Learn Digital Techniques
Study Digital Techniques using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(8)
Decks
Flashcards
Learners
-
Computing
Computing
By: Athan Doufas
Characteristics of data types, Functions and capabilities of key hardware and software components of digital sytems required for processing, storing and communicating data and information, Function requirements of solutions ...14Decks73Flashcards2Learners -
CA 2
CA 2
By: Jake P
2.1.1 The use of, and need for, data types, 2.1.2 Declaring and using constants and variables that use appropriate data types, 2.1.3 The use of, and need for, data structures ...25Decks207Flashcards3Learners -
ICT unit 3
ICT unit 3
By: Naina Jassal
Network, HCI, Control Systems ...9Decks71Flashcards1Learner -
Intro. Distribuidos
Intro. Distribuidos
By: Nicole Raveszani
Chapter 2 - Principles of Network Applications, Chapter 2 - The Web and HTTP, 2.3 Electronic Mail in the Internet ...25Decks134Flashcards2Learners -
Percepio Security +
Percepio Security +
By: Beth Hosek
Social Engineering Techniques & Other Attack Types, Implementing Identity and Account Management & AAA Solutions, Physical Security Controls ...12Decks38Flashcards1Learner -
IB Computing 2025
IB Computing 2025
By: Edward DUNNE
1.1.1 - Identify the context for which a new system is planned., 1.1.2 - Describe the need for change management., 1.1.3 - Outline compatibility issues resulting from situations including legacy systems or business mergers. ...74Decks553Flashcards5Learners -
E2: Managing Performance
E2: Managing Performance
By: Sam Turner
1. The Ecosystems Of Organisations, 2. The Elements Of Business Models, 3. Digital Disruption And Digital Business Models ...12Decks17Flashcards1Learner -
Sec+ -> 4.0 Operations and Incident Response (16%)
Sec+ -> 4.0 Operations and Incident Response (16%)
By: Isabelle S
4.1 - Given a scenario, use the appropriate tool to assess organizational security., 4.2 - Summarize the importance of policies, processes, and procedures for incident response., 4.3 - Given an incident, utilize appropriate data sources to support an investigation. ...5Decks41Flashcards1Learner