Browse Definitions :

Browse File Extensions by Alphabet

K - KDE

  • K - NRJ Live File
  • K - Desktop Color Separation...
  • K - IRIS Editor Format File ...
  • K - Desktop Color Separation...
  • K00 - TO 09 Tonline DB File
  • K00 - Tonline DB File
  • K01 - Tonline DB File
  • K01 - Clarion DOS Database Key...
  • K02 - Clarion DOS Database Key...
  • K02 - Tonline DB File
  • K03 - Tonline DB File
  • K03 - Clarion DOS Database Key...
  • K04 - Clarion DOS Database Key...
  • K05 - Clarion DOS Database Key...
  • K06 - Clarion DOS Database Key...
  • K07 - Clarion DOS Database Key...
  • K08 - Clarion DOS Database Key...
  • K09 - Clarion DOS Database Key...
  • K1 - DataFlex index file
  • K10 - DataFlex index file
  • K11 - DataFlex index file
  • K12 - DataFlex index file
  • K13 - DataFlex index file
  • K14 - DataFlex index file
  • K15 - DataFlex ind
  • K1S - Wave Glib19 file
  • K2 - Storyboard File
  • K2 - DataFlex index file
  • K25 - Sample file (Kurzweil ...
  • K26 - Kurzweil 2600 sample file
  • K26 - Kurzweil K2600 File
  • K2A - Data - Prince of Persia ...
  • K3 - DataFlex index file
  • K3D - 3DS : Description of ...
  • K3D - 3DS Macro Language ...
  • K4 - DataFlex index file
  • K4E - Player / Editor File
  • K4E - karaoke 4 everyone file
  • K5 - DataFlex index file
  • K6 - DataFlex index file
  • K7 - DCMO6 emulator tape ...
  • K7 - DataFlex index file
  • K7 - Tape Image File Emulator
  • K8 - DataFlex index file
  • K9 - DataFlex index file
  • KA - Karma Asset
  • KA - Karma engine ( Unreal ) ...
  • KAF - Resurrection Matchmaker ...
  • KAHL - Think Pascal KAHL text
  • KAHL - (MAC CREATOR CODE ) ...
  • KAL - Sfkal Calender Kal_40 ...
  • KAL - KManager calibration ...
  • KAL - Hondata K- Manager ...
  • KAN - Kwalitan Annotation
  • KAP - Map Info Sea Chart
  • KAP - MapInfo sea chart
  • KAP - BSB Chart Image File
  • KAR - MIDI file (text+MIDI) (...
  • KAT - Katorzer ( music ...
  • KAU - KeyAudit Software Audit
  • KAW - Karma Workspace
  • KB - Keyboard script (Borland...
  • KB - Program source code (...
  • KBD - Keyboard mapping script ...
  • KBF - MyInfo Documnet / ...
  • KBM - Keyboard mapping script ...
  • KBN - TeamSpeak keybinding file
  • KBN - Key Binding File
  • KBP - Keirsey - Bates ...
  • KBR - Keirsey - Bates ...
  • KBR - The Drums Pro file
  • KBS - ACE Studio Model Builder
  • KBX - AVG Keyboard Shortcut ...
  • KBZ - Unknown file extension
  • KCC - KeywordConvert Keyword /...
  • KCF - KiSS Configuration File
  • KCF - Kiss palette file
  • KCF - Sony Ericsson Remote ...
  • KCH - K- Chess notation
  • KCH - KChess Notation File (...
  • KCL - Lisp source code (Kyoto ...
  • KCM - K? nyvCalc File (MM.sys ...
  • KCO - Kwalitan Codes
  • KCT - Kwalitan Categories
  • KDA - Nova Logic game file
  • KDB - KeePass Password ...
  • KDB - Keypass Database File
  • KDB - Doobs Database ( Kyuran ...
  • KDB - kusziDataBase Database ...
  • KDB - Encrypted passwords ...
  • KDB - kinodb file
  • KDB - Doobs database Header
  • KDB - Kinetica data Header
  • KDB - KeePass password ...
  • KDBX - KeePass 2.x database ...
  • KDBX - KeePass password ...
  • KDC - Image (Kodak ...
  • KDD - Unknown or unassigned ...

-ADS BY GOOGLE

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • buffer underflow

    Buffer underflow, also known as buffer underrun or buffer underwrite, is a threat to data that typically occurs when the ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

  • denial-of-service attack

    A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • secondary storage

    Secondary storage is storage for noncritical data that does not need to be frequently accessed.

  • Pure Storage

    Pure Storage is a provider of enterprise data flash storage solutions designed to substitute for electromechanical disk arrays.

  • yobibyte (YiB)

    A yobibyte (YiB) is a unit of measure used to describe data capacity as part of the binary system of measuring computing and ...

Close