Browse Definitions :

Browse File Extensions by Alphabet

X - XC0

  • X - Source code file (Lex)
  • X - AVS image (SDSC Image ...
  • X-PNG - Portable ( Public ) ...
  • X01 - Secondary index file (...
  • X02 - Secondary index file (...
  • X03 - Secondary index file (...
  • X04 - Secondary index file (...
  • X05 - Secondary index file (...
  • X06 - Secondary index file (...
  • X07 - Secondary index file (...
  • X08 - Secondary index file (...
  • X09 - Secondary index file (...
  • X1 - X1 Desktop Search Saved ...
  • X10 - Bitmap image (X Window ...
  • X10 - X Window Dump Bitmap
  • X11 - Bitmap image (X Windows ...
  • X11 - X Windows System Window ...
  • X16 - Macromedia Extra (...
  • X20 - XTree ( Gold ) DOS Help ...
  • X32 - Macromedia Extra (...
  • X3D - x3d and xdart Formats
  • X3D - X3D File
  • X3D - Xara 3D project file
  • X3D - X3D file Header
  • X3DB - X3D Binary Format File (...
  • X3DBZ - X3D GZipped Binary ...
  • X3DV - X3D Classic VRML File ( ...
  • X3DVZ - X3D GZipped Classic VRML...
  • X3F - Foveon X3F RAW format ...
  • X3F - Sigma Camera RAW Picture...
  • X40 - Xtree ( gold ) Dos help ...
  • X5 - Rockwell Software Logix ...
  • X50 - Xtree ( gold ) Dos help ...
  • X60 - Xtree ( gold ) Dos help ...
  • X64 - C64 Emulator Disk Image
  • X64 - X64 and VICE emulators ...
  • X64 - Commodore 64 Disk Image
  • X70 - XTree ( Gold ) - DOS ...
  • X80 - Xtree ( gold ) Dos help ...
  • X83 - GAEB DA2000 XML and XML ...
  • X86 - Unknown file extension
  • X90 - XTree ( Gold ) (DOS) ...
  • X_B - Parasolid Model Part File
  • X_B - Parasolid CAD File
  • X_T - Parasolid Model Part File
  • X_T - Parasolid CAD File (UGS ...
  • XA - The Sims Extensive Audio...
  • XA - Sony PlayStation audio /...
  • XA - GEAR Image file
  • XA - XA audio file
  • XA - Extended Architecture ...
  • XA - Playstation Video ( Sony...
  • XA - Gear CD Suite File
  • XA - Maxis XA Audio ( sound /...
  • XA0 - Xtree ( gold ) Dos help ...
  • XA2 - Exam Editor Question ...
  • XAA - Unknown or unassigned ...
  • XAB - Mail Address Book ( ...
  • XAB - Microsoft Mail address ...
  • XAB - Xenis Mail address book
  • XAC - GNUCash GNUCash Backup ...
  • XAD - eXotic AdLib Format
  • XADML - XML- based Application ...
  • XAF - Active VRML
  • XAF - Microsoft Active VRML ...
  • XAML - Extensible Application ...
  • XAML - XAML File
  • XAML - Microsoft Extensible ...
  • XAN - XANIA Browser
  • XANN - XANN Packer format ( ...
  • XAP - Compressed Silverlight ...
  • XAP - Xbox Dashboard Script ( ...
  • XAP - XACT Project
  • XAP - Silveright application ...
  • XAP - Silverlight Application ...
  • XAR - Corel Xara drawing
  • XAR - Microsoft Excel ...
  • XARC - ISS Audio Header
  • XAS - PTC Pro/ Engineer ...
  • XAS - Playstation Video ( Sony...
  • XB0 - XTree ( Gold ) DOS ( ...
  • XBA - Timespace X200 / K200 ...
  • XBD - Fuji Xerox Docuworks file
  • XBEL - XML Bookmark Exchange ...
  • XBF - Data base file
  • XBF - Database file
  • XBF - Emperor Battle for Dune
  • XBIN - RegSupreme License File ...
  • XBK - SMART Notebook File
  • XBK - SMART Board Slide ...
  • XBL - XBLite source code file
  • XBL - Extensible Binding ...
  • XBM - A MIME 'X11" bitmap image
  • XBN - Cygnus ld- scripts file
  • XBSAV - Mass Effect 2 Xbox Saved...
  • XBW - Crossword
  • XBX - CD Image File
  • XC - X Server Constant Screen...
  • XC - Bitmap image (X server ...
  • XC0 - Xtree ( gold ) Dos help ...

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • quantum key distribution (QKD)

    Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties.

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery plan (DRP)

    A disaster recovery plan (DRP) is a documented, structured approach that describes how an organization can quickly resume work ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

SearchStorage

  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

  • NVMe over Fabrics (NVMe-oF)

    NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to ...

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...

Close