Learn Application Architecture
Study Application Architecture using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(29)
Decks
Flashcards
Learners
-
Interview Deck
Interview Deck
By: Carl Koster
Leadership, Strategy, Program Management ...14Decks70Flashcards1Learner -
Competing on Analytics
Competing on Analytics
By: Kaman Hung
INTRODUCTION FOUR ERAS IN TEN YEARS A REVOLUTION IN ANALYTICS, CHAPTER ONE THE NATURE OF ANALYTICAL COMPETITION USING ANALYTICS TO BUILD A DISTINCTIVE CAPABILITY, CHAPTER TWO WHAT MAKES AN ANALYTICAL COMPETITOR? DEFINING THE COMMON KEY ATTRIBUTES OF SUCH COMPANIES ...10Decks256Flashcards1Learner -
AZ-900: Microsoft AZURE Fundamentals
AZ-900: Microsoft AZURE Fundamentals
By: Dominik Herok
(LEARNING PATH) Describing cloud concepts, (MOD 1 OF 3) Describing Cloud concepts, (Unit 1 of 4) Describing Cloud computing ...68Decks362Flashcards3Learners -
CMPT 471
CMPT 471
By: Sidney Agbonkhese
The Cloud, Application Architectures, Requirements, Trade-offs, and Challenges ...4Decks40Flashcards1Learner -
Computer Science
Computer Science
By: Tamara Eshag
CPU Component & FDE Cycle, Performance & Pipelining, Architectures :( ...18Decks113Flashcards1Learner -
1.0 Networking Fundamentals
1.0 Networking Fundamentals
By: Leonel Martinez
1.1 Compare And Contrast The OSI Model Layers And Encapsulation Concepts., 1.2 Explain The Characteristics Of Network Topologies And Network Types., 1.3 Summarize The Types Of Cables And Connectors And Explain Which Is Appropriate ...8Decks135Flashcards1Learner -
Careerist
Careerist
By: Corrine Frederick
Lesson 2 Main Testing Types and Software Bug Classification, Lesson 3 SDLC, the Bug Life Cycle, and Jira, Lesson 4 Software Development Approches, Waterfall, Agile ...14Decks137Flashcards1Learner -
SCEA
SCEA
By: Gabor Csorba
Application Design Concepts and Principles, Common Architectures, Business Tier Technologies ...7Decks58Flashcards1Learner -
CompTIA Network + N10-008
CompTIA Network + N10-008
By: Danny Mishler
1.1 (OSI) model layers and encapsulation concepts, 1.2 Explain the characteristics of network topologies and network types., 1.3 Summarize the types of cables and connectors and explain which is the appropriate type for a solution. ...26Decks147Flashcards8Learners -
DOI - Engineering Foundation
DOI - Engineering Foundation
By: Sachin Nair
DevOps, Application Architecture, Continuous Delivery and Deployment ...5Decks46Flashcards1Learner -
AWS Solution Architect Certification Classes
AWS Solution Architect Certification Classes
By: Damilola Owolabi
Design High Performing Architectures, AWS Design Secure Architecture, Data Resilient Architecture ...6Decks25Flashcards1Learner -
Net+ N10-008
Net+ N10-008
By: Carlos Lorenzo
1.1 Compare and contrast the Open Systems Interconnection (OSI) model layers and encapsulation concepts, 1.2 Explain the characteristics of network topologies and network types, 1.3 Summarize the types of cables and connectors and explain which is the appropriate type for a solution. ...26Decks93Flashcards6Learners -
CCSK Certification
CCSK Certification
By: Kal Krishnan
Domain 1 - Cloud Computing Concepts and Architecture, Domain 2 - Governance & Risk Management, Domain 3 - Legal Issues, Contracts and Electronic Discovery ...13Decks90Flashcards3Learners -
Javascript refrence
Javascript refrence
By: Travis R
Functions, Array Obj properties and methods, General Javascript knowledge and concepts ...40Decks120Flashcards4Learners -
Solutions Architect Coursera
Solutions Architect Coursera
By: Heriberto Salcido
Domain 1 - Design Resilient Architectures, Domain 2 - Design High-Performing Architectures, Domain 3 - Design Secure Applications and Architectures ...4Decks29Flashcards1Learner -
OCR A-Level Computer Science
OCR A-Level Computer Science
By: Gavin Nkalubo
Systems analysis methods, Compression, Lossless compression ...22Decks143Flashcards1Learner -
CISSP
CISSP
By: Jennifer Toren
Chapter 1: Security Governance, Chapter 2: Personnel Security and Risk Management Concepts, Chapter 3: Business Continuity Planning ...21Decks19Flashcards2Learners -
AWS Cloud Practitioner (CLF-C01)
AWS Cloud Practitioner (CLF-C01)
By: Amit Topiwala
Learning Path Introduction, Cloud Concepts - Introduction, Cloud Concepts - What is Cloud Computing? ...39Decks322Flashcards1Learner -
BIGDATA & IOT 600
BIGDATA & IOT 600
By: Mignon Rossouw
Chapter 1: Big Data Analysis and 4 Extraction Techniques, Chapter 2: IoT applications and architectures2Decks20Flashcards1Learner -
Secure Computer Networks
Secure Computer Networks
By: Callum O'Hare
Internet Architecture, Internet Applications, Network Edge, Physical and Link Layers ...7Decks24Flashcards1Learner -
04 Tools of the Trade: Linux and SQL
04 Tools of the Trade: Linux and SQL
By: Amreek Paul
WK 1 The Wonderful World of Operating Systems, WK1 Inside the Operating System, WK1 Requests to the operating system ...43Decks261Flashcards1Learner -
Security+
Security+
By: Anne Leach
1. Malware and IOC, 2. Attacks, 3. Threat Actors ...29Decks66Flashcards1Learner -
Softwaretechnik II
Softwaretechnik II
By: Moritz Br
Clean Code, Architecture, Components ...6Decks32Flashcards1Learner -
CISSP
CISSP
By: Timothy Southern
Chapter 1 - Security Governance Through Principles and Policies, Chapter 2 - Personnel Security and Risk Management Concepts, Chapter 3 - Business Continuity Planning ...22Decks38Flashcards1Learner -
CompTIA ITF+ (Software Management)
CompTIA ITF+ (Software Management)
By: Mark Latysh
Software Types, Web Browsers, Application Delivery ...6Decks26Flashcards1Learner -
CompTIA Security+ Certification Exam
CompTIA Security+ Certification Exam
By: Fareedah James
1.1 Given a scenario, analyze indicators of compromise and determine the type of malware., 1.2 Compare and contrast types of attacks., 1.3 Explain threat actor types and attributes. ...37Decks130Flashcards1Learner -
coursera
coursera
By: Evin Hayes
Database fundamentals, computing platforms and software applications, Explore technology concepts and application architecture3Decks18Flashcards1Learner -
Professional Computing
Professional Computing
By: Harry Mitchell
Hardware, Networks, Software ...20Decks119Flashcards1Learner -
IT Security
IT Security
By: Kinzi Catalano
Cryptography Applications, 3 As, Secure Network Architecture ...6Decks25Flashcards1Learner