Browse Definitions:

Browse File Extensions by Alphabet

PMA - PNC

  • PMA - Microsoft Windows ...
  • PMA - MSX Computers Archive ...
  • PMA - Windows Performance ...
  • PMA - Payroll Mate file
  • PMA - Pegasus Mail Version 2.2...
  • PMAP - Pocket Mindmap Mindmap ...
  • PMAPZ - Pocket Mindmap ...
  • PMB - Polar Uplink Tool Bitmap...
  • PMB - Picture Bitmap /tbv
  • PMB - Payroll Mate 2008 ( ...
  • PMB - Pegasus Mail addressbook...
  • PMC - Graphics (A4TECH Scanner)
  • PMD - Adobe PageMaker 7.x file
  • PMDH - Mac File Type
  • PME - Plazmic Media Engine File
  • PME - Pegasus Mail Filter Rule...
  • PME - Pixela Digital Picture (...
  • PMET - Spore Creature Metadata ...
  • PMF - Pyrism Map File (Two ...
  • PMF - Pegasus Mail attachement...
  • PMF - AppMind Process ...
  • PMF - ArcReader map file
  • PMF - Payroll Mate 2008 ( ...
  • PMF - Playstation Movie Format...
  • PMG - Paint Magic image format
  • PMG - Photomerge Composition ...
  • PMG - Paint Magic
  • PMG - Pagemaker Group File (...
  • PMG - Adobe Pagemaker group ...
  • PMG - Pegasus Mail folder index
  • PMH - Pegasus Mail Phonemic ...
  • PMI - OS/2 : Program manager ...
  • PMI - Pegasus Mail message ...
  • PMI - Pegasus Mail Message ...
  • PMJ - 3D Digital Scanner File
  • PMJ - Pegasus Mail WinPMail ...
  • PMJX - 3D Digital Scanner File
  • PMK - Project makefile
  • PMK - Pegasus Mail Keyboard ...
  • PML - Windows Performance ...
  • PML - Adobe Pagemaker library ...
  • PML - PageMaker Library ( ...
  • PML - PADGen Program ...
  • PML - Pegasus Mail ...
  • PML - Process Monitor log file
  • PML - PADGen program ...
  • PML - Spin Promela Source Code...
  • PMM - Program file (Amaris BTX...
  • PMN - Pegasus Mail Annotation ...
  • PMO - Print Master Gold Text
  • PMO - Pegasus Mail saved ...
  • PMO - Broderbund Print Meta ...
  • PMP - Pegasus Mail Notepad ...
  • PMP - Video
  • PMP - Sony DSC-F1 Cyber - shot
  • PMP - AutoCAD R2000 Plotter ...
  • PMP - Photomorph Project
  • PMP - Soldat Map Maker / ...
  • PMP - PhotoMorph Project - ...
  • PMP - PHPMaker project file
  • PMP - AutoCAD Plot Model ...
  • PMP - ThumbsPlus graphics file
  • PMP - VideoCraft GIF Animator ...
  • PMP - PocketMusic plugin file
  • PMP - Project Manager Pro ...
  • PMP - PowerMedia Color Palette
  • PMPPKG - Pegasus Mail Pegasus ...
  • PMQ - Pegasus Mail Mail Filter...
  • PMR - Microsoft Windows ...
  • PMR - Pegasus Mail address book
  • PMR - Windows Performance ...
  • PMR - PhotoModeler project ...
  • PMR - PhotoModeler Project (...
  • PMS - AliceSoft PMS Bitmap
  • PMS - Pegasus Mail signature
  • PMS - Personal Media Suite ...
  • PMS - Password Master ...
  • PMT - Pegasus Mail tray file
  • PMT - Technics keyboard panel ...
  • PMT - Adobe PageMaker template
  • PMT - PhotoModeler Lite ...
  • PMT - PageMaker Template ( ...
  • PMU - Pegasus Mail keyboard ...
  • PMV - Ashampoo PlanMaker ...
  • PMV - Pegasus Mail filter rules
  • PMW - Windows NT Performance ...
  • PMW - Windows Performance ...
  • PMW - Pegasus Mail Draft ...
  • PMX - E- mail Examiner file
  • PMX - Pegasus Mail Final ...
  • PMX - Adobe PageMaker document...
  • PMZ - Pegasus Mail Pmail Scrap...
  • PN2 - International Systems ...
  • PN3 - Printer device driver (...
  • PNA - TomTom PNA map info ...
  • PNA - Panoramide Java 3D ...
  • PNA - PhatNoise Media / Music ...
  • PNA - TomTom Navigator PNA map...
  • PNA - PhatNoise Audio File
  • PNAGENT - Program Neighborhood ...

-ADS BY GOOGLE

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchSecurity

  • evil maid attack

    An evil maid attack is a security exploit that targets a computing device that has been shut down and left unattended.  An evil ...

  • Common Body of Knowledge (CBK)

    In security, Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional ...

  • rootkit

    A rootkit is a program or, more often, a collection of software tools that gives a threat actor remote access to and control over...

SearchHealthIT

  • value-based healthcare

    Value-based healthcare, also known as value-based care, is a payment model that rewards healthcare providers for providing ...

  • health informatics

    Health informatics is the practice of acquiring, studying and managing health data and applying medical concepts in conjunction ...

  • clinical trial

    A clinical trial, also known as a clinical research study, is a protocol to evaluate the effects and efficacy of experimental ...

SearchDisasterRecovery

  • crisis communication

    Crisis communication is a method of corresponding with people and organizations during a disruptive event to provide them with ...

  • Zerto

    Zerto is a storage software vendor that specializes in enterprise-class business continuity and disaster recovery in virtual and ...

  • crisis management plan (CMP)

    A crisis management plan (CMP) is a document that outlines the processes an organization will use to respond to a critical ...

SearchStorage

  • SSD write cycle

    An SSD write cycle is the process of programming data to a NAND flash memory chip in a solid-state storage device.

  • data storage

    Data storage is the collective methods and technologies that capture and retain digital information on electromagnetic, optical ...

  • hard disk

    A hard disk is part of a unit -- often called a disk drive, hard drive or hard disk drive -- that stores and provides relatively ...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close