Browse Definitions :

Browse File Extensions by Alphabet

J - JCL

  • J - JAR Compressed File
  • J - JAR Compressed Archive (...
  • J - Java source code
  • J - Image JPEG / JFIF
  • J - JPEG / JFIF Image
  • J - JAR archive
  • J1 - EDIT Compiler JEDEC ...
  • J2A - Jazz Jackrabbit 2 ...
  • J2B - Jazz Jackrabbit 2 Music ...
  • J2C - Joint Photographic ...
  • J2C - JPEG 2000 image
  • J2D - Jazz Jackrabbit Data ...
  • J2E - Jazz Jackrabbit 2 ...
  • J2H - Jazz Jackrabbit 2 High ...
  • J2I - Jazz 2 Internet Link File
  • J2I - Jazz Jackrabbit 2 ...
  • J2K - JPEG - 2000 JP2 File
  • J2K - JPEG 2000 Image
  • J2L - Jaxx Creation Station ...
  • J2L - Jazz Jackrabbit 2 Level ...
  • J2M - Jazz Jackrabbit 2 ...
  • J2S - Jazz Jackrabbit 2 ...
  • J2T - Jazz Jackrabbit 2 Tile ...
  • J2V - Jazz Jackrabbit 2 ...
  • J3D - Atari Jaguar 3D object ...
  • J62 - Ricoh camera format file
  • J6I - Ricoh Digital Camera ...
  • J6I - Ricoh Digital Camera ...
  • JA - Trainz Railroad ...
  • JA - IBM tools updater file
  • JACKSUM - Jacksum Fingerprint ( ...
  • JAD - Java Application ...
  • JAG - Atari Jaguar JPEG ...
  • JAK - Jack compressed archive ...
  • JAM - JamTracker module : Music
  • JAM - Jam messagebase - FTN ...
  • JAM - FTN Software Jam ...
  • JAM - Jam music score - Jam
  • JAM - JamTracker Music Module
  • JAM - E- mail
  • JAM - JAM Musical Score
  • JAM - Unknown Apple II File
  • JAM - Joaquim - Andrew - Mats ...
  • JAM - Leisure Suite Larry : ...
  • JAM - Misc
  • JAM - E- mail file
  • JAM - Image Microprose
  • JAMMIX - Jammix Enhacer Music ...
  • JAP - JAlbum album file
  • JAP - Fifa World Cup Game Data...
  • JAP - jalbum Project Header
  • JAR - Java Archive (a ...
  • JAS - Graphic (Generic)
  • JAV - Internet Program : JAVA ...
  • JAV - Java Source File
  • JAV - Java language source ...
  • JAVA - Source code (Java)
  • JAW - IchiTaro Web Japanese ...
  • JBA - Jabaco Source Code ...
  • JBB - JobEditor32 Binary Job ...
  • JBC - Jam byte - code hex file
  • JBC - BestCrypt file
  • JBC - BestCrypt Container ( ...
  • JBD - Datafile (SigmaScan)
  • JBF - Image browser file (...
  • JBG - JBIG File
  • JBG - Image JBIG 1-bit raster
  • JBI - JobEditor32 ASCII Job ...
  • JBI - Motoman Robot Job File
  • JBIG - Joint Bilevel Image Group
  • JBIG - JBIG raster image ...
  • JBIG - 1-bit raster image ...
  • JBK - Jot + Notes Backup File
  • JBK - Juno Backup File
  • JBL - Add-on : DOOM scene
  • JBL - Doom scene add-on file
  • JBP - DJ Jukebox Project
  • JBR - Paint Shop Pro Brushes ...
  • JBR - Paint Shop Pro Brush ( ...
  • JBS - Binary file with data ...
  • JBX - Project file (Project ...
  • JC - Watcom Source File
  • JC - FlashGet Intermediate ...
  • JC - Watcom src file
  • JC! - FlashGet incomplete ...
  • JC! - FlashGet File
  • JCAMP - Misc
  • JCB - CB- JCBrooke module / ...
  • JCB - CB- JCBrooke Song / ...
  • JCC - Japan Crossword File ( ...
  • JCC - Japan Crossword Dmitry ...
  • JCC - Code Crusader Project ...
  • JCD - FlashGet File
  • JCD - FlashGet Download ...
  • JCE - JWPce ( Glenn Rosenthal )
  • JCF - JAWS config file
  • JCF - JAWS for Windows ...
  • JCK - Liquid Motion JACK Scene...
  • JCL - IBM Job Control Language...
  • JCL - Job Control Language IBM

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • Web application firewall (WAF)

    A web application firewall (WAF) is a firewall that monitors, filters and blocks data packets as they travel to and from a ...

  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close