Browse Definitions:

Browse File Extensions by Alphabet

DGR - DIT

  • DGR - Design CAD ( ...
  • DGR - Keeptool ER diagrammer
  • DGR - DART Pro 98 File Group ...
  • DGR - PhoneTools Internal ...
  • DGR - Pivot Graphic Fax
  • DGR - MicroStation CAD design ...
  • DGR - PhoneTools Internal ...
  • DGR - Format Pivot Graphic (...
  • DGR - DeltaGraph Documen
  • DGRH - DeltaGraph
  • DGS - Diagnostics Report
  • DGSCHEME - DigiGuide Scheme ( ...
  • DGSCHEME-WEB - DigiGuide Scheme ( ...
  • DGSS - DigiGuide Smart Search ...
  • DGT - Digital Gallery
  • DGTOOLBAR - DigiGuide Toolbar ( ...
  • DGW - Digi - Watcher ...
  • DGX - Rational XDE (IBM)
  • DH - Dependency Information ...
  • DH2 - Pursuit CRM Report ...
  • DHCD - DHCD Computing Program ...
  • DHE - Help Workshop Dialog Box...
  • DHE - Dialog Box Hep Editor ...
  • DHE - Visual Basic Dialog Box ...
  • DHF - Help Maker File
  • DHF - AMIGA emulator disk ...
  • DHG - Direct Hit Graphics ...
  • DHP - Graphic file (Dr. Halo ...
  • DHR - Image Apple IIe / Apple ...
  • DHR - Unknown Apple II File
  • DHRP - Image Apple IIe / Apple ...
  • DHS - Shadowgrounds Savegame ...
  • DHT - Datafile (Gauss)
  • DHTML - Dynamic HTML file
  • DHY - Adobe Bridge file
  • DI - Sound file
  • DI - Sound
  • DI - D Programming Language ...
  • DI - Digital Illusion format
  • DI - Atari Disk Image ( Atari...
  • DI_ - Doko Compressed Install ...
  • DIA - Microsoft Sharepoint ...
  • DIAG - DIAGNOTICS chemical ...
  • DIB - Device-independent bitmap
  • DIC - Dictionary file
  • DIC - Dictionary file (Lotus ...
  • DICM - Digital imaging and ...
  • DICOM - DICOM Digital Imaging ...
  • DICOM - Medicine image file ...
  • DICPROOF - Microsoft Dictionary ...
  • DICPROOF - Dictionary Proofing File...
  • DICT - Sunnysoft InterWrite file
  • DICT - Dicts file
  • DICT - Microsoft Virtual PC ...
  • DID - Adobe Bridge file
  • DID - IKON DISC image document...
  • DID - BullsEye file
  • DID - Acrobat Distiller ( ...
  • DIESEL - Bandits - Phoenix Rising...
  • DIF - Data Interchange Format ...
  • DIF - Data Interchange Output ...
  • DIF - Database file (VisiCalc)
  • DIF - Text file (Output from ...
  • DIFF - Difference data file
  • DIFF - Patch script : ...
  • DIG - Sound Designer I audio
  • DIG - Digilink file
  • DIGI - DIGIBooster module format
  • DII - Summation Batch Load File
  • DII - TrialDirector Load File ...
  • DII - CT Summation Document ...
  • DIL - Delphi file
  • DIL - WordExpress2.0 File
  • DIL - Dialog LOTUS or HighEdit...
  • DIM - DIME File
  • DIM - Active @ File Recovery ...
  • DIM - XMap Symbol File ( ...
  • DIME - Direct Internet Message ...
  • DIME - Direct Internet Message ...
  • DIMG - Disk Image Drawing
  • DIMG - Mac File Type
  • DIN - Unknown Apple II File
  • DIN - ADC Labs eWave File
  • DIN - DataEase file
  • DINERDASHSAVEDGAME - Diner Dash Saved Game ( ...
  • DINFO - DivX Temporary Video ...
  • DIP - Graphics file
  • DIR - Movie (MacroMind ...
  • DIR - Macromedia Director file
  • DIR - Dialing Directory (...
  • DIR - Directory (VAX) (DEC)
  • DIRECT - Unknown Apple II File
  • DIRECT - Thoroughbred basic ...
  • DIRECTORY - KDE Folder Parameters (...
  • DIRECTORY - Unknown Apple II File
  • DIS - Thesaurus file (...
  • DIS - Distribution file (VAX ...
  • DIS - Ray Tracer file
  • DISABLED - SpyBot S& D Disabled ...
  • DISCO - Microsoft Visual Studio ...

-ADS BY GOOGLE

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchSecurity

  • evil maid attack

    An evil maid attack is a security exploit that targets a computing device that has been shut down and left unattended.  An evil ...

  • Common Body of Knowledge (CBK)

    In security, Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional ...

  • rootkit

    A rootkit is a program or, more often, a collection of software tools that gives a threat actor remote access to and control over...

SearchHealthIT

  • value-based healthcare

    Value-based healthcare, also known as value-based care, is a payment model that rewards healthcare providers for providing ...

  • health informatics

    Health informatics is the practice of acquiring, studying and managing health data and applying medical concepts in conjunction ...

  • clinical trial

    A clinical trial, also known as a clinical research study, is a protocol to evaluate the effects and efficacy of experimental ...

SearchDisasterRecovery

  • crisis communication

    Crisis communication is a method of corresponding with people and organizations during a disruptive event to provide them with ...

  • Zerto

    Zerto is a storage software vendor that specializes in enterprise-class business continuity and disaster recovery in virtual and ...

  • crisis management plan (CMP)

    A crisis management plan (CMP) is a document that outlines the processes an organization will use to respond to a critical ...

SearchStorage

  • SSD write cycle

    An SSD write cycle is the process of programming data to a NAND flash memory chip in a solid-state storage device.

  • data storage

    Data storage is the collective methods and technologies that capture and retain digital information on electromagnetic, optical ...

  • hard disk

    A hard disk is part of a unit -- often called a disk drive, hard drive or hard disk drive -- that stores and provides relatively ...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close