV2 Update File...
  • AUM - Adobe Update Manager ...
  • AUM - Adobe Update Manager ...
  • AUP - Audacity project file
  • AUPD - Windows Update File
  • AUPF - Audio CD Player ...
  • AUR - Sheffield Thesaurus file
  • AUR - AutoREALM map file
  • AUR - AutoREALM Map Header
  • AURL - MAC file type
  • AUS - AutoREALM Symbols Header
  • AUS - Agnitum Outpost Firewall...
  • AUS - AutoREALM Symbols
  • AUST - Self - extracting archive
  • AUT - AutoIt Script File
  • AUT - IPIX automation
  • AUT - Descent Manager Mission ...
  • AUT - AutoIt (pre Ver. 3) ...
  • AUT - Xitami Webserver Admin ...
  • AUT - Microcraft AUTHOR ...
  • AUT - Authentication File
  • AUT - GPSMan - autoMapic File
  • AUT - Signwave Auto - ...
  • AUTOCONF - Autoconfiguration file ...
  • AUTOCONF - UNIX File
  • AUTOPLAY - AutoPlay Media Studio ...
  • AUTOREG - Mozilla ( Netscape ) ...
  • AUX - TeX/LaTeX Auxilliary ...
  • AUX - ChiWriter Auxilliary ...
  • AUZ - Ableton Live File - ...
  • AV - Final Draft AV document ...
  • AV - Final Draft AV Document ...
  • AV2 - Avatar2 model file ( ...
  • AVA - Avagio Publication
  • AVASTLIC - Avast ! License File
  • AVATAR - Avatar
  • AVB - Inculan Anti-Virus virus...
  • AVC - Kaspersky Anti - virus ...
  • AVC - Advanced Video Coding ( ...
  • AVC - Kaspersky Anti - virus ...
  • AVD - AVD Video File
  • AVD - Movie Edit Pro Video ...
  • AVD - DOS7 File
  • AVE - ArcView Avenue script
  • AVF - AccountsVision Workbook ...
  • AVF - AccountsVision Workbook
  • AVF - Video information
  • AVG - AVG Virus Information ...
  • AVI - Microsoft Audio Video ...
  • AVIC - AVI to QT Utility
  • AVL - ArcView Theme Legend ...
  • AVL - Video fun file
  • AVL - ArcView Legend File
  • AVM - AVISO Geographic ...
  • AVM - Map file
  • AVM - AVG Incremental ...
  • AVN - altaVENTE Application ...
  • AVP - ArcView Pallet File ( ...
  • AVP - Avid Project

-ADS BY GOOGLE

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchSecurity

  • evil maid attack

    An evil maid attack is a security exploit that targets a computing device that has been shut down and left unattended.  An evil ...

  • Common Body of Knowledge (CBK)

    In security, Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional ...

  • rootkit

    A rootkit is a program or, more often, a collection of software tools that gives a threat actor remote access to and control over...

SearchHealthIT

  • value-based healthcare

    Value-based healthcare, also known as value-based care, is a payment model that rewards healthcare providers for providing ...

  • health informatics

    Health informatics is the practice of acquiring, studying and managing health data and applying medical concepts in conjunction ...

  • clinical trial

    A clinical trial, also known as a clinical research study, is a protocol to evaluate the effects and efficacy of experimental ...

SearchDisasterRecovery

  • crisis communication

    Crisis communication is a method of corresponding with people and organizations during a disruptive event to provide them with ...

  • Zerto

    Zerto is a storage software vendor that specializes in enterprise-class business continuity and disaster recovery in virtual and ...

  • crisis management plan (CMP)

    A crisis management plan (CMP) is a document that outlines the processes an organization will use to respond to a critical ...

SearchStorage

  • SSD write cycle

    An SSD write cycle is the process of programming data to a NAND flash memory chip in a solid-state storage device.

  • data storage

    Data storage is the collective methods and technologies that capture and retain digital information on electromagnetic, optical ...

  • hard disk

    A hard disk is part of a unit -- often called a disk drive, hard drive or hard disk drive -- that stores and provides relatively ...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close