Learn Digital Accessibility
Study Digital Accessibility using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(22)
Decks
Flashcards
Learners
-
IT: Unit 1
IT: Unit 1
By: Angel Adeyeye
Unit 1: Page 1: Digital Devices 1, Unit 1: Page 6: Storage Devices, Unit 1: Page 7: Types of Operating Systems. ...33Decks399Flashcards2Learners -
CS407
CS407
By: Egan Da Silva
Week 7 - SQL Injection, Week 7 - Web Security Threats, Week 7 - Malware ...31Decks284Flashcards1Learner -
IT Unit 1
IT Unit 1
By: Jessica Smith
Digital Devices, Uses for Digital Devices, Storage Devices ...12Decks44Flashcards2Learners -
ICT B-Tec
ICT B-Tec
By: Grace Green
Factors In Choosing An It System, Applictaion Software 6, File Types 5 ...18Decks177Flashcards2Learners -
CompTIA Sec+
CompTIA Sec+
By: James Groth
GCGA Ch. 1 Mastering Security Basics, GCGA Ch.2 Understanding Identity and Access Management, GCGA Ch. 3 Exploring Network Technologies and Tools ...62Decks723Flashcards1Learner -
Computer science theory
Computer science theory
By: Stepan Blyumin
13.1 User defined data types, 13.2 file organisation and access, 13.3 Floating-point numbers, representation and manipulation ...11Decks116Flashcards1Learner -
Govt. Schemes
Govt. Schemes
By: Sanchita Verma
Mission Mausam, Pradhan Mantri Vanbandhu Kalyan Yojana, Pradhan Mantri Mudra Yojana (done) ...64Decks409Flashcards1Learner -
CSC2004: Cyber Security Fundamentals
CSC2004: Cyber Security Fundamentals
By: Jun Xian Lim
Summary: Lecture 13, Intro to Cryptography & Asymmetric Cryptography: Lecture 1, Access Control: Lecture 2 ...11Decks56Flashcards2Learners -
CISSP - Domain 7
CISSP - Domain 7
By: Floyd Mayfield
BCP (Business Continuity Plan), Incident Management 8 step lifecycle, Key Terms ...15Decks75Flashcards2Learners -
Security+ Continuation
Security+ Continuation
By: Wisdom Eke
3.5 Given a scenario, implement secure mobile solutions., 3.6 Given a Scenario, apply Cybersecurity Solutions to the cloud, 3.7 Given a Scenarior, Implement Identity and account management controls ...15Decks463Flashcards1Learner -
Unit 1 Learning Aim A
Unit 1 Learning Aim A
By: Adam Zz
Digital devices, Function and use of digital device, Input and output devices ...10Decks38Flashcards1Learner -
05 Assets, Threats, and Vulnerabilities
05 Assets, Threats, and Vulnerabilities
By: Amreek Paul
MD1 Understand risks, threats, and vulnerabilities, MD1 Common classification requirements, MD1 Digital and Physical Assets: Assets in a digital world ...50Decks337Flashcards2Learners -
IB Computer Science HL (old)
IB Computer Science HL (old)
By: Edward DUNNE
1.1.1 - Identify the context for which a new system is planned., 1.1.2 - Describe the need for change management., 1.1.3 - Outline compatibility issues resulting from situations including legacy systems or business mergers. ...48Decks295Flashcards23Learners -
Unit 4 - Scots Criminal Law: Introduction And Investigation
Unit 4 - Scots Criminal Law: Introduction And Investigation
By: Ross McDermaid
Unit 4 Lesson 1: Crimes of Disorder, Unit 4 Lesson 2: Crimes of Violence, Unit 4 Lesson 3: Accession ...19Decks100Flashcards3Learners -
Intro. Distribuidos
Intro. Distribuidos
By: Nicole Raveszani
Chapter 2 - Principles of Network Applications, Chapter 2 - The Web and HTTP, 2.3 Electronic Mail in the Internet ...25Decks134Flashcards2Learners -
CAT
CAT
By: Lindiwe Motha
Internet Access, Digital Communication, VOIP (voice Over Internet Protocol) ...9Decks25Flashcards1Learner -
Computer Application Technology
Computer Application Technology
By: Alisha Maphosa
Systems Technology, Types of computing devices, Mobile Devices ...40Decks87Flashcards1Learner -
COSC301
COSC301
By: Unknown Unknown
2. TCP/IP Model and Network Entities, 3. IPv6 Addressing and Concepts, 4. Access Control Models ...20Decks72Flashcards1Learner -
IT
IT
By: Jamie McLean
Digital Devices, Accessibility and Data Processing2Decks24Flashcards1Learner -
IB Computing 2025
IB Computing 2025
By: Edward DUNNE
1.1.1 - Identify the context for which a new system is planned., 1.1.2 - Describe the need for change management., 1.1.3 - Outline compatibility issues resulting from situations including legacy systems or business mergers. ...73Decks464Flashcards7Learners -
Security+
Security+
By: Anne Leach
1. Malware and IOC, 2. Attacks, 3. Threat Actors ...29Decks66Flashcards1Learner -
Health and Human Unit 2 Exam Revision
Health and Human Unit 2 Exam Revision
By: Sarah Collins
Overview of the Human Lifespan, Perceptions of youth and adulthood as stages of the lifespan, Definitions and characteristics of development including physical, social, emotional and intellectual ...18Decks55Flashcards1Learner