Learn Digital Techniques
Study Digital Techniques using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
Forensics
Forensics
By: Gemma Blake
Lecture 1 - Changes after death, Lecture 2 - DNA and its applications, Work of forensic pathologists ...32Decks424Flashcards2Learners -
Comptia SEC+
Comptia SEC+
By: Shawn Mosby
Section 2.2 Virtualization and Cloud Computing Concepts, Section 2.3 Secure Application development, deployment, and automation concepts, Section 2.4 Authentication and Authorization Design concepts ...27Decks1,865Flashcards12Learners -
Dt
Dt
By: Sam Boyd
File Formats, Data Types, Database- Concepts Summary ...18Decks235Flashcards1Learner -
BDS3 1
BDS3 1
By: Roxanne B
Paediatric Eruption Dates/Sequence, Diseases of Human Systems - connective tissue disease (bone), Diseases of Human Systems - connective tissue disease (lupus) ...75Decks2,099Flashcards1Learner -
CySA+
CySA+
By: Brandon R
Cryptography, Managing Risk, Public Key Infrastructure ...28Decks234Flashcards3Learners -
Security + SY0-601
Security + SY0-601
By: Alket Shabani
1.1 Compare and contrast different types of social engineering techniques., 1.2 Given a scenario, analyze potential indicators to determine the type of attack., 1.3 Given a scenario, analyze potential indicators associated with application attacks. Given a scenario, analyze potential indicators associated with network attacks. ...24Decks258Flashcards41Learners -
SEC+SY0-601
SEC+SY0-601
By: Scott Byrams
1.1 Compare and contrast different types of social engineering tecchniques, 1.2 Analyze potential indicators to determine the type of attack, 1.3 Analyze potential indicators associated with application attacks ...35Decks546Flashcards19Learners -
4.0 - Operations and Incident Response
4.0 - Operations and Incident Response
By: Melissa Andrews
4.1 Operations and Incident Response (IR), 4.2 IR Policies, Processes, and Procedures, 4.3 Data Sources for Investation ...5Decks122Flashcards2Learners -
Sec+
Sec+
By: GiGi C.
1.1 social engineering techniques, 1.2 analyze potential indicators to determine the type of attack, 1.3 potential indicators associated with application attacks ...38Decks387Flashcards1Learner -
XRAY
XRAY
By: Maddie Schneider
Shoulder CR, Avg TECHNIQUES, Lower Extremity CR ...14Decks252Flashcards2Learners -
Graphics
Graphics
By: Katherine Avlassevits
T1 composition, T1 tone and line, T2 packaging ...24Decks178Flashcards2Learners -
CC0002
CC0002
By: John Foo
Week 2 (Computational Thinking & Problem Solving), Week 3 (Digital Misinformation), Week 3 (Intellectual Property & Rights Licensing) ...7Decks68Flashcards1Learner -
Rad Theory
Rad Theory
By: Melissa H
Chapter 1 Importance Of Radiographs, Week2 D1. Ch 4&7, Week 2 D2. Ch19 Parallel Technique ...12Decks168Flashcards3Learners -
OSCE
OSCE
By: Graeme Miller
Peak Expiratory Flow, Inhaler Technique, Respiratory Exam ...37Decks605Flashcards4Learners -
Tech Paper 1
Tech Paper 1
By: Evan Chandler
1.1 Materials and their applications, Smart and Modern Materials, Metals ...19Decks352Flashcards4Learners -
Enterprise Computing NSW HSC EXAM 2025
Enterprise Computing NSW HSC EXAM 2025
By: Dustin D
Week 1, Week 2, Week 3 ...35Decks140Flashcards2Learners -
IB Psychology HL
IB Psychology HL
By: 芷 𐙚
Sampling techniques, Research methods, Cognitive Approach SAQ ...12Decks116Flashcards2Learners -
Security
Security
By: elvis sanchez
1.1 Compare and contrast different types of social engineering techniques., 1.2 Given a scenario, analyze potential indicators to determine the type of attack., 1.3 Given a scenario, analyze potential indicators associated with application attacks. ...40Decks663Flashcards1Learner -
Radio 1
Radio 1
By: Stephen C
Rad Physics, Rad Bio, Rad Protection Prescription ...6Decks175Flashcards1Learner -
Radiology
Radiology
By: Becky Bernstein
Legislation, Production and Properites, Interactions With Matter ...9Decks152Flashcards1Learner -
Digital Security & Forensics
Digital Security & Forensics
By: Emal Qaliff Azmi
Security Concepts and Models C1, Cybersecurity Threats C2, Introduction to Cryptography C3A ...9Decks93Flashcards1Learner -
MBChB - Yr 5 - Final OSCEs
MBChB - Yr 5 - Final OSCEs
By: Jam E
Peak Expiratory Flow, Inhaler Technique, Respiratory Exam ...36Decks575Flashcards4Learners -
DT theory
DT theory
By: Elyssa Marr
topic 1 materials, topic 2- performance characteristics of materials, topic 3- processes, techniques and specialist tools ...8Decks210Flashcards1Learner -
LASx
LASx
By: Mary Ellen Josephine Mangiameli
Wound MGMT, Castration, Bandaging ...31Decks260Flashcards6Learners -
OSCE
OSCE
By: Becca M
Peak Expiratory Flow, Inhaler Technique, Respiratory Exam ...45Decks1,018Flashcards1Learner -
IT Block 1
IT Block 1
By: KaWandra Wiggins
Electrical and Electronic Safety, End-to-End Communications, End-to-End Communication Aflot ...14Decks163Flashcards2Learners -
IB Psychology
IB Psychology
By: Felicia Graham
Biological approach to understanding behaviour, Hormones and Behaviour, Role of animal research ...17Decks115Flashcards2Learners -
BTEC ICT
BTEC ICT
By: Ellen Kennedy
Digital devices, uses of digital devices, input and output devices ...40Decks279Flashcards10Learners -
MAPEH G10
MAPEH G10
By: Ellaiza Alvaira
MUSIC Q1/CHAPTER 1: IMPRESSIONISM, MUSIC Q1/LESSON 2: THE MUSIC OF EXPRESSIONISM, ART Q1/CHAPTER 5: MODERN ART ...33Decks309Flashcards2Learners -
Computing
Computing
By: Ayush Iyengar
1.1 Architecture of the CPU, 1.2 CPU performance and embedded systems, 2.1 Storage ...22Decks320Flashcards1Learner