Learn Data Architecture And Management
Study Data Architecture And Management using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
Dell PowerMax and VMAX Family Solutions Design 2023
Dell PowerMax and VMAX Family Solutions Design 2023
By: Brock Terry
Unisphere for PowerMax Implementation and Administration (Overview and Architecture), Unisphere for PowerMax Implementation and Administration (Documentation and Installation), Unisphere for PowerMax Implementation and Administration (Unisphere for PowerMax Administration) ...28Decks770Flashcards1Learner -
CCSP
CCSP
By: Brian White
Module 1: Understanding Cloud Computing Concepts, Module 2: Architectural Design and Reference Requirements, Module 3: Understanding Concepts relevant to Cloud Computing ...42Decks171Flashcards75Learners -
AWS SA Certification - Associate
AWS SA Certification - Associate
By: Andrea Coda
Architecture 101, AWS Architecture 101, AWS Product Fundamentals ...34Decks161Flashcards24Learners -
Computer Science Unit 1
Computer Science Unit 1
By: Matt Kouba
1.1.1 Hardware: Architecture, 1.1.2 Hardware: Input/output, 1.1.3 Hardware: Storage requirements ...18Decks89Flashcards3Learners -
A Level Computer Science Paper 1 OCR
A Level Computer Science Paper 1 OCR
By: Jack Maguire
CO1 WEEK 4 PARTS OF CPU, CO1 WEEK 5 FDE CYCLE, CO1 WEEK 5 FACTORS AFFECTING PERFORMANCE OF CPU ...25Decks386Flashcards11Learners -
Infosys 110
Infosys 110
By: Macy Watson
Topics 1 - 7, Enteprise Architecture - topic 7, Hardware and Networks ...12Decks166Flashcards2Learners -
Intro to IT D322
Intro to IT D322
By: Christopher Robbins
Section 2.1 > Introduction to Information Technology, Lesson 2.2: IT as a Discipline, Lesson 2.3: IT Professionals ...22Decks225Flashcards6Learners -
Intro to IT
Intro to IT
By: Jazmin Williams
2.1 Intro to Information Technology, 2.2 IT as a Discipline, 2.3 IT Professionals ...26Decks213Flashcards1Learner -
Digital Business and Information Systems
Digital Business and Information Systems
By: Luke Heeremans
(01) Carr, N. G. (2003). IT doesn't matter. Educause Review, 38, 24-38., (01) Digital business strategy: toward a next generation of insights. Bharadwaj, A., El Sawy, O. A., Pavlou, P. A., & Venkatraman, N. V. (2013).., (01) Lecture Note: R. Fichman (2012). Distinctive IT Characteristics: Implications for Digital Innovation and Value Creation, Boston College.Creation ...18Decks149Flashcards19Learners -
SRE
SRE
By: Sarah C Young
Server Virtualisation, Tooling, Database ...23Decks192Flashcards4Learners -
CISSP
CISSP
By: David Caranfa
Risk Management, Controls, BC/DC ...27Decks183Flashcards1Learner -
Local Area Networks
Local Area Networks
By: noah carlo-armstrong
Windows Server Installation, server roles, powershell ...22Decks283Flashcards1Learner -
A-Level Computing OCR
A-Level Computing OCR
By: Theo Crowley
OSI Model, Operating Systems, Memory Management ...52Decks271Flashcards12Learners -
CompTIA Security+
CompTIA Security+
By: Daniel Unknown
Fundamentals of Security, Threat Actors, Physical Security ...26Decks157Flashcards1Learner -
CTA
CTA
By: Mohd. Nadeem Shaikh
App Builder, Admin, Service Cloud ...11Decks22Flashcards3Learners -
Domain 4
Domain 4
By: C T
Test Questions, OSI and TCP/IP Models, Internet Protocol (IP) ...28Decks307Flashcards1Learner -
SnowPro Core
SnowPro Core
By: David Meech
Chapter 1: Introduction, Chapter 2: Snowflake Architecture, Chapter 3: Interfaces Connectivity ...10Decks136Flashcards1Learner -
Digital Intelligence For Lawyers
Digital Intelligence For Lawyers
By: Hannah Loo
Week 1 - Computers, Data And Algorithms, Week 2 - Data Management, Week 3 - Information Retrieval ...9Decks213Flashcards1Learner -
CISSP
CISSP
By: kaze kyo
Ch 01 - Security and Risk Management, Ch 02 Risk Management, Ch 03 Compliance ...9Decks116Flashcards1Learner -
Practice
Practice
By: Spirit Writer
(1)CyberSecurity Objectives, (1)Privacy Vs. Security, (1)Evaluating Security Risks ...89Decks906Flashcards1Learner -
AWS Core Services
AWS Core Services
By: Sam Ayoade
COMPUTE SERVICES, CONTENT AND NETWORK DELIVERY SERVICES, APP INTEGRATION SERVICES ...7Decks67Flashcards2Learners -
IB Computing 2025
IB Computing 2025
By: Edward DUNNE
1.1.1 - Identify the context for which a new system is planned., 1.1.2 - Describe the need for change management., 1.1.3 - Outline compatibility issues resulting from situations including legacy systems or business mergers. ...74Decks553Flashcards5Learners -
CCSK Certification
CCSK Certification
By: Kal Krishnan
Domain 1 - Cloud Computing Concepts and Architecture, Domain 2 - Governance & Risk Management, Domain 3 - Legal Issues, Contracts and Electronic Discovery ...13Decks90Flashcards3Learners -
MIS + DWH
MIS + DWH
By: Héctor Aguilera
01 Data Science for Business, 02 Data Warehouse Architecture, DWH Tool overview, 03 Information Needs Analysis and DWH Schema ...18Decks71Flashcards1Learner -
Javascript refrence
Javascript refrence
By: Travis R
Functions, Array Obj properties and methods, General Javascript knowledge and concepts ...40Decks120Flashcards4Learners -
MGMT 3265
MGMT 3265
By: Belle SM
Chapter 4, Everything, Chapter 11 Enterprise Architecture ...9Decks50Flashcards2Learners -
NETAPP: Industry Essentials: Enterprise Storage
NETAPP: Industry Essentials: Enterprise Storage
By: Keith Texel
Module 1: Data Center Infrastructure, Module 2 Enteprise Storage System Architecture, Module 3: Storage Systems, Storage Networks And Protocols ...6Decks83Flashcards1Learner -
Saa-3
Saa-3
By: S N
Amazon AppFlow, Aws MQ, Aws Glue ...76Decks323Flashcards1Learner -
CompTIA Security+ SY0-701 Module 1:
CompTIA Security+ SY0-701 Module 1:
By: Mehdi Ouhtit
Slide 1: General Security Concepts, Slide 2: Defense in Depth, Slide 3: Essential Terminology ...39Decks59Flashcards2Learners -
CompTIA Security+ Certification Exam
CompTIA Security+ Certification Exam
By: Fareedah James
1.1 Given a scenario, analyze indicators of compromise and determine the type of malware., 1.2 Compare and contrast types of attacks., 1.3 Explain threat actor types and attributes. ...37Decks130Flashcards1Learner