Browse Definitions:

Browse File Extensions by Alphabet

CCJ - CDL

  • CCJ - Crossword Compiler ...
  • CCK - Corel Clipart Format ( ...
  • CCL - Intalk Communication ...
  • CCM - Lotus CC:Mail "box" file...
  • CCN - Calendar Constructer ...
  • CCN - Multimedia Fusion ...
  • CCN - Vitalize ! Game File
  • CCO - CyberChat data file
  • CCO - XBTX Graphics
  • CCP - CloneCD profiles file
  • CCP - C Converter profiles file
  • CCP - Two Brothers Software ...
  • CCP - CalComp Color Palette ...
  • CCP - CloneCD ( SlySoft Inc.)
  • CCP - CaptureCAM -PRO Screen ...
  • CCPR - CaptureCAM -PRO ( Click ...
  • CCR - HealthFrame ASTM ...
  • CCR - Atari Jaguar Cinepak film
  • CCR - Systems Management ...
  • CCR - ASTM Continuity of Care ...
  • CCR - Microsoft Internet Chat ...
  • CCRF - Calcomp Raster Bitmap
  • CCRF - Bitmap image
  • CCS - CCS-lib File
  • CCS - CableNut Configuration ...
  • CCS - CONKY CeZaR stribas ...
  • CCS - CableNut Custom Settings...
  • CCS - TrialDirector Clip ...
  • CCT - Macromedia Director ...
  • CCV - Crystal Vision Report ( ...
  • CCX - Corel compressed ...
  • CCX - CorelDraw File
  • CCX - Total Annihilation : ...
  • CCX - Multimedia Fusion plugin
  • CCX - Click & Create Extension
  • CCXML - Call Control eXtensible ...
  • CCZ - Client - Course Manager ...
  • CD - cdTree CD catalogue file
  • CD - CD-i OptImage
  • CD - CD-i OptiImage CD image ...
  • CD - Visual Studio Class ...
  • CD - CD description (DN) Disk...
  • CD - Class Diagram ( Unicode )
  • CD - Class diagram file
  • CD1 - DATAIR Cafeteria ...
  • CD1 - Cafeteria Document ...
  • CD2 - DATAIR Cafeteria ...
  • CD2 - Click 'N Design 3d File
  • CD2 - Cafeteria Document ...
  • CD4 - Dymo DiscPainter file
  • CD5 - Chasys Draw Image File
  • CDA - CD Audio Track
  • CDAA - AIFF Audio File
  • CDAT - Internet Security and ...
  • CDATA - Command & Conquer 3 ...
  • CDB - CardScan Database (...
  • CDB - TCU Turbo C Utilities ...
  • CDB - Clipboard file
  • CDB - Conceptual model backup ...
  • CDBK - SPSS Database File
  • CDC - CLAN Debug File ( Child ...
  • CDC - Chromeleon Driver ...
  • CDC - Canvastic Documnet / ...
  • CDC - Autodesk file
  • CDC - Nero CD Cover File ( ...
  • CDD - Balder Multiboot ...
  • CDD - UML file
  • CDD - ConceptDraw document
  • CDD - Chromeleon Device Driver
  • CDD - Chromeleon Device Driver...
  • CDD - Claris Draw document ...
  • CDD - CD- Architect Driver ...
  • CDD - CADEX drawing
  • CDD - CADAM Drawing ( Dassault...
  • CDD - Conceptdraw Drawing
  • CDD - Claris Draw v 1.2 ...
  • CDD - ConceptDraw drawing ...
  • CDD - Cadifra diagram file
  • CDDA - AIFF Audio
  • CDDS - Midtown Madness 3 Data
  • CDE - CADKEY Dynamic Extension...
  • CDE - Honeywell Hybrid Control...
  • CDEV - Mac File Type
  • CDF - Microsoft Channel ...
  • CDF - Netcdf Graphic file
  • CDFS - Compact Disk filing ...
  • CDG - CanoDraw Graph ( ...
  • CDG - DART Karaoke Studio CD+G...
  • CDG - Compact Disc Plus ...
  • CDI - Phillips Compact Disk ...
  • CDIC - Mac File Type
  • CDJ - Disc Juggler File
  • CDK - Atari Calamus Document
  • CDKEY - Protocol Used in ...
  • CDKEY - Access data ( ...

-ADS BY GOOGLE

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchSecurity

  • evil maid attack

    An evil maid attack is a security exploit that targets a computing device that has been shut down and left unattended.  An evil ...

  • Common Body of Knowledge (CBK)

    In security, Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional ...

  • rootkit

    A rootkit is a program or, more often, a collection of software tools that gives a threat actor remote access to and control over...

SearchHealthIT

  • value-based healthcare

    Value-based healthcare, also known as value-based care, is a payment model that rewards healthcare providers for providing ...

  • health informatics

    Health informatics is the practice of acquiring, studying and managing health data and applying medical concepts in conjunction ...

  • clinical trial

    A clinical trial, also known as a clinical research study, is a protocol to evaluate the effects and efficacy of experimental ...

SearchDisasterRecovery

  • crisis communication

    Crisis communication is a method of corresponding with people and organizations during a disruptive event to provide them with ...

  • Zerto

    Zerto is a storage software vendor that specializes in enterprise-class business continuity and disaster recovery in virtual and ...

  • crisis management plan (CMP)

    A crisis management plan (CMP) is a document that outlines the processes an organization will use to respond to a critical ...

SearchStorage

  • SSD write cycle

    An SSD write cycle is the process of programming data to a NAND flash memory chip in a solid-state storage device.

  • data storage

    Data storage is the collective methods and technologies that capture and retain digital information on electromagnetic, optical ...

  • hard disk

    A hard disk is part of a unit -- often called a disk drive, hard drive or hard disk drive -- that stores and provides relatively ...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close