Browse Definitions :

Browse File Extensions by Alphabet

V - VBD

  • V - Main image input file (...
  • V - Consistency check ...
  • V$$ - Cheyenne antivirus ...
  • V00 - 3D Ultrasound Image
  • V00 - Krez 3D ultrasound image...
  • V01 - Genesis 2000 ( Genesis ...
  • V11O - ACDSee offline media file
  • V11P - ACDSee photo disc file
  • V11PF - ACDSee private folder
  • V12 - All The Right Type ...
  • V18 - SYNETSIM Source Code
  • V2 - Microsoft Live Messenger...
  • V22 - CWCDATA file
  • V2A - TI Voyage 200 Figure ( ...
  • V2B - Texas Instruments TI ...
  • V2C - TI Voyage 200 Data ( ...
  • V2D - TI Voyage 200 GDB ( ...
  • V2D - CAD Design File
  • V2D - VersaCAD file
  • V2E - TI Voyage 200 Expression...
  • V2F - TI Voyage 200 Function (...
  • V2G - TI Voyage 200 Group ( ...
  • V2I - Ghost Disk Drive Image (...
  • V2I - Norton Ghost Virtual ...
  • V2I - TI Voyage 200 Bitmap ( ...
  • V2K - TI Voyage 200 ...
  • V2L - TI Voyage 200 List ( ...
  • V2M - TI Voyage 200 Matrix ( ...
  • V2N - TI Voyage 200 ...
  • V2P - TI Voyage 200 Calculator...
  • V2Q - TI Voyage 200 ...
  • V2R - TI Voyage 200 ...
  • V2S - TI Voyage 200 String ( ...
  • V2T - TI Voyage 200 Text ( ...
  • V2U - TI Voyage 200 OS Upgrade...
  • V2X - TI Voyage 200 Macro ( ...
  • V2Y - Texas Instruments TI ...
  • V2Z - TI Voyage 200 Program / ...
  • V3D - Vecta3D Model File
  • V3D - Visual3D.NET Data File
  • V3D - Stratum Samples Models ...
  • V3O - Emergency 3D model Header
  • V3O - 3D model file
  • V3S - Voice Master Key Sound
  • V44 - CWCDATA file
  • V4E - Microsoft Windows Script...
  • V4S - Microsoft Windows Script...
  • V56 - 56k Modem Patch
  • V5D - Dataset UNIX Chemical
  • V5D - Vis5d Dataset Object
  • V64 - Nintento 64 emulation ...
  • V64 - Nintendo 64 ROM Dump
  • V64 - Nintento 64 Emulation ...
  • V8 - 8-bit audio file (CoVox)
  • VA - Unknown Apple II File
  • VAB - Playstation Wave Bank ...
  • VAB - Album Visualb
  • VAC - Oc2. 316s Cakit File
  • VAC - IMail Server Vacation ...
  • VAD - Vadera Enterprises PHP ...
  • VAD - Mapper Variant File
  • VAF - Visual Studio Common ...
  • VAF - DVD2SVCD Temporary File
  • VAF - Microsoft Visual Studio ...
  • VAG - Sony Playstation /PS2 ...
  • VAG - PlayStation ADPCM Sound ...
  • VAG - Sony PlayStation ADPCM ...
  • VAI - multimedia - PhotoDub ...
  • VAL - Values list object file ...
  • VAL - Validity checks/...
  • VAL - Asset management ...
  • VALU - Same as VAL
  • VAM - Microsoft Visual Studio ...
  • VAM - Velazquez Application Map
  • VAN - Animation file (VistaPro)
  • VAP - Annotated speech file (...
  • VAPORCD - UltraISO file
  • VAPORCD - Norum Vapor CD
  • VAR - ASCII text file
  • VAR - Variable file (...
  • VARS - Templates file
  • VARS - Template File
  • VAS - VirtualAssessor ...
  • VAT - Vala Content Management ...
  • VB - VBScript File
  • VB - Sony Playstation wave ...
  • VB - Image ROM File
  • VB - Visual Basic.NET source ...
  • VB - Virtual Boy Image File
  • VB - Virtual Boy ROM File
  • VBA - VBase file
  • VBA - Visual Basic file
  • VBB - Backup File
  • VBC - Visual Business Cards ...
  • VBC - Vocabulary file
  • VBC4 - Visual Business Cards ...
  • VBD - ActiveX ( Microsoft ...
  • VBD - Visual Basic ActiveX ...
  • VBD - Visual Basic 5 Active ...
  • VBDT - VBdocman Documentation ...

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • Web application firewall (WAF)

    A web application firewall (WAF) is a firewall that monitors, filters and blocks data packets as they travel to and from a ...

  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close