Learn Social Network
Study Social Network using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
Entrepreneurial
Entrepreneurial
By: Lady Rey Belando
Types Of Business Model, Type Of Modern Business Model, Key Partners ...23Decks168Flashcards4Learners -
Neuroscience 2: higher cognitive function
Neuroscience 2: higher cognitive function
By: Sofie Sørensen
Module 1: L1-4 - intro, Module 1: L5-6 + 8-9 - development, Module 1: L7 + L12-L17 - MDD and BIP ...20Decks283Flashcards2Learners -
2. Management Information Systems
2. Management Information Systems
By: Stephanie Geary
Lesson 1: Informations Systems and You, Lesson 2: Business Processes and Decision Making, Lesson 3: Productivity, Innovation, and Strategy ...13Decks97Flashcards1Learner -
Business A level (Year2)
Business A level (Year2)
By: Ella Gray
Unit 7a - Mission, corporate objectives and strategy notes (includes SWOT), Unit 7a Analysing internal position: financial ratio analysis, 7a 3 Analysing internal position: overall position (Kaplan & Norton) ...29Decks733Flashcards44Learners -
SEC+SY0-601
SEC+SY0-601
By: Scott Byrams
1.1 Compare and contrast different types of social engineering tecchniques, 1.2 Analyze potential indicators to determine the type of attack, 1.3 Analyze potential indicators associated with application attacks ...35Decks546Flashcards19Learners -
Espanol 2 honores
Espanol 2 honores
By: Chelsea Gonzalez
Unit 4, Vocab P, Movement ...8Decks191Flashcards1Learner -
Geography HSC
Geography HSC
By: Irene Xiao
Ecosystems at risk: Reasons for protection, Ecosystems at risk: vulnerability and resilience, Ecosystems at risk: traditional and contemporary management ...23Decks201Flashcards152Learners -
A Computer Science : Unit 1
A Computer Science : Unit 1
By: ww ww
1.1.1 Architecture Introduction, 1.1.2 Von Neumann Architecture, 1.1.3 Factors affecting CPU performance ...26Decks253Flashcards2Learners -
Business Analytics & Emerging Trends
Business Analytics & Emerging Trends
By: Rob Vermeer
Lecture 1 - Business Analytics Trends, Lecture 2 - Industry 4.0 & Knowledge graphs, Readings Week 1 ...14Decks111Flashcards2Learners -
IT Theory 2018
IT Theory 2018
By: R W
1.1- Hardware, 4.3- Intro to Multi-Tables, 2.3- The Internet and the WWW ...12Decks190Flashcards2Learners -
CompTIA Security Tests
CompTIA Security Tests
By: Hyun Rim
CH01 Overview of Security, CH02 Malware, CH03 Malware Infection ...56Decks2,102Flashcards1Learner -
Security + SY0-601
Security + SY0-601
By: Alket Shabani
1.1 Compare and contrast different types of social engineering techniques., 1.2 Given a scenario, analyze potential indicators to determine the type of attack., 1.3 Given a scenario, analyze potential indicators associated with application attacks. Given a scenario, analyze potential indicators associated with network attacks. ...24Decks258Flashcards40Learners -
IB Computer Science HL (old)
IB Computer Science HL (old)
By: Edward DUNNE
1.1.1 - Identify the context for which a new system is planned., 1.1.2 - Describe the need for change management., 1.1.3 - Outline compatibility issues resulting from situations including legacy systems or business mergers. ...64Decks295Flashcards20Learners -
Introduction to electronic business
Introduction to electronic business
By: Ninni Svensson
Marketing, B2C- E-tailing, E-payment ...5Decks122Flashcards1Learner -
Cpl Exam
Cpl Exam
By: Kory White
202 Rules And Regulations, 304 Civil Lawsuits, Subpoenas For Documents And Open Records, 305 Grooming And Dress Regulations ...9Decks230Flashcards3Learners -
Security +
Security +
By: Blayne Ehrenzeller
Social Engineering and Security Fundamentals, Malware, Password Attacks ...16Decks195Flashcards1Learner -
Pentest+
Pentest+
By: Zoubida Regzal
1 Planning & scoping, 2.1 Information gathering & Vulnerability scanning: passive reconnaissance, 2.2.1 Information gathering & Vulnerability scanning: active reconnaissance/ scanning & recon ...28Decks782Flashcards1Learner -
Theories of Marketing
Theories of Marketing
By: Puk slewe
1.1 Knowledge clip Customer experience management, 1.2 kc: network paradigm, 1.3 lecture 1 ...40Decks516Flashcards2Learners -
Ethics + Sociology
Ethics + Sociology
By: Unknown J
Ethics and Professionalism, Abortion, Ageing and Society ...11Decks240Flashcards1Learner -
Security+
Security+
By: a a
Ports, Hashing Algorithms, Symmetric Encryption ...16Decks167Flashcards3Learners -
Security+ Study Pts
Security+ Study Pts
By: Carmen Menéndez
X- Security+ Exam 411, 1- Mastering the Basics, 2- Exploring Control Types/ Methods ...12Decks124Flashcards3Learners -
Equality, Diversity, and Rights
Equality, Diversity, and Rights
By: Rebecca Edmondson
the care act 2014, Words, The Equality Act ...14Decks57Flashcards3Learners -
Anglais
Anglais
By: Vicky Rodgers
Linkwords, Expressions Idiomatiques, Racism ...14Decks263Flashcards1Learner -
A+ Technical Training
A+ Technical Training
By: Mark Straley
Chapter 1: Operational Procedures, Chapter 2: Planning and Professionalism, Chapter 3: Operating System Fundamentals ...22Decks120Flashcards3Learners -
E-Assessment
E-Assessment
By: Said Togru
Lecture 1: Introduction E-Assessment, Lecture 2: Formative Assessment & Peer Feedback & Peer Assessment, Lecture 3: Summative Assessment, E-Exams, Architectures ...12Decks73Flashcards1Learner -
SYO-601
SYO-601
By: Maria Ouvarova
Social Engineering, Types of Attack, Computing Architecture ...10Decks600Flashcards1Learner -
Behavior, Health and Wellbeing
Behavior, Health and Wellbeing
By: Esther Cherukara
BCM: Basic Methods at the Individual Level, BCM: Methods to Increase Knowledge, BCM: Methods to Change Awareness and Risk Perception ...18Decks184Flashcards4Learners -
PenTest+
PenTest+
By: Odin Boseth
Section 1: Planning an Engagement, Section 2: Scoping an Engagement, Section 3: Passive Reconnaissance ...22Decks201Flashcards1Learner -
Comptia Security +601
Comptia Security +601
By: Avi'ance Jarreau
Chapter 1 - Social Engineering Techniques, Chapter 2- Type of Attack Indicators, Chapter 3- Application Attack Indicators ...8Decks76Flashcards1Learner -
SEC+ 601
SEC+ 601
By: Duc Phan
1.1: Compare and contrast different types of social engineering techniques. , 1.2 Given a scenario, analyze potential indicators to determine the type of attack., 1.3 Given a scenario, analyze potential indicators associated with application attacks. ...9Decks222Flashcards1Learner