Learn Embedded Systems
Study Embedded Systems using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
CompTIA Sec+
CompTIA Sec+
By: James Camp
Social Engineering Techniques, Types of Attacks/Malware, Application Attacks ...29Decks377Flashcards5Learners -
Computer Science- Mocks
Computer Science- Mocks
By: Sim <3 floaties
Common Components of the CPU + functions., Von Nueman Architecture., Characteristics of the CPU: ...18Decks87Flashcards3Learners -
Computing
Computing
By: Ayush Iyengar
1.1 Architecture of the CPU, 1.2 CPU performance and embedded systems, 2.1 Storage ...22Decks320Flashcards1Learner -
Math
Math
By: Jessie Us
Modul I, Actuators (Fluid Based), Embedded systems3Decks43Flashcards1Learner -
Security+
Security+
By: Zoubida Regzal
1.1 Social engineering attacks, 1.2 Malware & common attacks, 1.3 Application attacks ...35Decks859Flashcards6Learners -
500L ECE
500L ECE
By: Olayinkascott Andee
ECE 541: Microprocessor and Embedded Systems Design1Decks108Flashcards1Learner -
2.0 - Architecture and Design
2.0 - Architecture and Design
By: Melissa Andrews
2.1 Security Concepts, 2.2 Cloud Computing Concepts, 2.3 Application Development, Deployment, & Automation ...8Decks224Flashcards1Learner -
1.1 Systems Architecture
1.1 Systems Architecture
By: Chris Ives
1.1.1 Systems Architecture, 1.1.1 Glossary (Systems Architecture), 1.1.2 CPU Performance ...5Decks58Flashcards1Learner -
Computer Science
Computer Science
By: Tom White
CPU, Von Neumann Architecture, Primary Storage ...7Decks108Flashcards2Learners -
2.0 Architecture and Design
2.0 Architecture and Design
By: Justin Doring
2.1 Explain the importance of security concepts in an enterprise environment, 2.2 Summarize virtualization and cloud computing concepts, 2.3 Summarize secure application development, deployment, and automation concepts ...8Decks257Flashcards3Learners -
CompTIA Security+ SY0-501 - Based on Objectives X
CompTIA Security+ SY0-501 - Based on Objectives X
By: xavier Xavier
1.0 Threats, Attacks and Vulnerabilities (21%), 1.1 Given a scenario, analyze indicators of compromise and determine the type of malware., 1.2 Compare and contrast types of attacks. ...45Decks887Flashcards15Learners -
Cyber Security (CompTIA Security+)
Cyber Security (CompTIA Security+)
By: Jeremy Lazzari
Chapter 1 - Threats, Attacks, and Vulnerabilities, Chapter 1.1 - Social Engineering, Chapter 1.2 - Attack Types ...41Decks1,670Flashcards17Learners -
CompTIA Security+ SY0-501 - Objectives
CompTIA Security+ SY0-501 - Objectives
By: Eliza Hazard
1.0 Threats, Attacks and Vulnerabilities (21%), 1.1 Given a scenario, analyze indicators of compromise and determine the type of malware., 1.2 Compare and contrast types of attacks. ...45Decks887Flashcards10Learners -
Computer science Topic 3
Computer science Topic 3
By: Jisung Kim
Topic 3.1 - Computer Architecture, Topic 3.2 - Embedded Systems, Topic 3.3 - Machines ...6Decks38Flashcards2Learners -
mocks cs revision
mocks cs revision
By: Anooj Syedah
computational thinking, Data types and variables, pseudocode ...4Decks52Flashcards1Learner -
Comp.Sci. GCSE
Comp.Sci. GCSE
By: Dawid German
1.1 Hardware - CPU, 1.1 Hardware - Primary Storage, 1.1 Hardware - Additional Hardware Components ...11Decks114Flashcards3Learners -
Computer Science
Computer Science
By: Cjgamer97 #8262
Hardware, Operating Systems, Disk Organisation ...11Decks114Flashcards1Learner -
Mobile Development and Ubiquitous Computing
Mobile Development and Ubiquitous Computing
By: Daniel Casley
Android OS, Android Activity Lifecycle, Intents ...12Decks190Flashcards1Learner -
Security + 601
Security + 601
By: Carlos Rosado
Attacks, Threats, Vulnerabilities, Malware Variants, Types of Attacks ...18Decks265Flashcards1Learner -
Histology
Histology
By: Kamie Grech
Decalcification, Microtomy and Embedding, Lymphoid neoplasms, Respiratory disorders ...10Decks94Flashcards1Learner -
F202 Life Insurance Fellowship_MM
F202 Life Insurance Fellowship_MM
By: Merveilleuse M
Chapter 1: South African general business environment, Chapter 2: South African socio-economic conditions, Chapter 3: South African specific products ...16Decks220Flashcards2Learners -
CompTIA A+ Core 2
CompTIA A+ Core 2
By: Birdman Jetson
1.1 Identify Basic Features of Microsoft Windows Editions, 1.2 Microsoft Command Line Tool, 1.3 Use Features & Tools of Microsoft Windows 10 Operating System (OS) ...35Decks506Flashcards14Learners -
Computer Science
Computer Science
By: Connor Richards
1.3 | CPU Performance, 1.5 | Input/Output Devices, 1.6 | Primary Storage ...16Decks145Flashcards3Learners -
computer science
computer science
By: zainab kifayat
1.5.1 operating systems, 1.5.2 utility software, 1.2.1 primary storage (memory) ...11Decks78Flashcards1Learner -
Security + 501 - FHSU - Feb 3 - 13
Security + 501 - FHSU - Feb 3 - 13
By: Casey Tozier
Domain 1.1 - Given a scenario, analyze indicators of compromise and determine the type of malware., Domain 1.2 - Compare and contrast types of attacks., Domain 1.3 - Explain threat actor types and attributes. ...39Decks773Flashcards7Learners -
DOMAIN 2 Sec+
DOMAIN 2 Sec+
By: I J
2.1 Explain the importance of security concepts in an enterprise environment, 2.2 Summarize virtualization and cloud computing concepts, 2.3 Summarize secure application development, deployment, and automation concepts ...8Decks212Flashcards1Learner -
GCSE Computer Science 23-25
GCSE Computer Science 23-25
By: Mr Dixon Dixon
1.1.1 Architecture of the CPU, 1.1.2 CPU Performance, 1.1.3 Embedded Systems ...16Decks160Flashcards2Learners -
Microprocessor and Microcontroller Technology
Microprocessor and Microcontroller Technology
By: Catrina Gatt
Describe with the aid of diagrams the main differences between a microprocessor-based svstem and a microcontroller, Describe the main criteria or factors for choosing a microcontroller for an application., Explain the concept of an embedded system, including some examples ...6Decks61Flashcards2Learners -
Microprocessors
Microprocessors
By: Ashley Paley
Section 2: Embedded Systems, Section 3: Software Synchronization, Section 3: Device Drivers ...5Decks64Flashcards2Learners -
SEC+SY0-601
SEC+SY0-601
By: Scott Byrams
1.1 Compare and contrast different types of social engineering tecchniques, 1.2 Analyze potential indicators to determine the type of attack, 1.3 Analyze potential indicators associated with application attacks ...35Decks546Flashcards18Learners