Browse Definitions:
This Content Component encountered an error
Reference

Cheat Sheets and Quick Reference Guides

Quick Look-Up

Almost every file extension in the world
File extension quick look-up reference

ASCII symbols
How to type special ASCII symbols

CAT5 and other cabling categories
ANSI/EIA standards for categories of twisted pair cabling systems

Chat Abbreviations
Text message shortcuts and abbreviations


Color codes
216-color browser-safe palette table

Digital signal (DS) multiples
Standard digital transmission rates

Emoticons
Character symbols for expressing emotion in text messages

Error messages for Windows 2000
Quick look-up for Microsoft Windows 2000 error messages

Error messages for Windows XP Pro
Quick look-up for Microsoft Windows XP Pro error messages

How many bytes for...
Tables and other information about how much computer storage is required for a specific purpose

International System of Units
Chart listing values in International System of Units (SI) and the meter-kilogram-second (MKS) system

Kibi, mebi, gibi, tebi, pebi, and all that
Binary prefix multipliers used to clarify the differnce between decimal (power-of-10) and binary (power-of-2) numeration terms

Mathematical Symbols
This table contains mathematical symbols and links to definitions of what they represent.

OSI Reference Model Illustrated
Standard reference model for communication between two end users in a network

Our Favorite Cheat Sheets
Cheat sheet charts for programming and end-user applications like Word and Excel

RAID reference chart
Printable PDF chart documenting different levels of RAID

The speed of...
Data rates for end-user and backbone transmission technologies

Fast Guides
Fast guide to 802.11
IEEE 802 reference chart subdivided into 22 parts that cover the physical and data-link aspects of wireless networking

Fast Guide to Acronyms used in manufacturing
Acronyms are used in internal communications within a manufacturing environment.

Fast Guide to CD/DVD
Data transfer rates, rotation speeds and capabilities

Fast Guide to F# Programming
F# is a functional programming language that runs on Microsoft's Common Language Runtime and the .NET Framework.

Fast guide to iSeries SQL
Novice iSeries SQL tips and expert advice.

Fast Guide to IT Humor
Resource for trainers, teachers and presenters

Fast Guide to PL/SQL
PL/SQL is the procedural language extension to the structured query language (SQL).

Fast Guide to RAM
Types of Random Access Memory with explanations of how and where they're used

Fast Guide to Advanced SAN Management
Troubleshooting performance issues, strategies and management tasks.

Fast Guide to Storage Technologies
Evaluation chart for determining what kind of storage technology you need


This was last updated in May 2011

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

SearchCloudProvider

  • cloud ecosystem

    A cloud ecosystem is a complex system of interdependent components that all work together to enable cloud services.

  • cloud services

    Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional ...

  • uncloud (de-cloud)

    The term uncloud describes the action or process of removing applications and data from a cloud computing platform.

SearchSecurity

  • cyberextortion

    Cyberextortion is a crime involving an attack or threat of an attack coupled with a demand for money or some other response in ...

  • Cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

  • National Security Agency (NSA)

    The National Security Agency is the official U.S. cryptologic organization of the United States Intelligence Community under the ...

SearchHealthIT

  • Practice Fusion

    Practice Fusion Inc. is a San Francisco-based company that developed a free electronic health record (EHR) system available to ...

  • RHIA (Registered Health Information Administrator)

    An RHIA, or registered health information administrator, is a certified professional who oversees the creation and use of patient...

  • 21st Century Cures Act

    The 21st Century Cures Act is a wide-ranging healthcare bill that funds medical research and development, medical device ...

SearchDisasterRecovery

SearchStorage

  • Random Access Memory (RAM)

    Random Access Memory (RAM) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • floating gate transistor (FGT)

    A floating gate transistor (FGT) is a complementary metal-oxide semiconductor (CMOS) technology capable of holding an electrical ...

  • bad block

    A bad block is an area of storage media that is no longer reliable for storing and retrieving data because it has been physically...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close