Learn Embedded Systems
Study Embedded Systems using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
CompTIA Security+ SY0-501 - Based on Objectives
CompTIA Security+ SY0-501 - Based on Objectives
By: Tánh Phạm
1.0 Threats, Attacks and Vulnerabilities (21%), 1.1 Given a scenario, analyze indicators of compromise and determine the type of malware., 1.2 Compare and contrast types of attacks....45Decks887Flashcards505Learners -
Computer Science 1 Revision
Computer Science 1 Revision
By: Isha Turay
System Architecture, Performance Of The CPU, Embedded System...21Decks174Flashcards1Learner -
Microcomputer Engineering
Microcomputer Engineering
By: Kathleen Emily-Anne
Embedded Systems Intro, Computer and Memory Organization, ARM Processor and Assembly Language3Decks50Flashcards4Learners -
Security +
Security +
By: Ben Moore
overview of Security, Threat Intelligence and Sources, Attack Frameworks...32Decks669Flashcards1Learner -
Systemsoftware
Systemsoftware
By: Max Mustermann
Linux Kernel, Dateisysteme unter Linux, Root Filesystem...17Decks237Flashcards7Learners -
IT Unit 1 LO2
IT Unit 1 LO2
By: Harry Symes
2.1 - Open Source vs Closed Source, 2.1 - Off the Shelf vs Bespoke Software, 2.1 - Shareware, Freeware, Embedded Software...8Decks59Flashcards1Learner -
Security + Messer
Security + Messer
By: Blayne Ehrenzeller
1.1 - Social Engineering, 1.2 - Attack Types, 1.3 - Application Attacks...24Decks622Flashcards1Learner -
Computer Science
Computer Science
By: fatemah .
1.1.1 - Architecture of the CPU, 1.1.2 - CPU performance, 1.1.3 - Embedded Systems...15Decks133Flashcards1Learner -
Comptia SEC+
Comptia SEC+
By: Shawn Mosby
Section 2.2 Virtualization and Cloud Computing Concepts, Section 2.3 Secure Application development, deployment, and automation concepts, Section 2.4 Authentication and Authorization Design concepts...27Decks1,865Flashcards12Learners -
Pervasive Computing
Pervasive Computing
By: Jan Kiefer
Exercise: Paper discussion, Introduction, Location-based Services...11Decks320Flashcards1Learner -
Computer Science paper 1
Computer Science paper 1
By: Logan Watts
2.1 Units of data storage and binary numbers, 2.2 Binary arithmetic and hexadecimal, 2.3 Characters...26Decks200Flashcards2Learners -
Computer Science- Mocks
Computer Science- Mocks
By: Sim <3 floaties
Common Components of the CPU + functions., Von Nueman Architecture., Characteristics of the CPU:...18Decks87Flashcards3Learners -
CompTIA Sec+
CompTIA Sec+
By: James Camp
Social Engineering Techniques, Types of Attacks/Malware, Application Attacks...29Decks377Flashcards5Learners -
Security+
Security+
By: Zoubida Regzal
1.1 Social engineering attacks, 1.2 Malware & common attacks, 1.3 Application attacks...35Decks859Flashcards6Learners -
Math
Math
By: Jessie Us
Modul I, Actuators (Fluid Based), Embedded systems3Decks43Flashcards1Learner -
Computer Architecture
Computer Architecture
By: Thabo Pali
Chapter 09 - Alternative Architectures, Chapter 10 - Embedded Systems, Chapter 13 -Selected Storage Systems and Interfaces3Decks183Flashcards1Learner -
GCSE OCR Computer Science
GCSE OCR Computer Science
By: Oliver Prockter
1.1.1 Architecture of the CPU, 1.1.2 CPU Performance, 1.1.3 Embedded Systems...26Decks307Flashcards1Learner -
2.0 - Architecture and Design
2.0 - Architecture and Design
By: Melissa Andrews
2.1 Security Concepts, 2.2 Cloud Computing Concepts, 2.3 Application Development, Deployment, & Automation...8Decks224Flashcards1Learner -
Computing
Computing
By: Ayush Iyengar
1.1 Architecture of the CPU, 1.2 CPU performance and embedded systems, 2.1 Storage...22Decks320Flashcards1Learner -
Computer Science
Computer Science
By: Tom White
CPU, Von Neumann Architecture, Primary Storage...7Decks108Flashcards2Learners -
Cyber Security (CompTIA Security+)
Cyber Security (CompTIA Security+)
By: Jeremy Lazzari
Chapter 1 - Threats, Attacks, and Vulnerabilities, Chapter 1.1 - Social Engineering, Chapter 1.2 - Attack Types...41Decks1,670Flashcards21Learners -
2.0 Architecture and Design
2.0 Architecture and Design
By: Justin Doring
2.1 Explain the importance of security concepts in an enterprise environment, 2.2 Summarize virtualization and cloud computing concepts, 2.3 Summarize secure application development, deployment, and automation concepts...8Decks257Flashcards3Learners -
CompTIA Security+ SY0-501 - Based on Objectives X
CompTIA Security+ SY0-501 - Based on Objectives X
By: xavier Xavier
1.0 Threats, Attacks and Vulnerabilities (21%), 1.1 Given a scenario, analyze indicators of compromise and determine the type of malware., 1.2 Compare and contrast types of attacks....45Decks887Flashcards15Learners -
1.1 Systems Architecture
1.1 Systems Architecture
By: Chris Ives
1.1.1 Systems Architecture, 1.1.1 Glossary (Systems Architecture), 1.1.2 CPU Performance...5Decks58Flashcards1Learner -
CompTIA Security+ SY0-501 - Objectives
CompTIA Security+ SY0-501 - Objectives
By: Eliza Hazard
1.0 Threats, Attacks and Vulnerabilities (21%), 1.1 Given a scenario, analyze indicators of compromise and determine the type of malware., 1.2 Compare and contrast types of attacks....45Decks887Flashcards11Learners -
Computer science Topic 3
Computer science Topic 3
By: Jisung Kim
Topic 3.1 - Computer Architecture, Topic 3.2 - Embedded Systems, Topic 3.3 - Machines...6Decks38Flashcards2Learners -
Comp.Sci. GCSE
Comp.Sci. GCSE
By: Dawid German
1.1 Hardware - CPU, 1.1 Hardware - Primary Storage, 1.1 Hardware - Additional Hardware Components...11Decks114Flashcards3Learners -
Computer Science
Computer Science
By: Ayaana Mistry
Section 1, embedded systems2Decks31Flashcards1Learner -
Computer Science
Computer Science
By: Cjgamer97 #8262
Hardware, Operating Systems, Disk Organisation...11Decks114Flashcards1Learner -
Mobile Development and Ubiquitous Computing
Mobile Development and Ubiquitous Computing
By: Daniel Casley
Android OS, Android Activity Lifecycle, Intents...12Decks190Flashcards1Learner