Browse Definitions :

Browse File Extensions by Alphabet

SIB - SJS

  • SIB - Sibelius Score
  • SIB - Sibelius file - Sibelius...
  • SIB - ShipInBottle compressed ...
  • SIB - Sheet music file
  • SIB - Sibelius music file
  • SIC - Quicken 2002 order file
  • SIC - Quicken 2002 Order File ...
  • SID - LizardTech MrSID photo ...
  • SID - ScanIt Document file
  • SID - LizardTech MrSID image ...
  • SID - Commodore 64 tunes and ...
  • SID - Real C64 SIDtune Header
  • SID - SIDtune Header
  • SID - C64 Sound Effects File
  • SID - Steam Game Data Backup ...
  • SID - MrSID file
  • SIF - Setup installation files...
  • SIG - PrintMaster graphics file
  • SIG - Signature file (PopMail)
  • SIG - Current program settings...
  • SIGN - Archive File
  • SIGN - Archive
  • SIGS - Mac File Type
  • SIK - Backup files (...
  • SIK - Backup files (Microsoft ...
  • SIL - Spameater Pro Import File
  • SIL - SmartInspect Log File ( ...
  • SILK - Same as SLK
  • SILO - MeshTV : Mesh file
  • SIM - PDP-10 Simula -67 ...
  • SIM - Autodesk storage ...
  • SIM - SAP Itutor tutorial ...
  • SIM - PC Finder 2002C file
  • SIM - Aurora image format
  • SIM - Stagecast Creator ...
  • SIM - ITI-SIM model file
  • SIM - Aurora Image
  • SIM - SAP Course Material (SAP)
  • SIM - VTune Performance ...
  • SIM - SIMPLE script source ( ...
  • SIM - PowerDVD File
  • SIM - Intel VTune performance ...
  • SIM - Steam Game Backup ...
  • SIM - Simon document file - ...
  • SIM - SimulationX Model File (...
  • SIMPLE - Simple Compiler Source ...
  • SIMPLE - cygnus share file
  • SIMS2PACK - The Sims Compacted ...
  • SIMS2PACK - Downloaded Sims 2 ...
  • SIMS3PACK - The Sims 3 Package File
  • SIMS3PACK - The Sims 3 game package ...
  • SIN - Rise of Nations Campaign...
  • SIN - Unknown Apple II File
  • SIN - SiN game file
  • SIP - Spider Player Icon Set ...
  • SIP - Scoptrax file
  • SIP - Powersim Studio ...
  • SIP - SCRIPT Internet Protocol...
  • SIR - BYU SIR
  • SIR - Bitmap image ( Solitaire...
  • SIR - SIR ( Scientific ...
  • SIR - BYU SIR image format
  • SIS - Nokia Phone Program
  • SIS - symbian file
  • SIS - EPOC / SymbianOS ...
  • SIS - Student Information ...
  • SIS - Symbian OS Installer ...
  • SIS - SiSoftware Sandra ...
  • SIS - Symbian installation file
  • SISHEN - Worm W32/ Sonebot -C
  • SISX - Symbian OS Installation ...
  • SISX - Symbian Series 3 ...
  • SIT - Compressed archive of ...
  • SIT! - Archive created by ...
  • SIT5 - StuffIt 5 archive format
  • SITD - Archive created by ...
  • SITE - Site specific file
  • SITE - GoLive Website Project ...
  • SITE - GoLive Website project ...
  • SITEMAP - ASP.NET site map
  • SITHQX - StuffIt Compressed ...
  • SITL - StuffIt library file
  • SITO - StuffIt Translator file
  • SITV - StuffIt Viewer file
  • SITX - Stuffit X Archive
  • SITX - Stuffit SITX Archive ...
  • SITX - StuffIt Compressed ...
  • SIX - SIXEL Graphic
  • SIX - DEC SIXEL Graphic bitmap...
  • SIX - Bitmap image (DEC LN03 +...
  • SIZ - Configuration file (...
  • SIZED - Gallery resized photo ...
  • SJ1 - SEGA SJ-1 DIGIO graphic ...
  • SJ1 - Image SEGA SJ-1 DIGIO
  • SJ_ - Midiprg Superjam ...
  • SJ_ - Superjam Compressed ...
  • SJF - Split Files Shell ...
  • SJF - Label Etching Matching ...
  • SJP - Sealed JPEG Image ( ...
  • SJP - 3WayPack (The Three - ...

-ADS BY GOOGLE

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • access control

    Access control is a security technique that regulates who or what can view or use resources in a computing environment.

  • ethical hacker

    An ethical hacker, also referred to as a white hat hacker, is an information security expert who systematically attempts to ...

  • two-factor authentication (2FA)

    Two-factor authentication (2FA), sometimes referred to as two-step verification or dual factor authentication, is a security ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • Flash Storage

    Flash storage is any type of drive, repository or system that uses flash memory to keep data for an extended period of time.

  • optical disc

    An optical disc is an electronic data storage medium that can be written to and read from using a low-powered laser beam.

  • RAID 0 (disk striping)

    RAID 0 (disk striping) is the process of dividing a body of data into blocks and spreading the data blocks across multiple ...

Close