Learn Data Privacy
Study Data Privacy using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
Mobile Development and Ubiquitous Computing
Mobile Development and Ubiquitous Computing
By: Daniel Casley
Android OS, Android Activity Lifecycle, Intents ...12Decks190Flashcards1Learner -
GCSE Computer Science
GCSE Computer Science
By: Dank Memes
Chapter 5: Networks and the Internet, Chapter 4: Computers, Chapter 6: Ethics, privacy and the bigger picture ...6Decks131Flashcards1Learner -
COMPTIA A+ 220-1101 [Core 1]
COMPTIA A+ 220-1101 [Core 1]
By: Bilal Durrani
IT Fundamentals, 1.1 Physical Privacy & Security, 1.2 Display Components ...128Decks1,111Flashcards105Learners -
RCT
RCT
By: Anna Tröger
lecture 1: RCT overview, lecture 2: control groups, recruitments of patients ...16Decks210Flashcards1Learner -
GCSE Computing
GCSE Computing
By: Rhea Rhea
3.4 Computer Systems, 3.8 Aspects Of Software Development, 3.7 Ethical, Legal And Environmental Impacts Of Digital Technology On Wider Society, Inclusing Issues Of Privacy ...8Decks196Flashcards2Learners -
SC-900
SC-900
By: Elizabeth Sanchez
Describe Security and Compliance Concepts, Describe Identity Concepts, Describe the function and identity types of Microsoft Entra ID ...15Decks102Flashcards3Learners -
macOS High Sierra - Support Essentials 10.13
macOS High Sierra - Support Essentials 10.13
By: Sean Martin
Part 1: Installation and Configuration - Lesson 1—Introduction to macOS, Part 1: Installation and Configuration - Lesson 2—Update, Upgrade, or Reinstall macOS, Part 1: Installation and Configuration - Lesson 3—Set Up and Configure macOS ...28Decks197Flashcards55Learners -
MIS 311
MIS 311
By: Clinton Richardson
Lecture 13 - IT Infrastructure: Large (Enterprise) Applications, ERP, Metrics, Lecture 14 - Software Development Life Cycle (SDLC), Lecture 15 - Project Management Planning & the Critical Path Method ...12Decks184Flashcards4Learners -
Marketing
Marketing
By: bastian schumaker
Chapter 1: Defining marketing and the marketin process, Chapter 3: analyzing the marketing environment, Chapter 5: Consumer markets and buyer behavior ...28Decks273Flashcards1Learner -
Comp TIA A+ 220 1002 Chris
Comp TIA A+ 220 1002 Chris
By: chris carnaffin
1.1 - Compare and contrast common operating system types and their purposes., 1.2 - Compare and contrast features of Microsoft Windows versions., 1.3 - Summarise general OS installation considerations and upgrade methods. ...33Decks497Flashcards113Learners -
MS IT-CYBERSECURITY
MS IT-CYBERSECURITY
By: M.K. Gallegos
Passwords, Deep Web vs Dark Web, Passwordless & Privacy Settings ...21Decks168Flashcards1Learner -
Local Area Networks
Local Area Networks
By: noah carlo-armstrong
Windows Server Installation, server roles, powershell ...22Decks283Flashcards1Learner -
CIPP/US Exam Prep
CIPP/US Exam Prep
By: Megan Medina
Chapter 1: Intro to Privacy, Chapter 2: U.S. Legal Framework, Chapter 3: Federal and State Regulators and Enforcement Privacy ...15Decks26Flashcards2Learners -
Security
Security
By: elvis sanchez
1.1 Compare and contrast different types of social engineering techniques., 1.2 Given a scenario, analyze potential indicators to determine the type of attack., 1.3 Given a scenario, analyze potential indicators associated with application attacks. ...40Decks663Flashcards1Learner -
English
English
By: 家伟 孙
NASA picks three companies to send cargo to the moon., The Carbon Tax Fallacy, The Guardian 2018.06.26 ...8Decks344Flashcards1Learner -
2024 Sylb D1_PM_20% Commercial & Tax
2024 Sylb D1_PM_20% Commercial & Tax
By: Boy Secnar
I. CORPORATION LAW (R.A. No. 11232, Revised Corporation Code), II. PARTNERSHIP, III. INSURANCE LAW (P.D. No. 612, as amended by R.A. No. 10607) ...12Decks276Flashcards1Learner -
Security+ Continuation
Security+ Continuation
By: Wisdom Eke
3.5 Given a scenario, implement secure mobile solutions., 3.6 Given a Scenario, apply Cybersecurity Solutions to the cloud, 3.7 Given a Scenarior, Implement Identity and account management controls ...15Decks463Flashcards1Learner -
Political Law- Bill of Rights
Political Law- Bill of Rights
By: Navy Seal Bar
BOR Equal Protection, BOR Privacy of Communication, BP 880 ...20Decks207Flashcards1Learner -
CompTIA A+ Core 2
CompTIA A+ Core 2
By: Birdman Jetson
1.1 Identify Basic Features of Microsoft Windows Editions, 1.2 Microsoft Command Line Tool, 1.3 Use Features & Tools of Microsoft Windows 10 Operating System (OS) ...35Decks506Flashcards16Learners -
IMKM
IMKM
By: Lewon Simonian
1 - Information & Knowledge Management: Fundamentals, 2 Strategy & Information Management I (Business IT Alignment), 3 Strategy & Information Management II (IT-enabled Strategies) ...11Decks141Flashcards2Learners -
Computing
Computing
By: Ayesha Shahzad
Fundamentals of Algorithms, Programming, Fundamentals of data representation ...7Decks156Flashcards1Learner -
Computing & Society
Computing & Society
By: christopher daly
Lecture 3 Information Access And Consumption, Lecture 1 Digital Citezenship, Lecture 2 Biometrics And Security ...22Decks198Flashcards4Learners -
ag-AWS 2018 - By Service Section - FAQs
ag-AWS 2018 - By Service Section - FAQs
By: Anti Gondu
Alexa for Business | Calendar integration, Alexa for Business | Calling and conferencing, Alexa for Business | Enrolled users and personal devices ...744Decks6,164Flashcards1Learner -
PI
PI
By: Zoey Sheffield
Law and Government, Software Contracts and Licences, The Computing Profession ...8Decks71Flashcards2Learners -
macOS Support Essentials 10.13 - Exam Test Questions
macOS Support Essentials 10.13 - Exam Test Questions
By: Amy Jumper
Part One: Installation and Configuration - Lesson 1—Introduction to macOS, Lesson 2—Update, Upgrade, or Reinstall macOS, Lesson 3—Set Up and Configure macOS ...28Decks190Flashcards81Learners -
BA_1530
BA_1530
By: George Dzyubinskiy
C1. The Digital Enterprise, C2. Digital Strategy and Competitive Advantage, C3. Business Intelligence and Data-Driven Decision Making ...7Decks79Flashcards2Learners -
CE
CE
By: Nicolo' Fontana
1 - What Is computer ethics? - Moor, 2 - The responsibilities of engineers - Van De Poel, 3 - Do artifacts have politics? - Winner ...7Decks96Flashcards1Learner -
ADB with PYSPARK
ADB with PYSPARK
By: Thomas Reddy
Cloud Computing Concepts, Core Azure Services, Security, Privacy, Compliance ...40Decks80Flashcards2Learners -
HIS
HIS
By: Megara Deamonne
1: THE VISION, MISSION, CORE VALUES AND OBJECTIVES OF THE INSTITUTION, 2: HEALTH SYSTEM, 3: PHILIPPINE HEALTH CARE AND THE PHILIPPINE HEALTH CARE DELIVERY SYSTEM ...11Decks189Flashcards1Learner -
Practice
Practice
By: Spirit Writer
(1)CyberSecurity Objectives, (1)Privacy Vs. Security, (1)Evaluating Security Risks ...89Decks906Flashcards3Learners