Learn Social Network
Study Social Network using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
CISM Exam Prep
CISM Exam Prep
By: Bryan Scott
Information Security Governance, Business Continuity & Security, Incident Response ...20Decks186Flashcards1Learner -
CND
CND
By: Clark Graves
Port Scanners, Packet Analysis 1, Packet Analysis 2 ...10Decks241Flashcards3Learners -
IT Theory Grade 11
IT Theory Grade 11
By: Chloë Belcher
Chapter 1.1 - Hardware, Chapter 2.2. Social Implications for Networks2Decks133Flashcards3Learners -
PenTest+
PenTest+
By: Nicholas McCarthy
Wiley - Assessment Test missed/items, Chap 1 - Penetration testing, Chap 2 - Planning and Scoping Penetration Tests ...19Decks771Flashcards2Learners -
math 443
math 443
By: Leo Ivan Brown
Chapter 1, Chapter 2, Chapter 3 ...11Decks202Flashcards1Learner -
BTM200
BTM200
By: Sweet Kerstin
Practice Final, Unit 4: Application Software, Unit 5A: Communications & Networks ...11Decks309Flashcards2Learners -
Technology In Organisations
Technology In Organisations
By: Vicky van Veggel
Lecture 1 Creativity Innovation And Change, Lecture 2 Innovation Management, and the Value Proposition, Lecture 3 Diffusion of Innovation ...14Decks379Flashcards1Learner -
CompTIA A+ Core 2 (220-1102)
CompTIA A+ Core 2 (220-1102)
By: John Vargas
Operating System 3 revision, Security, Software and Trouble Shooting ...50Decks1,075Flashcards36Learners -
IT G12
IT G12
By: Daniel Klette
Database Management, Database Design Concepts, Social Implications ...7Decks85Flashcards8Learners -
ethical hacking
ethical hacking
By: Barbara Workman
Information Security Fundamentals, Ethical Hacking Fundamentals, Information Security Threats and Vulnerability Assessment ...13Decks222Flashcards117Learners -
BRM
BRM
By: Marcos Neyra
Research Philisophy, Designing Research, Descriptives Distribution ...5Decks62Flashcards1Learner -
IT Theory
IT Theory
By: Jacques du Preez
LU2 - Hardware, LU3 - System Software, LU4 - Local Area Networks ...7Decks229Flashcards2Learners -
HTC
HTC
By: Joni E.
VL 1 Introduction, VL 2 City rise middle age + early modern period, VL 3 Urban growth ...11Decks234Flashcards6Learners -
Career Management
Career Management
By: Sarah S
Class 1, Power Skills and Emotional Intelligence, Developing Job Search Strategies ...10Decks111Flashcards1Learner -
german
german
By: Anna Cheng
chapter 2- Films and TV, chapter 2-books, chapter 2-sports ...9Decks239Flashcards1Learner -
JMM 632
JMM 632
By: Noelia Osorio Aguiar
Final Exam, JMM 632 Final: News Media, JMM 632: Social Networks/Media ...4Decks74Flashcards1Learner -
9569 H2 Computing Theory
9569 H2 Computing Theory
By: Javier Lim
Data types, Sort algorithms, Search algorithms ...17Decks197Flashcards13Learners -
Computer Science P2 (*)
Computer Science P2 (*)
By: Ellis Outterside
4.5 - Fundamentals of Data Representation, Number Systems and Binary, Floating point binary ...27Decks359Flashcards1Learner -
Networks 1
Networks 1
By: Lune van Dijk
Lecture 1: intro, Lecture 2: embeddedness, Lecture 3: wicked problem ...12Decks110Flashcards5Learners -
Sociolinguistics
Sociolinguistics
By: Mireia BiF
1- Introduction, 2- Language Variation, 3- Social Class and Social Networks ...5Decks104Flashcards3Learners -
Population and Social Science
Population and Social Science
By: Saskia Chapman
L1- Public health and your clinical practice, L2- Lay beliefs and lay networks, L3- Adapting and coping with long term conditions ...14Decks528Flashcards14Learners -
ag-CEH-V10 - Certified Ethical Hacker
ag-CEH-V10 - Certified Ethical Hacker
By: Anti Gondu
Chapter 1 Introduction to Ethical Hacking, Chapter 0 Random Terms, Chapter 2 System Fundamentals ...25Decks922Flashcards2Learners -
Business Computing
Business Computing
By: Michael Conti
Intro, Week 2, Systems Thinking & Business Analytics ...16Decks490Flashcards8Learners -
CompTIA Security +
CompTIA Security +
By: Andre Bangala
Security + Acronyms, Security + Acronyms, Security + Acronyms ...29Decks390Flashcards1Learner -
ag-CEH v10
ag-CEH v10
By: Anti Gondu
Module 1 - Intro to Ethical Hacking, Module 2 - Footprinting and Reconnaissance, Module 3 - Scanning Networks ...25Decks772Flashcards6Learners -
Social and Environmental Eship Adv.
Social and Environmental Eship Adv.
By: Mees Keijning
SEE 1 - Diagnosing Social Issues, SEE Adv 2 - Social Value Capture, Lecture 2 - articles ...8Decks98Flashcards1Learner -
Digital Forensics
Digital Forensics
By: Sitora Salaeva
Handling digital evidences, Network Forensics, Anomaly detection ...8Decks228Flashcards4Learners -
DTDDB Eksamen
DTDDB Eksamen
By: Rasmus Hilligsøe
1. General - Intro to the topic, 2. Use of Digital Technologies, 3. Organization and strategy ...10Decks196Flashcards5Learners -
Comptia A+ Core 2
Comptia A+ Core 2
By: Sr Leigh
Operating systems overview( Comptia Objective 1.1), An Overview Of Windows 7( Comptia Objective 1.2), An Overview of Windows 8 and 8.1(Comptia Objective 1.2) ...57Decks647Flashcards14Learners -
Man and Machine
Man and Machine
By: Lisa Marie Lebensfroh
Task 1-Cognitive science, artificial intelligence, prediction, Task 2-computational creativity, problem space search, optimization, systems view, default network, simulated annealing, Task 3-cognitive modeling, production rules, ACT-R ...10Decks311Flashcards18Learners