Browse Definitions :

Browse File Extensions by Alphabet

G - GB

  • G - Data chart (APPLAUSE)
  • G01 - MicroSim PCBoard ...
  • G01 - HEC-RAS Geometry File (...
  • G02 - HEC-RAS Geometry File (...
  • G02 - MicroSim PCBoard ...
  • G03 - HEC-RAS Geometry File (...
  • G03 - MicroSim PCBoard ...
  • G04 - HEC-RAS Geometry File (...
  • G05 - HEC-RAS Geometry File (...
  • G06 - MicroSim PCBoard ...
  • G07 - MicroSim PCBoard ...
  • G08 - MicroSim PCBoard ...
  • G09 - MicroSim PCBoard ...
  • G10 - Garmin GPS Map File ( ...
  • G10 - MicroSim PCBoard ...
  • G16 - GoldED / DOS Compiled ...
  • G16 - GoldED / DOS compiled ...
  • G18 - Recomposer MIDI ...
  • G1A - Casio Model 9860 Add-in ...
  • G1E - Casio Model 9860 ...
  • G1L - Casio Model 9860 File ( ...
  • G1M - Casio Model 9860 BASIC ...
  • G1N - Casio Model 9860 File ( ...
  • G1R - Casio Model 9860 Image ...
  • G2A - GoToAssist Session File ...
  • G3 - G3 FAX File
  • G3 - Group 3 Fax Document
  • G32 - GFA BASIC 32 Program File
  • G36 - Recomposer MIDI ...
  • G3D - GenDesigner 3.x ...
  • G3F - Zetafax TIFF file ( fine...
  • G3F - Zetafax Fine Resolution ...
  • G3N - Imaging Fax image format
  • G3N - Zetafax Normal ...
  • G3P - data - Grand Prix 3 car ...
  • G3S - Goletas 3S Triangle ...
  • G3X - RealFlight Content File
  • G4 - Microsoft Access image ...
  • G4 - Access ( Microsoft ...
  • G4 - GTX RasterCAD File
  • G42 - DLS/32 Supply Chain ...
  • G4B - Sokoban ++ Level File
  • G53 - DLS/32 Supply Chain ...
  • G64 - Video file
  • G64 - C64 Emulator Disk Image
  • G721 - Raw CCITT G.721 //$bit ...
  • G723 - Raw CCITT G.723 3 or ...
  • G723-3 - Raw CCITT /ITU G.723 3-...
  • G723-5 - Raw CCITT /ITU G.723 5-...
  • G726 - Raw CCITT /ITU G.726 ...
  • G726 - G.726 Audio File
  • G726-2 - G726 -2 - Raw CCITT /ITU...
  • G726-3 - G726 -3 - Raw CCITT /ITU...
  • G726-4 - G726 -4 - Raw CCITT /ITU...
  • G726-5 - G726 -5 - Raw CCITT /ITU...
  • G7XX - PCM U-law A-law G7xx ...
  • G8 - Raw Graphics (one byte ...
  • G94 - Gaussian 94 Output ...
  • G99 - HEC-RAS Geometry File (...
  • GAB - Global Address Book ...
  • GAB - Connectivity Memory ...
  • GAB - Address Book File
  • GAB - WinDev Controls ' Styles...
  • GAC - Global Audio Control Skin
  • GAD - Golden Arrow file
  • GADGET - Windows Sidebar Gadget ...
  • GADGET - Microsoft Gadget ( ...
  • GADGET - Microsoft Vista Sidebar ...
  • GAF - Total Annihilation
  • GAF - Total Annihilation image...
  • GAK - Win32 Shellext file
  • GAL - Album (Corel Multimedia ...
  • GALLERYITEM - SMART Notebook ( SMART ...
  • GAM - Fax document (GammaFax)
  • GAME - Unknown Apple II File
  • GAME - Apple Chess Saved Game
  • GAMIN - Gamess Input chemical ...
  • GAML - Generalized Analytical ...
  • GAMOUT - GAMESS Output chemical ...
  • GAN - GanttProject Project File
  • GAN - GanttProject Project ...
  • GANI - Graal Game Animation
  • GAP - Electrical Generation ...
  • GAP - PhotoImpact Pencil Style...
  • GAR - GPS_COM Waypoint Data ( ...
  • GARMIN - Garmin hacking project
  • GAS - Grab -a- Site project ...
  • GAS - Atari Jaguar GPU ...
  • GAS - Intelligence Tracking ...
  • GAT - Gator File
  • GAT - Genetic Algorithm ...
  • GAU - MS Flight Simulator ...
  • GAU - Flight Simulator Gauge ...
  • GAU - Gaussian input file
  • GAU - Flight Simulator Gauge (...
  • GAUOUT - Gaussian 92 Output ...
  • GAX - MS Age of Empires II: ...
  • GAX - Age of Empires 2 (The ...
  • GAY - Reported as Sometimes a ...
  • GB - Emulator ROM image file ...

-ADS BY GOOGLE

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • buffer underflow

    Buffer underflow, also known as buffer underrun or buffer underwrite, is a threat to data that typically occurs when the ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

  • denial-of-service attack

    A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • secondary storage

    Secondary storage is storage for noncritical data that does not need to be frequently accessed.

  • Pure Storage

    Pure Storage is a provider of enterprise data flash storage solutions designed to substitute for electromechanical disk arrays.

  • yobibyte (YiB)

    A yobibyte (YiB) is a unit of measure used to describe data capacity as part of the binary system of measuring computing and ...

Close