Browse Definitions :

Browse File Extensions by Alphabet

V - VBD

  • V - Main image input file (...
  • V - Consistency check ...
  • V$$ - Cheyenne antivirus ...
  • V00 - Krez 3D ultrasound image...
  • V00 - 3D Ultrasound Image
  • V01 - Genesis 2000 ( Genesis ...
  • V11O - ACDSee offline media file
  • V11P - ACDSee photo disc file
  • V11PF - ACDSee private folder
  • V12 - All The Right Type ...
  • V18 - SYNETSIM Source Code
  • V2 - Microsoft Live Messenger...
  • V22 - CWCDATA file
  • V2A - TI Voyage 200 Figure ( ...
  • V2B - Texas Instruments TI ...
  • V2C - TI Voyage 200 Data ( ...
  • V2D - TI Voyage 200 GDB ( ...
  • V2D - CAD Design File
  • V2D - VersaCAD file
  • V2E - TI Voyage 200 Expression...
  • V2F - TI Voyage 200 Function (...
  • V2G - TI Voyage 200 Group ( ...
  • V2I - Norton Ghost Virtual ...
  • V2I - TI Voyage 200 Bitmap ( ...
  • V2I - Ghost Disk Drive Image (...
  • V2K - TI Voyage 200 ...
  • V2L - TI Voyage 200 List ( ...
  • V2M - TI Voyage 200 Matrix ( ...
  • V2N - TI Voyage 200 ...
  • V2P - TI Voyage 200 Calculator...
  • V2Q - TI Voyage 200 ...
  • V2R - TI Voyage 200 ...
  • V2S - TI Voyage 200 String ( ...
  • V2T - TI Voyage 200 Text ( ...
  • V2U - TI Voyage 200 OS Upgrade...
  • V2X - TI Voyage 200 Macro ( ...
  • V2Y - Texas Instruments TI ...
  • V2Z - TI Voyage 200 Program / ...
  • V3D - Vecta3D Model File
  • V3D - Visual3D.NET Data File
  • V3D - Stratum Samples Models ...
  • V3O - Emergency 3D model Header
  • V3O - 3D model file
  • V3S - Voice Master Key Sound
  • V44 - CWCDATA file
  • V4E - Microsoft Windows Script...
  • V4S - Microsoft Windows Script...
  • V56 - 56k Modem Patch
  • V5D - Vis5d Dataset Object
  • V5D - Dataset UNIX Chemical
  • V64 - Nintendo 64 ROM Dump
  • V64 - Nintento 64 emulation ...
  • V64 - Nintento 64 Emulation ...
  • V8 - 8-bit audio file (CoVox)
  • VA - Unknown Apple II File
  • VAB - Playstation Wave Bank ...
  • VAB - Album Visualb
  • VAC - Oc2. 316s Cakit File
  • VAC - IMail Server Vacation ...
  • VAD - Vadera Enterprises PHP ...
  • VAD - Mapper Variant File
  • VAF - Visual Studio Common ...
  • VAF - DVD2SVCD Temporary File
  • VAF - Microsoft Visual Studio ...
  • VAG - Sony PlayStation ADPCM ...
  • VAG - Sony Playstation /PS2 ...
  • VAG - PlayStation ADPCM Sound ...
  • VAI - multimedia - PhotoDub ...
  • VAL - Validity checks/...
  • VAL - Values list object file ...
  • VAL - Asset management ...
  • VALU - Same as VAL
  • VAM - Microsoft Visual Studio ...
  • VAM - Velazquez Application Map
  • VAN - Animation file (VistaPro)
  • VAP - Annotated speech file (...
  • VAPORCD - UltraISO file
  • VAPORCD - Norum Vapor CD
  • VAR - ASCII text file
  • VAR - Variable file (...
  • VARS - Templates file
  • VARS - Template File
  • VAS - VirtualAssessor ...
  • VAT - Vala Content Management ...
  • VB - Image ROM File
  • VB - VBScript File
  • VB - Visual Basic.NET source ...
  • VB - Virtual Boy Image File
  • VB - Sony Playstation wave ...
  • VB - Virtual Boy ROM File
  • VBA - VBase file
  • VBA - Visual Basic file
  • VBB - Backup File
  • VBC - Vocabulary file
  • VBC - Visual Business Cards ...
  • VBC4 - Visual Business Cards ...
  • VBD - Visual Basic ActiveX ...
  • VBD - ActiveX ( Microsoft ...
  • VBD - Visual Basic 5 Active ...
  • VBDT - VBdocman Documentation ...

-ADS BY GOOGLE

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • certificate authority (CA)

    A certificate authority (CA) is a trusted entity that issues digital certificates, which are data files used to cryptographically...

  • hacktivism

    Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose.

  • advanced persistent threat (APT)

    An advanced persistent threat (APT) is a prolonged and targeted cyberattack in which an intruder gains access to a network and ...

SearchHealthIT

  • Cerner Corp.

    Cerner Corp. is a public company in North Kansas City, Mo., that provides various health information technologies, ranging from ...

  • clinical decision support system (CDSS)

    A clinical decision support system (CDSS) is an application that analyzes data to help healthcare providers make decisions and ...

  • Health IT (health information technology)

    Health IT (health information technology) is the area of IT involving the design, development, creation, use and maintenance of ...

SearchDisasterRecovery

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

  • ransomware recovery

    Ransomware recovery is the process of resuming options following a cyberattack that demands payment in exchange for unlocking ...

SearchStorage

  • SSD (solid-state drive)

    An SSD (solid-state drive) is a type of nonvolatile storage media that stores persistent data on solid-state flash memory.

  • file system

    In a computer, a file system -- sometimes written filesystem -- is the way in which files are named and where they are placed ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close