Browse Definitions :

Browse File Extensions by Alphabet

T - TAF

  • T - IRIS Spreadsheet ( ...
  • T - ReaGeniX Code Generator ...
  • T - Tape archive (TAR) (...
  • T - Source file (TADS)
  • T - Turing Source Code File
  • T - Paradox Database File
  • T - Microsoft Windows ...
  • T - Tester symbol file
  • T - Timber Compiler Source ...
  • T - TAR Tape Archive Without...
  • T - Tester symbol file (...
  • T - roff / troff unformatted...
  • T - Turing Programming ...
  • T - Alchemy chemical ...
  • T - terse Language Source ...
  • T - TADS source
  • T - Tads Source File
  • T$ - Modem Bitware Fax disk5 ...
  • T$2A - Mac File Type
  • T$AB - Mac File Type
  • T$M - AVG Temporary File (AVG ...
  • T$M - AVG Internet Security ...
  • T$M - Found in Windows ( Vista...
  • T00 - Unknown file extension
  • T01 - Tonline Netscape File
  • T01 - TAXWIZ Deluxe tax file
  • T01 - TaxCut 2001 Tax Return ...
  • T01 - TaxCut 2001 File
  • T02 - TaxCut 2002 tax return ...
  • T02 - TAXWIZ Deluxe Canadian ...
  • T02 - Tonline Netscape File
  • T02 - TaxCut 2002 File
  • T03 - TaxCut 2003 Tax Return ...
  • T03 - TaxCut 2003 File
  • T04 - TaxCut 2004 File
  • T04 - TaxCut 2004 Tax Return ...
  • T05 - TaxCut 2005 Tax Return ...
  • T05 - TaxCut 2005 Tax Return
  • T06 - TaxCut 2006 Tax Return
  • T06 - TaxCut 2006 Tax Return ...
  • T07 - TaxCut 2007 tax return ...
  • T07 - TaxCut Tax Return File
  • T08 - TaxCut 2008 Tax Return
  • T08 - TaxCut 2008 tax return ...
  • T09 - At Home 2009 Tax Return
  • T09 - At Home 2009 tax return ...
  • T1 - EARS Component File
  • T1 - Male MRI image format
  • T10 - IRIG 106 Data Transfer ...
  • T2 - Male MRI image format
  • T2 - Textease 2000 File
  • T2 - TrueType Font
  • T2 - Unknown Apple II File
  • T2B - Bookeen Cybook thumbnail...
  • T2K - Mirror Suite Image ( ...
  • T2K - Teach2000 document file
  • T2K - VISIA image file
  • T2KS - Teach2000 Exam Results ...
  • T2KT - Teach2000 Exam File (bas...
  • T2L - True2Life file format - ...
  • T2T - Modeling software file (...
  • T2W - Ntgraph Turbo Pascal file
  • T3 - Tarshare file
  • T3 - TADS 3 game
  • T3001 - TARGET 3001 ! Circuit ...
  • T32 - Drive Image5 file
  • T3D - Swift 3D 3D Graphic ( ...
  • T3D - Epic Unreal engine 3D ...
  • T3D - Unreal Engine 3D Brush ...
  • T3D - Game : FiFa2000 ...
  • T3D - TicTacTi Advertisement ...
  • T3M - Swift 3D Material ( ...
  • T3X - TYPO3 Compressed ...
  • T4 - TerrAlign alignment ...
  • T44 - Temporary file for ...
  • T4G - Tommy Software CAD Draw ...
  • T4G - Tscad4 file
  • T64 - Emulator tape image file...
  • T65 - PageMaker Template ( ...
  • T65 - Adobe PageMaker Template
  • T98 - Kiplinger Tax Cut File (...
  • TA0 - TaxACT Tax Year 2000 ...
  • TA1 - TaxACT Tax Year 2001 ...
  • TA2 - TaxACT Tax Year 2002 ...
  • TA3 - TaxACT Tax Year 2003 ...
  • TA4 - TaxACT Tax Year 2004 ...
  • TA5 - TaxACT Tax Year 2005 ...
  • TA6 - TaxACT Tax Year 2006 ...
  • TA8 - TaxACT Tax Year 1998 ...
  • TA9 - TaxACT Tax Year 1999 ...
  • TAAC - Sun TAAC bitmap image
  • TAAC - Sun TAAC File
  • TAB - Guitar Tablature file
  • TAB - Table file (MapInfo GIS)
  • TAC - JSim Time Activity Curve...
  • TACO - TacoSoft System File ( ...
  • TAD - TA Demo Saved Game Data ...

-ADS BY GOOGLE

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • buffer underflow

    Buffer underflow, also known as buffer underrun or buffer underwrite, is a threat to data that typically occurs when the ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

  • denial-of-service attack

    A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • secondary storage

    Secondary storage is storage for noncritical data that does not need to be frequently accessed.

  • Pure Storage

    Pure Storage is a provider of enterprise data flash storage solutions designed to substitute for electromechanical disk arrays.

  • yobibyte (YiB)

    A yobibyte (YiB) is a unit of measure used to describe data capacity as part of the binary system of measuring computing and ...

Close