Browse Definitions :

Browse File Extensions by Alphabet

K - KDE

  • K - Desktop Color Separation...
  • K - NRJ Live File
  • K - IRIS Editor Format File ...
  • K - Desktop Color Separation...
  • K00 - Tonline DB File
  • K00 - TO 09 Tonline DB File
  • K01 - Tonline DB File
  • K01 - Clarion DOS Database Key...
  • K02 - Tonline DB File
  • K02 - Clarion DOS Database Key...
  • K03 - Clarion DOS Database Key...
  • K03 - Tonline DB File
  • K04 - Clarion DOS Database Key...
  • K05 - Clarion DOS Database Key...
  • K06 - Clarion DOS Database Key...
  • K07 - Clarion DOS Database Key...
  • K08 - Clarion DOS Database Key...
  • K09 - Clarion DOS Database Key...
  • K1 - DataFlex index file
  • K10 - DataFlex index file
  • K11 - DataFlex index file
  • K12 - DataFlex index file
  • K13 - DataFlex index file
  • K14 - DataFlex index file
  • K15 - DataFlex ind
  • K1S - Wave Glib19 file
  • K2 - DataFlex index file
  • K2 - Storyboard File
  • K25 - Sample file (Kurzweil ...
  • K26 - Kurzweil K2600 File
  • K26 - Kurzweil 2600 sample file
  • K2A - Data - Prince of Persia ...
  • K3 - DataFlex index file
  • K3D - 3DS Macro Language ...
  • K3D - 3DS : Description of ...
  • K4 - DataFlex index file
  • K4E - karaoke 4 everyone file
  • K4E - Player / Editor File
  • K5 - DataFlex index file
  • K6 - DataFlex index file
  • K7 - DCMO6 emulator tape ...
  • K7 - DataFlex index file
  • K7 - Tape Image File Emulator
  • K8 - DataFlex index file
  • K9 - DataFlex index file
  • KA - Karma Asset
  • KA - Karma engine ( Unreal ) ...
  • KAF - Resurrection Matchmaker ...
  • KAHL - (MAC CREATOR CODE ) ...
  • KAHL - Think Pascal KAHL text
  • KAL - Sfkal Calender Kal_40 ...
  • KAL - KManager calibration ...
  • KAL - Hondata K- Manager ...
  • KAN - Kwalitan Annotation
  • KAP - Map Info Sea Chart
  • KAP - MapInfo sea chart
  • KAP - BSB Chart Image File
  • KAR - MIDI file (text+MIDI) (...
  • KAT - Katorzer ( music ...
  • KAU - KeyAudit Software Audit
  • KAW - Karma Workspace
  • KB - Keyboard script (Borland...
  • KB - Program source code (...
  • KBD - Keyboard mapping script ...
  • KBF - MyInfo Documnet / ...
  • KBM - Keyboard mapping script ...
  • KBN - TeamSpeak keybinding file
  • KBN - Key Binding File
  • KBP - Keirsey - Bates ...
  • KBR - Keirsey - Bates ...
  • KBR - The Drums Pro file
  • KBS - ACE Studio Model Builder
  • KBX - AVG Keyboard Shortcut ...
  • KBZ - Unknown file extension
  • KCC - KeywordConvert Keyword /...
  • KCF - KiSS Configuration File
  • KCF - Sony Ericsson Remote ...
  • KCF - Kiss palette file
  • KCH - K- Chess notation
  • KCH - KChess Notation File (...
  • KCL - Lisp source code (Kyoto ...
  • KCM - K? nyvCalc File (MM.sys ...
  • KCO - Kwalitan Codes
  • KCT - Kwalitan Categories
  • KDA - Nova Logic game file
  • KDB - KeePass Password ...
  • KDB - Kinetica data Header
  • KDB - Doobs database Header
  • KDB - KeePass password ...
  • KDB - kinodb file
  • KDB - Encrypted passwords ...
  • KDB - kusziDataBase Database ...
  • KDB - Doobs Database ( Kyuran ...
  • KDB - Keypass Database File
  • KDBX - KeePass password ...
  • KDBX - KeePass 2.x database ...
  • KDC - Image (Kodak ...
  • KDD - Unknown or unassigned ...

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • quantum key distribution (QKD)

    Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties.

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery (DR)

    Disaster recovery (DR) is an area of security planning that aims to protect an organization from the effects of significant ...

  • disaster recovery plan (DRP)

    A disaster recovery plan (DRP) is a documented, structured approach that describes how an organization can quickly resume work ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

SearchStorage

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • secondary storage

    Secondary storage is storage for noncritical data that will not be frequently accessed.

  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

Close