Browse Definitions:

Browse File Extensions by Alphabet

IS - ITM

  • IS - InStereo audio file
  • IS - Unknown Apple II File
  • IS - Modula -3 Intermediate ...
  • IS2 - IRT Cronista Infrared ...
  • ISA - Adobe Photoshop file
  • ISB - IS- Builder Link File (...
  • ISBN - HM3 Tutorial Software
  • ISC - RVS-COM Prepaid SMS ...
  • ISC - Xilinx Device ...
  • ISC - GRDSOZ4W ISCII File
  • ISC - iScreensaver Designer ...
  • ISC - Xilinx Integrated ...
  • ISC - Internet Servide ...
  • ISD - Spell checker dictionary...
  • ISE - Installshield Express ...
  • ISF - ModelPress highly ...
  • ISF - Tektronix instrument ...
  • ISF - InfoNet Snapshot File ( ...
  • ISF - Inspiration Software ...
  • ISF - ZerOS Saved Show ( Zero ...
  • ISF - Inspiration Mind Mapping...
  • ISF - Inspiration Concept Map ...
  • ISFF - Intergraph Standard File...
  • ISFF - Intergraph Standard File...
  • ISH - Compressed archive (ISH)
  • ISK - Command File
  • ISL - DB- MAIN Scheme File
  • ISL - InstallShield temporary ...
  • ISL - Inno Setup 1.3 file
  • ISL - The Universal game ...
  • ISM - InstallShield Project ...
  • ISM - ITI SimulationX ...
  • ISM - ArchiCAD Geometric ...
  • ISM - SimulationX Encrypted ...
  • ISM - Image System ( ...
  • ISM - MySQL ISAM Table Handler...
  • ISMA - Output Video file - ...
  • ISN - Installer Source Files
  • ISO - Lists the files on a ...
  • ISO - ISO (International ...
  • ISO-11172 - mpeg 1 spec.(iso 11172 )
  • ISOD - CloneDVD ISO Image ( ...
  • ISP - Sign-up file(X-Internet)
  • ISQ - MicroCT Image ( SCANCO ...
  • ISR - Streets & Trips Route ...
  • ISR - Go- Moku game file
  • ISS - ISS image format
  • ISS - InstallShield Response ...
  • ISS - Caseware IDEA IDEAScript
  • ISS - InstallShield Silent ...
  • ISS - ISS Audio Header
  • ISS - Inno Setup Script
  • ISS - The Longest Journey ...
  • ISS - Inno Setup Script ( ...
  • ISSP - Internet Search Sitelesrc
  • IST - Instrument file (...
  • ISTG - Imagine Staging Stage ...
  • ISTG - Imagine Stage Edit
  • ISTR - IsoStar Library of ...
  • ISTR - IsoStar Library of ...
  • ISU - Uninstall script (...
  • ISYM - ArchiCAD for MAC ...
  • ISZ - ISo Zipped format Header
  • ISZ - WinMount Compressed ISO ...
  • ISZ - Zipped ISO Disk Image
  • ISZ - Compressed disk image ...
  • IT - Music module (MOD) (...
  • IT - Settings file (intalk)
  • IT3 - Internet Timer 3 Log File
  • ITA - Italian localization ...
  • ITA - Italian README File
  • ITA - IconTweaker theme
  • ITA - Personal Paint user ...
  • ITA - IconTweaker Theme Archive
  • ITC - Image File
  • ITC - Uthscsa Imagetool ...
  • ITC - iTunes CoverFlow data ...
  • ITC - iTunes Cover Flow Data ...
  • ITC2 - iTunes Cover Flow Data ...
  • ITCL - tcl 00 Extension
  • ITCL - cygwin iwidgets3.0.0 ...
  • ITD - SDL Trados Translation ...
  • ITD - System Dll file
  • ITDB - iTunes Database File
  • ITE - E- Tabs Reader File
  • ITE - Iterare project file
  • ITF - Interface file (JPI ...
  • ITG - Intergraph Format ( ...
  • ITG - Intergraph format bitmap...
  • ITH - InTether Receiver File (...
  • ITH - InTether technology ...
  • ITHMB - iPod photo Thumbnail ...
  • ITHMB - Apple iPod / iPhone ...
  • ITI - Instrument file (Impulse...
  • ITK - Cygwin itk3.0 file
  • ITL - ITEM ToolKit Library ( ...
  • ITL - iTunes Music Library ...
  • ITL - iTunes music database ...
  • ITL - iTunes Library File
  • ITL - IntelliTipster League ...

-ADS BY GOOGLE

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchSecurity

  • evil maid attack

    An evil maid attack is a security exploit that targets a computing device that has been shut down and left unattended.  An evil ...

  • Common Body of Knowledge (CBK)

    In security, Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional ...

  • rootkit

    A rootkit is a program or, more often, a collection of software tools that gives a threat actor remote access to and control over...

SearchHealthIT

  • value-based healthcare

    Value-based healthcare, also known as value-based care, is a payment model that rewards healthcare providers for providing ...

  • health informatics

    Health informatics is the practice of acquiring, studying and managing health data and applying medical concepts in conjunction ...

  • clinical trial

    A clinical trial, also known as a clinical research study, is a protocol to evaluate the effects and efficacy of experimental ...

SearchDisasterRecovery

  • crisis communication

    Crisis communication is a method of corresponding with people and organizations during a disruptive event to provide them with ...

  • Zerto

    Zerto is a storage software vendor that specializes in enterprise-class business continuity and disaster recovery in virtual and ...

  • crisis management plan (CMP)

    A crisis management plan (CMP) is a document that outlines the processes an organization will use to respond to a critical ...

SearchStorage

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • Red Hat OpenStack Platform

    Red Hat OpenStack Platform is a commercially supported distribution of open source OpenStack software designed to build and ...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close