Browse Definitions :

Browse File Extensions by Alphabet

J - JCL

  • J - JPEG / JFIF Image
  • J - JAR archive
  • J - Java source code
  • J - Image JPEG / JFIF
  • J - JAR Compressed File
  • J - JAR Compressed Archive (...
  • J1 - EDIT Compiler JEDEC ...
  • J2A - Jazz Jackrabbit 2 ...
  • J2B - Jazz Jackrabbit 2 Music ...
  • J2C - Joint Photographic ...
  • J2C - JPEG 2000 image
  • J2D - Jazz Jackrabbit Data ...
  • J2E - Jazz Jackrabbit 2 ...
  • J2H - Jazz Jackrabbit 2 High ...
  • J2I - Jazz 2 Internet Link File
  • J2I - Jazz Jackrabbit 2 ...
  • J2K - JPEG - 2000 JP2 File
  • J2K - JPEG 2000 Image
  • J2L - Jaxx Creation Station ...
  • J2L - Jazz Jackrabbit 2 Level ...
  • J2M - Jazz Jackrabbit 2 ...
  • J2S - Jazz Jackrabbit 2 ...
  • J2T - Jazz Jackrabbit 2 Tile ...
  • J2V - Jazz Jackrabbit 2 ...
  • J3D - Atari Jaguar 3D object ...
  • J62 - Ricoh camera format file
  • J6I - Ricoh Digital Camera ...
  • J6I - Ricoh Digital Camera ...
  • JA - IBM tools updater file
  • JA - Trainz Railroad ...
  • JACKSUM - Jacksum Fingerprint ( ...
  • JAD - Java Application ...
  • JAG - Atari Jaguar JPEG ...
  • JAK - Jack compressed archive ...
  • JAM - JamTracker Music Module
  • JAM - E- mail
  • JAM - JAM Musical Score
  • JAM - Unknown Apple II File
  • JAM - Joaquim - Andrew - Mats ...
  • JAM - Image Microprose
  • JAM - Leisure Suite Larry : ...
  • JAM - Misc
  • JAM - E- mail file
  • JAM - JamTracker module : Music
  • JAM - Jam messagebase - FTN ...
  • JAM - FTN Software Jam ...
  • JAM - Jam music score - Jam
  • JAMMIX - Jammix Enhacer Music ...
  • JAP - JAlbum album file
  • JAP - Fifa World Cup Game Data...
  • JAP - jalbum Project Header
  • JAR - Java Archive (a ...
  • JAS - Graphic (Generic)
  • JAV - Internet Program : JAVA ...
  • JAV - Java Source File
  • JAV - Java language source ...
  • JAVA - Source code (Java)
  • JAW - IchiTaro Web Japanese ...
  • JBA - Jabaco Source Code ...
  • JBB - JobEditor32 Binary Job ...
  • JBC - Jam byte - code hex file
  • JBC - BestCrypt file
  • JBC - BestCrypt Container ( ...
  • JBD - Datafile (SigmaScan)
  • JBF - Image browser file (...
  • JBG - JBIG File
  • JBG - Image JBIG 1-bit raster
  • JBI - Motoman Robot Job File
  • JBI - JobEditor32 ASCII Job ...
  • JBIG - JBIG raster image ...
  • JBIG - Joint Bilevel Image Group
  • JBIG - 1-bit raster image ...
  • JBK - Juno Backup File
  • JBK - Jot + Notes Backup File
  • JBL - Add-on : DOOM scene
  • JBL - Doom scene add-on file
  • JBP - DJ Jukebox Project
  • JBR - Paint Shop Pro Brushes ...
  • JBR - Paint Shop Pro Brush ( ...
  • JBS - Binary file with data ...
  • JBX - Project file (Project ...
  • JC - Watcom src file
  • JC - FlashGet Intermediate ...
  • JC - Watcom Source File
  • JC! - FlashGet incomplete ...
  • JC! - FlashGet File
  • JCAMP - Misc
  • JCB - CB- JCBrooke module / ...
  • JCB - CB- JCBrooke Song / ...
  • JCC - Japan Crossword File ( ...
  • JCC - Japan Crossword Dmitry ...
  • JCC - Code Crusader Project ...
  • JCD - FlashGet File
  • JCD - FlashGet Download ...
  • JCE - JWPce ( Glenn Rosenthal )
  • JCF - JAWS config file
  • JCF - JAWS for Windows ...
  • JCK - Liquid Motion JACK Scene...
  • JCL - Job Control Language IBM
  • JCL - IBM Job Control Language...

-ADS BY GOOGLE

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • RSA algorithm (Rivest-Shamir-Adleman)

    The RSA algorithm is the basis of a cryptosystem -- a suite of cryptographic algorithms that are used for specific security ...

  • remote access

    Remote access is the ability to access a computer or a network remotely through a network connection.

  • IP Spoofing

    IP spoofing is the crafting of Internet Protocol (IP) packets with a source IP address that has been modified to impersonate ...

SearchHealthIT

SearchDisasterRecovery

  • network disaster recovery plan

    A network disaster recovery plan is a set of procedures designed to prepare an organization to respond to an interruption of ...

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

SearchStorage

  • disk array

    A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object ...

  • enterprise storage

    Enterprise storage is a centralized repository for business information that provides common data management, protection and data...

  • optical storage

    Optical storage is any storage type in which data is written and read with a laser. Typically, data is written to optical media, ...

Close