Learn Software Processes
Study Software Processes using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
CDAP 350 Audiology
CDAP 350 Audiology
By: Emily Beacham
Amplification Systems and Aural Rehabilitation, Perscriptive Formulas, Compression And Hearing Software, Hearing Instrument Styles and Earmolds ...4Decks84Flashcards4Learners -
CompTIA Security+ SY0-501 - Based on Objectives X
CompTIA Security+ SY0-501 - Based on Objectives X
By: xavier Xavier
1.0 Threats, Attacks and Vulnerabilities (21%), 1.1 Given a scenario, analyze indicators of compromise and determine the type of malware., 1.2 Compare and contrast types of attacks. ...45Decks887Flashcards15Learners -
ICT Unit 2
ICT Unit 2
By: Matthew Grimsley
Data Representation, Data, information and knowledge, Architecture ...10Decks120Flashcards2Learners -
CEN4020: Software Engineering I
CEN4020: Software Engineering I
By: Wynne Nicholas
Exam 3 Study, Exam 3 CMM Levels, Components of a Software Project Management Plan ...10Decks171Flashcards2Learners -
BEC - IT Fundamentals & Systems
BEC - IT Fundamentals & Systems
By: Tired Pup
Data, Software, & Databases, Hardware, Transaction Processing ...9Decks199Flashcards2Learners -
Software Engineering
Software Engineering
By: Lukas W
Requirements Engineering, Use Cases, Domain Modelling ...11Decks128Flashcards2Learners -
512
512
By: Damilola Ekanola
agile, Architectural pattern, Project mangement ...6Decks58Flashcards1Learner -
Computer Science
Computer Science
By: Jolyon Knagg
1.1 Hardware and Communication, 1.2 Logical Operations, 1.3 Data Transmission ...17Decks193Flashcards2Learners -
Test Analyst Interview
Test Analyst Interview
By: E Hole
Tell me about yourself, Metrics, Defect Life Cycle ...35Decks572Flashcards5Learners -
CompTIA Security+ SY0-501 - Objectives
CompTIA Security+ SY0-501 - Objectives
By: Eliza Hazard
1.0 Threats, Attacks and Vulnerabilities (21%), 1.1 Given a scenario, analyze indicators of compromise and determine the type of malware., 1.2 Compare and contrast types of attacks. ...45Decks887Flashcards10Learners -
LPIC1
LPIC1
By: Kessi Diones O. Silva
Chapter 1 - Exploring Linux Command-Line Tools, Chapter 2 - Managing Software and Processes2Decks30Flashcards4Learners -
Computer Science
Computer Science
By: Andre Davis
Deadlock, Operating System, Memory Management, Virtual Memory, Paging and Thrashing ...13Decks64Flashcards1Learner -
Functional Safety
Functional Safety
By: Jalal Elwazze
Module 2 - Process Safety and Functional Safety, Module 3 - IEC 61508 and IEC 61511, Module 4 - Hazard and Risk Assessment + Allocation of Protection Layers ...15Decks164Flashcards7Learners -
System Design
System Design
By: Toni Ashe
Waterfall Model, Agile Methodology, Software Development Lifecycle ...8Decks30Flashcards2Learners -
I40(0/1/2) Computer Science Bsc Year 1
I40(0/1/2) Computer Science Bsc Year 1
By: Aria Noroozi
ECM 1407 Electronic Machines, ECM 1407 The History of Computing, ECM 1407 Encryption ...40Decks731Flashcards2Learners -
Massey Subjects
Massey Subjects
By: Kelsey Martin
Topic 3.3 Confidentiality And Privacy, Topic 3.2 Information Systems Control For Systems Reliabilty, Topic 3.1 Fraud And AIS ...12Decks316Flashcards6Learners -
information management
information management
By: Teresa Handawi
Week 7&8 Social Media IS, Digital Marketing, Week 9 - Smart Accounting Information Security Management, Business Continuity Planning, Week 10 - Organizations and IS ...11Decks124Flashcards1Learner -
Software Project Management
Software Project Management
By: Martin Grant
1 - Intro, 2 - Software Dev Process, 3 - Use Cases3Decks78Flashcards2Learners -
IS Development and Implementation
IS Development and Implementation
By: Camilla Toft
Lecture 1 - Introduction, Lecture 2 - Implementation, Configuration (And Failures), Lecture 3 - History of ISD and Current practice and problems ...15Decks256Flashcards9Learners -
MS IT-INTRO COMP
MS IT-INTRO COMP
By: M.K. Gallegos
INTRO, Gen AI, Terminology ...22Decks259Flashcards1Learner -
Data Science at Scale
Data Science at Scale
By: Matthew Gilbert
Introduction, Data Intensive Applications, Data Models ...14Decks199Flashcards1Learner -
Rapid Track Commands and Options
Rapid Track Commands and Options
By: Solomon Scott
Validate Network Configuration, Configure Networking from the Command Line, Edit Network Configuration Files ...44Decks278Flashcards1Learner -
INFO123
INFO123
By: Frazer Hawke
Week 7: Hardware, Software and Mobile Systems, Week 8: Data, Databases and Data Management, Week 9: Big Data and Business Intelligence Systems ...8Decks125Flashcards3Learners -
BTEC ICT
BTEC ICT
By: Ellen Kennedy
Digital devices, uses of digital devices, input and output devices ...40Decks279Flashcards10Learners -
ISD
ISD
By: Frederik Bendz
ISD Lecture 2 Systems development, ISD Lecture 4 From systems development to technochange, ISD Lecture 5 Requirement Analysis: Benefits & Strategies ...9Decks269Flashcards4Learners -
SDD
SDD
By: Mothiver Chat
Development Approaches, Copyright, Languages ...15Decks135Flashcards1Learner -
Software Quality Assurance
Software Quality Assurance
By: Chantel Fick
1.1) Motivation and Terms, 1.2) Principles of Software Quality Assurance, 1.3) Principles in Software Testing ...10Decks106Flashcards1Learner -
computing component 1
computing component 1
By: Susie Cabral
MAR MDR CIR, databases, 1.1.1 structure and function of the processor ...30Decks240Flashcards1Learner -
IT Project Management
IT Project Management
By: Vrinda Ujoodha
Requirement Elicitations, Business Case, RISKS ...33Decks123Flashcards1Learner -
Advance Analysis and Design
Advance Analysis and Design
By: Derice McDonald
Information Systems Development, Planning, Project Management ...20Decks265Flashcards1Learner