Browse Definitions:

Browse File Extensions by Alphabet

VER - VIK

  • VER - TurboTax installed ...
  • VER - Version Description
  • VER - Garmin FTL Image Version...
  • VER - SeeYou Airspace file
  • VER - Version Record
  • VER - Internet Explorer file
  • VERS - Version description ( ...
  • VERSATEC - Misc
  • VERSION - Linux gated daemon file
  • VERSION - Version dist file
  • VES - Curvaceous Visual ...
  • VET - VET antivirus system file
  • VET - Ventrilo Event Text File...
  • VET - Ribbons surface file
  • VEW - View file (Clipper 5)
  • VEW - View file (Lotus ...
  • VEX - Possible Virus File
  • VEXE - Virus Executable File
  • VF - Vegas Movie Studio File
  • VF3 - Vaultlet Suite Encrypted...
  • VFB - Font Description File
  • VFB - Microsoft Office Outlook...
  • VFB - VForm Builder file
  • VFC - VentaFax Cover Page File
  • VFD - Virtual PC virtual ...
  • VFD - Drive Image5 Vfd file
  • VFE - Left 4 Dead file
  • VFF - DESR VFF greyscale ...
  • VFF - Sun TAAC File
  • VFF - Apple Macintosh Image
  • VFF - Vextus Factor Compiled ...
  • VFL - Clip art file (...
  • VFM - Voting form (Voter)
  • VFN - Voting form for ...
  • VFP - Qtreader file
  • VFP - TMPGEnc VFAPI plug -in
  • VFS - Virtual File System Index
  • VFS - VentaFax Schedule File
  • VFS - HP All-in-One Thumbnail ...
  • VFS - GnomeVFS Virtual File ...
  • VFT - VisiForm Form ( Primary ...
  • VFX - Volumetric effect plugin...
  • VFZ - Creative Webcam Video ...
  • VFZ - Video Effects File
  • VG - VGuard Proprietry H.264 ...
  • VGA - Video graphics array
  • VGA - Video graphics array (...
  • VGB - VoloGest Management ...
  • VGC - ViziGen source code file
  • VGC - ViziGen Code Generation ...
  • VGC - ViziGen code generation ...
  • VGD - Visual display driver ( ...
  • VGDB - V IDE Automatically ...
  • VGENDLL - V IDE Automatically ...
  • VGI - Vista Game Information
  • VGL - Config 911s file
  • VGL - Configuration 911s file ...
  • VGR - Graphics file (Ventura ...
  • VGRD - LaserWriter
  • VGRD - (MAC CREATOR CODE ) ...
  • VGS - Virtual Game Station ...
  • VGS - Virtual Game Station ...
  • VGUI - V IDE Automatically ...
  • VGUIDB - V IDE Automatically ...
  • VGX - VGuard Proprietry H.264 ...
  • VGZ - DigitalVDO Compressed ...
  • VGZ - VGuard proprietary H.264...
  • VH - Playstation Wave Bank ...
  • VH - Winhelp Vh file
  • VHA - Macromedia Sitespring ...
  • VHC - Big Red Racing Vehicle ...
  • VHD - Virtual Hard Disk file
  • VHD - Vista complete PC backup...
  • VHD - Quartus II VHDL Design ...
  • VHD - Virtual PC Virtual HD ...
  • VHD - VHDL Source File
  • VHD - Quartus II VHDL Design ...
  • VHD - Disk image file format ...
  • VHD - Virtual PC Virtual Hard ...
  • VHDL - Quartus II VHDL Design ...
  • VHDL - " Very High - level ...
  • VHTML - VITRAGE Apache Module ...
  • VI - Virtual Instrument file ...
  • VI - Variable Information ...
  • VI - Graphics file (Jovian ...
  • VI1 - Kaspersky Anti - Virus ...
  • VI2 - Kaspersky Anti - Virus ...
  • VI_ - Audio Waveprg Samplitude...
  • VIB - Chemsoft Export / Import...
  • VIC - Graphics file (Vicar)
  • VICAR - VICAR graphics
  • VICAR - Graphics ( Video Image ...
  • VID - Screen device driver (...
  • VID - Bitmap graphics (YUV12C ...
  • VID - Shell monitor file (...
  • VID - Bethesda video files (...
  • VID - Generic video file
  • VIEW - GOM Atos Scanner File
  • VIEW - Unknown Apple II File
  • VIF - Khoros Visualisation ...

-ADS BY GOOGLE

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchSecurity

  • evil maid attack

    An evil maid attack is a security exploit that targets a computing device that has been shut down and left unattended.  An evil ...

  • Common Body of Knowledge (CBK)

    In security, Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional ...

  • rootkit

    A rootkit is a program or, more often, a collection of software tools that gives a threat actor remote access to and control over...

SearchHealthIT

  • value-based healthcare

    Value-based healthcare, also known as value-based care, is a payment model that rewards healthcare providers for providing ...

  • health informatics

    Health informatics is the practice of acquiring, studying and managing health data and applying medical concepts in conjunction ...

  • clinical trial

    A clinical trial, also known as a clinical research study, is a protocol to evaluate the effects and efficacy of experimental ...

SearchDisasterRecovery

  • crisis communication

    Crisis communication is a method of corresponding with people and organizations during a disruptive event to provide them with ...

  • Zerto

    Zerto is a storage software vendor that specializes in enterprise-class business continuity and disaster recovery in virtual and ...

  • crisis management plan (CMP)

    A crisis management plan (CMP) is a document that outlines the processes an organization will use to respond to a critical ...

SearchStorage

  • SSD write cycle

    An SSD write cycle is the process of programming data to a NAND flash memory chip in a solid-state storage device.

  • data storage

    Data storage is the collective methods and technologies that capture and retain digital information on electromagnetic, optical ...

  • hard disk

    A hard disk is part of a unit -- often called a disk drive, hard drive or hard disk drive -- that stores and provides relatively ...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close