Browse Definitions :

Browse File Extensions by Alphabet

V - VBD

  • V - Main image input file (...
  • V - Consistency check ...
  • V$$ - Cheyenne antivirus ...
  • V00 - 3D Ultrasound Image
  • V00 - Krez 3D ultrasound image...
  • V01 - Genesis 2000 ( Genesis ...
  • V11O - ACDSee offline media file
  • V11P - ACDSee photo disc file
  • V11PF - ACDSee private folder
  • V12 - All The Right Type ...
  • V18 - SYNETSIM Source Code
  • V2 - Microsoft Live Messenger...
  • V22 - CWCDATA file
  • V2A - TI Voyage 200 Figure ( ...
  • V2B - Texas Instruments TI ...
  • V2C - TI Voyage 200 Data ( ...
  • V2D - CAD Design File
  • V2D - TI Voyage 200 GDB ( ...
  • V2D - VersaCAD file
  • V2E - TI Voyage 200 Expression...
  • V2F - TI Voyage 200 Function (...
  • V2G - TI Voyage 200 Group ( ...
  • V2I - Ghost Disk Drive Image (...
  • V2I - Norton Ghost Virtual ...
  • V2I - TI Voyage 200 Bitmap ( ...
  • V2K - TI Voyage 200 ...
  • V2L - TI Voyage 200 List ( ...
  • V2M - TI Voyage 200 Matrix ( ...
  • V2N - TI Voyage 200 ...
  • V2P - TI Voyage 200 Calculator...
  • V2Q - TI Voyage 200 ...
  • V2R - TI Voyage 200 ...
  • V2S - TI Voyage 200 String ( ...
  • V2T - TI Voyage 200 Text ( ...
  • V2U - TI Voyage 200 OS Upgrade...
  • V2X - TI Voyage 200 Macro ( ...
  • V2Y - Texas Instruments TI ...
  • V2Z - TI Voyage 200 Program / ...
  • V3D - Stratum Samples Models ...
  • V3D - Visual3D.NET Data File
  • V3D - Vecta3D Model File
  • V3O - Emergency 3D model Header
  • V3O - 3D model file
  • V3S - Voice Master Key Sound
  • V44 - CWCDATA file
  • V4E - Microsoft Windows Script...
  • V4S - Microsoft Windows Script...
  • V56 - 56k Modem Patch
  • V5D - Vis5d Dataset Object
  • V5D - Dataset UNIX Chemical
  • V64 - Nintento 64 emulation ...
  • V64 - Nintendo 64 ROM Dump
  • V64 - Nintento 64 Emulation ...
  • V8 - 8-bit audio file (CoVox)
  • VA - Unknown Apple II File
  • VAB - Album Visualb
  • VAB - Playstation Wave Bank ...
  • VAC - Oc2. 316s Cakit File
  • VAC - IMail Server Vacation ...
  • VAD - Mapper Variant File
  • VAD - Vadera Enterprises PHP ...
  • VAF - Microsoft Visual Studio ...
  • VAF - DVD2SVCD Temporary File
  • VAF - Visual Studio Common ...
  • VAG - Sony Playstation /PS2 ...
  • VAG - Sony PlayStation ADPCM ...
  • VAG - PlayStation ADPCM Sound ...
  • VAI - multimedia - PhotoDub ...
  • VAL - Values list object file ...
  • VAL - Validity checks/...
  • VAL - Asset management ...
  • VALU - Same as VAL
  • VAM - Velazquez Application Map
  • VAM - Microsoft Visual Studio ...
  • VAN - Animation file (VistaPro)
  • VAP - Annotated speech file (...
  • VAPORCD - Norum Vapor CD
  • VAPORCD - UltraISO file
  • VAR - ASCII text file
  • VAR - Variable file (...
  • VARS - Templates file
  • VARS - Template File
  • VAS - VirtualAssessor ...
  • VAT - Vala Content Management ...
  • VB - Sony Playstation wave ...
  • VB - Image ROM File
  • VB - Visual Basic.NET source ...
  • VB - Virtual Boy Image File
  • VB - VBScript File
  • VB - Virtual Boy ROM File
  • VBA - VBase file
  • VBA - Visual Basic file
  • VBB - Backup File
  • VBC - Vocabulary file
  • VBC - Visual Business Cards ...
  • VBC4 - Visual Business Cards ...
  • VBD - Visual Basic ActiveX ...
  • VBD - ActiveX ( Microsoft ...
  • VBD - Visual Basic 5 Active ...
  • VBDT - VBdocman Documentation ...

-ADS BY GOOGLE

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • buffer underflow

    Buffer underflow, also known as buffer underrun or buffer underwrite, is a threat to data that typically occurs when the ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

  • denial-of-service attack

    A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • secondary storage

    Secondary storage is storage for noncritical data that does not need to be frequently accessed.

  • Pure Storage

    Pure Storage is a provider of enterprise data flash storage solutions designed to substitute for electromechanical disk arrays.

  • yobibyte (YiB)

    A yobibyte (YiB) is a unit of measure used to describe data capacity as part of the binary system of measuring computing and ...

Close