Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
.A-level Computing [OCR]
.A-level Computing [OCR]
By: Harvey Woodall
1.1.1 - CPU, ALU, Registers, Buses, FDE Cycle, 1.1.1 - The factors affecting the performance of the CPU, Pipelining, 1.1.2 - CISC & RISC, GPUs, Multicore and Parallel systems10Decks101Flashcards3Learners -
Procedures and Policies
Procedures and Policies
By: Jeremy Dowling
IS0001-03 Information Security Plan, QS0001-03: Quality Statement and Principles, QS0002-02: Controlled Document Procedures35Decks184Flashcards28Learners -
Paper 2 Computer Science (mine).
Paper 2 Computer Science (mine).
By: Annabel Molloy
3.5.1 Natural Numbers., 3.5.1.2 Integer Numbers., 3.5.2.1 Number Bases.49Decks734Flashcards5Learners -
Computer science paper 1
Computer science paper 1
By: Vishesh Lahori
Encryption, OOP, Pipelining22Decks163Flashcards1Learner -
OCR A Level Computer Science
OCR A Level Computer Science
By: Rayan Niazi
1.1.1 Structure and function of the processor, 1.1.2 Types of processors, 1.1.3 Input, output and storage24Decks204Flashcards3Learners -
Computer Science EDEXCEL IGSCE
Computer Science EDEXCEL IGSCE
By: Dinara Unknown
Programming : Unit 5-11, Problem Solving: Unit 1, Problem solving: Unit 2-327Decks403Flashcards1Learner -
A OCR Computer Science A level
A OCR Computer Science A level
By: Anonymous T
Chapter 1 - Processor components, Chapter 2 - Processor performance, Chapter 3 - Types of processor75Decks944Flashcards9Learners -
CRTIA
CRTIA
By: Daniel Giraldo
APPENDIX D- DATA ANALYSIS, Threat Modelling, Cognitive Biases15Decks112Flashcards1Learner -
CS: Section 04 Data Transfer
CS: Section 04 Data Transfer
By: andrew neate
Encryption, Databases, SQL4Decks64Flashcards1Learner -
Cyber Security
Cyber Security
By: Elliot Minns
1a - Understanding how internal threats occur, 1b - How External Threats Function, 2a - The Impact of Threats15Decks141Flashcards5Learners -
Compter Science - A Level
Compter Science - A Level
By: 월랑 달
1.1 Processor Components, 1.2 Processor Performance, 1.3 Types of Processors25Decks321Flashcards1Learner -
INFOSYS 727
INFOSYS 727
By: Kinzi Catalano
Risk Management Continue, Informationn Security And Risk Management, Security Management54Decks633Flashcards1Learner -
OCR Computer Science Paper 1
OCR Computer Science Paper 1
By: Jake Charters
1.2.2 Applications Generation, 1.1.1 Structure and functions of the processor, 1.1.2 Types of Processor9Decks83Flashcards3Learners -
Security Comp TIA 701
Security Comp TIA 701
By: Dominic Asio
Security Controls 1.1, THE CIA/AIC Triad 1.2, Non-Repudiation 1.214Decks171Flashcards1Learner -
Computer Science
Computer Science
By: Edward Price
SLR 01 - Structure and Function of the CPU, SLR 02 - Types of Processor, SLR 03 - Input, Output and Storage11Decks275Flashcards1Learner -
Cryptography Week1 and Week2
Cryptography Week1 and Week2
By: Vemula Shravya
Information Security policies, General Cryptographic Schema, Mathematical formalisation of encryption and decryption6Decks63Flashcards1Learner -
AWS Cloud Solutions Architects Associate
AWS Cloud Solutions Architects Associate
By: keegz Whodis?
AWS Certified Solutions Architect Associate Practice Exams (Bonso), AWS Certified Solutions Architect Associate Practice Test 2 - Results (Bonzo), AWS Certified Solutions Architect Associate Practice Test 3 (Bonso)42Decks1,324Flashcards35Learners -
Computer Science OCR
Computer Science OCR
By: Kalias Plays
1.1.1 Structure of the Processor, 1.1.2 Types of Processor, 1.1.3 Input, Output and Storage9Decks132Flashcards1Learner -
Computer
Computer
By: Saad Amin
Number system, Encryption, Data Transmission3Decks84Flashcards1Learner -
SQL Server
SQL Server
By: Cecil Du Toit
Indexes, Clustering, Database Mirroring21Decks108Flashcards3Learners -
Information Security 4472
Information Security 4472
By: Ivan Zvonkov
Week 1: Security Rules, Week 2: Secrecy and Security Goals, Week 2b: IND-EAV and Perfect Secrecy12Decks118Flashcards4Learners -
Computer science
Computer science
By: Micky Timms
1.1.1 Structure and function of the processor, 1.1.2 types of processors, 1.1.3 input output storage17Decks101Flashcards7Learners -
AWS
AWS
By: Samuel Lim
AWS Fundamentals (IAM/EC2), AWS Fundamental (Load Balancing/ASG/EBS), EBS & EFS18Decks217Flashcards1Learner -
A2 Computer Science
A2 Computer Science
By: Adrian Scott
1.1.1 Structure and Function of the processor, 1.1.2 Types of processor, 1.1.3 Input, Output and Storage24Decks116Flashcards7Learners -
IT Security
IT Security
By: Patrick Winzenried
Introduction, Cryptosystems, Symmetric encryption systems3Decks33Flashcards2Learners -
A-level Computer Science
A-level Computer Science
By: Joe Wright-Laprugne
The CPU, Binary numbers, Databases11Decks222Flashcards1Learner -
Linux Commands
Linux Commands
By: Kaite Rea
Getting Around, Text Editors, Reading Files11Decks46Flashcards3Learners -
1.3 CS
1.3 CS
By: oliver leigh
1.3.1 compression, encryption and hashing, 1.3.2 databases, 1.3.3 networks4Decks94Flashcards1Learner -
Cs Revision / Notion
Cs Revision / Notion
By: charlie LEWIS
Network Knowledge, Servers, Topology64Decks272Flashcards1Learner -
Hackers Exposed
Hackers Exposed
By: Tyler Wilson
Encryption, Knowing Your Enemy, SSL, TLS, HTTPS and E2EE7Decks135Flashcards1Learner