Browse Definitions :

Browse File Extensions by Alphabet

U - UDS

  • U - Subsampled Raw YUV Image
  • U00 - Commodore C64 universal ...
  • U2 - Telelogic Tau UML Model
  • U2E - Unreal Game Translation
  • U2P - Telelogic Tau UML ...
  • U3D - Universal 3D Header
  • U3D - Model file format - ...
  • U3D - Universal 3D File
  • U3D - Ultimate3D Engine 3D ...
  • U3I - U3 Application ...
  • U3I - Sandisk Launchpad ...
  • U3P - U3 application Package ...
  • U3P - U3 Platform install file
  • U3P - U3 Smart Application
  • U4A - UnInstaller Archive
  • U8 - Raw Unsigned 8-Bit Audio...
  • U8 - Raw Unsigned 8-Bit Audio...
  • U96 - EasyZip Temporary File
  • U98 - USA 98 Streets & ...
  • U98 - Urdu 98 document file
  • UAE - UAE - WinUAE ...
  • UAE - WinUAE configuration file
  • UAP - User agent profile (Used...
  • UAS - PhotoImpact Backup / ...
  • UAX - Deus Ex
  • UAX - Unreal Audio Package
  • UAX - Rune
  • UAX - Unreal Audio File
  • UAX - Unreal / Unreal 2
  • UAX - Unified Application ...
  • UB - Raw unsigned byte (8-bit...
  • UBB - Basic Ubas File
  • UBD - Basic Ubas file
  • UBI - Animation UBISOFT
  • UBK - Embiid Reader eBook ( ...
  • UBM - Iphoto Mtwain Install ...
  • UBS - Tracesrv etc Bugslayer ...
  • UBS - Tracesrv Bugslayer ...
  • UC - Unreal Tournament code ...
  • UC - UnrealScript Class
  • UC - AutoCut Flash Firmware ...
  • UC2 - Compressed archive (...
  • UCC - National UCC Financing ...
  • UCCAPILOG - Microsoft UCC API Log ...
  • UCCAPILOG - Windows Live Messenger ...
  • UCD - Prosa / OM use case ...
  • UCD - Prosa / OM Use Case ...
  • UCE - UniCode extensions
  • UCE - Microsoft Windows XP ...
  • UCE - WINXP SYSTEM32 file
  • UCF - WebEx Universal ...
  • UCF - Epson personal settings ...
  • UCF - Xilinx Foundation User ...
  • UCF - WebEx Media File
  • UCF - Coordinate list file
  • UCG - ULEAD MediaStudio CG ...
  • UCI - UFS Explorer Backup File
  • UCI - Samsung YP-P2 Theme
  • UCM - Urban Chaos Game File
  • UCN - New compressed archive (...
  • UCR - MicroSim PCBoard ...
  • UCR - Pixel image file
  • UCS - Universal Classification...
  • UCS - Homeworld Localized ...
  • UCS - Universal Classification...
  • UCSETTINGS - Universal Converter ...
  • UCV - Universal Converter ...
  • UCX - Rational XDE (IBM)
  • UD - OmniPage User Dictionary
  • UD - AOL 4.0 ( America Online...
  • UD - Aol40 file
  • UDA - ZEMAX model data file
  • UDB - Off-line application ...
  • UDB - Windows 2000 Uniqueness ...
  • UDB - PINO 3-Server File
  • UDB - Microsoft Works file
  • UDC - Fh5 Us English file
  • UDC - Systems Management ...
  • UDC - Acrobat Spelling File ( ...
  • UDC - Adobe user dictionary ...
  • UDCX - Universal Data ...
  • UDD - OllyDbg Module Info ...
  • UDEB - Debian Package File
  • UDF - Image filter (...
  • UDF - User-Defined Function (...
  • UDI - Dazzle DVD complete
  • UDI - Corel Graphics draw ...
  • UDI - Corel Graphics10 Draw ...
  • UDIF - Apple Mac OS X Universal...
  • UDIWWW - bookmark data - UdiWWW
  • UDL - ADONIS User Export From ...
  • UDL - Microsoft Data Link file
  • UDL - Data Link ( Microsoft ...
  • UDM - MapView User - Defined ...
  • UDO - Data - Moray User ...
  • UDO - 3D Graphic
  • UDOG - Apple Browser Launcher
  • UDP - User Datagram Protocol
  • UDP - Corel VideoStudio scene ...

-ADS BY GOOGLE

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • buffer underflow

    Buffer underflow, also known as buffer underrun or buffer underwrite, is a threat to data that typically occurs when the ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

  • denial-of-service attack

    A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • secondary storage

    Secondary storage is storage for noncritical data that does not need to be frequently accessed.

  • Pure Storage

    Pure Storage is a provider of enterprise data flash storage solutions designed to substitute for electromechanical disk arrays.

  • yobibyte (YiB)

    A yobibyte (YiB) is a unit of measure used to describe data capacity as part of the binary system of measuring computing and ...

Close