Learn Computing System Utilities
Study Computing System Utilities using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(19)
Decks
Flashcards
Learners
-
IB Design Technology
IB Design Technology
By: Leen Abou Ibrahim
1.1a Anthropometrics, 1.1b Psychological Factors, 1.1c Physiological Factors34Decks402Flashcards25Learners -
A-Level OCR Computer Science H446
A-Level OCR Computer Science H446
By: Bradley M
1.1.1 Architecture - Main parts of a CPU, 1.1.1 Architecture - Registers within the CPU, 1.1.1 Architecture - F-D-E Cycle22Decks134Flashcards29Learners -
Linux
Linux
By: t t
History of Linux, Linux OS Architecture, Linux Startup56Decks592Flashcards1Learner -
Comptia
Comptia
By: Russell Davis
Social Engineering, Determine type of attack via indicators, Application Attacks35Decks1,194Flashcards16Learners -
Fundamentals of IT - Cambridge Technical
Fundamentals of IT - Cambridge Technical
By: Fabio Orza
1.1 Computer Hardware, 1.1 Biometrics, 1.2 Computer Components32Decks86Flashcards21Learners -
ICT
ICT
By: Kallum Singh
Communication Skills, Ready For Work, Job Roles23Decks171Flashcards6Learners -
ICT - Unit 2: Technology Systems
ICT - Unit 2: Technology Systems
By: Sophie Wealleans
Technology Systems, Issues In Technology Systems, Developing Technology Systems28Decks113Flashcards38Learners -
ICT-unit 1
ICT-unit 1
By: Joel Ogunsanya
1.1 Computer hardware, 1.2 Computer Compnents, 1.2 Computer Components pt221Decks167Flashcards1Learner -
unit 1 essesntials of IT systems
unit 1 essesntials of IT systems
By: Samuel Lloyd
1 Computer Components, 2 Input And Output Devices, 3 +4 Backing Storage and types of storage13Decks116Flashcards2Learners -
SEC+SY0-601
SEC+SY0-601
By: Scott Byrams
1.1 Compare and contrast different types of social engineering tecchniques, 1.2 Analyze potential indicators to determine the type of attack, 1.3 Analyze potential indicators associated with application attacks35Decks546Flashcards16Learners -
Security
Security
By: elvis sanchez
1.1 Compare and contrast different types of social engineering techniques., 1.2 Given a scenario, analyze potential indicators to determine the type of attack., 1.3 Given a scenario, analyze potential indicators associated with application attacks.40Decks662Flashcards1Learner -
Computer Science paper one
Computer Science paper one
By: summer sexton
Computer Systems, RAM AND ROM, Environmental Issues9Decks16Flashcards3Learners -
CompTIA A+ Core 2
CompTIA A+ Core 2
By: Birdman Jetson
1.1 Identify Basic Features of Microsoft Windows Editions, 1.2 Microsoft Command Line Tool, 1.3 Use Features & Tools of Microsoft Windows 10 Operating System (OS)35Decks506Flashcards3Learners -
Computer Science
Computer Science
By: Henry Green
Defensive Design, CPU, Memory45Decks200Flashcards1Learner -
IT
IT
By: Ollie Andrews
Ethical Issues, 1.3 Types of Computer Systems, 2.3 Utility Software8Decks68Flashcards1Learner -
IT Unit 1
IT Unit 1
By: Daniel Genge
1.1 computer hardware, 1.2 computer components, 1.3 types of computer systems32Decks184Flashcards1Learner -
Computing F451
Computing F451
By: Tristan Landi
F451: Components of a Computer System, F451: Systems Developmental Life Cycle, F451: Generic Applications Software12Decks89Flashcards1Learner -
Computing
Computing
By: loren seal
1.1.1 Architecture of the CPU, 1.1.2 CPU performance, 1.1.3 embedded systems26Decks22Flashcards1Learner -
SYSTEM TOOL FACTS
SYSTEM TOOL FACTS
By: Kim wade
TASK MANAGER, COMPUTER MANAGEMENT, DEVICE MANAGER9Decks36Flashcards1Learner