Browse Definitions :

Browse File Extensions by Alphabet

DSA - DTE

  • DSA - DasyTec DASYLab File ...
  • DSA - PKCS7 signature DSA
  • DSASAVE - Dungeon Siege File ( ...
  • DSB - DiscSafe Backup ( ...
  • DSB - Orchida Embroidery ...
  • DSB - Embroidery File
  • DSB - Tajima embroidery file
  • DSB - DasyTec DASYLab File
  • DSC - Discard file (Oracle)
  • DSCE - Diagnosis Scenario
  • DSCMD - Desktop Sidebar Command ...
  • DSD - Database file (...
  • DSDF - Smart Manager ...
  • DSDLL - Dungeon Siege Resource ...
  • DSE - WhatsUp Gold Virtual ...
  • DSE - WhatsUp Gold Virtual ...
  • DSF - Micrografx Designer v7.x...
  • DSG - DooM saved game
  • DSH - Dashboard PDA Wallpaper
  • DSI - DAZ Studio Layered Image...
  • DSI - Digital Sound Module ...
  • DSI - DESI Labeling System ...
  • DSJ - Director 5 Resources ...
  • DSK - Driver file (Novell ...
  • DSK - Project Desktop file (...
  • DSKP - Desktop Patterns
  • DSL - Critical Seeker game file
  • DSL - Product Compass Suite ...
  • DSL - Lingvo User Feature ...
  • DSL - Lingvo User Feature ...
  • DSLSETUP - Domain Specific Language...
  • DSM - Music module file (DSIK)
  • DSM - Dynamic Studio music ...
  • DSM - Digital Sound Module (...
  • DSMAP - Dungeon Siege File ( ...
  • DSMR - Mac File Type
  • DSN - Design (Object System ...
  • DSN - Schematic file (Orcad ...
  • DSN - ODBC Data source
  • DSN6 - Ribbons FRODO Map
  • DSO - MS Visc 6 Dev studio ...
  • DSO - Tribes 2 file
  • DSO - DataFlex Data _Set
  • DSP - Display parameters (...
  • DSP - Microsoft Developer ...
  • DSP - Graphics Display driver ...
  • DSPACKAGE - Desktop Sidebar ...
  • DSPARTY - Dungeon Siege File ( ...
  • DSPLUGIN - Desktop Sidebar Plug -in...
  • DSQ - Corel QUERY
  • DSR - Visual Basic Active ...
  • DSR - Driver Resource (...
  • DSRES - Dungeon Siege Resource ...
  • DSS - Screensaver file (DCC)
  • DSS - Digital Sound file (...
  • DSSL - DSSL style sheet SGML ( ...
  • DSSL - DSSL SGML Style Sheet
  • DST - Distribution file (...
  • DST - Embroidery machines ...
  • DSTF - DropStuff
  • DSTF - Smart Manager ...
  • DSU - ProWORX Nxt Data Setup (...
  • DSV - DeSmuME Save File
  • DSW - Desktop settings (...
  • DSW - Microsoft Developer ...
  • DSX - Visual Basic Active ...
  • DSY - Directory Synchronizer ...
  • DSY - DAISY AdAkta container ...
  • DSY - AJC Directory ...
  • DSYM - ArchiCAD for MAC ...
  • DSZ - Orchida (OES) Embroidery...
  • DSZ - Orchida Embroidery ...
  • DSZ - DynaMaSZ Data / ...
  • DSZ - Win Help Related File
  • DT - DAT backup
  • DT0 - DTED Level 0 File
  • DT1 - Diablo II tile file
  • DT1 - DTED Level 1 file
  • DT2 - Microsoft Live Messenger...
  • DT2 - DTED - Level 2 File
  • DT2 - DTED Level 2 ( National ...
  • DT5 - Brother 's Keeper File
  • DTA - Datafile (Turbo C++)
  • DTA - Data file (EZ-Forms)
  • DTA - World Bank's STARS data
  • DTAPART - Mozilla Firefox ...
  • DTAUS - Misc
  • DTAZV - Misc
  • DTB - After Dark
  • DTB - Cybermedia Uninstaller
  • DTB - After Dark file
  • DTB - Database Backup for. ...
  • DTB2 - Mac File Type
  • DTC - Windows Applog Journal ...
  • DTC - CADE graphic file
  • DTC - OutStart ...
  • DTC - Applog journal
  • DTC - DYTEC HEADQUARTER
  • DTC - JetBrains dotTrace CPU ...
  • DTD - |SGML Document Type ...

-ADS BY GOOGLE

SearchCompliance

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchSecurity

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys -- one public key ...

  • Evil Corp

    Evil Corp is an international cybercrime network that uses malicious software to steal money from its victims' bank accounts.

  • Plundervolt

    Plundervolt is a method of hacking that involves depriving an Intel chip of power so that processing errors occur.

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • 3D NAND flash

    3D NAND is a type of non-volatile flash memory in which the memory cells are stacked vertically in multiple layers.

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

Close