Browse Definitions :

Browse File Extensions by Alphabet

V - VBD

  • V - Main image input file (...
  • V - Consistency check ...
  • V$$ - Cheyenne antivirus ...
  • V00 - 3D Ultrasound Image
  • V00 - Krez 3D ultrasound image...
  • V01 - Genesis 2000 ( Genesis ...
  • V11O - ACDSee offline media file
  • V11P - ACDSee photo disc file
  • V11PF - ACDSee private folder
  • V12 - All The Right Type ...
  • V18 - SYNETSIM Source Code
  • V2 - Microsoft Live Messenger...
  • V22 - CWCDATA file
  • V2A - TI Voyage 200 Figure ( ...
  • V2B - Texas Instruments TI ...
  • V2C - TI Voyage 200 Data ( ...
  • V2D - CAD Design File
  • V2D - TI Voyage 200 GDB ( ...
  • V2D - VersaCAD file
  • V2E - TI Voyage 200 Expression...
  • V2F - TI Voyage 200 Function (...
  • V2G - TI Voyage 200 Group ( ...
  • V2I - Norton Ghost Virtual ...
  • V2I - Ghost Disk Drive Image (...
  • V2I - TI Voyage 200 Bitmap ( ...
  • V2K - TI Voyage 200 ...
  • V2L - TI Voyage 200 List ( ...
  • V2M - TI Voyage 200 Matrix ( ...
  • V2N - TI Voyage 200 ...
  • V2P - TI Voyage 200 Calculator...
  • V2Q - TI Voyage 200 ...
  • V2R - TI Voyage 200 ...
  • V2S - TI Voyage 200 String ( ...
  • V2T - TI Voyage 200 Text ( ...
  • V2U - TI Voyage 200 OS Upgrade...
  • V2X - TI Voyage 200 Macro ( ...
  • V2Y - Texas Instruments TI ...
  • V2Z - TI Voyage 200 Program / ...
  • V3D - Stratum Samples Models ...
  • V3D - Visual3D.NET Data File
  • V3D - Vecta3D Model File
  • V3O - Emergency 3D model Header
  • V3O - 3D model file
  • V3S - Voice Master Key Sound
  • V44 - CWCDATA file
  • V4E - Microsoft Windows Script...
  • V4S - Microsoft Windows Script...
  • V56 - 56k Modem Patch
  • V5D - Vis5d Dataset Object
  • V5D - Dataset UNIX Chemical
  • V64 - Nintento 64 emulation ...
  • V64 - Nintento 64 Emulation ...
  • V64 - Nintendo 64 ROM Dump
  • V8 - 8-bit audio file (CoVox)
  • VA - Unknown Apple II File
  • VAB - Album Visualb
  • VAB - Playstation Wave Bank ...
  • VAC - Oc2. 316s Cakit File
  • VAC - IMail Server Vacation ...
  • VAD - Vadera Enterprises PHP ...
  • VAD - Mapper Variant File
  • VAF - DVD2SVCD Temporary File
  • VAF - Visual Studio Common ...
  • VAF - Microsoft Visual Studio ...
  • VAG - PlayStation ADPCM Sound ...
  • VAG - Sony Playstation /PS2 ...
  • VAG - Sony PlayStation ADPCM ...
  • VAI - multimedia - PhotoDub ...
  • VAL - Values list object file ...
  • VAL - Asset management ...
  • VAL - Validity checks/...
  • VALU - Same as VAL
  • VAM - Velazquez Application Map
  • VAM - Microsoft Visual Studio ...
  • VAN - Animation file (VistaPro)
  • VAP - Annotated speech file (...
  • VAPORCD - UltraISO file
  • VAPORCD - Norum Vapor CD
  • VAR - ASCII text file
  • VAR - Variable file (...
  • VARS - Templates file
  • VARS - Template File
  • VAS - VirtualAssessor ...
  • VAT - Vala Content Management ...
  • VB - Sony Playstation wave ...
  • VB - VBScript File
  • VB - Virtual Boy ROM File
  • VB - Image ROM File
  • VB - Virtual Boy Image File
  • VB - Visual Basic.NET source ...
  • VBA - Visual Basic file
  • VBA - VBase file
  • VBB - Backup File
  • VBC - Vocabulary file
  • VBC - Visual Business Cards ...
  • VBC4 - Visual Business Cards ...
  • VBD - Visual Basic ActiveX ...
  • VBD - ActiveX ( Microsoft ...
  • VBD - Visual Basic 5 Active ...
  • VBDT - VBdocman Documentation ...

-ADS BY GOOGLE

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • orphan account

    An orphan account, also referred to as an orphaned account, is a user account that can provide access to corporate systems, ...

  • voice squatting (skill squatting)

    Voice squatting is an attack vector for voice user interfaces (VUIs) that exploits homonyms (words that sound the same but are ...

  • WPA3

    WPA3, also known as Wi-Fi Protected Access 3, is the third version of the security certification program developed by the Wi-Fi ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity policy

    Business continuity policy is the set of standards and guidelines an organization enforces to ensure resilience and proper risk ...

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • warm site

    A warm site is a type of facility an organization uses to recover its technology infrastructure when its primary data center goes...

SearchStorage

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

  • disk array

    A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object ...

  • enterprise storage

    Enterprise storage is a centralized repository for business information that provides common data management, protection and data...

Close