Learn Informal Network
Study Informal Network using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
AICT
AICT
By: Chris Heberden
Chapter 2 (how organisations use ICT, Chapter 3 (Impact of ICT on Society), Chapter 4 (System life cycle)...20Decks438Flashcards15Learners -
LING140
LING140
By: Maddy Teape
Lecture 2- gestures, sign and language, Lecture 3- Conversations 1, Lecture 4- Conversations 2...22Decks353Flashcards1Learner -
DTDDB Eksamen
DTDDB Eksamen
By: Rasmus Hilligsøe
1. General - Intro to the topic, 2. Use of Digital Technologies, 3. Organization and strategy...10Decks196Flashcards5Learners -
Pentest+
Pentest+
By: Zoubida Regzal
1 Planning & scoping, 2.1 Information gathering & Vulnerability scanning: passive reconnaissance, 2.2.1 Information gathering & Vulnerability scanning: active reconnaissance/ scanning & recon...28Decks781Flashcards6Learners -
Management Information Systems
Management Information Systems
By: Mackenzie Stuart
Chapter 6: Data - Business Intelligence, Chapter 3: Ebusiness - Electronic Business Value, Chapter 5: Infrastructures - Sustainable Technologies...8Decks413Flashcards13Learners -
CISSP - Udemy
CISSP - Udemy
By: Stephen Holden
Cryptography Concepts, Cryptography History, Cryptography Cryptosystem Features...21Decks589Flashcards52Learners -
BUS 391: Information Systems
BUS 391: Information Systems
By: Colin Lieske
Chapter 1: Management Information Systems, Appendix C: Designing Databases, Appendix A: Hardware Basics...10Decks374Flashcards8Learners -
Intro to IM
Intro to IM
By: Charlene Dilig
Relational Database, Information Concepts, Basic Principles of Networks...5Decks112Flashcards1Learner -
Work
Work
By: How High
Chap 1 - information & Sec environment, Chap 2 - Information asset security, Chap 3 - Identity Access Mgmt...9Decks584Flashcards1Learner -
ethical hacking
ethical hacking
By: Barbara Workman
Information Security Fundamentals, Ethical Hacking Fundamentals, Information Security Threats and Vulnerability Assessment...13Decks222Flashcards121Learners -
Pentest+ PT0-002
Pentest+ PT0-002
By: Steven Brumley
Planning and Engagement, Information Gathering and Vulnerability Scanning, Network-Based Attacks...9Decks290Flashcards13Learners -
INFOSYS 727
INFOSYS 727
By: Kinzi Catalano
Risk Management Continue, Informationn Security And Risk Management, Security Management...54Decks633Flashcards1Learner -
CISSP Exam Questions - 250q
CISSP Exam Questions - 250q
By: Martin Harmsen
Domain 1 - Access Control, Domain 2 - Telecommunications and Network Security, Domain 3 - Information Security Governance and Risk Management...10Decks253Flashcards193Learners -
DTDDB 2021 SEM <3
DTDDB 2021 SEM <3
By: Julie Nielsen
Introduction to computational thinking, What is an Information System: Digital Technologies in a Global Society, How Businesses Use Digital Technologies...11Decks235Flashcards8Learners -
MIS
MIS
By: Emma Juarez
Chapter 6: Data and Business Intelligence, Chapter 4: Ethics + information Security, Appendix C...12Decks433Flashcards29Learners -
PenTest+
PenTest+
By: Laurence Toje
Penetration Testing, Planning and Scoping Penetration Tests, Information Gathering...13Decks340Flashcards3Learners -
Introduction to Computing
Introduction to Computing
By: KYLE ROBIN ANDAYA
Introduction to the Profession, Introduction to Computer, Hardware Components of a Personal Computer...8Decks548Flashcards4Learners -
Natural Language Processing
Natural Language Processing
By: Simon Sardorf
Lecture 5 - Relation Extraction & Question Answering, Lecture 3: Text Classification & Naive Bayes, Lecture 6 - Dialog Systems and Chatbots - Conversational Agents...11Decks237Flashcards13Learners -
CAT THEORY GR12
CAT THEORY GR12
By: Hannah Hundermark
Computers in every day lives, Hardware devices and recommendations, System Software...19Decks438Flashcards13Learners -
SDC WJEC ICT A2
SDC WJEC ICT A2
By: Sheridan Nye
Topic 1: Networks, Topic 2: Internet, Topic 3: Human-Computer Interface (HCI)...9Decks136Flashcards56Learners -
IGCSE
IGCSE
By: Bahara Mohammed
Excretiton and Homeostasis, FINANCE, MARKETING...50Decks1,027Flashcards1Learner -
General Information Technology
General Information Technology
By: Mayson Skusek
Costco Technical Architecture, Identity and Access Management (IAM), Information Security...8Decks103Flashcards1Learner -
CompTIA
CompTIA
By: Caitlin Ricks
Computer Memory Measurements, 1.1 Notational Systems, 1.2 Data Types and Characteristics...23Decks401Flashcards3Learners -
A2 ICT
A2 ICT
By: Jade Marriott
Chapter 1: The Systems Cycle, Chapter 2: Designing Computer-Based Information Systems, Chapter 3: Networks and Communications...6Decks301Flashcards6Learners -
ICT A2
ICT A2
By: Candice Rogers
01 Networks, 02 The Internet, 03 Human-Computer Interface (HCI)...9Decks501Flashcards6Learners -
BTM 200
BTM 200
By: Komal Patel
BTM 200 FINAL, Unit 1 – Computer and Information Ethics, Unit 2 – Computer parts...8Decks276Flashcards1Learner -
CND
CND
By: Clark Graves
Port Scanners, Packet Analysis 1, Packet Analysis 2...10Decks241Flashcards3Learners -
Introduction to Computer Science
Introduction to Computer Science
By: Hans Anders
Unit 1 - Basics, Unit 2 - Information representation, Unit 3 - Algorithms and data structures...8Decks269Flashcards13Learners -
ICT A2
ICT A2
By: James Wade
1. The Systems Cycle, 2. Designing Computer-Based Information Systems, 3. Networks and Communications...9Decks250Flashcards3Learners -
Unit 1 - Information Technology Systems
Unit 1 - Information Technology Systems
By: Diamond Catfudge
Topic 1 - Digital Devices 1, Topic 2 - Digital Devices 2, Topic 3 - Uses Of Digital Devices...39Decks615Flashcards123Learners