Learn Social Network
Study Social Network using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
Erikson: Post-Freudian Theory
Erikson: Post-Freudian Theory
By: TRIZZA MAE ANGKE
The Ego in Post-Freudian Theory, Stages of Psychosocial Development, Erikson’s Methods of Investigation ...7Decks59Flashcards1Learner -
Pentest+ PTO-002
Pentest+ PTO-002
By: Will Schmidt
Chapter 01: Penetration Testing, Chapter 02: Planning and Scoping Penetration Tests, Chapter 03: Information Gathering ...14Decks461Flashcards1Learner -
Soc Final
Soc Final
By: Isaias Bustos
Identity and Socialization, Social Interaction-some groups, Groups, Networks, and Orgs ...8Decks132Flashcards1Learner -
Health and Social Care- Unit 2
Health and Social Care- Unit 2
By: Evie Phillips
Equality, Diversity, Rights ...10Decks55Flashcards1Learner -
IOR
IOR
By: sophie vand
Key paper 1 Burt 1992 Structural Holes, Key paper 2 Granovetter 1973 The strength of weak ties, Key paper 3 Powell, Kogut, Smith-Doer 1996 ...6Decks49Flashcards1Learner -
IT
IT
By: Chelsea Benjamin
Computer Fundamentals and Information Processing, Computer Networks and Web Technologies., Social and Economic Impact of Information and Communications Technology3Decks65Flashcards4Learners -
Computer Science HL
Computer Science HL
By: . .
Sys. Fundamentals 1.1.1 System in Org., Sys. Fundamentals 1.1.2 The need for change management, Sys. Fundamentals 1.1.3 Compatibility issues resulting from situations including legacy systems or business mergers ...17Decks189Flashcards2Learners -
Sociolinguistics
Sociolinguistics
By: Megan Little
Week 1 - Keywords and concepts, Week 2 - Language attitudes and AAVE, Week 4 - Style and Class ...9Decks162Flashcards4Learners -
english language
english language
By: ezra ansell
gender and language, occupatuonal language variation, social stratification theorist ...4Decks29Flashcards2Learners -
Cognitive
Cognitive
By: SweetCattieM .
Week 1 - Intro to the topic, Week 2 - Perception, Attention & Consciousness, Week 3 - Movement And Action ...12Decks221Flashcards2Learners -
security +
security +
By: larry neville
Chapter 1 Measuring and Weighing Risk, Chapter 2 Monitoring and Diagnosing Networks, Chapter 3 Understanding Devices and Infrastructure ...12Decks238Flashcards2Learners -
Entrepreneurial
Entrepreneurial
By: Lady Rey Belando
Types Of Business Model, Type Of Modern Business Model, Key Partners ...23Decks168Flashcards4Learners -
Neuroscience 2: higher cognitive function
Neuroscience 2: higher cognitive function
By: Sofie Sørensen
Module 1: L1-4 - intro, Module 1: L5-6 + 8-9 - development, Module 1: L7 + L12-L17 - MDD and BIP ...20Decks283Flashcards2Learners -
2. Management Information Systems
2. Management Information Systems
By: Stephanie Geary
Lesson 1: Informations Systems and You, Lesson 2: Business Processes and Decision Making, Lesson 3: Productivity, Innovation, and Strategy ...13Decks97Flashcards1Learner -
A Computer Science : Unit 1
A Computer Science : Unit 1
By: ww ww
1.1.1 Architecture Introduction, 1.1.2 Von Neumann Architecture, 1.1.3 Factors affecting CPU performance ...26Decks253Flashcards2Learners -
Business A level (Year2)
Business A level (Year2)
By: Ella Gray
Unit 7a - Mission, corporate objectives and strategy notes (includes SWOT), Unit 7a Analysing internal position: financial ratio analysis, 7a 3 Analysing internal position: overall position (Kaplan & Norton) ...29Decks733Flashcards44Learners -
SEC+SY0-601
SEC+SY0-601
By: Scott Byrams
1.1 Compare and contrast different types of social engineering tecchniques, 1.2 Analyze potential indicators to determine the type of attack, 1.3 Analyze potential indicators associated with application attacks ...35Decks546Flashcards19Learners -
Business Analytics & Emerging Trends
Business Analytics & Emerging Trends
By: Rob Vermeer
Lecture 1 - Business Analytics Trends, Lecture 2 - Industry 4.0 & Knowledge graphs, Readings Week 1 ...14Decks111Flashcards2Learners -
IT Theory 2018
IT Theory 2018
By: R W
1.1- Hardware, 4.3- Intro to Multi-Tables, 2.3- The Internet and the WWW ...12Decks190Flashcards2Learners -
Espanol 2 honores
Espanol 2 honores
By: Chelsea Gonzalez
Unit 4, Vocab P, Movement ...8Decks191Flashcards1Learner -
CompTIA Security Tests
CompTIA Security Tests
By: Hyun Rim
CH01 Overview of Security, CH02 Malware, CH03 Malware Infection ...56Decks2,102Flashcards1Learner -
Security + SY0-601
Security + SY0-601
By: Alket Shabani
1.1 Compare and contrast different types of social engineering techniques., 1.2 Given a scenario, analyze potential indicators to determine the type of attack., 1.3 Given a scenario, analyze potential indicators associated with application attacks. Given a scenario, analyze potential indicators associated with network attacks. ...24Decks258Flashcards40Learners -
Geography HSC
Geography HSC
By: Irene Xiao
Ecosystems at risk: Reasons for protection, Ecosystems at risk: vulnerability and resilience, Ecosystems at risk: traditional and contemporary management ...23Decks201Flashcards152Learners -
IB Computer Science HL (old)
IB Computer Science HL (old)
By: Edward DUNNE
1.1.1 - Identify the context for which a new system is planned., 1.1.2 - Describe the need for change management., 1.1.3 - Outline compatibility issues resulting from situations including legacy systems or business mergers. ...64Decks295Flashcards20Learners -
Introduction to electronic business
Introduction to electronic business
By: Ninni Svensson
Marketing, B2C- E-tailing, E-payment ...5Decks122Flashcards1Learner -
Cpl Exam
Cpl Exam
By: Kory White
202 Rules And Regulations, 304 Civil Lawsuits, Subpoenas For Documents And Open Records, 305 Grooming And Dress Regulations ...9Decks230Flashcards3Learners -
Security +
Security +
By: Blayne Ehrenzeller
Social Engineering and Security Fundamentals, Malware, Password Attacks ...16Decks195Flashcards1Learner -
Pentest+
Pentest+
By: Zoubida Regzal
1 Planning & scoping, 2.1 Information gathering & Vulnerability scanning: passive reconnaissance, 2.2.1 Information gathering & Vulnerability scanning: active reconnaissance/ scanning & recon ...28Decks782Flashcards1Learner -
Security+
Security+
By: a a
Ports, Hashing Algorithms, Symmetric Encryption ...16Decks167Flashcards3Learners -
Theories of Marketing
Theories of Marketing
By: Puk slewe
1.1 Knowledge clip Customer experience management, 1.2 kc: network paradigm, 1.3 lecture 1 ...40Decks516Flashcards2Learners