Browse Definitions:

Browse File Extensions by Alphabet

BDW - BHF

  • BDW - Budget data file
  • BDW - Data File
  • BDX - JavaBib index file
  • BDX - FUSE Science Pipeline ...
  • BDX - BarBack Drink Exchange ...
  • BDX - BitDefender file
  • BEA - Beamer Song File (The ...
  • BEA - Song File
  • BEAM - Compiled Erlang Code file
  • BEAN - Bean document file
  • BEAN - Bean Rich Text Document
  • BEC - Break Even Calculator
  • BED - Blue Elephant Definition
  • BED - InfoSnorkel Blue ...
  • BED - Unknown Apple II File
  • BEE - The Bee Archiver ...
  • BEE - Unknown Apple II File
  • BEE - Beeline -AIR System File
  • BEE - Bee Archiver compressed ...
  • BEF - Boomi Integration ...
  • BEJEWELED2DELUXESAVEDGAME - Bejeweled Ver 2 Saved ...
  • BEL - HPXView binary event log...
  • BEL - Compressed Archive File
  • BEL - Beamer Layout File (The ...
  • BEL - Belon Compressed archive...
  • BEN - Syssoft Sandra File
  • BEN - SiSoftware Sandra file
  • BEP - Beamer Playlist (The ...
  • BER - German Bericht = report ...
  • BES - Beschreibung : German ...
  • BES - Database file
  • BET - BETA Source File
  • BEVEL - FontTwister bevel file
  • BEX - BOOM Extensions To ...
  • BEX - Pretty Good Privacy (PGP...
  • BEX - Kashmir 3D Transparent ...
  • BEX - PGP Binary EXtracted ...
  • BEX - British National ...
  • BEXPK - Pretty Good Privacy (PGP...
  • BEXPK - PGP Binary EXtracted ...
  • BEZ - Bitstream Outline font ...
  • BF - Beyond Good & Evil Game ...
  • BF - Game archive file
  • BF - Brainfuck sourcefile
  • BF - Brainf *ck program file
  • BF - Cryo Interactive game ...
  • BF - Befunge program file
  • BF2 - Bradford 2 Font
  • BFA - Blowfish - encrypted File
  • BFC - Windows 95 Briefcase ...
  • BFE - bcrypt - BlowFish file ...
  • BFF - WorldToolKit Neutral ...
  • BFF - AIX Backup File Format
  • BFF - AIX backup format
  • BFFM - B17 Flying Fortress Game...
  • BFI - Blaise Index ( ...
  • BFL - Big Flexible Line ...
  • BFL - e- Book File
  • BFL - Colin McRae Rally 2 Data...
  • BFL - yBook eBook file
  • BFL - BFLI image format
  • BFLI - Big Flexible Line ...
  • BFLI - BFLI image format
  • BFM - Font Metrics file (Unix/...
  • BFN - Brother Embroidery ...
  • BFN - Brother Embroidery ...
  • BFONT - Need for Speed SHIFT ...
  • BFR - Capture File
  • BFS - Tivoli Storage Manager ...
  • BFS - IBM Tivoli Storage ...
  • BFX - Fax document file (...
  • BG - Microsoft Backgammon ...
  • BGA - OS/2 Graphic array
  • BGB - Chat Background Graphic ...
  • BGB - MS Chat Background ...
  • BGCF - Greeting card design
  • BGDB - Global Virtual Accademy ...
  • BGF - ZEMAX binary glass ...
  • BGF - MSI BGF chemical ...
  • BGI - Borland Graphics ...
  • BGL - Microsoft Flight ...
  • BGM - Jane 's Combat ...
  • BGM - Basic4GL 3D Object ( ...
  • BGO - Recipe File
  • BGO - BigOven Recipe Card ( ...
  • BGT - Quicken 2002 inet common...
  • BGT - Quicken 2002 Internet ...
  • BGT - Graphic Accounts Budget ...
  • BGT - Budget Data File
  • BGUI - Need for Speed SHIFT GUI...
  • BGV - BonanzaGraf financial ...
  • BGW - Final Fantasy XI Music (...
  • BGX - Bc45 Bgi file
  • BH - BlackHole compressed ...
  • BH - Archive file format
  • BH - BlakHole Archive
  • BH2 - OASYS Presentation : ...
  • BH3 - Rise of Nations Unit ...
  • BHA - Rise of Nations Unit ...
  • BHF - pcAnywhere Host file

-ADS BY GOOGLE

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchSecurity

  • evil maid attack

    An evil maid attack is a security exploit that targets a computing device that has been shut down and left unattended.  An evil ...

  • Common Body of Knowledge (CBK)

    In security, Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional ...

  • rootkit

    A rootkit is a program or, more often, a collection of software tools that gives a threat actor remote access to and control over...

SearchHealthIT

  • value-based healthcare

    Value-based healthcare, also known as value-based care, is a payment model that rewards healthcare providers for providing ...

  • health informatics

    Health informatics is the practice of acquiring, studying and managing health data and applying medical concepts in conjunction ...

  • clinical trial

    A clinical trial, also known as a clinical research study, is a protocol to evaluate the effects and efficacy of experimental ...

SearchDisasterRecovery

  • crisis communication

    Crisis communication is a method of corresponding with people and organizations during a disruptive event to provide them with ...

  • Zerto

    Zerto is a storage software vendor that specializes in enterprise-class business continuity and disaster recovery in virtual and ...

  • crisis management plan (CMP)

    A crisis management plan (CMP) is a document that outlines the processes an organization will use to respond to a critical ...

SearchStorage

  • SSD write cycle

    An SSD write cycle is the process of programming data to a NAND flash memory chip in a solid-state storage device.

  • data storage

    Data storage is the collective methods and technologies that capture and retain digital information on electromagnetic, optical ...

  • hard disk

    A hard disk is part of a unit -- often called a disk drive, hard drive or hard disk drive -- that stores and provides relatively ...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close