Learn Computer Applications
Study Computer Applications using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
OCR A-Level Computer Science
OCR A-Level Computer Science
By: George Weaver
1.1.1 Structure and function of the processor, 1.2.1 Systems Software, 1.2.2 Applications Generation ...11Decks411Flashcards1Learner -
COMPUTER SCIENCE
COMPUTER SCIENCE
By: Ali Hamza
Chap#01 Principles of Computer Architecture & System Software, Chap#02 Information Networks, Chap#03 Data Communications ...12Decks221Flashcards1Learner -
70-534
70-534
By: g d
Virtual Networks, Design Azure Compute, Express Architecture and design ...9Decks202Flashcards9Learners -
DTDDB 2021 SEM <3
DTDDB 2021 SEM <3
By: Julie Nielsen
Introduction to computational thinking, What is an Information System: Digital Technologies in a Global Society, How Businesses Use Digital Technologies ...11Decks235Flashcards8Learners -
OCR Computing A Level LTS (Set 1)
OCR Computing A Level LTS (Set 1)
By: Mrs McDougall Welch
Unit 1 Components of a Computer, Unit 2 Systems Software and Applications, Unit 3 Software Development ...13Decks601Flashcards2Learners -
CS P1
CS P1
By: Olivier MB
Structure and Function of Processor, Types of Processor, Input, Output and storage ...16Decks573Flashcards1Learner -
A Level Computer Science 23-24
A Level Computer Science 23-24
By: Mr. Stigner
1.1.1 - The CPU, 1.1.2 - Types of Processor, 1.1.3 - Input, output and storage ...16Decks359Flashcards7Learners -
ICT and Programming Techniques A
ICT and Programming Techniques A
By: Emi D M
Legislation. ICT in Engineering, Components and Functions of Computer Systems, Application Software and Programming language ...4Decks136Flashcards3Learners -
CompTIA Security+ SY0-301 Authorized Cert Guide By David L. Prowse - Pearson - Chapter Questions -
CompTIA Security+ SY0-301 Authorized Cert Guide By David L. Prowse - Pearson - Chapter Questions -
By: Timothy Carter
Chapter 1 - Introduction to Security, Chapter 2 - Computer Systems Security, Chapter 3 - OS Hardening and Virtualization ...15Decks373Flashcards831Learners -
A-Level OCR Computer Science
A-Level OCR Computer Science
By: Tim Apologun
1.1.1 Structure and function of the processor, 1.1.2 Types of processor, 1.1.3 Input, output and storage ...10Decks212Flashcards35Learners -
Data Engineering
Data Engineering
By: Renée Theunissen
Virtualization and Cloud Computing, Containerization for Big Data, Data-Intensive Application Architectures ...6Decks129Flashcards13Learners -
ICT A2
ICT A2
By: James Wade
1. The Systems Cycle, 2. Designing Computer-Based Information Systems, 3. Networks and Communications ...9Decks250Flashcards3Learners -
Comptia SEC+
Comptia SEC+
By: Shawn Mosby
Section 2.2 Virtualization and Cloud Computing Concepts, Section 2.3 Secure Application development, deployment, and automation concepts, Section 2.4 Authentication and Authorization Design concepts ...27Decks1,865Flashcards11Learners -
CompTIA A+ Core 2 (220-1102)
CompTIA A+ Core 2 (220-1102)
By: John Vargas
Operating System 3 revision, Security, Software and Trouble Shooting ...51Decks1,075Flashcards18Learners -
CTA
CTA
By: b d
Module 1 Overview of Cloud Computing, Module 2 Cloud Adoption and Emerging Technologies, Module 3 Cloud Computing Service and Deployment Models ...24Decks237Flashcards1Learner -
IT Fundamentals Book One - All Acronyms
IT Fundamentals Book One - All Acronyms
By: Dave E ICT
Chapter 1 - Introduction to Computer and Communications, Chapter 2 - Computer Hardware: Inside the Case, Chapter 3 - Computer Hardware - Peripheral Devices ...9Decks150Flashcards11Learners -
AUG - Augmented Reality
AUG - Augmented Reality
By: Tamara Fellner
01 - Introduction, 02 - Computer Graphics, 03 - Application Areas and Application Development ...7Decks274Flashcards4Learners -
GCP Associate engineer
GCP Associate engineer
By: Guilherme Martins
IAM, Networking, Compute ...6Decks45Flashcards2Learners -
Computing /:
Computing /:
By: Eva McLoughlin
Computer systems, Input, output, storage, the CPU ...12Decks88Flashcards6Learners -
GCP Developer
GCP Developer
By: Maria A
Kubernetes & GKE, Security and Identity, GCP Basics ...12Decks166Flashcards1Learner -
igcse ict
igcse ict
By: Robert Yeo
Section 1 - Types and components of computer systems, Section 2 - Input and output devices, Section 3 - Storages devices and media ...10Decks326Flashcards63Learners -
Sec+
Sec+
By: Zach Harvey
Ports and protocols, Social Engineering, Attack types ...37Decks577Flashcards3Learners -
Nursing Subjects
Nursing Subjects
By: tintin g
Nursing Informatics: introduction, Application of nursing informatics, Historical perspective in nursing and computer ...13Decks230Flashcards1Learner -
AWS Cloud Practitioner (Digital Cloud)
AWS Cloud Practitioner (Digital Cloud)
By: Josh Cheung
AWS Analytics, AWS Monitoring and Logging Services, AWS Content Delivery and DNS Services ...19Decks696Flashcards2Learners -
A-level OCR Computer Science
A-level OCR Computer Science
By: Jacob Connor
1.1 structure of the CPU, 1.1.2 types of processor, input, output and storage ...21Decks305Flashcards1Learner -
OCR COMPSCI OFFICIAL
OCR COMPSCI OFFICIAL
By: Josh Connor
1.1.1 Structure and Function of the Processor, 1.1.2 - Types of Processor, 1.1.3 - Input, Output and Storage ...29Decks565Flashcards2Learners -
A Level - Computer Science
A Level - Computer Science
By: Dominic Lees
Components Of A Computer, Input, Output and Storage, Systems Software ...11Decks232Flashcards3Learners -
Pharm 151 - self inflicted lobotomy
Pharm 151 - self inflicted lobotomy
By: Matthew Miller
Week 1, Week 2 - privacy and security, Week 3 - Foundation and Application of Health Informatics ...8Decks245Flashcards1Learner -
Deep Learning Concepts
Deep Learning Concepts
By: Elizabeth Le
Definitions, CNN models et al., Developing real-world applications ...7Decks85Flashcards16Learners -
Security + Messer
Security + Messer
By: Blayne Ehrenzeller
1.1 - Social Engineering, 1.2 - Attack Types, 1.3 - Application Attacks ...24Decks622Flashcards1Learner