Learn Computer Application
Study Computer Application using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
AQA Computer Science GCSE
AQA Computer Science GCSE
By: Mrs Goodwin
Constants, variables and data types, Data structures, Program Flow control16Decks150Flashcards177Learners -
Computer Science Paper 1
Computer Science Paper 1
By: Deleted Deleted
Structure and Function of the Processor, Types of Processors, Input, Output and Storage16Decks430Flashcards12Learners -
A-Level Computer Science - Component 1 + 2
A-Level Computer Science - Component 1 + 2
By: Andrew O'Hara
1.1.1 - Structure and Function of the Processor, 1.1.2 Types of Processor, 1.1.3 Input, Output and Storage26Decks473Flashcards59Learners -
Amazon Web Services (Whitepaper)
Amazon Web Services (Whitepaper)
By: Bari Ryczek
*Cloud Computing Models*, *Cloud Computing Deployment Models*, *AWS Services & Application Access*29Decks274Flashcards6Learners -
Higher Computing
Higher Computing
By: Jack Leslie
Computer Systems: Chapter 1 (Data Representation), Computer Systems: Chapter 2 (Computer Structure), Computer Systems: Chapter 3 (Peripherals)17Decks376Flashcards53Learners -
OCR Computing A Level
OCR Computing A Level
By: Sausage Toast
Unit 1 Components of a Computer, Unit 2 Systems Software and Applications, Unit 3 Software Development13Decks601Flashcards9Learners -
Computers And The Internet
Computers And The Internet
By: Ashford Reid
Computers, File Management, Input and output management20Decks296Flashcards2Learners -
ICT and programming
ICT and programming
By: rouhma sajjaf
ICT in engineering/computer ethics & legal issues/components & functions of computer systems, Applications, graphics and multimedia software8Decks257Flashcards4Learners -
Computer Science
Computer Science
By: Ajinkya dange
Computer architecture and secondary memory, Operating Systems, Types of application Software5Decks234Flashcards1Learner -
Security+ SY0-601
Security+ SY0-601
By: David Wartman
1.0 Acronyms, 1.1 Social Engineering Techniques, 1.2 Malware Types37Decks832Flashcards358Learners -
CS1005 - Logic and Computation
CS1005 - Logic and Computation
By: Joey Pang
Computer Number Systems, Sets, Propositional Logic21Decks258Flashcards4Learners -
AD
AD
By: Anna Bergin
Storage, Compute (EC2), Deployment (Elastic Beanstalk, Cloud Formation, Code Deploy, Code Pipeline))21Decks575Flashcards1Learner -
Comptia
Comptia
By: Russell Davis
Social Engineering, Determine type of attack via indicators, Application Attacks35Decks1,194Flashcards16Learners -
CSci 11
CSci 11
By: Cypress Faith
Introductory Computer Concepts I, The Internet, The Web & E-Commerce, Basic Application Software11Decks505Flashcards4Learners -
Nursing Informatics
Nursing Informatics
By: Totoro Totoro
Applying the DIKW Model to Health Information Technology, Part 1: Intro to Nursing Informatics, Part 2: Computer Software8Decks797Flashcards16Learners -
Introduction to Computing
Introduction to Computing
By: Gabriel Garcia
Computer Organization and Hardware Part 1, Computer Organization and Hardware Part 2, Systems Software8Decks309Flashcards25Learners -
CIS101
CIS101
By: Professor Stryker
Chapter 01: Introduction to the World of Computers, Chapter 02: The System Unit: Processing and Memory, Chapter 03: Storage17Decks694Flashcards120Learners -
Software
Software
By: Emma Wardle
Application Layer, HTTP Of Application Layer, Layered Networks11Decks174Flashcards2Learners -
Computer Science
Computer Science
By: Halah A
3.1.16 Use of computer technology in society, 3.1.15 Database Concepts, 3.1.14 use of external code sources11Decks240Flashcards27Learners -
IGCSE ICT
IGCSE ICT
By: Ngan Nguyen
Section 1 - Types and components of computer systems, Section 2 - Input and output devices, Section 3 - Storages devices and media10Decks326Flashcards1,462Learners -
CEH v10
CEH v10
By: Nicholas Phelps
Module 1 - Intro to Ethical Hacking, Module 2 - Footprinting and Reconnaissance, Module 3 - Scanning Networks25Decks772Flashcards1,023Learners -
Security+ Practice exams
Security+ Practice exams
By: Alan Malone
Professor Messer Practice questions, CompTia practice questions, Comptia review questions38Decks2,776Flashcards124Learners -
CEH v11 Revision
CEH v11 Revision
By: A Red
Essential Knowledge, Security in Cloud Computing, Linux15Decks558Flashcards26Learners -
Security+ UDemy
Security+ UDemy
By: Kassandra Strong
Section 1, Section 2, Section 333Decks1,484Flashcards3Learners -
AWS DVA-C01
AWS DVA-C01
By: Phillip Son
Wiley Pre-Assessment, Chapter 1 Introduction to AWS Cloud Api, Chapter 2 Compute and Networking22Decks652Flashcards32Learners -
Computer Science Paper 2
Computer Science Paper 2
By: Efe Oni
Computational Thinking skills, Programming Techniques, Applications generations9Decks94Flashcards1Learner -
Study Guide SY0-601
Study Guide SY0-601
By: Dakota Edmunds
1.1 Compare and contrast different types of social engineering techniques., 1.5 Explain Different Threat Actors, Vectors And Intelligence Sources, 1.2 Given a scenario, analyze potential indicators to determine the type of attack20Decks620Flashcards150Learners -
MED 107- MEDICAL PHYSICS II
MED 107- MEDICAL PHYSICS II
By: Elena .M
1. IONISING RADIATION, 2. IONISING RADIATION: INTERACTIONS OF PHOTONS WITH MATTER, 3. IONISING RADIATION: X-RAY IMAGING108Decks2,263Flashcards6Learners -
CompTIA CASP+
CompTIA CASP+
By: Kevin Noble
Assessment, Application Security and Penetration Testing, Risk Management11Decks247Flashcards68Learners -
BTM 200
BTM 200
By: Komal Patel
BTM 200 FINAL, Unit 1 – Computer and Information Ethics, Unit 2 – Computer parts8Decks276Flashcards1Learner