Browse Definitions:

Browse File Extensions by Alphabet

NIM - NOD

  • NIM - Game File
  • NIM - Nokia Phone Game File ( ...
  • NIMBLEGEN - ArrayScribe = NimbleGen ...
  • NINDEX - Newsgroup Index File
  • NIP - Microsoft DRM ( Digital ...
  • NIP - Network interface plug -...
  • NIS - Homeworld Non- ...
  • NISI - (MAC CREATOR CODE ) ...
  • NIST - Audio (NIST Sphere)
  • NIT - ArcView INFO Table ...
  • NITF - National Imagery ...
  • NITF - National Imagery ...
  • NIV - TheWord & Bible ...
  • NIX - REF file
  • NIX - Rational XDE (IBM)
  • NJB - Nikon Photo Index File
  • NJB - Nikon Digital SLR Camera...
  • NJI - Nero BackItUp job file
  • NJP - njPipes Compiler File
  • NJT - Nero BackItUp job ...
  • NK2 - Microsoft Outlook ...
  • NK2 - Outlook AutoComplete ...
  • NK2 - Outlook 2002 Nickname ...
  • NK2 - e- mail address ...
  • NKC - ECG Viewer ( Nihon ...
  • NKI - KONTAKT Instrument File
  • NKI - Native Instruments ...
  • NKJV - TheWord & Bible ...
  • NKM - KONTAKT ( Native ...
  • NKS - Archive file
  • NKS - Native Instruments ...
  • NKY - NUMROTOplus Keyfile (NUM...
  • NL - Norton Desktop Icon ...
  • NL - Unknown Apple II File
  • NLB - Data (Oracle 7)
  • NLC - NeroLINUX Compilation ( ...
  • NLD - WINXP SYSTEM32 file
  • NLD - ATI Radeon Video Driver
  • NLF - MicroSim PCBoard Netlist...
  • NLM - Loadable Module (Netware)
  • NLO - NetG Skill Builder file
  • NLP - Newsletter Profi 2001 ...
  • NLP - Newsletter Profi 2001
  • NLR - NLREG Nonlinear ...
  • NLS - National Language ...
  • NLTRACK - NoLimits Roller Coaster ...
  • NLTRACK - NoLimits Rollercoaster ...
  • NLU - E-Mail Trigger file (...
  • NLV - Nikon Capture LCHE ...
  • NLX - Form (FormWorx 3.0)
  • NM - RM Number Magic Data ...
  • NM2 - Navitel 3.1 Map Header
  • NM2 - Navitel Navigator Ver ...
  • NMA - Normalised Extinction ...
  • NMA - NMEA GPS log data Header
  • NMA - GPS Log Data file
  • NMAT - NeoEngine ( Reality Rift...
  • NMD - SwordSearcher File
  • NMD - Nero miniDVD Compilation...
  • NMDAR - Connectivity Memory ...
  • NMEA - GPS Log Data file
  • NMF - Nuzzler Basic Message ...
  • NMF - Nuzzler Basic Rule ...
  • NMF - Lightwave Narmal map file
  • NMF - Note - Mate Question Set...
  • NMF - NICE Media Player audio ...
  • NMGF - 2D Graphic
  • NMI - SwordSearcher File
  • NMIND - NovaMind Mind Map File
  • NMK - Oc2. 316s cakit file
  • NML - NewsMail 2.0 E- mail ...
  • NML - News Markup Language file
  • NML - NEURO ONE Static Neuron ...
  • NML - NML Language Source File...
  • NML. - nugthat Compiler Source ...
  • NMO - Virtools behavioral ...
  • NMP - Neopaint Mask image ...
  • NMS - Virtools Graphical ...
  • NMS - Unknown Apple II File
  • NMS - Note - Mate save file
  • NMS - Numega Softice 's Loader...
  • NMU - Unknown file extension
  • NMV - Nintendulator Movie ...
  • NMW - Netmeeting T126 ...
  • NMW - Microsoft NetMeeting ...
  • NN - Nero CD File List
  • NNB - ANNI Batch File
  • NNG - Unknown file extension
  • NNI - ANNI Archive
  • NNN - Arj archive volumes up ...
  • NNN - News about smth with ext...
  • NNP - ANNI Portfolio File
  • NNR - Nikon Capture Noise ...
  • NNVS - NextNine VNC Player ...
  • NOA - Nancy Codec video Header
  • NOA - Cell Phone Video Clip
  • NOB - Vampire : La Mascarade ...
  • NOB - Silver game data and ...
  • NOB - VersaPro Word Exchange ...
  • NOD - File (Netobject Fusion)

-ADS BY GOOGLE

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchSecurity

  • evil maid attack

    An evil maid attack is a security exploit that targets a computing device that has been shut down and left unattended.  An evil ...

  • Common Body of Knowledge (CBK)

    In security, Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional ...

  • rootkit

    A rootkit is a program or, more often, a collection of software tools that gives a threat actor remote access to and control over...

SearchHealthIT

  • value-based healthcare

    Value-based healthcare, also known as value-based care, is a payment model that rewards healthcare providers for providing ...

  • health informatics

    Health informatics is the practice of acquiring, studying and managing health data and applying medical concepts in conjunction ...

  • clinical trial

    A clinical trial, also known as a clinical research study, is a protocol to evaluate the effects and efficacy of experimental ...

SearchDisasterRecovery

  • crisis communication

    Crisis communication is a method of corresponding with people and organizations during a disruptive event to provide them with ...

  • Zerto

    Zerto is a storage software vendor that specializes in enterprise-class business continuity and disaster recovery in virtual and ...

  • crisis management plan (CMP)

    A crisis management plan (CMP) is a document that outlines the processes an organization will use to respond to a critical ...

SearchStorage

  • SSD write cycle

    An SSD write cycle is the process of programming data to a NAND flash memory chip in a solid-state storage device.

  • data storage

    Data storage is the collective methods and technologies that capture and retain digital information on electromagnetic, optical ...

  • hard disk

    A hard disk is part of a unit -- often called a disk drive, hard drive or hard disk drive -- that stores and provides relatively ...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close