Learn Enterprise Computing
Study Enterprise Computing using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
Enterprise Computing
Enterprise Computing
By: Jason Swift
L2 - Lean Cycle Evolution, L4 - Monoliths, L5 - Monoliths 220Decks241Flashcards1Learner -
ECM3408 Enterprise Computing
ECM3408 Enterprise Computing
By: Kate Belson
Week 1 - Basics and MVPs, Week 2 - Monoliths, Microservices and Communication, Week 3 - Spreadsheets and Storage11Decks241Flashcards10Learners -
Enterprise Computing
Enterprise Computing
By: Alistair Pullen
EC1Decks45Flashcards1Learner -
Enterprise Computing
Enterprise Computing
By: Clinton Lough
UI and UX Design, Digital Assets, Long Term Management and Evaluation5Decks38Flashcards6Learners -
enterprise computing: 1.2
enterprise computing: 1.2
By: Joy Zhang
capture, store, integrate data, methods of data capture, data storage - personal6Decks65Flashcards1Learner -
enterprise computing
enterprise computing
By: Joy Zhang
design + production process, ubiquity of social media, UX elements4Decks49Flashcards2Learners -
CMPS 482
CMPS 482
By: Lee White
CMPS 161/280, CMPS 280, CMPS 25712Decks172Flashcards15Learners -
CompTIA CASP+
CompTIA CASP+
By: Kevin Noble
Assessment, Application Security and Penetration Testing, Risk Management11Decks247Flashcards68Learners -
CCSK v4
CCSK v4
By: wyt hat
Domain 1 - Cloud Computing Concepts and Architectures, Domain 2 - Governance and Enterprise Risk Management, Domain 3 - Legal Issues, Contracts and E-discovery11Decks238Flashcards350Learners -
NOS-130
NOS-130
By: Joshua Tharrington
Module 1 - Introduction to Windows 10, Module 2 - Using the System Utilities, Module 3 - User Management13Decks529Flashcards1Learner -
BTM 226
BTM 226
By: Angelica Di Libero
Module 1, Module 2: Hardware, Module 2: Software15Decks420Flashcards1Learner -
DTDDB 2021 SEM <3
DTDDB 2021 SEM <3
By: Julie Nielsen
Introduction to computational thinking, What is an Information System: Digital Technologies in a Global Society, How Businesses Use Digital Technologies11Decks235Flashcards8Learners -
CompTia Security+ SY0-601 Definitions
CompTia Security+ SY0-601 Definitions
By: Kiki's Kastle
1.1 Social Engineering Techniques, 1.2 Potential Indicators - Attack Type, 1.3 Potential Indicators - Associated with Application Attacks47Decks1,691Flashcards762Learners -
CCSK v4 - MP
CCSK v4 - MP
By: Mike Peeler
Domain 1 - Cloud Computing and Concepts and Architectures, Domain 2 - Governance and Enterprise Risk Management2Decks51Flashcards16Learners -
Cybersecurity Bootcamp Study Aid
Cybersecurity Bootcamp Study Aid
By: Ari Feldman
1.1_ Cybersecurity Mindset, 1.2_ Surveying Cyberspace, 1.3_ Certifications and Security+55Decks1,358Flashcards380Learners -
My CCSK 4.0
My CCSK 4.0
By: Matthew Clark
Domain 1 - Cloud Computing Concepts and Architectures, Domain 2 - Governance and Enterprise Risk Management, Domain 3 - Legal Issues, Contracts and E-discovery11Decks242Flashcards43Learners -
BPI
BPI
By: Joost Kok
Lecture 1A - Intro, Lecture 2 - The World of e-Business, Lecture 3 - e-Business Relationships11Decks192Flashcards1Learner -
CCSK
CCSK
By: UNKNOWN T
1. Cloud Computing Concepts and Architectures - DONE, 2. Governance and Enterprise risk management - DONE, 3. “Legal Issues, Contracts, and Electronic Discovery” - DONE20Decks533Flashcards1Learner -
Business Studies
Business Studies
By: Palesa Morolong
Study Unit: 1 General Overview Of Companies, Study unit 2: The Board Of Directors And General Meeting Of Shareholders, Study Unit 9: Business Rescue8Decks184Flashcards1Learner -
Information Systems
Information Systems
By: Eric Rodriguez
Systems Development Life Cycle (SDLC), Methodologies and the Unified Process, Planning: Project Identification, Project Management And Requirements Analysis, Unified Process - Analysis Behavioural and Structural Modelling14Decks295Flashcards6Learners -
Security+ SY0-601
Security+ SY0-601
By: David Wartman
1.0 Acronyms, 1.1 Social Engineering Techniques, 1.2 Malware Types37Decks832Flashcards358Learners -
AWS Certified Cloud Practitioner Exam
AWS Certified Cloud Practitioner Exam
By: Courtney Tyler
Cloud Concepts, AWS Global Infrastructure, Technology part 1 - Org, Networking, DB, Provisioning, Computing, Storage8Decks159Flashcards10Learners -
IT 14
IT 14
By: Huan Elwood
Chapter 1: Introduction, Chapter 2: Computers, Chapter 12: Levels of Management15Decks369Flashcards13Learners -
System Integration
System Integration
By: Phillip Eismark
Basics about system integration, Data Files and Serialization, Interfaces, Contracts and Protocols13Decks145Flashcards6Learners -
Reading Word
Reading Word
By: Fatih Özdemir
Fallout 4 Trailer Lets Waiting Fans Exhale, Thomas A. Edison, Enzo Ferrari77Decks517Flashcards2Learners -
Security + Messer
Security + Messer
By: Blayne Ehrenzeller
1.1 - Social Engineering, 1.2 - Attack Types, 1.3 - Application Attacks24Decks622Flashcards1Learner -
Security 601
Security 601
By: Marlon M
1.1 Social Engineering Techniques, 1.2 Malware Types, 1.3 Application Attacks16Decks385Flashcards1Learner -
Study Guide SY0-601
Study Guide SY0-601
By: Dakota Edmunds
1.1 Compare and contrast different types of social engineering techniques., 1.5 Explain Different Threat Actors, Vectors And Intelligence Sources, 1.2 Given a scenario, analyze potential indicators to determine the type of attack20Decks620Flashcards150Learners -
ag-Cybersecurity Bootcamp Study Aid
ag-Cybersecurity Bootcamp Study Aid
By: Anti Gondu
1.1_ Cybersecurity Mindset, 1.2_ Surveying Cyberspace, 1.3_ Certifications and Security+55Decks1,358Flashcards5Learners -
(6) CompTia Security+ SY0-601 Definitions
(6) CompTia Security+ SY0-601 Definitions
By: Maciej Węgrzynowski
1.1 Social Engineering Techniques, 1.2 Potential Indicators - Attack Type, 1.3 Potential Indicators - Associated with Application Attacks47Decks1,691Flashcards26Learners