Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
Geography
Geography
By: - -
(F) Sustainable Communities, (F) Qualitative and quantative data, (F) Primary and secondary data62Decks531Flashcards1Learner -
Engineering Module 1
Engineering Module 1
By: Leo Benz
Fundamentals of System Engineering, Process Models And Associated Assessment Methods, Big Data Management4Decks63Flashcards3Learners -
STEM Critical Thinking
STEM Critical Thinking
By: LAASYA POTULURI
Geometrical Shapes Net, SCT Test 2 Video Notes, Electrical Engineering: Wired Switches43Decks351Flashcards1Learner -
A Computer Science : Unit 1
A Computer Science : Unit 1
By: ww ww
1.1.1 Architecture Introduction, 1.1.2 Von Neumann Architecture, 1.1.3 Factors affecting CPU performance26Decks253Flashcards2Learners -
IQT Chance
IQT Chance
By: Joshua chance
Systems 101 AC systems, Systems 102 ADCS, Systems 103 data links14Decks181Flashcards5Learners -
Security+
Security+
By: Kevin Zheng
Encryption Algorithms, Certificate Formats, Ports26Decks242Flashcards1Learner -
S4HC Manufacturing
S4HC Manufacturing
By: Kai Hagen
+++++++++++++++++ LVL 1, [S] J44 Material Requirements Planning, [A] F3445 Maintain PIRs96Decks1,335Flashcards1Learner -
GCP Big Data and ML fundamentals
GCP Big Data and ML fundamentals
By: Wonk L
Big Data and Machine Learning on Google Cloud, Data Engineering for Streaming Data, Big Data with BigQuery5Decks81Flashcards1Learner -
QRS A+ Core 2
QRS A+ Core 2
By: Elizabeth Perez
3.0 Software Troubleshooting QRS, 4.0 Operational Proceedures, 1.1 Compare and contrast common operating system types and their purposes.24Decks640Flashcards47Learners -
Security + SY0-601
Security + SY0-601
By: Alket Shabani
1.1 Compare and contrast different types of social engineering techniques., 1.2 Given a scenario, analyze potential indicators to determine the type of attack., 1.3 Given a scenario, analyze potential indicators associated with application attacks. Given a scenario, analyze potential indicators associated with network attacks.24Decks258Flashcards39Learners -
Information Systems 301
Information Systems 301
By: Sebastian Seibel
1. Introduction to Information Systems, 2. Technology Foundations, 3. Introduction to Databases10Decks168Flashcards1Learner -
Computer Science
Computer Science
By: Andre Davis
Deadlock, Operating System, Memory Management, Virtual Memory, Paging and Thrashing13Decks64Flashcards1Learner -
CompTIA Security+ Deluxe Study Guide: Exam SY0-501, Fourth Edition
CompTIA Security+ Deluxe Study Guide: Exam SY0-501, Fourth Edition
By: Alex valentine
Managing Risk, Monitoring and Diagnosing Networks, Understanding Devices and Infrastructure12Decks224Flashcards1Learner -
Security
Security
By: elvis sanchez
1.1 Compare and contrast different types of social engineering techniques., 1.2 Given a scenario, analyze potential indicators to determine the type of attack., 1.3 Given a scenario, analyze potential indicators associated with application attacks.40Decks662Flashcards1Learner -
CompTIA A+ Core 2 (220-1102)
CompTIA A+ Core 2 (220-1102)
By: John Vargas
Operating System 3 revision, Security, Software and Trouble Shooting49Decks1,033Flashcards3Learners -
Design Economics and Cost Planning
Design Economics and Cost Planning
By: Henry Hayley
Level 1 - Design Metrics, Level 1 - Cost Data, Level 1 - RIBA Plan of Work12Decks67Flashcards4Learners -
Comp TIA A+ 220 1002 Chris
Comp TIA A+ 220 1002 Chris
By: chris carnaffin
1.1 - Compare and contrast common operating system types and their purposes., 1.2 - Compare and contrast features of Microsoft Windows versions., 1.3 - Summarise general OS installation considerations and upgrade methods.33Decks497Flashcards112Learners -
Instruments
Instruments
By: Oliver Reynolds
B - Intro (17-05-18), B - Pressure sensing (17-05-18), B - The Altimeter (17-05-18)27Decks368Flashcards11Learners -
Mod 2
Mod 2
By: Cherlyn Koh
Introduction To Communication, System Integration, Flight Control - Auto Pilot Mode34Decks85Flashcards1Learner -
*M CMCN
*M CMCN
By: Stevie Davies
1 | review matrix, vector spaces, 2 | review linear programming, metabolic model, 1-2 | Matlab stuff16Decks110Flashcards1Learner -
Data Structures
Data Structures
By: Sam Miller
Software Engineering, Recursion, Abstract Data Types3Decks37Flashcards2Learners -
CS 247
CS 247
By: Maria Adams
Cache, Virtual Memory, Reverse Engineering11Decks84Flashcards2Learners -
Machine Learning
Machine Learning
By: KK Cheng
Framing ML Problems, Exploring Data and Building Data Pipelines, Feature Engineering14Decks113Flashcards1Learner -
Computer Science Paper two stuff
Computer Science Paper two stuff
By: gusy edwards
The Computer System's Architecture, Embedded Systems, Memory11Decks89Flashcards1Learner -
Sec+
Sec+
By: Brendan McNulty
FOS, Security Controls, Threat Actors14Decks61Flashcards1Learner -
SEC+SY0-601
SEC+SY0-601
By: Scott Byrams
1.1 Compare and contrast different types of social engineering tecchniques, 1.2 Analyze potential indicators to determine the type of attack, 1.3 Analyze potential indicators associated with application attacks35Decks546Flashcards16Learners -
security +
security +
By: larry neville
Chapter 1 Measuring and Weighing Risk, Chapter 2 Monitoring and Diagnosing Networks, Chapter 3 Understanding Devices and Infrastructure12Decks238Flashcards2Learners -
dee-pee-pee-tw0-ohhh-thr33
dee-pee-pee-tw0-ohhh-thr33
By: Haute Punjaban
Instructor's Method - 6/14/2021, 02 - Design and Implement the serving layer, 03 - Data engineering considerations for source files21Decks55Flashcards2Learners -
A-Level Computer Science
A-Level Computer Science
By: Hannan _
Hardware and Communication, Operating Systems, Economic, moral, legal, ethical and cultural issues12Decks98Flashcards1Learner -
Security +
Security +
By: Benjamin Braswell
1: Fundamentals of Security, 2- Threat Actors, 3: Social Engineering4Decks39Flashcards1Learner