Learn Informal Network
Study Informal Network using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
AS ICT
AS ICT
By: Charlotte Wintle
CAD/CAM, Computer Based Shopping Systems, Date, Information And Knowledge ...14Decks53Flashcards4Learners -
ICT A2
ICT A2
By: Emelda Braimoh
4.3.3 Human Computer Interface (HCI), 4.3.4 Working with ICT, 4.3.5 ICT Security Policies ...9Decks109Flashcards5Learners -
aqa a level computer science:2
aqa a level computer science:2
By: naarah Bonti-Asamoah
4.5: section 3: data representation: number, binary and information coding systems, 4.5: section 3: data representation: representing images and sound, 4.6: section 4: hardware and software ...11Decks181Flashcards13Learners -
i.t!
i.t!
By: Rey Nae
hardware, input and output devices, storage ...11Decks116Flashcards1Learner -
Linux Commands
Linux Commands
By: Michael McKersie
System Information, Hardware Info, Performance Monitoring ...13Decks140Flashcards1Learner -
CPSA 2024
CPSA 2024
By: sweet •
A2 - Law and Compliance, B1 - IP Protocols, B2 - Network Architectures ...16Decks166Flashcards1Learner -
ISA - 201
ISA - 201
By: Akhyaar Mian
Chapter 0, Chapter 1: Introduction to Information Systems, Chapter 2: Organizational Strategy, Competitive Advantage + IS ...7Decks302Flashcards1Learner -
BTEC IT UNIT 1 - YR12
BTEC IT UNIT 1 - YR12
By: cajimat richaelczia
Digital devices, uses of digital devices, input and output devices ...37Decks176Flashcards51Learners -
Intro to Computer Science
Intro to Computer Science
By: Karine Sarkisian
Functions, Arrays, Programming ...10Decks158Flashcards3Learners -
CISSP v.6
CISSP v.6
By: Edo B
Course Introduction, Chapter 1: The Information Security Environment, Chapter 2: Information Asset Security ...8Decks37Flashcards1Learner -
Unit 1 - Information Technology Systems
Unit 1 - Information Technology Systems
By: S B
Digital Devices - Content, Input And Ouput Devices - Content, Devices For Accessibilty And Data Processing - Content ...36Decks376Flashcards11Learners -
PPBM
PPBM
By: Cassie Williams
Code of Ethics and Rules of Conduct, FTO Program, Sworn Ranks, Titles, and Promotion Process ...41Decks539Flashcards3Learners -
TDTS04
TDTS04
By: Cecilia Petersson
L1. Why do we need protocol layering?, DS L1. What are main design goals in DS?, S1. How do config errors made in OSPF vs BGP affect Internet operation? ...54Decks743Flashcards1Learner -
Pentest+ PTO-002
Pentest+ PTO-002
By: Will Schmidt
Chapter 01: Penetration Testing, Chapter 02: Planning and Scoping Penetration Tests, Chapter 03: Information Gathering ...14Decks461Flashcards1Learner -
DAC1 - Information and Systems Management
DAC1 - Information and Systems Management
By: Keiichi Uegaki
Chapter 1 Business Driven Technology, Chapter 15 Creating Collaborative Partnerships, Chapter 2 Identifying Competitive Advantages ...17Decks124Flashcards9Learners -
Digital Forensics
Digital Forensics
By: Kevin Zhang
Introduction to Forensic Science, Digital Evidence, Forensics Walk-Through ...26Decks351Flashcards2Learners -
Supply Chain Management
Supply Chain Management
By: Ilari Häikiö
Intro, Inventory Management and Risk Pooling, Network Planning and Facility Location ...9Decks137Flashcards4Learners -
economics
economics
By: kamraan ahmadi
credit banks and money, economic fluctuations and unemployment, unemployment and fiscal policy ...10Decks100Flashcards13Learners -
Linux
Linux
By: user delete
Shell variables, Input/output redirection, Combining commands ...11Decks98Flashcards4Learners -
IS4670 CYBER CRIME FORENSICS QUESTIONS
IS4670 CYBER CRIME FORENSICS QUESTIONS
By: Barbara Crable
IS4670 CHAPTER 1 System Forensics Fundamentals, IS4670 CHAPTER 2 Overview of Computer Crime, IS4670 CHAPTER 3 Challenges of System Forensics ...16Decks200Flashcards21Learners -
GKI (IN2062)
GKI (IN2062)
By: Lukas A
1 - Intelligent Agents, 2 - Uninformed Search, 3 - Informed Search ...13Decks220Flashcards1Learner -
IT Fundamentals Book Two - All Acronyms
IT Fundamentals Book Two - All Acronyms
By: Dave E ICT
Chapter 9 - Local Area Network Acronyms, Chapter 10 - Wide Area Networks Acronyms, Chapter 11 - Common Network Protocols Acronyms ...7Decks77Flashcards2Learners -
I.T.
I.T.
By: Daniel Peart
Computer Fundamentals and information Processing, Computer Components, Memory ...11Decks121Flashcards1Learner -
Foundations Business Systems & Ecommerce
Foundations Business Systems & Ecommerce
By: Lucas Turner
Wk 1 - data to information, Wk 2 - the business environment, Operations m.ment / supply chain m.ment ...13Decks153Flashcards11Learners -
Enterprise Architecture
Enterprise Architecture
By: Claire Wensing
Part 1: Enterprise Architecture for design, Part 1: Article Sowa & Zachman – “Extending and Formalizing the Framework for Information Systems Architecture”, Part 3: Lecture 4a - Operating Model ...9Decks164Flashcards10Learners -
A Computer Science : Unit 1
A Computer Science : Unit 1
By: ww ww
1.1.1 Architecture Introduction, 1.1.2 Von Neumann Architecture, 1.1.3 Factors affecting CPU performance ...26Decks253Flashcards2Learners -
Introduction To IT
Introduction To IT
By: Natalie Hardee
Section 2: Introduction To Information Technology, Section 3: Computer Hardware And History, Section 4: Computer Networks ...7Decks432Flashcards1Learner -
Certified Ethical Hacker (CEH)
Certified Ethical Hacker (CEH)
By: Christoph Todd
Common Terms, Zero Day Attack, Miscellaneous Computer Processes (stuff I find and look up along the way) ...66Decks320Flashcards7Learners -
COMM 226
COMM 226
By: Brad H
Q1-1: Why Is Introduction to MIS the Most Important Class in the Business School?, Q1-2 What Is MIS?, Q1-3 How Does MIS Relate to Organizational Strategy? ...27Decks402Flashcards1Learner -
VD Exam1
VD Exam1
By: Alex Moorman
Networks, Telco Basics, Convergence, and Total Network Connectivity, Cyber Crime and Laws ...5Decks130Flashcards1Learner