Browse Definitions :

Browse File Extensions by Alphabet

T - TAF

  • T - IRIS Spreadsheet ( ...
  • T - ReaGeniX Code Generator ...
  • T - Source file (TADS)
  • T - Tape archive (TAR) (...
  • T - Alchemy chemical ...
  • T - Microsoft Windows ...
  • T - Tester symbol file
  • T - Turing Programming ...
  • T - TADS source
  • T - Turing Source Code File
  • T - Paradox Database File
  • T - Tester symbol file (...
  • T - roff / troff unformatted...
  • T - terse Language Source ...
  • T - Tads Source File
  • T - TAR Tape Archive Without...
  • T - Timber Compiler Source ...
  • T$ - Modem Bitware Fax disk5 ...
  • T$2A - Mac File Type
  • T$AB - Mac File Type
  • T$M - AVG Internet Security ...
  • T$M - AVG Temporary File (AVG ...
  • T$M - Found in Windows ( Vista...
  • T00 - Unknown file extension
  • T01 - TaxCut 2001 Tax Return ...
  • T01 - TaxCut 2001 File
  • T01 - Tonline Netscape File
  • T01 - TAXWIZ Deluxe tax file
  • T02 - TaxCut 2002 tax return ...
  • T02 - Tonline Netscape File
  • T02 - TAXWIZ Deluxe Canadian ...
  • T02 - TaxCut 2002 File
  • T03 - TaxCut 2003 Tax Return ...
  • T03 - TaxCut 2003 File
  • T04 - TaxCut 2004 File
  • T04 - TaxCut 2004 Tax Return ...
  • T05 - TaxCut 2005 Tax Return ...
  • T05 - TaxCut 2005 Tax Return
  • T06 - TaxCut 2006 Tax Return ...
  • T06 - TaxCut 2006 Tax Return
  • T07 - TaxCut 2007 tax return ...
  • T07 - TaxCut Tax Return File
  • T08 - TaxCut 2008 tax return ...
  • T08 - TaxCut 2008 Tax Return
  • T09 - At Home 2009 Tax Return
  • T09 - At Home 2009 tax return ...
  • T1 - EARS Component File
  • T1 - Male MRI image format
  • T10 - IRIG 106 Data Transfer ...
  • T2 - Male MRI image format
  • T2 - Textease 2000 File
  • T2 - TrueType Font
  • T2 - Unknown Apple II File
  • T2B - Bookeen Cybook thumbnail...
  • T2K - Mirror Suite Image ( ...
  • T2K - Teach2000 document file
  • T2K - VISIA image file
  • T2KS - Teach2000 Exam Results ...
  • T2KT - Teach2000 Exam File (bas...
  • T2L - True2Life file format - ...
  • T2T - Modeling software file (...
  • T2W - Ntgraph Turbo Pascal file
  • T3 - TADS 3 game
  • T3 - Tarshare file
  • T3001 - TARGET 3001 ! Circuit ...
  • T32 - Drive Image5 file
  • T3D - Unreal Engine 3D Brush ...
  • T3D - Swift 3D 3D Graphic ( ...
  • T3D - TicTacTi Advertisement ...
  • T3D - Epic Unreal engine 3D ...
  • T3D - Game : FiFa2000 ...
  • T3M - Swift 3D Material ( ...
  • T3X - TYPO3 Compressed ...
  • T4 - TerrAlign alignment ...
  • T44 - Temporary file for ...
  • T4G - Tommy Software CAD Draw ...
  • T4G - Tscad4 file
  • T64 - Emulator tape image file...
  • T65 - PageMaker Template ( ...
  • T65 - Adobe PageMaker Template
  • T98 - Kiplinger Tax Cut File (...
  • TA0 - TaxACT Tax Year 2000 ...
  • TA1 - TaxACT Tax Year 2001 ...
  • TA2 - TaxACT Tax Year 2002 ...
  • TA3 - TaxACT Tax Year 2003 ...
  • TA4 - TaxACT Tax Year 2004 ...
  • TA5 - TaxACT Tax Year 2005 ...
  • TA6 - TaxACT Tax Year 2006 ...
  • TA8 - TaxACT Tax Year 1998 ...
  • TA9 - TaxACT Tax Year 1999 ...
  • TAAC - Sun TAAC File
  • TAAC - Sun TAAC bitmap image
  • TAB - Guitar Tablature file
  • TAB - Table file (MapInfo GIS)
  • TAC - JSim Time Activity Curve...
  • TACO - TacoSoft System File ( ...
  • TAD - TA Demo Saved Game Data ...

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • Web application firewall (WAF)

    A web application firewall (WAF) is a firewall that monitors, filters and blocks data packets as they travel to and from a ...

  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close