Learn Digital Techniques
Study Digital Techniques using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(23)
Decks
Flashcards
Learners
-
Radiology
Radiology
By: Sushmi Jay
Legislation, Production and properties of xrays, Interactions of xrays with matter ...9Decks19Flashcards4Learners -
Digital Forensics
Digital Forensics
By: Kevin Zhang
Introduction to Forensic Science, Digital Evidence, Forensics Walk-Through ...26Decks351Flashcards2Learners -
Psychology
Psychology
By: Alex Horan
Chapter 1: Research Methodology, Chapter 2: Localisation, Chapter 2: Neuroplasticity ...27Decks491Flashcards9Learners -
CySA+ 2023
CySA+ 2023
By: Thomas Hollinghurst
1A. Identify Security Control Types obj 5.3, 1B. Importance of Threat Data and Intelligence obj 1.1, 1.2, 2A. Threats and Threat Actor Types ...15Decks209Flashcards4Learners -
Sound Design for the Electronic Musician (Class)
Sound Design for the Electronic Musician (Class)
By: Nicolas Goleeke
Week 1 - Introduction to Electronic Music Synthesizers, Week 2 - Using Control Signals in Sound Design, Week 3 - Control Signals in Reason's Subtractor ...12Decks185Flashcards1Learner -
IT
IT
By: Angel Adeyeye
Unit 1: Page 1: Digital Devices 1, Unit 1: Page 6: Storage Devices, Unit 1: Page 7: Types of Operating Systems. ...34Decks399Flashcards2Learners -
ICT unit 3
ICT unit 3
By: Naina Jassal
Network, HCI, Control Systems ...9Decks71Flashcards2Learners -
Security+ Continuation
Security+ Continuation
By: Wisdom Eke
3.5 Given a scenario, implement secure mobile solutions., 3.6 Given a Scenario, apply Cybersecurity Solutions to the cloud, 3.7 Given a Scenarior, Implement Identity and account management controls ...15Decks463Flashcards1Learner -
CIMA E2
CIMA E2
By: James Alder
Business Ecosystems, Alternative Approaches to Business Models, Business models in a digital ecosystem ...11Decks65Flashcards2Learners -
E2
E2
By: John Nixon
Topic 1 - Ecosystems, Topic 2 - Alternative Approaches to Business Models, Topic 3 - Business Models in Digital Ecosystems ...11Decks126Flashcards1Learner -
4.0 Operations and Incident Response
4.0 Operations and Incident Response
By: E. Slate
4.1 Organizational Security, 4.2 Policies / Processes Incident Response, 4.3 Incident Investigation ...5Decks25Flashcards2Learners -
GMAT
GMAT
By: Daniel Zhu
Quant Rules, Unit Digit Patterns, Absolute Value Rules ...6Decks154Flashcards1Learner -
CA 2
CA 2
By: Jake P
2.1.1 The use of, and need for, data types, 2.1.2 Declaring and using constants and variables that use appropriate data types, 2.1.3 The use of, and need for, data structures ...25Decks207Flashcards14Learners -
IB Computer Science HL (old)
IB Computer Science HL (old)
By: Edward DUNNE
1.1.1 - Identify the context for which a new system is planned., 1.1.2 - Describe the need for change management., 1.1.3 - Outline compatibility issues resulting from situations including legacy systems or business mergers. ...48Decks295Flashcards22Learners -
Psychology
Psychology
By: Lucy Perry
Cognitive Approach - Models of Memory, Cognitive Approach - Schema Theory, Cognitive Approach - Thinking & Decision Making ...30Decks183Flashcards1Learner -
Computing
Computing
By: Athan Doufas
Characteristics of data types, Functions and capabilities of key hardware and software components of digital sytems required for processing, storing and communicating data and information, Function requirements of solutions ...14Decks73Flashcards2Learners -
DT
DT
By: Abi Twort
Chapter 4: Digital Technologies, Chapter 5: Factors Influencing the Development of Products, Chapter 6: Effects of Technological Development ...5Decks47Flashcards1Learner -
Intro. Distribuidos
Intro. Distribuidos
By: Nicole Raveszani
Chapter 2 - Principles of Network Applications, Chapter 2 - The Web and HTTP, 2.3 Electronic Mail in the Internet ...25Decks134Flashcards2Learners -
Percepio Security +
Percepio Security +
By: Beth Hosek
Social Engineering Techniques & Other Attack Types, Implementing Identity and Account Management & AAA Solutions, Physical Security Controls ...12Decks38Flashcards1Learner -
IB Computing 2025
IB Computing 2025
By: Edward DUNNE
1.1.1 - Identify the context for which a new system is planned., 1.1.2 - Describe the need for change management., 1.1.3 - Outline compatibility issues resulting from situations including legacy systems or business mergers. ...73Decks464Flashcards7Learners -
ODP: Contact Lens(NCLE)
ODP: Contact Lens(NCLE)
By: Micah Murray
L.2 - Types of CLs & Materials, L.3 - Basic CL Design, L.4 - Structures & Functions of the Eye ...18Decks94Flashcards1Learner -
N: Paper Two = Documentary Film
N: Paper Two = Documentary Film
By: Bethany Harries
Filmmaker's Mode, Asif Kapadia, Specific Techniques ...8Decks48Flashcards1Learner -
Sec+ -> 4.0 Operations and Incident Response (16%)
Sec+ -> 4.0 Operations and Incident Response (16%)
By: Isabelle S
4.1 - Given a scenario, use the appropriate tool to assess organizational security., 4.2 - Summarize the importance of policies, processes, and procedures for incident response., 4.3 - Given an incident, utilize appropriate data sources to support an investigation. ...5Decks41Flashcards1Learner