Browse Definitions :

Browse File Extensions by Alphabet

GGP - GM

  • GGP - GemCom Graphic Format
  • GGR - GIMP Gradient (The GIMP ...
  • GGS - Audio file
  • GGS - Gameboy Emulator File
  • GGX - Green Globs & Graphing ...
  • GHI - NCSA Mosaic ...
  • GHI - Configuration File for ...
  • GHO - Symantec ghost image file
  • GHS - Symantec ghost segment ...
  • GHW - GHDL Wave file - GHDL / ...
  • GI - Audio Utility ...
  • GI - Prassi or PrimoDVD Image
  • GI - Sony CD Extreme Global ...
  • GI - CD Image
  • GI - Global Image
  • GI - RecordNow ! CD Image
  • GI - Sonic RecordNow ! cd ...
  • GI - UltraISO disk image file
  • GI! - GigaSampler / GigaStudio...
  • GIB - Chart (Graph-in-the-Box)
  • GIC - BioWare Aurora Engine ...
  • GID - Windows 95 global index ...
  • GIF - Bitmap (CompuServe)
  • GIF2 - Netobjects fusion Styles...
  • GIF_ - GIF Image Filter Databgif
  • GIFAR - GIF With Java ARchive
  • GIFENX - egis Encrypted GIF File ...
  • GIFF - Graphic Interchange ...
  • GIFF - CompuServe bitmap image ...
  • GIG - Gigasampler file
  • GIG - GigaSampler / GigaStudio...
  • GIG - Tascam GigaSampler File
  • GIH - GIMP Animated Brush (The...
  • GIM - Graphics Link ...
  • GIN - GEMS Engine Control Unit...
  • GINT - Gintor Download ...
  • GIO - Nyquist V2.10 Test file
  • GIO - Adagio Score File
  • GIO - Nyquist MIDI File
  • GIR - Gens Plus ! Movie Capture
  • GIS - Erdas gray - scale ...
  • GIS - Erdas bitmap Header
  • GIT - BioWare Aurora Engine ...
  • GIW - Presentation (...
  • GIX - Graphics Link ...
  • GJD - 7th Guest Game Archive
  • GJD - The 11th Hour game file
  • GJD - 11th Hour Game Archive
  • GJD - GeoJet Professional ...
  • GJF - Gaussian Input Data File
  • GJM - Compressed audio file ( ...
  • GJS - Compressed audio file ( ...
  • GJT - GAJET Input Data File (...
  • GKA - GKWIN ( Matsushita ...
  • GKB - General Knowledge Base ...
  • GKH - Ensoniq EPS family disk ...
  • GKS - GripKey document (Gravis)
  • GL - Animation file (GRASP ...
  • GL2 - HP Graphics Language ...
  • GL3 - Green line file
  • GLADE - Glade Project File
  • GLB - Microsoft Exchange ...
  • GLB - Textured 3-D scene file ...
  • GLC - 3D Graphic
  • GLD - Ground Loop Design Work ...
  • GLD - The GUI Loft Design ( ...
  • GLD - Glide File
  • GLF - Pointwise Tcl script
  • GLF - Gridgen Tcl script
  • GLF - iGolf golf course file
  • GLF - Golf Save file
  • GLF - 3D font used by glf
  • GLF - Grantleigh Labels
  • GLF - AfterGRASP font
  • GLG - MicroSim PCBoard ...
  • GLH - Wise Installer Temporary...
  • GLI - GLHEPRO Input Data ( ...
  • GLIF - Glyph Interchange Format
  • GLK - Microsoft Office Groove ...
  • GLM - Datafile (Glim)
  • GLO - Auxiliary for glossary (...
  • GLO - Global module in Basic ...
  • GLO - Instant Text Glossary ...
  • GLOBAL - Unknown Apple II File
  • GLOBAL - Global Makefile
  • GLOS - Mac File Type
  • GLOS - MS Word Glossary
  • GLS - Datafile (Across)
  • GLT - Sothink Glenda File
  • GLUE - GlueMon song / module ...
  • GLUE - GlueMon audio file
  • GLUT - Opengl Glut -3.6 file
  • GLUT2 - Opengl Glut -3.6 file
  • GLUT3 - Opengl Glut -3.6 file
  • GLV - Glove Data File (New ...
  • GLV - 2D Graphic
  • GLY - Glossary (Microsoft Word)

-ADS BY GOOGLE

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • brute force attack

    Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted ...

  • spyware

    Spyware is software that is installed on a computing device without the user's knowledge. Spyware can be difficult to detect; ...

  • ATM black box attack

    An ATM black box attack, also referred to as jackpotting, is a type of banking-system crime in which the perpetrators bore holes ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • warm site

    A warm site is a type of facility an organization uses to recover its technology infrastructure when its primary data center goes...

  • disaster recovery (DR) test

    A disaster recovery test (DR test) is the examination of each step in a disaster recovery plan as outlined in an organization's ...

SearchStorage

  • disk array

    A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object ...

  • enterprise storage

    Enterprise storage is a centralized repository for business information that provides common data management, protection and data...

  • optical storage

    Optical storage is any storage type in which data is written and read with a laser. Typically, data is written to optical media, ...

Close