Learn Digital Techniques
Study Digital Techniques using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
Security
Security
By: elvis sanchez
1.1 Compare and contrast different types of social engineering techniques., 1.2 Given a scenario, analyze potential indicators to determine the type of attack., 1.3 Given a scenario, analyze potential indicators associated with application attacks. ...40Decks663Flashcards1Learner -
OSCE
OSCE
By: Graeme Miller
Peak Expiratory Flow, Inhaler Technique, Respiratory Exam ...37Decks605Flashcards4Learners -
CA 3
CA 3
By: Jake P
3.1.1 Ethical and moral issues, and organisations' and individuals' response to these challenges, 3.1.2 How organisations and individuals respond to ethical and moral issues when designing and developing digital systems, 3.1.3 How individuals use a range of observational techniques to inform situational awareness ...4Decks89Flashcards3Learners -
Radio 1
Radio 1
By: Stephen C
Rad Physics, Rad Bio, Rad Protection Prescription ...6Decks175Flashcards1Learner -
Radiology
Radiology
By: Becky Bernstein
Legislation, Production and Properites, Interactions With Matter ...9Decks152Flashcards1Learner -
Radio Comms
Radio Comms
By: Kieran Baker
Chapter 1 - Intro, Chapter 2 - Propagation, Chapter 3 - Modulation ...14Decks61Flashcards1Learner -
MBChB - Yr 5 - Final OSCEs
MBChB - Yr 5 - Final OSCEs
By: Jam E
Peak Expiratory Flow, Inhaler Technique, Respiratory Exam ...36Decks575Flashcards4Learners -
LASx
LASx
By: Mary Ellen Josephine Mangiameli
Wound MGMT, Castration, Bandaging ...31Decks260Flashcards6Learners -
CySA+
CySA+
By: Brandon R
Cryptography, Managing Risk, Public Key Infrastructure ...28Decks234Flashcards2Learners -
OSCE
OSCE
By: Becca M
Peak Expiratory Flow, Inhaler Technique, Respiratory Exam ...45Decks1,018Flashcards1Learner -
IT Block 1
IT Block 1
By: KaWandra Wiggins
Electrical and Electronic Safety, End-to-End Communications, End-to-End Communication Aflot ...14Decks163Flashcards2Learners -
IB Psychology HL
IB Psychology HL
By: 芷 𐙚
Sampling techniques, Research methods, Cognitive Approach SAQ ...12Decks116Flashcards1Learner -
IB Psychology
IB Psychology
By: Felicia Graham
Biological approach to understanding behaviour, Hormones and Behaviour, Role of animal research ...17Decks115Flashcards2Learners -
BTEC ICT
BTEC ICT
By: Ellen Kennedy
Digital devices, uses of digital devices, input and output devices ...40Decks279Flashcards10Learners -
Unit 1 - Information Technology Systems
Unit 1 - Information Technology Systems
By: S B
Digital Devices - Content, Input And Ouput Devices - Content, Devices For Accessibilty And Data Processing - Content ...36Decks376Flashcards11Learners -
Digital Forensics
Digital Forensics
By: Kevin Zhang
Introduction to Forensic Science, Digital Evidence, Forensics Walk-Through ...26Decks351Flashcards2Learners -
Radiology
Radiology
By: Sushmi Jay
Legislation, Production and properties of xrays, Interactions of xrays with matter ...9Decks19Flashcards4Learners -
Psychology
Psychology
By: Alex Horan
Chapter 1: Research Methodology, Chapter 2: Localisation, Chapter 2: Neuroplasticity ...27Decks491Flashcards9Learners -
Sound Design for the Electronic Musician (Class)
Sound Design for the Electronic Musician (Class)
By: Nicolas Goleeke
Week 1 - Introduction to Electronic Music Synthesizers, Week 2 - Using Control Signals in Sound Design, Week 3 - Control Signals in Reason's Subtractor ...12Decks185Flashcards1Learner -
4th year OSCE
4th year OSCE
By: Dua Khan
Peak Expiratory Flow, Inhaler Technique, Respiratory Exam ...39Decks726Flashcards1Learner -
CC2
CC2
By: hnin eindra wai
Module 1: Computational Thinking, Module 2: Quantitative reasoning techniques, Module 3: Managing cybersecurity ...7Decks47Flashcards1Learner -
CySA+ 2023
CySA+ 2023
By: Thomas Hollinghurst
1A. Identify Security Control Types obj 5.3, 1B. Importance of Threat Data and Intelligence obj 1.1, 1.2, 2A. Threats and Threat Actor Types ...15Decks209Flashcards4Learners -
Psychology
Psychology
By: Lucy Perry
Cognitive Approach - Models of Memory, Cognitive Approach - Schema Theory, Cognitive Approach - Thinking & Decision Making ...30Decks183Flashcards1Learner -
Security+ Continuation
Security+ Continuation
By: Wisdom Eke
3.5 Given a scenario, implement secure mobile solutions., 3.6 Given a Scenario, apply Cybersecurity Solutions to the cloud, 3.7 Given a Scenarior, Implement Identity and account management controls ...15Decks463Flashcards1Learner -
computer science
computer science
By: kaylee putty
fundamentals of algorithms, programming basics, programming techniques ...9Decks51Flashcards1Learner -
CIMA E2
CIMA E2
By: James Alder
Business Ecosystems, Alternative Approaches to Business Models, Business models in a digital ecosystem ...11Decks65Flashcards2Learners -
4.0 Operations and Incident Response
4.0 Operations and Incident Response
By: E. Slate
4.1 Organizational Security, 4.2 Policies / Processes Incident Response, 4.3 Incident Investigation ...5Decks25Flashcards2Learners -
GMAT
GMAT
By: Daniel Zhu
Quant Rules, Unit Digit Patterns, Absolute Value Rules ...6Decks154Flashcards1Learner -
Digital Security & Forensics
Digital Security & Forensics
By: Emal Qaliff Azmi
Security Concepts and Models C1, Cybersecurity Threats C2, Introduction to Cryptography C3A ...9Decks93Flashcards1Learner -
IB Computer Science HL (old)
IB Computer Science HL (old)
By: Edward DUNNE
1.1.1 - Identify the context for which a new system is planned., 1.1.2 - Describe the need for change management., 1.1.3 - Outline compatibility issues resulting from situations including legacy systems or business mergers. ...64Decks295Flashcards20Learners