Learn Social Network
Study Social Network using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
CompTIA A+ Core 2 (220-1102)
CompTIA A+ Core 2 (220-1102)
By: John Vargas
Operating System 3 revision, Security, Software and Trouble Shooting ...51Decks1,075Flashcards18Learners -
german
german
By: Anna Cheng
chapter 2- Films and TV, chapter 2-books, chapter 2-sports ...9Decks239Flashcards1Learner -
Business Computing
Business Computing
By: Michael Conti
Intro, Week 2, Systems Thinking & Business Analytics ...16Decks490Flashcards8Learners -
BTM200
BTM200
By: Sweet Kerstin
Practice Final, Unit 4: Application Software, Unit 5A: Communications & Networks ...11Decks309Flashcards2Learners -
9569 H2 Computing Theory
9569 H2 Computing Theory
By: Javier Lim
Data types, Sort algorithms, Search algorithms ...17Decks197Flashcards13Learners -
DTDDB Eksamen
DTDDB Eksamen
By: Rasmus Hilligsøe
1. General - Intro to the topic, 2. Use of Digital Technologies, 3. Organization and strategy ...10Decks196Flashcards5Learners -
COMP 156 Computer Concepts
COMP 156 Computer Concepts
By: G M
What's In A Computer? (Week 2), Binary + Representation of Info (Week 3), Hexidecimal, CPU, and the Toy Computer (Week 4) ...12Decks381Flashcards22Learners -
Security + Messer
Security + Messer
By: Blayne Ehrenzeller
1.1 - Social Engineering, 1.2 - Attack Types, 1.3 - Application Attacks ...24Decks622Flashcards1Learner -
English Level 6
English Level 6
By: Luis Puga
Vocabulary Unit 1: Fake News, Vocabulary Unit 2: Health, Vocabulary Unit 3: Culture Shock ...4Decks85Flashcards2Learners -
Networks 1
Networks 1
By: Lune van Dijk
Lecture 1: intro, Lecture 2: embeddedness, Lecture 3: wicked problem ...12Decks110Flashcards5Learners -
Digital Forensics
Digital Forensics
By: Sitora Salaeva
Handling digital evidences, Network Forensics, Anomaly detection ...8Decks228Flashcards1Learner -
Language and Development
Language and Development
By: Megan Verrier
Word Meanings and Ambiguity - SM1, Structure of sentences - SM2, Parsing and syntactic ambiguity - SM3 ...16Decks476Flashcards2Learners -
Security+
Security+
By: Camden Connell
Chapter 1 & 2 Todays Security Professional & CyberSecurity Threat Landscape, Chapter 3 Malicious Code, Chapter 4 Social Engineering, Physical, and Password Attacks ...16Decks633Flashcards2Learners -
ag-CEH v10
ag-CEH v10
By: Anti Gondu
Module 1 - Intro to Ethical Hacking, Module 2 - Footprinting and Reconnaissance, Module 3 - Scanning Networks ...25Decks772Flashcards4Learners -
Man and Machine
Man and Machine
By: Lisa Marie Lebensfroh
Task 1-Cognitive science, artificial intelligence, prediction, Task 2-computational creativity, problem space search, optimization, systems view, default network, simulated annealing, Task 3-cognitive modeling, production rules, ACT-R ...10Decks311Flashcards18Learners -
ethical hacking
ethical hacking
By: Barbara Workman
Information Security Fundamentals, Ethical Hacking Fundamentals, Information Security Threats and Vulnerability Assessment ...13Decks222Flashcards92Learners -
Social Media
Social Media
By: Susanne t
L1: What is social media marketing?, L2: History, recent developments and ethics, L3: Platforms and network effects ...16Decks412Flashcards2Learners -
Information systems
Information systems
By: Dina Mojica
Module 1&2- information system and Information Technology, Unit 3- Hardware and Software, unit 4- Data Resource Management ...7Decks162Flashcards2Learners -
NexGenT
NexGenT
By: Sylvester Quintana
1.1 Social Engineering Techniques, 1.2 Types of Attacks, 1.3 Application Attacks ...5Decks167Flashcards1Learner -
Security+
Security+
By: Zoubida Regzal
1.1 Social engineering attacks, 1.2 Malware & common attacks, 1.3 Application attacks ...35Decks859Flashcards6Learners -
DTDDB 2021 SEM <3
DTDDB 2021 SEM <3
By: Julie Nielsen
Introduction to computational thinking, What is an Information System: Digital Technologies in a Global Society, How Businesses Use Digital Technologies ...11Decks235Flashcards8Learners -
Book Notes
Book Notes
By: Tom Krieglstein
The Happiness Advantage by Shawn Achor, NSA Masterclasses, NSA Magazine ...88Decks13,680Flashcards197Learners -
Rosetta Stone - Online Tutoring
Rosetta Stone - Online Tutoring
By: Fatih Özdemir
Leaders or Managers, Small Loans Make a Real Difference, Habits of Happy People ...15Decks143Flashcards3Learners -
Academic Words
Academic Words
By: Mohammad Aghanavaz
Global warming, The Global, Atmosphere ...28Decks420Flashcards1Learner -
CompTIA Sec+
CompTIA Sec+
By: James Camp
Social Engineering Techniques, Types of Attacks/Malware, Application Attacks ...29Decks377Flashcards5Learners -
MO final
MO final
By: Joseph Wagner
Networks I, Networks II, Uncovering & building social capital ...9Decks123Flashcards3Learners -
Method and Techniques
Method and Techniques
By: Olli Amrehn
Task 1 Welcome sience, Task 2 the characteristic score, Task 3 Making Observations and asking questions ...10Decks244Flashcards16Learners -
Org. Behavior
Org. Behavior
By: Jorge Andres Quiroga
Networking Readings, M2: Judging Talent, M4: Motivating People ...10Decks103Flashcards3Learners -
CSCI 4174
CSCI 4174
By: Eric Desjardins
Module 0: Review of Networking Concepts, Module 1: Introduction to Network Security, Module2: Denial of Service and Social Engineering ...4Decks118Flashcards4Learners -
unit 2 - Stacey
unit 2 - Stacey
By: Georgia Wharton
lo1 - concepts of equality, diversity and rights., lo1 - 3 values of care, lo1 - early years values of care. ...16Decks213Flashcards1Learner