Browse Definitions:

Browse File Extensions by Alphabet

WJF - WML

  • WJF - WinZip Job File
  • WJF - WinZip Job File ( WinZip...
  • WJF - WinZip Job File Header
  • WJR - ReGet Deluxe Data File
  • WK! - Lotus Spreadsheet File
  • WK! - 1-2-3 Speadsheet (IBM)
  • WK1 - Spreadsheet (Lotus 1-2-3...
  • WK2 - Lotus 2 Worksheet
  • WK2 - Lotus 1-2-3 Spreadsheet ...
  • WK3 - Spreadsheet (Lotus 1-2-3...
  • WK4 - Spreadsheet (Lotus 1-2-3...
  • WK5 - Lotus 5 Worksheet
  • WK5 - Lotus 1-2-3 Spreadsheet ...
  • WKB - Document file (...
  • WKE - Spreadsheet (Lotus 1-2-3...
  • WKF - VISI - Series CAD Work ...
  • WKF - Workbook Folders ...
  • WKF - KF Web Server Default ...
  • WKI - Lexmark PhotoCenter ...
  • WKI - Lotus 1-2-3 version 2 ...
  • WKI - Spreadsheet format - ...
  • WKO - RippedPro Workout ...
  • WKQ - Spreadsheet (Quattro Pro)
  • WKS - Spreadsheet (Symphony ...
  • WKS - Worksheet spreadsheet (...
  • WKS - Workspace file (Xlisp)
  • WKS - Spreadsheet file (...
  • WKSP - Workspace Macro Macro ( ...
  • WKU - Lotus 1-2-3 Spreadsheet
  • WKU - Lotus 1-2-3 Spreadsheet ...
  • WKZ - Wingz spreadsheet
  • WKZ - Compressed Spreadsheet
  • WL - WISCO Word Power Word ...
  • WL2 - Well Logger v2.x
  • WL3 - Wolfenstein 3D ...
  • WL6 - Wolfenstein 3D ( ...
  • WL6 - Wolfenstein 3D ...
  • WLB - WinLabel Ver. 1.0-2.02 ...
  • WLB - Wgt file
  • WLC - Microsoft Live Mesh file
  • WLC - WISCO Word Power word ...
  • WLD - REND386/AVRIL file
  • WLF - Upload file (Argo Upload...
  • WLG - DrWatson LoG file
  • WLG - Dr. Watson Log
  • WLI - Who Likes Puzzles ? ...
  • WLK - Graphics file (Virtus ...
  • WLL - Add-In file (Microsoft)
  • WLMP - Movie Maker ( beta ) ...
  • WLP - Who Likes Puzzles ? ...
  • WLR - VRML Page
  • WLR - Virtual Reality Modeling...
  • WLS - Web Log Storming Log ...
  • WLS - 602PC SUITE Worksheet ...
  • WLS - 602Tab document
  • WLT - WaveL Wavelet Compressed...
  • WLT - words of worship file
  • WLT - eWallet File
  • WLT - Subsembly Wallet ...
  • WLV - Web Link Validator File
  • WLX - Live Mesh Placeholder or...
  • WLX - Total / Windows ...
  • WLX - FileMaker Pro Plug -in
  • WLX - Total Commander Lister ...
  • WLZ - WinImage
  • WLZ - WinImage File
  • WM - Working Model Motion ...
  • WM - Working Model 2D data ...
  • WM - Windows Media A/V File (...
  • WM - Windows Media Audio or ...
  • WM2D - Working Model 2D data ...
  • WM2D - Working Model Motion ...
  • WM3 - Working Model 3D Document
  • WM3 - VisualNastran file
  • WM3 - MSC Nastran Desktop ...
  • WMA - Audio file in Microsoft ...
  • WMASCOT - Otaku Mascot Mascot ( ...
  • WMB - 3D GameStudio Map Entity...
  • WMC - Macro file (WordPerfect ...
  • WMC - Backup files for startup...
  • WMC - Text file (WordMARC)
  • WMD - Windows Media Player ...
  • WMD - Windows Media Download ...
  • WMD - WaveMaker design file
  • WMD - Windows Media Download ...
  • WME - Crazy Talk Windows Media...
  • WMF - Metafile (Microsoft ...
  • WMF2 - Embedded Bitmap Metafile
  • WMF_ - Mac File Type
  • WMG - SecureDoc Encrypted Hard...
  • WMK - Oc2. 316s cakit file

-ADS BY GOOGLE

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchSecurity

  • evil maid attack

    An evil maid attack is a security exploit that targets a computing device that has been shut down and left unattended.  An evil ...

  • Common Body of Knowledge (CBK)

    In security, Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional ...

  • rootkit

    A rootkit is a program or, more often, a collection of software tools that gives a threat actor remote access to and control over...

SearchHealthIT

  • value-based healthcare

    Value-based healthcare, also known as value-based care, is a payment model that rewards healthcare providers for providing ...

  • health informatics

    Health informatics is the practice of acquiring, studying and managing health data and applying medical concepts in conjunction ...

  • clinical trial

    A clinical trial, also known as a clinical research study, is a protocol to evaluate the effects and efficacy of experimental ...

SearchDisasterRecovery

  • crisis communication

    Crisis communication is a method of corresponding with people and organizations during a disruptive event to provide them with ...

  • Zerto

    Zerto is a storage software vendor that specializes in enterprise-class business continuity and disaster recovery in virtual and ...

  • crisis management plan (CMP)

    A crisis management plan (CMP) is a document that outlines the processes an organization will use to respond to a critical ...

SearchStorage

  • SSD write cycle

    An SSD write cycle is the process of programming data to a NAND flash memory chip in a solid-state storage device.

  • data storage

    Data storage is the collective methods and technologies that capture and retain digital information on electromagnetic, optical ...

  • hard disk

    A hard disk is part of a unit -- often called a disk drive, hard drive or hard disk drive -- that stores and provides relatively ...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close