Browse Definitions :

Browse File Extensions by Alphabet

S - SAB

  • S - Assembler source code (...
  • S - Source code file (Scheme)
  • S!D - Shuffle ! Direct Video ...
  • S$$ - Sprint temporary sort ...
  • S$$ - Temporary sort file
  • S01 - WordPerfect Distribution...
  • S01 - Microstation file
  • S01 - MicroStation ...
  • S01 - ZipSplitter Part 2 ...
  • S02 - ZipSplitter Part 3 ...
  • S02 - WordPerfect Distribution...
  • S02 - Corel WordPerfect ...
  • S03 - WordPerfect S03 ...
  • S03 - Corel WordPerfect ...
  • S08 - TaxCalc Tax File ( ...
  • S1 - Free Pascal Assembler ...
  • S11 - Sealed MPEG -1 Video ( ...
  • S12 - SPIRIT Drawing File (STI...
  • S14 - Sealed MPEG -4 Video ( ...
  • S17 - SubSeven Saved Settings ...
  • S19 - Motorola S19 File Record
  • S19 - Motorola ASCII format of...
  • S19 - Motorola EEPROM ...
  • S1A - Sealed Acrobat Document ...
  • S1E - Sealed Excel Worksheet (...
  • S1G - Sealed GIF Image ( ...
  • S1H - Sealed HTML Document ( ...
  • S1J - Sealed file
  • S1M - Sealed MP3 Audio ( ...
  • S1N - Sealed PNG Graphic ( ...
  • S1P - Sealed PowerPoint ...
  • S1Q - Sealed QuickTime Movie (...
  • S1V - Yamaha EX- series ...
  • S1W - Sealed Word Document ( ...
  • S1Y - Yamaha EX- series ...
  • S2 - Stranded II Mapfile ...
  • S2 - Stranded II map file
  • S2 - Motorola S- record format
  • S28 - Genesis or Sega32X ROM ...
  • S2K - Subtitle file
  • S2M - Stronghold 2 Map File
  • S2MA - Starcraft 2 map file
  • S2MV - Starcraft 2 map preview ...
  • S2P - Sonnet File
  • S2P - Sonnet S- device ...
  • S2R - RegMagiK Registry Editor...
  • S2S - SRT2SUP native subtitle ...
  • S2S - Spike2 Script ( ...
  • S2WDH - HP Share to Web Upload ...
  • S2Z - S2Games Savage game ...
  • S3 - Motorola S- record format
  • S3D - Shape3d Surfboard Design...
  • S3D - Philips 3D Solutions 3D ...
  • S3D - Micrografx Simply 3D ...
  • S3D - EverQuest ( Sony )
  • S3DF - Sealed CAD File ( ...
  • S3I - Instrument file (Scream ...
  • S3M - 16 channel music file (...
  • S3P - AKAI MESA II/PC S- ...
  • S3R - Rtl Ski Jump Replay File
  • S3Z - ScreamTracker v3 File
  • S3Z - Amiga and Pc Tracker ...
  • S4T - S4/ TEXT and Tagless ...
  • S57 - vector image ( ' ...
  • S5D - Step5 Program ( Siemens ...
  • S6BN - Mac File Type
  • S7 - Sibelius Music Notation ...
  • S70 - Xilinx Libraries Library...
  • S7I - Seed7 library / include ...
  • S7P - SubSeven Trojan File
  • S7Z - 7-Zip Compressed File ( ...
  • S7Z - 7-zip compressed file
  • S8 - Simul8 Simulation
  • S85 - SABRE Chart or Graph ( ...
  • S85 - Sabre Airline Solutions ...
  • S8BN - Mac File Type
  • SA - UNIX stub library
  • SA - System Sa51swe file
  • SA1 - Panasonic AAC Data ...
  • SA1 - Audio Encryption File
  • SA2 - Time Stamp project grid ...
  • SA2 - Surprise ! AdLib Tracker...
  • SA2 - Suprise ! adlib tracker ...
  • SA2B - A2B Player Stream ( ...
  • SA4 - STABCAL ( stability ...
  • SA5 - street atlas document ...
  • SA5 - SecretAgent archive file
  • SA6 - Street Atlas Ver. 6 Map ...
  • SA7 - Street Atlas Ver 7 Map ...
  • SA8 - Street Atlas Ver 8 Map ...
  • SA9 - Hue and Cry Photoshop ...
  • SA9 - Hue and Cry Photoshop / ...
  • SAA - SecretAgent Auto - ...
  • SAB - ALSong album file
  • SAB - ACIS Solid Binary File
  • SAB - Saber file - Star Wars :...
  • SAB - NVision 3D Scanner File
  • SAB - 3D ACIS binary file
  • SAB - ModelMaker File
  • SAB2 - NVision 3D Scanner File

-ADS BY GOOGLE

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • buffer underflow

    Buffer underflow, also known as buffer underrun or buffer underwrite, is a threat to data that typically occurs when the ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

  • denial-of-service attack

    A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • secondary storage

    Secondary storage is storage for noncritical data that does not need to be frequently accessed.

  • Pure Storage

    Pure Storage is a provider of enterprise data flash storage solutions designed to substitute for electromechanical disk arrays.

  • yobibyte (YiB)

    A yobibyte (YiB) is a unit of measure used to describe data capacity as part of the binary system of measuring computing and ...

Close