Browse Definitions :

Browse File Extensions by Alphabet

C - C4V

  • C - C code
  • C - V Cvip file
  • C - Compressed unix file ...
  • C - C programming language ...
  • C - Origin C Program File ( ...
  • C - Site configuration for ...
  • C - ADS Source Code ( ...
  • C - C/C++ Source Code File
  • C - Site configuration for ...
  • C - Unix file archive - ...
  • C - Check Point Site ...
  • C - Desktop color separation...
  • C - ANSI C script
  • C!_ - Audio Utility Midimach ...
  • C-- - Sphinx C-- Source code
  • C00 - Ventura Publisher Print ...
  • C01 - Typhoon wave
  • C01 - C03 ETC Split Compressed...
  • C02 - (C02-C38) Driveimage Ace...
  • C02 - Driveimage ace file
  • C02 - WinAce Compressed File ...
  • C03 - Split Multi - volume ACE...
  • C04 - Driveimage ace file
  • C04 - WinAce Compressed File ...
  • C05 - Driveimage ace file
  • C05 - WinAce Compressed File ...
  • C06 - WinAce Compressed File ...
  • C06 - Driveimage ace file
  • C07 - WinAce Compressed File ...
  • C07 - Driveimage ace file
  • C08 - Split Multi - volume ACE...
  • C08 - Driveimage ace file
  • C09 - Driveimage ace file
  • C09 - WinAce Compressed File ...
  • C1 - Pov-Ray for Windows 3.x ...
  • C10 - WinAce Compressed File ...
  • C10 - Driveimage ace file
  • C10 - Split Multi - volume ACE...
  • C10 - IRIG 106 original ...
  • C13 - Charlie Packer
  • C18 - Dassault Systemes Catia ...
  • C1S - Capture One Photo Cache ...
  • C2 - Pov-Ray for Windows 3.x ...
  • C2C - CopyToDVD Project File (...
  • C2D - IsoBuster CD/DVD Image ...
  • C2D - WinOnCD Disc Image
  • C2E - Chinese dictionary file ...
  • C2I - Driver file
  • C2I - Tt File
  • C2L - Cequadrat Winoncd file
  • C2R - Windows Media Center ...
  • C2R - Microsoft Windows Media ...
  • C2X - Winoncd file
  • C3 - Pov-ray for Windows v3.1...
  • C3 - 3D model Header
  • C3 - 3D model file
  • C39 - (C39-C56) Quicken Ace ...
  • C39 - Quicken ace file
  • C3D - Coordinate 3D
  • C3D - Micrografx
  • C3D - 3D biomechanics data ...
  • C3D - Cult3D file
  • C3D - Chem3D chemical file
  • C3D1 - Chem3D Cartesian 1 ...
  • C3D1 - Chem3D Cartesian 1 ...
  • C3D2 - Chem3D Cartesian 2 ...
  • C3D2 - Chem3D Cartesian 2 ...
  • C3E - CYPE related file
  • C3T - Chem3D Chemical Template...
  • C3XML - Chem3D XML format
  • C4 - Edmics image format
  • C4 - Unknown Apple II File
  • C4 - JEDMICS Bitmap Image File
  • C4 - JEDMICS Image File
  • C40 - Quicken ace file
  • C41 - Quicken ace file
  • C42 - Quicken ace file
  • C43 - Quicken ace file
  • C44 - Quicken ace file
  • C45 - Quicken ace file
  • C46 - Quicken ace file
  • C47 - Quicken ace file
  • C48 - Quicken ace file
  • C49 - Quicken ace file
  • C4D - Clonk Object Definition ...
  • C4D - Game object definition
  • C4D - CINEMA 4D model ( ...
  • C4D - Cinema 4D 3D Model ( ...
  • C4D - Maxon Cinema 4D v4.x ...
  • C4F - Game round file
  • C4F - Clonk Round File ( ...
  • C4G - Clonk System File ( ...
  • C4I - Clonk object info file
  • C4M - Clonk material file
  • C4P - Clonk Player File ( ...
  • C4P - Game player file
  • C4Q - Clonk queue file
  • C4S - Game scenario file
  • C4S - Clonk Scenario ( RedWolf...

-ADS BY GOOGLE

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • buffer underflow

    Buffer underflow, also known as buffer underrun or buffer underwrite, is a threat to data that typically occurs when the ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

  • denial-of-service attack

    A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • secondary storage

    Secondary storage is storage for noncritical data that does not need to be frequently accessed.

  • Pure Storage

    Pure Storage is a provider of enterprise data flash storage solutions designed to substitute for electromechanical disk arrays.

  • yobibyte (YiB)

    A yobibyte (YiB) is a unit of measure used to describe data capacity as part of the binary system of measuring computing and ...

Close