Learn Application Architecture
Study Application Architecture using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
ICT Unit 2
ICT Unit 2
By: Matthew Grimsley
Data Representation, Data, information and knowledge, Architecture ...10Decks120Flashcards2Learners -
Cisco CCNA (Exam 200-301)
Cisco CCNA (Exam 200-301)
By: Brendan Simpson
Volume 1 - Chapter 1: Introduction to TCP/IP Networking, Volume 1 - Chapter 2: Fundamentals of Ethernet LANs, Volume 1 - Chapter 3: Fundamentals of WANs and IP Routing ...53Decks1,304Flashcards20Learners -
Meta: Front-end web developer
Meta: Front-end web developer
By: Maryam Fatima
Module 1- How the web works?, MODULE 1 - Core internet technologies, M2- What is HTML? ...25Decks429Flashcards2Learners -
My CISSP Official Summary
My CISSP Official Summary
By: Unknown Unknown
Chap 11: Secure Network Architecture and Components, Chap 10: Secure Communications and Network Attacks, Chap 15: Security Assessment and Testing ...7Decks121Flashcards2Learners -
computing component 1
computing component 1
By: Susie Cabral
MAR MDR CIR, databases, 1.1.1 structure and function of the processor ...32Decks243Flashcards1Learner -
BISA
BISA
By: Antonio Sainz
3. Architecture Dimensions, 4. Architecture Structure, 2. Architecture Concept ...5Decks93Flashcards1Learner -
Computer Science
Computer Science
By: Sheldon Yearwood
Computer Architecture, Computer Architecture, Ports ...10Decks88Flashcards1Learner -
ISM v5
ISM v5
By: Brock Terry
Module 1: Introduction to Information Storage, Module 2: Business Drivers of Digital Transformation, Module 3: Modern Data Center Environment (Compute + Applications) ...32Decks1,001Flashcards1Learner -
AWS Architect
AWS Architect
By: Pablo Silva
10000 overview, AWS Directory Services, What do I need to know? ...21Decks150Flashcards1Learner -
Software Engineering
Software Engineering
By: David Stojanovski
Application Security, Software Architecture, C# 7.0 ...4Decks156Flashcards1Learner -
Network Plus 2/10/25
Network Plus 2/10/25
By: Jesse Buerhaus
1.1 Protocols and ports, 1.2 Explain devices, applications, protocols and services at their appropriate OSI layers., 1.3 Explain the concepts and characteristics of routing and switching. ...38Decks641Flashcards9Learners -
SYO-601
SYO-601
By: Maria Ouvarova
Social Engineering, Types of Attack, Computing Architecture ...10Decks600Flashcards1Learner -
Cloud infrastructure and services v3
Cloud infrastructure and services v3
By: Abdoulaye MAIGA
Driving Digital transformation through cloud, Cloud reference architecture, Application ...10Decks65Flashcards1Learner -
AWS SAA
AWS SAA
By: millie o'driscoll
Fundamentals - IAM + EC2, Design Resilient Architectures, Design High Performing Architectures ...6Decks152Flashcards1Learner -
Economic Psychology
Economic Psychology
By: Tim Jenzelewski
Chapter 1 Economic Psychology: History and Application, Chapter 2 Decision-Making: Normative Models and Anomalies, Chapter 3 Decision-Making: Descriptive Models and Choice Architecture ...10Decks176Flashcards2Learners -
Microprocessor and Microcontroller Technology
Microprocessor and Microcontroller Technology
By: Catrina Gatt
Describe with the aid of diagrams the main differences between a microprocessor-based svstem and a microcontroller, Describe the main criteria or factors for choosing a microcontroller for an application., Explain the concept of an embedded system, including some examples ...6Decks61Flashcards2Learners -
Computer Science
Computer Science
By: Peter Bavage
Von Neumann Architecture, Legal Issues, Network Protocols ...4Decks33Flashcards2Learners -
[OCR] | [A-Level] | [Computing]
[OCR] | [A-Level] | [Computing]
By: Oli S
[1.1.1] | 1: Inside a CPU, [1.1.1] | 2: The FDE Cycle, [1.1.1] | 3: CPU Performance ...17Decks72Flashcards1Learner -
Security + 501 - FHSU - Feb 3 - 13
Security + 501 - FHSU - Feb 3 - 13
By: Casey Tozier
Domain 1.1 - Given a scenario, analyze indicators of compromise and determine the type of malware., Domain 1.2 - Compare and contrast types of attacks., Domain 1.3 - Explain threat actor types and attributes. ...39Decks773Flashcards7Learners -
8. SIG
8. SIG
By: Puybareau Yohan
2.1.1. Qu'est-ce que le système d'information?, 2.1.2. La qualité irréprochable d'une information, 2.2.1. Qui sont les acteurs du SI? ...36Decks492Flashcards1Learner -
Cysa+
Cysa+
By: Faisal Iqbal
Understandinf Vulnerability Response, Handling, And Management, Exploring Threat Intelligence and Threat Hunting Concepts, Explain Important System and Network Architecture Concepts ...15Decks195Flashcards1Learner -
Computer Science
Computer Science
By: Millie Hardy
Types of storage(1.1.3 b), Input and output(1.1.3 a), RAM and ROM(1.1.3 c) ...52Decks514Flashcards1Learner -
JSP
JSP
By: M&M Sweet
Overview, Architecture, and Lifecycle of JSP, JSP Elements & Directives, Implicit Objects ...6Decks34Flashcards1Learner -
CCSP
CCSP
By: Martin Harmsen
1. Architectural Concepts and Design Requirements Domain, 2. Cloud Data Security Domain, 3. Cloud Platform and Infrastructure Security Domain ...6Decks15Flashcards3Learners -
GCP - PCA -Architecture1
GCP - PCA -Architecture1
By: Andre White
Regions & Zones, Compute, Instance Groups ...34Decks106Flashcards1Learner -
CompTia Security
CompTia Security
By: ezzie ejedenawe
Identity and account management Controls, Security Reconnaissance, Architecture And Design ...6Decks56Flashcards1Learner -
Computer science A level
Computer science A level
By: Leo Lu
Architecture of CPU 1.1.1, Types of processor 1.1.2, System software 1.2.1 ...4Decks71Flashcards1Learner -
Architecture Concepts and Domains Foundation
Architecture Concepts and Domains Foundation
By: Michael Henry-Rose
Fundamentals Of Architecture, Business Architecture, Applications Architecture ...8Decks52Flashcards1Learner -
USNA Cyber
USNA Cyber
By: Kris Medina
Cyber Domain & Pillars of Cyber Security, Risk, Computer Architecture ...30Decks240Flashcards5Learners -
3. Architecture and Design
3. Architecture and Design
By: Matthew Schroeder
3.1 Use cases and purpose for frameworks, best practices, and secure configuration guides., 3.2 Implement secure network architecture concepts, 3.3 Implement secure systems design. ...8Decks124Flashcards1Learner