Learn Computer Applications
Study Computer Applications using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Top Computer Applications Flashcards Ranked by Quality
-
AQA Computer Science GCSE
AQA Computer Science GCSE
By: Mrs Goodwin
150 Cards –16 Decks –177 LearnersSample Decks: Constants, variables and data types, Data structures, Program Flow controlShow Class -
Computer Science Paper 1
Computer Science Paper 1
By: Deleted Deleted
430 Cards –16 Decks –12 LearnersSample Decks: Structure and Function of the Processor, Types of Processors, Input, Output and StorageShow Class -
Amazon Web Services (Whitepaper)
Amazon Web Services (Whitepaper)
By: Bari Ryczek
274 Cards –29 Decks –6 LearnersSample Decks: *Cloud Computing Models*, *Cloud Computing Deployment Models*, *AWS Services & Application Access*Show Class -
A-Level Computer Science - Component 1 + 2
A-Level Computer Science - Component 1 + 2
By: Andrew O'Hara
473 Cards –26 Decks –59 LearnersSample Decks: 1.1.1 - Structure and Function of the Processor, 1.1.2 Types of Processor, 1.1.3 Input, Output and StorageShow Class -
Higher Computing
Higher Computing
By: Jack Leslie
376 Cards –17 Decks –53 LearnersSample Decks: Computer Systems: Chapter 1 (Data Representation), Computer Systems: Chapter 2 (Computer Structure), Computer Systems: Chapter 3 (Peripherals)Show Class -
OCR Computing A Level
OCR Computing A Level
By: Sausage Toast
601 Cards –13 Decks –9 LearnersSample Decks: Unit 1 Components of a Computer, Unit 2 Systems Software and Applications, Unit 3 Software DevelopmentShow Class -
Computers And The Internet
Computers And The Internet
By: Ashford Reid
296 Cards –20 Decks –2 LearnersSample Decks: Computers, File Management, Input and output managementShow Class -
ICT and programming
ICT and programming
By: rouhma sajjaf
257 Cards –8 Decks –4 LearnersSample Decks: ICT in engineering/computer ethics & legal issues/components & functions of computer systems, Applications, graphics and multimedia softwareShow Class -
Computer Science
Computer Science
By: Ajinkya dange
234 Cards –5 Decks –1 LearnerSample Decks: Computer architecture and secondary memory, Operating Systems, Types of application SoftwareShow Class -
Security+ SY0-601
Security+ SY0-601
By: David Wartman
832 Cards –37 Decks –358 LearnersSample Decks: 1.0 Acronyms, 1.1 Social Engineering Techniques, 1.2 Malware TypesShow Class -
CS1005 - Logic and Computation
CS1005 - Logic and Computation
By: Joey Pang
258 Cards –21 Decks –4 LearnersSample Decks: Computer Number Systems, Sets, Propositional LogicShow Class -
AD
AD
By: Anna Bergin
575 Cards –21 Decks –1 LearnerSample Decks: Storage, Compute (EC2), Deployment (Elastic Beanstalk, Cloud Formation, Code Deploy, Code Pipeline))Show Class -
Comptia
Comptia
By: Russell Davis
1,194 Cards –35 Decks –16 LearnersSample Decks: Social Engineering, Determine type of attack via indicators, Application AttacksShow Class -
CSci 11
CSci 11
By: Cypress Faith
505 Cards –11 Decks –4 LearnersSample Decks: Introductory Computer Concepts I, The Internet, The Web & E-Commerce, Basic Application SoftwareShow Class -
Introduction to Computing
Introduction to Computing
By: Gabriel Garcia
309 Cards –8 Decks –25 LearnersSample Decks: Computer Organization and Hardware Part 1, Computer Organization and Hardware Part 2, Systems SoftwareShow Class -
Nursing Informatics
Nursing Informatics
By: Totoro Totoro
797 Cards –8 Decks –16 LearnersSample Decks: Applying the DIKW Model to Health Information Technology, Part 1: Intro to Nursing Informatics, Part 2: Computer SoftwareShow Class -
CIS101
CIS101
By: Professor Stryker
694 Cards –17 Decks –120 LearnersSample Decks: Chapter 01: Introduction to the World of Computers, Chapter 02: The System Unit: Processing and Memory, Chapter 03: StorageShow Class -
Software
Software
By: Emma Wardle
174 Cards –11 Decks –2 LearnersSample Decks: Application Layer, HTTP Of Application Layer, Layered NetworksShow Class -
Computer Science
Computer Science
By: Halah A
240 Cards –11 Decks –27 LearnersSample Decks: 3.1.16 Use of computer technology in society, 3.1.15 Database Concepts, 3.1.14 use of external code sourcesShow Class -
Security+ Practice exams
Security+ Practice exams
By: Alan Malone
2,776 Cards –38 Decks –124 LearnersSample Decks: Professor Messer Practice questions, CompTia practice questions, Comptia review questionsShow Class -
IGCSE ICT
IGCSE ICT
By: Ngan Nguyen
326 Cards –10 Decks –1,462 LearnersSample Decks: Section 1 - Types and components of computer systems, Section 2 - Input and output devices, Section 3 - Storages devices and mediaShow Class -
CEH v10
CEH v10
By: Nicholas Phelps
772 Cards –25 Decks –1,023 LearnersSample Decks: Module 1 - Intro to Ethical Hacking, Module 2 - Footprinting and Reconnaissance, Module 3 - Scanning NetworksShow Class -
CEH v11 Revision
CEH v11 Revision
By: A Red
558 Cards –15 Decks –26 LearnersSample Decks: Essential Knowledge, Security in Cloud Computing, LinuxShow Class -
Security+ UDemy
Security+ UDemy
By: Kassandra Strong
1,484 Cards –33 Decks –3 LearnersSample Decks: Section 1, Section 2, Section 3Show Class -
AWS DVA-C01
AWS DVA-C01
By: Phillip Son
652 Cards –22 Decks –32 LearnersSample Decks: Wiley Pre-Assessment, Chapter 1 Introduction to AWS Cloud Api, Chapter 2 Compute and NetworkingShow Class -
Computer Science Paper 2
Computer Science Paper 2
By: Efe Oni
94 Cards –9 Decks –1 LearnerSample Decks: Computational Thinking skills, Programming Techniques, Applications generationsShow Class -
MED 107- MEDICAL PHYSICS II
MED 107- MEDICAL PHYSICS II
By: Elena .M
2,263 Cards –108 Decks –6 LearnersSample Decks: 1. IONISING RADIATION, 2. IONISING RADIATION: INTERACTIONS OF PHOTONS WITH MATTER, 3. IONISING RADIATION: X-RAY IMAGINGShow Class -
CompTIA CASP+
CompTIA CASP+
By: Kevin Noble
247 Cards –11 Decks –68 LearnersSample Decks: Assessment, Application Security and Penetration Testing, Risk ManagementShow Class -
Study Guide SY0-601
Study Guide SY0-601
By: Dakota Edmunds
620 Cards –20 Decks –150 LearnersSample Decks: 1.1 Compare and contrast different types of social engineering techniques., 1.5 Explain Different Threat Actors, Vectors And Intelligence Sources, 1.2 Given a scenario, analyze potential indicators to determine the type of attackShow Class -
BTM 200
BTM 200
By: Komal Patel
276 Cards –8 Decks –1 LearnerSample Decks: BTM 200 FINAL, Unit 1 – Computer and Information Ethics, Unit 2 – Computer partsShow Class