Learn Computer Applications
Study Computer Applications using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
ITCL
ITCL
By: Gabrielle Unknown
Computing Devices, Computer Internal Components, Computer Software ...12Decks174Flashcards1Learner -
CC 113 A MidTerms
CC 113 A MidTerms
By: Ralph Laurence Madayag
Chapter 1 Digital Technologies, Chapter 3 Computer Hardware, Chapter 2: The Internet and E-commerce ...5Decks200Flashcards11Learners -
Network +
Network +
By: Robert Livingston
Network Models, Topologies and Cabling, Ethernet ...20Decks740Flashcards1Learner -
ICT and programming
ICT and programming
By: rouhma sajjaf
ICT in engineering/computer ethics & legal issues/components & functions of computer systems, Applications, graphics and multimedia software ...8Decks257Flashcards4Learners -
AD
AD
By: Anna Bergin
Storage, Compute (EC2), Deployment (Elastic Beanstalk, Cloud Formation, Code Deploy, Code Pipeline)) ...21Decks575Flashcards1Learner -
Security+ UDemy
Security+ UDemy
By: Kassandra Strong
Section 1, Section 2, Section 3 ...33Decks1,541Flashcards5Learners -
Computers And The Internet
Computers And The Internet
By: Ashford Reid
Computers, File Management, Input and output management ...20Decks296Flashcards4Learners -
Computer Science
Computer Science
By: Halah A
3.1.16 Use of computer technology in society, 3.1.15 Database Concepts, 3.1.14 use of external code sources ...11Decks240Flashcards26Learners -
Digital Technology (GCSE)
Digital Technology (GCSE)
By: Declan Larkin
Topic 1-Digital Data, Topic 2-Software, Topic 3-Database Concepts ...6Decks165Flashcards44Learners -
Network+
Network+
By: Aaron Nunnally
Securing TCP/IP, Network Models, Cabling and Topology ...21Decks641Flashcards5Learners -
CompTIA CASP+
CompTIA CASP+
By: Kevin Noble
Assessment, Application Security and Penetration Testing, Risk Management ...11Decks247Flashcards79Learners -
(6) CompTia Security+ SY0-601 Definitions
(6) CompTia Security+ SY0-601 Definitions
By: Maciej Węgrzynowski
1.1 Social Engineering Techniques, 1.2 Potential Indicators - Attack Type, 1.3 Potential Indicators - Associated with Application Attacks ...47Decks1,691Flashcards29Learners -
MED 107- MEDICAL PHYSICS II
MED 107- MEDICAL PHYSICS II
By: Elena .M
1. IONISING RADIATION, 2. IONISING RADIATION: INTERACTIONS OF PHOTONS WITH MATTER, 3. IONISING RADIATION: X-RAY IMAGING ...108Decks2,263Flashcards12Learners -
A+ 220-1101
A+ 220-1101
By: Michael Paustian
Cable Types, Motherboards, Cooling And Power ...29Decks624Flashcards2Learners -
OCR Computer Science
OCR Computer Science
By: Lucy Williams
Definitions, 1.1.1 Structure & Function of the Processor, 1.1.2 Types of Processor ...29Decks753Flashcards1Learner -
AWS DVA-C01
AWS DVA-C01
By: Phillip Son
Wiley Pre-Assessment, Chapter 1 Introduction to AWS Cloud Api, Chapter 2 Compute and Networking ...22Decks652Flashcards32Learners -
Computer Science Paper 2
Computer Science Paper 2
By: Efe Oni
Computational Thinking skills, Programming Techniques, Applications generations ...9Decks94Flashcards1Learner -
A Level Comp Sci Paper 1
A Level Comp Sci Paper 1
By: Thasfi Islam
1.1.1 Structure And Function Of The Processor, 1.1.2 Types of Processors, 1.1.3 Input, output and storage devices ...16Decks857Flashcards10Learners -
I40(0/1/2) Computer Science Bsc Year 1
I40(0/1/2) Computer Science Bsc Year 1
By: Aria Noroozi
ECM 1407 Electronic Machines, ECM 1407 The History of Computing, ECM 1407 Encryption ...40Decks731Flashcards1Learner -
Computer Science A Level OCR
Computer Science A Level OCR
By: Sana Siddiqee (Student)
1.1.1 Structure And Function Of The Processor, 1.1.2 Types Of Processors, 1.1.3 Input, Output, Storage ...24Decks559Flashcards6Learners -
Security + NET Attacks
Security + NET Attacks
By: Edwin P
Security + CIAT QUESTIONS, Security + NET ATTACKS, Security + Password Attacks ...13Decks260Flashcards1Learner -
Study Guide SY0-601
Study Guide SY0-601
By: Dakota Edmunds
1.1 Compare and contrast different types of social engineering techniques., 1.5 Explain Different Threat Actors, Vectors And Intelligence Sources, 1.2 Given a scenario, analyze potential indicators to determine the type of attack ...20Decks620Flashcards165Learners -
CEH v10
CEH v10
By: Nicholas Phelps
Module 1 - Intro to Ethical Hacking, Module 2 - Footprinting and Reconnaissance, Module 3 - Scanning Networks ...25Decks772Flashcards1,049Learners -
Certified Ethical Hacker
Certified Ethical Hacker
By: James Carrion
Essential Knowledge, Reconnaissance, Scanning and Enumeration ...13Decks789Flashcards16Learners -
Living In It Era
Living In It Era
By: Tanjim Seyeon
Application ICT In Our Daily life, History Of Computers, Basic COMPUTING Periods Ages ...7Decks222Flashcards3Learners -
A Level Computer Science Paper 1
A Level Computer Science Paper 1
By: Billy Chambers
1.1.1 Processors, input, output and storage, 1.3.3 Networks Pt1, 1.4.2 Data Structures ...23Decks657Flashcards368Learners -
CEH v12 Exam Prep "Hard"
CEH v12 Exam Prep "Hard"
By: Naser aljufairah
Module 01 - Introduction to Ethical Hacking ( EC Mode ), Module 02 - Footprinting and Reconnaissance ( EC Mode ), Module 03 - Scanning Networks ( EC Mode ) ...19Decks1,206Flashcards13Learners -
CIS*1000
CIS*1000
By: 1a agostin
Unit 01: The Impact of Technology in a Changing World, TB - Review/Practice, Unti 02: Looking at Computers - Understanding the Parts ...15Decks1,588Flashcards79Learners -
CompTia Security Plus
CompTia Security Plus
By: Jason Owens
1.1 Social Engineering, 1.2 Attack Types, 1.3 Application Attacks ...35Decks722Flashcards18Learners -
Network+
Network+
By: Matt Miller
Chapter 2: Network Models, Chapter 3: Cabling and Topology, Chapter 4: Ethernet Basics ...22Decks937Flashcards503Learners