Browse Definitions :

Browse File Extensions by Alphabet

V - VBD

  • V - Main image input file (...
  • V - Consistency check ...
  • V$$ - Cheyenne antivirus ...
  • V00 - 3D Ultrasound Image
  • V00 - Krez 3D ultrasound image...
  • V01 - Genesis 2000 ( Genesis ...
  • V11O - ACDSee offline media file
  • V11P - ACDSee photo disc file
  • V11PF - ACDSee private folder
  • V12 - All The Right Type ...
  • V18 - SYNETSIM Source Code
  • V2 - Microsoft Live Messenger...
  • V22 - CWCDATA file
  • V2A - TI Voyage 200 Figure ( ...
  • V2B - Texas Instruments TI ...
  • V2C - TI Voyage 200 Data ( ...
  • V2D - CAD Design File
  • V2D - TI Voyage 200 GDB ( ...
  • V2D - VersaCAD file
  • V2E - TI Voyage 200 Expression...
  • V2F - TI Voyage 200 Function (...
  • V2G - TI Voyage 200 Group ( ...
  • V2I - Norton Ghost Virtual ...
  • V2I - Ghost Disk Drive Image (...
  • V2I - TI Voyage 200 Bitmap ( ...
  • V2K - TI Voyage 200 ...
  • V2L - TI Voyage 200 List ( ...
  • V2M - TI Voyage 200 Matrix ( ...
  • V2N - TI Voyage 200 ...
  • V2P - TI Voyage 200 Calculator...
  • V2Q - TI Voyage 200 ...
  • V2R - TI Voyage 200 ...
  • V2S - TI Voyage 200 String ( ...
  • V2T - TI Voyage 200 Text ( ...
  • V2U - TI Voyage 200 OS Upgrade...
  • V2X - TI Voyage 200 Macro ( ...
  • V2Y - Texas Instruments TI ...
  • V2Z - TI Voyage 200 Program / ...
  • V3D - Stratum Samples Models ...
  • V3D - Visual3D.NET Data File
  • V3D - Vecta3D Model File
  • V3O - Emergency 3D model Header
  • V3O - 3D model file
  • V3S - Voice Master Key Sound
  • V44 - CWCDATA file
  • V4E - Microsoft Windows Script...
  • V4S - Microsoft Windows Script...
  • V56 - 56k Modem Patch
  • V5D - Vis5d Dataset Object
  • V5D - Dataset UNIX Chemical
  • V64 - Nintento 64 emulation ...
  • V64 - Nintento 64 Emulation ...
  • V64 - Nintendo 64 ROM Dump
  • V8 - 8-bit audio file (CoVox)
  • VA - Unknown Apple II File
  • VAB - Album Visualb
  • VAB - Playstation Wave Bank ...
  • VAC - Oc2. 316s Cakit File
  • VAC - IMail Server Vacation ...
  • VAD - Vadera Enterprises PHP ...
  • VAD - Mapper Variant File
  • VAF - DVD2SVCD Temporary File
  • VAF - Visual Studio Common ...
  • VAF - Microsoft Visual Studio ...
  • VAG - PlayStation ADPCM Sound ...
  • VAG - Sony Playstation /PS2 ...
  • VAG - Sony PlayStation ADPCM ...
  • VAI - multimedia - PhotoDub ...
  • VAL - Values list object file ...
  • VAL - Asset management ...
  • VAL - Validity checks/...
  • VALU - Same as VAL
  • VAM - Velazquez Application Map
  • VAM - Microsoft Visual Studio ...
  • VAN - Animation file (VistaPro)
  • VAP - Annotated speech file (...
  • VAPORCD - UltraISO file
  • VAPORCD - Norum Vapor CD
  • VAR - ASCII text file
  • VAR - Variable file (...
  • VARS - Templates file
  • VARS - Template File
  • VAS - VirtualAssessor ...
  • VAT - Vala Content Management ...
  • VB - Sony Playstation wave ...
  • VB - VBScript File
  • VB - Virtual Boy ROM File
  • VB - Image ROM File
  • VB - Virtual Boy Image File
  • VB - Visual Basic.NET source ...
  • VBA - Visual Basic file
  • VBA - VBase file
  • VBB - Backup File
  • VBC - Vocabulary file
  • VBC - Visual Business Cards ...
  • VBC4 - Visual Business Cards ...
  • VBD - Visual Basic ActiveX ...
  • VBD - ActiveX ( Microsoft ...
  • VBD - Visual Basic 5 Active ...
  • VBDT - VBdocman Documentation ...

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • quantum key distribution (QKD)

    Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties.

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery plan (DRP)

    A disaster recovery plan (DRP) is a documented, structured approach that describes how an organization can quickly resume work ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

SearchStorage

  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

  • NVMe over Fabrics (NVMe-oF)

    NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to ...

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...

Close