Learn Software Processes
Study Software Processes using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
HUGB
HUGB
By: Ævar Ástþórsson
Software Process, Life cycles, Agile methods ...15Decks128Flashcards2Learners -
Comp 361D1
Comp 361D1
By: Arok Khot
The Software Engineering Process: Phase 1, The Software Engineering Process: Phase 2, Design The Software Engineering Process: Phase 33Decks63Flashcards1Learner -
PRIM
PRIM
By: Sven de Waard
Lean, Six Sigma, BPM ...9Decks103Flashcards2Learners -
information management
information management
By: Teresa Handawi
Week 7&8 Social Media IS, Digital Marketing, Week 9 - Smart Accounting Information Security Management, Business Continuity Planning, Week 10 - Organizations and IS ...11Decks124Flashcards1Learner -
2. Management Information Systems
2. Management Information Systems
By: Stephanie Geary
Lesson 1: Informations Systems and You, Lesson 2: Business Processes and Decision Making, Lesson 3: Productivity, Innovation, and Strategy ...13Decks97Flashcards1Learner -
Introduction to Operating Systems and Becoming a Power User
Introduction to Operating Systems and Becoming a Power User
By: Rebekah Pesquera
Module 1, day 1, Module 1, day 2, module 1, day 3: windows make directories in gui and cli) through windows moving a renaming files, directories ...34Decks2,504Flashcards17Learners -
Computing
Computing
By: Daniel Barber
Topic 1.1 - Data Structures, Topic 1.2 - Logical Operations, 1.3 - Algorithms ...17Decks251Flashcards5Learners -
CompTIA Security+ SY0-501 - Based on Objectives X
CompTIA Security+ SY0-501 - Based on Objectives X
By: xavier Xavier
1.0 Threats, Attacks and Vulnerabilities (21%), 1.1 Given a scenario, analyze indicators of compromise and determine the type of malware., 1.2 Compare and contrast types of attacks. ...45Decks887Flashcards15Learners -
NURSING INFORMATICS
NURSING INFORMATICS
By: ADRIANNE DOMINIQUE BENAURO
Module 01: Computer and Nursing, Module 02: Computer Hardware and Software, Module 03: Data and Data Processing3Decks253Flashcards1Learner -
PRMS
PRMS
By: user delete
Designprinzipien, Input Processing, Authentication ...7Decks89Flashcards3Learners -
Software Engineering 1
Software Engineering 1
By: Kevin May
Is Software Engineering Dead? - Roger S. Pressman, No Silver Bullet - Frederick P. Brooks, Jr., Software Process, Ian Sommerville (CH 4) ...5Decks74Flashcards2Learners -
It (Topic review)
It (Topic review)
By: one touch
Secondary storage, System Software, Troubleshoot computer hardware ...6Decks41Flashcards1Learner -
CDAP 350 Audiology
CDAP 350 Audiology
By: Emily Beacham
Amplification Systems and Aural Rehabilitation, Perscriptive Formulas, Compression And Hearing Software, Hearing Instrument Styles and Earmolds ...4Decks84Flashcards4Learners -
CEN4020: Software Engineering I
CEN4020: Software Engineering I
By: Wynne Nicholas
Exam 3 Study, Exam 3 CMM Levels, Components of a Software Project Management Plan ...10Decks171Flashcards2Learners -
BEC - IT Fundamentals & Systems
BEC - IT Fundamentals & Systems
By: Tired Pup
Data, Software, & Databases, Hardware, Transaction Processing ...9Decks199Flashcards2Learners -
CompTIA Security+ SY0-501 - Objectives
CompTIA Security+ SY0-501 - Objectives
By: Eliza Hazard
1.0 Threats, Attacks and Vulnerabilities (21%), 1.1 Given a scenario, analyze indicators of compromise and determine the type of malware., 1.2 Compare and contrast types of attacks. ...45Decks887Flashcards10Learners -
ICT Unit 2
ICT Unit 2
By: Matthew Grimsley
Data Representation, Data, information and knowledge, Architecture ...10Decks120Flashcards2Learners -
INFO123
INFO123
By: Frazer Hawke
Week 7: Hardware, Software and Mobile Systems, Week 8: Data, Databases and Data Management, Week 9: Big Data and Business Intelligence Systems ...8Decks125Flashcards4Learners -
Test Analyst Interview
Test Analyst Interview
By: E Hole
Tell me about yourself, Metrics, Defect Life Cycle ...35Decks572Flashcards5Learners -
Computer Science
Computer Science
By: Jolyon Knagg
1.1 Hardware and Communication, 1.2 Logical Operations, 1.3 Data Transmission ...17Decks193Flashcards2Learners -
Functional Safety
Functional Safety
By: Jalal Elwazze
Module 2 - Process Safety and Functional Safety, Module 3 - IEC 61508 and IEC 61511, Module 4 - Hazard and Risk Assessment + Allocation of Protection Layers ...15Decks164Flashcards7Learners -
Software
Software
By: Shelly Y
Software, Software 2, Software 3 ...10Decks89Flashcards1Learner -
Software Engineering
Software Engineering
By: Lukas W
Requirements Engineering, Use Cases, Domain Modelling ...11Decks128Flashcards2Learners -
computing component 1
computing component 1
By: Susie Cabral
MAR MDR CIR, databases, 1.1.1 structure and function of the processor ...32Decks243Flashcards1Learner -
Massey Subjects
Massey Subjects
By: Kelsey Martin
Topic 3.3 Confidentiality And Privacy, Topic 3.2 Information Systems Control For Systems Reliabilty, Topic 3.1 Fraud And AIS ...12Decks316Flashcards6Learners -
Computer Science
Computer Science
By: Andre Davis
Deadlock, Operating System, Memory Management, Virtual Memory, Paging and Thrashing ...13Decks64Flashcards1Learner -
LPIC1
LPIC1
By: Kessi Diones O. Silva
Chapter 1 - Exploring Linux Command-Line Tools, Chapter 2 - Managing Software and Processes2Decks30Flashcards4Learners -
I40(0/1/2) Computer Science Bsc Year 1
I40(0/1/2) Computer Science Bsc Year 1
By: Aria Noroozi
ECM 1407 Electronic Machines, ECM 1407 The History of Computing, ECM 1407 Encryption ...40Decks731Flashcards2Learners -
512
512
By: Damilola Ekanola
agile, Architectural pattern, Project mangement ...6Decks58Flashcards1Learner -
System Design
System Design
By: Toni Ashe
Waterfall Model, Agile Methodology, Software Development Lifecycle ...8Decks30Flashcards2Learners