Learn Application Software
Study Application Software using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
A OCR Computer Science A level
A OCR Computer Science A level
By: Anonymous T
Chapter 1 - Processor components, Chapter 2 - Processor performance, Chapter 3 - Types of processor75Decks944Flashcards9Learners -
cs paper 1 (from textbook)
cs paper 1 (from textbook)
By: MG G
1.1.1 Structure and function of the processor, 1.1.2 Types of processor, 1.1.3 Input, output and storage7Decks78Flashcards3Learners -
Company Compliance & Administration
Company Compliance & Administration
By: Laura Capel
Chapter 1 - THE ROLE OF THE CO SEC, Chapter 2 - THE DIRECTORS, Chapter 3 - EFFECTIVE BOARD PRACTICES16Decks472Flashcards3Learners -
A+
A+
By: Laura Hendrix
Conversions and Binary, CPU, Cooling Systems27Decks1,014Flashcards1Learner -
IT systems
IT systems
By: Usman AK
A2 - Part 1, A2 - Part 2 Storage devices, A2 - Part 3 Accessibility Devices and Data Processess18Decks232Flashcards3Learners -
OCR Computer Science A Level
OCR Computer Science A Level
By: Patricia Kalingking
1.1.1.Characteristics of contemporary processors (chp 1), 1.1.2.Types of processor, 1.1.3.Input, Output and storage (Chp2)15Decks270Flashcards6Learners -
ICT - Unit 2: Technology Systems
ICT - Unit 2: Technology Systems
By: Sophie Wealleans
Technology Systems, Issues In Technology Systems, Developing Technology Systems28Decks113Flashcards38Learners -
OCR A Level Computer Science
OCR A Level Computer Science
By: Rayan Niazi
1.1.1 Structure and function of the processor, 1.1.2 Types of processors, 1.1.3 Input, output and storage24Decks204Flashcards3Learners -
CISSP Study Guide
CISSP Study Guide
By: Enosh Chang
Security Governance Through Principles and Policies, Personnel Security and Risk Management Concepts, Business Continuity Planning21Decks420Flashcards1Learner -
Computer science revision
Computer science revision
By: Charlotte Gambardella
Structure and function of the processor, Types of processor, Input, output and storage19Decks245Flashcards2Learners -
I40(0/1/2) Computer Science Bsc
I40(0/1/2) Computer Science Bsc
By: Aria Noroozi
ECM 1407 Electronic Machines, ECM 1407 The History of Computing, ECM 1407 Encryption40Decks726Flashcards1Learner -
(2Tuesday) PCAS
(2Tuesday) PCAS
By: Mark Js
(Week 2) Chapter1 Components of Computer System, (Week 2) Chapter2 Operating System and Application Software, (Week 3) Chapter3 Computer Hardware IPO Storage and Network7Decks312Flashcards1Learner -
BSc Computer Science
BSc Computer Science
By: Najiba Abbas Ali
Machine Learning, Malicious Software, MS Past paper qs4Decks110Flashcards1Learner -
CCNA 200-301 Vol 2
CCNA 200-301 Vol 2
By: Alexandre Menetre
Chapitre 1 - Introduction to TCP/IP Transport and Applications, Chapitre 2 - Basics IPv4 Access Control Lists, Chapitre 3 - Avanced IPv4 Access Control Lists19Decks244Flashcards17Learners -
CISSP
CISSP
By: Eric Lekus
Chapter 1 Security Governance Through Principles and Policies, Chapter 2 Personnel Security and Risk Management, Chapter 3 Business Continuity Planning22Decks524Flashcards1Learner -
A-Level Computer Science
A-Level Computer Science
By: Charlotte Broadbent
1: The CPU, 2: Types of Processor, 3: Input, Output and Storage25Decks421Flashcards2Learners -
Computer Science
Computer Science
By: Kyan Dawson
1.1.1 Structure and Function of the Processor, 1.1.2 Types of Processor, 1.1.3 Input, Output and Storage16Decks381Flashcards1Learner -
Linux Essentials
Linux Essentials
By: James Hallfin
Topic 1.1 Linux Evolution and Popular Operating Systems, Topic 1.2 Major Open Source Applications, Topic 1.3 Open Source Software and Licensing8Decks92Flashcards1Learner -
Computer science
Computer science
By: Toby MacDonald
1.1.1 Processor Architecture, 1.1.2 Types of CPU, 1.1.3 Storage Devices24Decks219Flashcards1Learner -
CompTIA Security+ SY0-501 - Based on Objectives X
CompTIA Security+ SY0-501 - Based on Objectives X
By: xavier Xavier
1.0 Threats, Attacks and Vulnerabilities (21%), 1.1 Given a scenario, analyze indicators of compromise and determine the type of malware., 1.2 Compare and contrast types of attacks.45Decks887Flashcards13Learners -
BTEC IT UNIT 1 - YR12
BTEC IT UNIT 1 - YR12
By: cajimat richaelczia
Digital devices, uses of digital devices, input and output devices37Decks176Flashcards48Learners -
Computer Science
Computer Science
By: Edward Price
SLR 01 - Structure and Function of the CPU, SLR 02 - Types of Processor, SLR 03 - Input, Output and Storage11Decks275Flashcards1Learner -
Apple macOS 10.12 Sierra Support Essentials
Apple macOS 10.12 Sierra Support Essentials
By: Chris Smith
Lesson 1 - Install macOS Sierra, Lesson 2 - Set Up and Configure macOS, Lesson 3 - Use macOS Recovery26Decks199Flashcards162Learners -
ICT Unit 2
ICT Unit 2
By: Matthew Grimsley
Data Representation, Data, information and knowledge, Architecture10Decks120Flashcards2Learners -
CISSP 2019 (tms005)
CISSP 2019 (tms005)
By: Tuck Meng Siew
Chapter 1– Security Governance through Principles and Policies, Chapter 2– Personnel Security and Risk Management Concepts, Chapter 3– Business Continuity Planning21Decks290Flashcards28Learners -
GCSE Digital Technology Unit 1 Revision CCEA
GCSE Digital Technology Unit 1 Revision CCEA
By: MAX PATTERSON
Chapter 1 Digital Data, Chapter 5 Computer Hardware, Chapter 2 Software6Decks71Flashcards4Learners -
System Design
System Design
By: Toni Ashe
Waterfall Model, Agile Methodology, Software Development Lifecycle8Decks30Flashcards2Learners -
Unit 1 - Information Technology Systems
Unit 1 - Information Technology Systems
By: S B
Digital Devices - Content, Input And Ouput Devices - Content, Devices For Accessibilty And Data Processing - Content36Decks376Flashcards9Learners -
Linux
Linux
By: t t
History of Linux, Linux OS Architecture, Linux Startup56Decks592Flashcards1Learner -
Dt
Dt
By: Sam Boyd
File Formats, Data Types, Database- Concepts Summary18Decks235Flashcards1Learner