Browse Definitions :

Browse File Extensions by Alphabet

DCM - DEF

  • DCM - DCM module
  • DCMD - DiskCatalogMaker catalog...
  • DCN - VerdiCash digital cash ...
  • DCN - Autodesk depth slope ...
  • DCO - DisCryptor Encrypted ...
  • DCOL - Claris Color File
  • DCOVER - Disc Cover File
  • DCP - Data CodePage (OS/2)
  • DCPIL - Delphi Compiler Symbolic...
  • DCR - Shockwave file
  • DCS - Desktop Color Separation...
  • DCS - Datafile (ACT! Activity ...
  • DCT - Database Dictionary file...
  • DCT - Microsoft's Visual ...
  • DCT - Database SpellCheck ...
  • DCT5 - Mac File Type
  • DCTMP - DC++ Incomplete Download...
  • DCTMP - DC++ Partially ...
  • DCU - Delphi compiled unit
  • DCUIL - Delphi compiled unit file
  • DCV - DriveCrypt Volume
  • DCW - Walter Machine ...
  • DCW - Draft Choice for Windows...
  • DCX - Bitmap Graphics file (...
  • DCX - Microsoft's Visual ...
  • DCX - Macro file
  • DD - Compressed Archive (...
  • DD2 - Dungeon Designer 2 Map ...
  • DDA - DDA media file
  • DDA - Data - GLBasic ASCII 3D ...
  • DDA - TNTmips Import File
  • DDAP - Disk Doubler
  • DDAP - (MAC CREATOR CODE ) File...
  • DDAP - Mac File Type
  • DDAT - DivX Temporary Video File
  • DDATA - Pocket Diary Text File
  • DDB - Bitmap Graphics file
  • DDC - DivX Descriptor File
  • DDC - ddoc Print and Preview ...
  • DDC - DivX Descriptor DVD ...
  • DDCX - DivX Descriptor 2 File
  • DDD - Diagram Designer project...
  • DDD - Acrobat Distiller ( ...
  • DDD - Medlin Accounting Direct...
  • DDD - TIS- Office Digital ...
  • DDD - ARC+ Drawing (ACA)
  • DDD - Adobe ColdFusion verity ...
  • DDD - Alpha Five Table Data ...
  • DDD - ColdFusion Verity engine...
  • DDD - Fuji Xerox 2D CAD data ...
  • DDE - Dynamic Data Exchange
  • DDE - binary : Dynamic Data ...
  • DDF - Btrieve or Xtrieve Data ...
  • DDFL - Apple DiskDoubler file
  • DDI - Image File (DISKDUPE)
  • DDIF - Digital Equipment or ...
  • DDJ - SilkRoad Alchemy Page ( ...
  • DDK - IBM OS/2 saved SKF file ...
  • DDL - SQL Data Definition ...
  • DDL - Data Definition Language...
  • DDM - Alpha Five Table Objects...
  • DDM - Intelliware Data Modeller
  • DDNA - Miramar Systems Desktop ...
  • DDP - Device Driver Profile (...
  • DDR - DDRemote Parameter File ...
  • DDR - Systems Management ...
  • DDR - FileMaker Pro Database ...
  • DDRW - Apple ClarisDraw draw ...
  • DDRW - ClarisDraw Drawing
  • DDS - DirectDraw Surface file ...
  • DDS - Direct Draw Surface 3-d ...
  • DDT - PDP-10 Commands for DDT ...
  • DDT - Diagram Designer Template
  • DDT - Adobe Bridge file
  • DDT - Neurological data for ...
  • DDV - Xbase Dbfast example ...
  • DDW - CSPro File
  • DDX - Device Data Exchange ...
  • DDX - Juno Get File
  • DDX - Alpha Five data ...
  • DDY - ASHRAE Design Conditions...
  • DE - Win Ace 204 File
  • DE - German language ...
  • DE - MetaProducts Download ...
  • DE$ - Modem Bitware Fax disk2 ...
  • DEB - Debug Script (DOS Debug)
  • DEBIAN - Debian ( make -) file
  • DEC - Unknown Apple II File
  • DEC - VersaPro declaration file
  • DEC - Dolphin EasyConverter ...
  • DEC - Magic : The Gathering ...
  • DECK - MS Query Cue Card File
  • DECK - DeckTools Deck Project (...
  • DEE - Creator Simulator ...

-ADS BY GOOGLE

SearchCompliance

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchSecurity

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys -- one public key ...

  • Evil Corp

    Evil Corp is an international cybercrime network that uses malicious software to steal money from its victims' bank accounts.

  • Plundervolt

    Plundervolt is a method of hacking that involves depriving an Intel chip of power so that processing errors occur.

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • 3D NAND flash

    3D NAND is a type of non-volatile flash memory in which the memory cells are stacked vertically in multiple layers.

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

Close