Learn Computer Application
Study Computer Application using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
Network+
Network+
By: Aaron Nunnally
Securing TCP/IP, Network Models, Cabling and Topology21Decks641Flashcards4Learners -
Network+
Network+
By: Matt Miller
Chapter 2: Network Models, Chapter 3: Cabling and Topology, Chapter 4: Ethernet Basics22Decks937Flashcards492Learners -
Study Guide SY0-601
Study Guide SY0-601
By: Dakota Edmunds
1.1 Compare and contrast different types of social engineering techniques., 1.5 Explain Different Threat Actors, Vectors And Intelligence Sources, 1.2 Given a scenario, analyze potential indicators to determine the type of attack20Decks620Flashcards150Learners -
OCR A LEVEL COMPUTER SCIENCE
OCR A LEVEL COMPUTER SCIENCE
By: Zack Walsh
1.1.1 Structure and function of the processor, 1.1.2 Types of processor, 1.1.3 Input, output and storage20Decks333Flashcards6Learners -
A Level Comp Sci Paper 1
A Level Comp Sci Paper 1
By: Thasfi Islam
1.1.1 Structure And Function Of The Processor, 1.1.2 Types of Processors, 1.1.3 Input, output and storage devices16Decks857Flashcards9Learners -
Digital Technology (GCSE)
Digital Technology (GCSE)
By: Declan Larkin
Topic 1-Digital Data, Topic 2-Software, Topic 3-Database Concepts6Decks165Flashcards35Learners -
Principles II - Vocabulary
Principles II - Vocabulary
By: Emily Thomas
Small Business Management, Funeral Directing, Funeral Service Merchandising21Decks1,800Flashcards25Learners -
A Level Computer Science Paper 1
A Level Computer Science Paper 1
By: Billy Chambers
1.1.1 Processors, input, output and storage, 1.3.3 Networks Pt1, 1.4.2 Data Structures23Decks657Flashcards336Learners -
CIS*1000
CIS*1000
By: 1a agostin
Unit 01: The Impact of Technology in a Changing World, TB - Review/Practice, Unti 02: Looking at Computers - Understanding the Parts15Decks1,588Flashcards79Learners -
Certified Ethical Hacker
Certified Ethical Hacker
By: James Carrion
Essential Knowledge, Reconnaissance, Scanning and Enumeration13Decks789Flashcards15Learners -
Living In It Era
Living In It Era
By: Tanjim Seyeon
Application ICT In Our Daily life, History Of Computers, Basic COMPUTING Periods Ages7Decks210Flashcards1Learner -
AWS Certified Cloud Practitioner (CCP)
AWS Certified Cloud Practitioner (CCP)
By: Christine Darcy
Cloud Computing and AWS, Identity and Access Management, AWS Compute Services15Decks284Flashcards11Learners -
Net+ exam
Net+ exam
By: kim kim
Chapter 2: Network Models, Chapter 3: Cabling and Topology, Chapter 4: Ethernet Basics33Decks1,140Flashcards61Learners -
Computer Science
Computer Science
By: Gianmarco Barca
General, Professional Scrum, Application Modernization14Decks260Flashcards1Learner -
CEH v12 Exam Prep "Hard"
CEH v12 Exam Prep "Hard"
By: Naser aljufairah
Module 01 - Introduction to Ethical Hacking ( EC Mode ), Module 02 - Footprinting and Reconnaissance ( EC Mode ), Module 03 - Scanning Networks ( EC Mode )19Decks1,206Flashcards1Learner -
CompTIA Security+ Certification Practice Exams, Fourth Edition (Exam SY0-601)
CompTIA Security+ Certification Practice Exams, Fourth Edition (Exam SY0-601)
By: Alex valentine
Networking Basics and Terminology (1), Networking Basics and Terminology (2), Introduction to Security Terminology26Decks658Flashcards298Learners -
Computer Vision Exam Revision
Computer Vision Exam Revision
By: SO Amri
Week 1: Introduction into Computer Vision, Week 2: Object Detection & Recognition, Week 3: Videos6Decks105Flashcards1Learner -
Computing Y9
Computing Y9
By: Ethan Retish
November Exams, Computational Thinking, Binary to Denary and Hexadecimals6Decks45Flashcards5Learners -
Security + Messer
Security + Messer
By: Blayne Ehrenzeller
1.1 - Social Engineering, 1.2 - Attack Types, 1.3 - Application Attacks24Decks622Flashcards1Learner -
CCSK v4
CCSK v4
By: wyt hat
Domain 1 - Cloud Computing Concepts and Architectures, Domain 2 - Governance and Enterprise Risk Management, Domain 3 - Legal Issues, Contracts and E-discovery11Decks238Flashcards350Learners -
AWS Architect Associate
AWS Architect Associate
By: Fernando Guerra
Resilient Architectures - Availability, Resilient Architectures - Environment setup, Resilient Architectures - CloudFormation30Decks349Flashcards4Learners -
I40(0/1/2) Computer Science Bsc
I40(0/1/2) Computer Science Bsc
By: Aria Noroozi
ECM 1407 Electronic Machines, ECM 1407 The History of Computing, ECM 1407 Encryption41Decks590Flashcards1Learner -
CP102 - Info Processing with Micros
CP102 - Info Processing with Micros
By: Alana Leclair
Chapter 1 - Using Technology to Change the World, Chapter 2 - Looking at Computers: Understanding the Parts, Chapter 3 - Using the Internet: Making the Most of the Web's Resources15Decks771Flashcards113Learners -
MIDTERM IT ERA
MIDTERM IT ERA
By: Chloe Kempis
Cloud Computing, Security and Maintenance, Program and Applications5Decks176Flashcards1Learner -
A level Computer Science
A level Computer Science
By: Max Conroy
1.1 The characteristics of contemporary processors, input, output and storage devices, 1.2.1 - 1.2.2 Systems software + Applications generation, 1.2.3 Software development16Decks692Flashcards145Learners -
ICT
ICT
By: Noah Fenton
Networks, Network security, Effects of using ICT9Decks414Flashcards7Learners -
WJEC Computing A2
WJEC Computing A2
By: matas povilonis
Data Structures Part 1, Data Structures Part 2, Operating Systems5Decks426Flashcards6Learners -
CompTia Security Plus
CompTia Security Plus
By: Jason Owens
1.1 Social Engineering, 1.2 Attack Types, 1.3 Application Attacks35Decks722Flashcards11Learners -
EC-COUNCIL CEH
EC-COUNCIL CEH
By: Isham Mohamed
Cryptography, Common, Cloud Computing16Decks257Flashcards9Learners -
computer
computer
By: Krishtina Ranjitkar
contents of computer, characteristics, applications of computer, merits and demerits of computer7Decks53Flashcards1Learner