Browse Definitions :

Browse File Extensions by Alphabet

DBG - DCN

  • DBG - Debugger script - DOS ...
  • DBG - Symbolic debugging ...
  • DBG - FoxPro Debugger ...
  • DBG - ArcView Problem Debug ...
  • DBG - Paradox File
  • DBG - Oracle Generator File
  • DBG - InstallShield debug ...
  • DBG - ASIC compiler debug info...
  • DBG - C++ symbolic debugging ...
  • DBGR - Debugger
  • DBH - CodeWarrior debug ...
  • DBHEADER - Download Boost header ...
  • DBI - Delphi Database Explorer...
  • DBI - Photo Soap2 file
  • DBI - FiFa World Cup game data...
  • DBI - Isearch Database ...
  • DBI - Borland Database ...
  • DBK - dBase Database Backup
  • DBK - mobile phone backup ...
  • DBK - Schematic backup file (...
  • DBKIT - Doggiebox Drum Kit File ...
  • DBL - DIBOL source file
  • DBL - WindowsXP Product ...
  • DBL - LineWriter File
  • DBLIB - Altium Designer database...
  • DBLINK - Altium Designer database...
  • DBLS - Smart Manager ...
  • DBM - Rational Data Architect ...
  • DBM - DataBoss Menu template
  • DBM - Menu template - DataBoss
  • DBM - Adobe ColdFusion ...
  • DBM - Datafile - DataEase
  • DBMC - Mac File Type
  • DBMG - Mac File Type
  • DBML - Microsoft Visual Studio ...
  • DBNW - Mac File Type
  • DBNX - Mac File Type
  • DBO - Compiled program file (...
  • DBOOK - Pocket Diary Text
  • DBP - Microsoft Visual Studio ...
  • DBP - Lytec Medical Software ...
  • DBP - SigniIQ data broker ...
  • DBP - Visual Studio.NET ...
  • DBPRO - DarkBASIC Professional ...
  • DBPROJ - Microsoft Visual Studio ...
  • DBQ - Paradox Memo
  • DBR - DB/ TextWorks Database (...
  • DBR - DB/ TextWorks Database ...
  • DBR - Golf Courses File
  • DBR - TCM - MRP Software ...
  • DBR - DeepBurner burn list file
  • DBR - Comdial VMMI Database ...
  • DBS - Managing Your Money data...
  • DBS - Microsoft Word printer ...
  • DBS - SQL Windows database
  • DBSE - (MAC CREATOR CODE ) ...
  • DBT - dBase Text Memo
  • DBU - Client - Course Manager ...
  • DBV - Memo field file (...
  • DBW - Microsoft Windows 9.x ...
  • DBWRITER - TechWriter for Databases...
  • DBX - Outlook Express mail ...
  • DBX - DataBeam image
  • DBX - Microsoft's Visual ...
  • DC - CAD file (DesignCAD)
  • DC1 - Bloomba E- mail Message
  • DC2 - CAD file (DesignCAD)
  • DC3 - Medicine image file ...
  • DC3 - Diamond Caves 3 levels ...
  • DC5 - DataCAD Drawing
  • DC6 - Image file - Diablo II
  • DC8 - Video file
  • DCA - Document Content ...
  • DCA - Visual Basic Active ...
  • DCB - TrialDirector ...
  • DCB - Concordance Database ...
  • DCB - Digital Ceremonial Bugle...
  • DCC - WordExpress2.0 ...
  • DCC - Animation - Diablo II
  • DCD - INMOS transputer ...
  • DCD - DesignCAD drawing Header
  • DCD - DesignCAD drawing file
  • DCD - CAD Drawing File - ...
  • DCD - Document Content ...
  • DCD - FORTRAN Data File
  • DCDC - Astound Presentation
  • DCE - Drivecam video file ...
  • DCE - DCE AutoEnhance Settings...
  • DCE - AutoCAD R2000 Dialog ...
  • DCE - DriveCam Video ( ...
  • DCF - Primus-DCF file
  • DCF - DRM content format
  • DCG - Digocat Data file format
  • DCH - DraftChoice Drawing ( ...
  • DCI - Dreamcast Save File - ...
  • DCI - AOL HTML Mail ( America ...
  • DCI - HTML ( AOLmail )
  • DCIM - Digital Imaging and ...
  • DCK - ZX Spectrum - Emulator
  • DCL - AutoCAD Dialog Control ...

-ADS BY GOOGLE

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • Trojan horse (computing)

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close