Browse Definitions:

Browse File Extensions by Alphabet

GR9 - GSA

  • GR96A - GROMOS96 (A) chemical ...
  • GR96N - GROMOS96 (nm) chemical ...
  • GRA - Graph (Microsoft)
  • GRA - Datafile (SigmaPlot)
  • GRA_ - Mac File Type
  • GRAAL - Graal Level ( ...
  • GRADS - Metafile
  • GRAF - Digital F/X image format
  • GRAFFLE - OmniGraffle Drawing (The...
  • GRAFFLE - OmniGraffle Drawing
  • GRAFSAO - Aleph One Shapes ( ...
  • GRAPH - Amaya
  • GRAPH - Amaya file
  • GRASP - GRASP Animation
  • GRASP - Animation ( GRAphical ...
  • GRASP - Animation
  • GRAY - Raw Gray Samples
  • GRAY - Bitmap image (raw gray ...
  • GRB - Shell Monitor (MS-DOS ...
  • GRC - Vertical Mapper ...
  • GRD - Image processing grid ...
  • GRDEF - Geoworks UI resource file
  • GRDNT - Image format ...
  • GRE - Webalizer.01 Lang file
  • GRE - data - Grenoble Thermal ...
  • GREY - RAW RGB 24-bit Graphic
  • GREY - Raw image format
  • GRF - Graph (Charisma Graph ...
  • GRF - Microsoft GraphEdit graph
  • GRFZ - DPlot Graph File ( ...
  • GRG - GreatFamily Graphic ...
  • GRH - Little fighter 1 image ...
  • GRI - Petrosys grid file
  • GRIB - Gridded Binary File
  • GRIB - WMO CBS FM 92- VIII Ext....
  • GRIB - Gridded Binary
  • GRID - Unknown Apple II File
  • GRID - GridMove grid settings ...
  • GRK - Kreon Scanner File
  • GRK - Gradekeeper Class ...
  • GRK - Gradekeeper Class ...
  • GRL - MATLAB Graphic Format (...
  • GRL - Windows Update Status
  • GRM - Minos File
  • GRM - VISUAL EPR Input Data ...
  • GRN - Granny 3D File
  • GRN - Granny 3D rendering ...
  • GRN - Drivers for GRX Graphic ...
  • GRN - Masterpoint green points...
  • GRN - Drivers for GRX
  • GRO - Unknown Apple II File
  • GRO - HP-48/ 48sx /49 Graphic ...
  • GRO - Genbox Family History ...
  • GRO - Genbox Family History ...
  • GRO - Serious Sam Game File ( ...
  • GRO - HP-48/49 Grob image ...
  • GRO - Warlords Battlecry game ...
  • GROB - Graphic Object Bitmap ...
  • GROOVY - Groovy ( programming ...
  • GROUP - Linux file
  • GROUPPROJ - Delphi project group file
  • GROWLREGDICT - Growl Temp File
  • GRP - Program Manager Group (...
  • GRP - Pictures group (PixBase)
  • GRPH - ANSYS Plot
  • GRQ - Quickstep Barco Graphics
  • GRR - Gradekeeper Class Roster...
  • GRR - Gradekeeper Class Roster...
  • GRS - GetRight Skin Header
  • GRS - GetRight Skin ( ...
  • GRS - Packedge Barco Graphics
  • GRT - MegaHAL Greeting File (...
  • GRV - Cakewalk file
  • GRV - Microsoft Office Groove ...
  • GRV - Cakewalk ( Cakewalk )
  • GRW - SeeYou Waypoint ( ...
  • GRX - GetRight File List ( ...
  • GRX - GetRight file list
  • GRXML - Speech Recognition ...
  • GRY - Raw graphic (GREY)
  • GRZ - GRZip II Compressed ...
  • GRZ - GRZip Compressed Archive
  • GS - eXplorist GPS Geocache ...
  • GS - Note file
  • GS - Gofer script ( Haskell ...
  • GS - GemStone Model Document ...
  • GS - GemStone Document
  • GS0 - Genecyst Save State 0
  • GS1 - Presentation (GraphShow)
  • GS2 - Genecyst Save State 2
  • GS3 - Genecyst Save State 1
  • GS3 - GameStarter File
  • GS3 - data - GameStarter
  • GS4 - Genecyst Save State 4
  • GS5 - Genecyst Save State 5
  • GS6 - Genecyst Save State 6
  • GS7 - Genecyst Save State 7
  • GS8 - Genecyst Save State 8
  • GS9 - Genecyst Save State 9

-ADS BY GOOGLE

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchSecurity

  • evil maid attack

    An evil maid attack is a security exploit that targets a computing device that has been shut down and left unattended.  An evil ...

  • Common Body of Knowledge (CBK)

    In security, Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional ...

  • rootkit

    A rootkit is a program or, more often, a collection of software tools that gives a threat actor remote access to and control over...

SearchHealthIT

  • value-based healthcare

    Value-based healthcare, also known as value-based care, is a payment model that rewards healthcare providers for providing ...

  • health informatics

    Health informatics is the practice of acquiring, studying and managing health data and applying medical concepts in conjunction ...

  • clinical trial

    A clinical trial, also known as a clinical research study, is a protocol to evaluate the effects and efficacy of experimental ...

SearchDisasterRecovery

  • crisis communication

    Crisis communication is a method of corresponding with people and organizations during a disruptive event to provide them with ...

  • Zerto

    Zerto is a storage software vendor that specializes in enterprise-class business continuity and disaster recovery in virtual and ...

  • crisis management plan (CMP)

    A crisis management plan (CMP) is a document that outlines the processes an organization will use to respond to a critical ...

SearchStorage

  • SSD write cycle

    An SSD write cycle is the process of programming data to a NAND flash memory chip in a solid-state storage device.

  • data storage

    Data storage is the collective methods and technologies that capture and retain digital information on electromagnetic, optical ...

  • hard disk

    A hard disk is part of a unit -- often called a disk drive, hard drive or hard disk drive -- that stores and provides relatively ...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close