Browse Definitions :

Browse File Extensions by Alphabet

DIS - DMA

  • DIS - Distribution file (VAX ...
  • DIS - Ray Tracer file
  • DIS - Thesaurus file (...
  • DISCO - Microsoft Visual Studio ...
  • DISCOMAP - DISCO Discovery Output ...
  • DISKDEFINES - Linux LiveCD Information...
  • DIST - Mac OS X Distribution ...
  • DIST - SAM scoring file
  • DIT - Windows2000 Active ...
  • DIV - DivX Movie ( ...
  • DIVX - DivX Media Format
  • DIVX - DivX - Encoded Movie File
  • DIX - Stonevoice Translator ...
  • DIZ - Description file (...
  • DJ - DJGPP docs file
  • DJE - MattBatt iAM- player ...
  • DJR - Adobe Director video ...
  • DJR - Macromedia Director ...
  • DJS - Data Junction ...
  • DJS - NASCAR Thunder game ...
  • DJV - DjVu Image
  • DJV - DjVu file bitmap graphics
  • DJVU - DjVu compressed image ...
  • DJW - Datadisc Explore
  • DJX - Dundjinni Art ( Fluid ...
  • DK - Denmark Danish text
  • DK@P - DocMaker Standalone Doc
  • DKB - Graphics file (Ray ...
  • DKC - Virtue Deskshow Compiler
  • DKD - Karaoke file
  • DKD - Submarine Titans battle ...
  • DKD - Virtue Deskshow ...
  • DKE - DriveLock FDE Disk Key ...
  • DKP - Dreamkeys plug -in
  • DKP - Virtue Deskshow ...
  • DKS - DataKeeper Configuration...
  • DKX - Submarine Titans Battle ...
  • DKZ - Description In Zip File
  • DL - Image
  • DL$ - System Dllbackup file
  • DL0 - ABBYY Finereader 4.0 ...
  • DL0 - Abbyy Finereader 4.0 ...
  • DL_ - Compressed DLL File
  • DL_ - DLL backup
  • DLB - Troj / Dloadr -AHT file
  • DLB - SmartBook
  • DLB - Spectrum Analyzer ...
  • DLB - SSL Trojan data file
  • DLC - 3D Studio Max animation ...
  • DLC - JDownloader download ...
  • DLC - DIGILINEAR compressed ...
  • DLC - Model Dislocation file
  • DLC - Disclib library database
  • DLC - Echelon HQ configuration...
  • DLCT - AppleScript Dialect
  • DLD - Datafile (Lotus 1-2-3)
  • DLE - 3D Studio Max plugin
  • DLF - Dialogue Live Format
  • DLF - Belkin Router Firmware ...
  • DLF - DataCAD Double Precision...
  • DLG - C++ Dialogue Script
  • DLI - Beast 2.02 Trojan File
  • DLK - INMOS Transputer ...
  • DLK - INMOS Transputer ...
  • DLL - Export/Import Filter (...
  • DLL - Dynamic-link library file
  • DLM - Adobe Download Manager ...
  • DLM - Microsoft File Transfer ...
  • DLM - 3ds Max ( Autodesk Inc.)
  • DLM - Dirty Little Helper ...
  • DLM - Dynamic Link Module
  • DLM - FileMaker Pro : Data
  • DLMCACHE - FilePlanet Download ...
  • DLN - Scanner Recognita file
  • DLO - 3D Studio Max Plugin file
  • DLO - DOS7 SYSTEM file
  • DLP - Data - DAQLab
  • DLPF - DinkeyLook Diagnostic ...
  • DLR - TIB Browser
  • DLS - Downloadable sound
  • DLS - Interactive music ...
  • DLS - Setup file (Norton ...
  • DLT - VCTEditor Data File ( ...
  • DLU - Dirty Little Helper ...
  • DLV - CATIA export file
  • DLV - CATIA 4 Export File
  • DLV3 - CATIA Export File ( ...
  • DLV4 - Catia file format
  • DLW - DALiM LiTHO Line Work ...
  • DLX - Renamed DLL File
  • DLX - Complete Works file
  • DLX - Adobe Premiere file
  • DLY - Complete Works ...
  • DM - Paradox Data Model ( ...
  • DM - DeltaMusic audio file
  • DM1 - Desktop Music Score ( ...
  • DM2 - Misc
  • DM2 - Quake 2 Demo File
  • DM3 - Gatan Digital Micrograph...
  • DM_2 - Call of Duty Demo File (...

-ADS BY GOOGLE

SearchCompliance

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchSecurity

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys -- one public key ...

  • Evil Corp

    Evil Corp is an international cybercrime network that uses malicious software to steal money from its victims' bank accounts.

  • Plundervolt

    Plundervolt is a method of hacking that involves depriving an Intel chip of power so that processing errors occur.

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • 3D NAND flash

    3D NAND is a type of non-volatile flash memory in which the memory cells are stacked vertically in multiple layers.

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

Close