Learn Software Processes
Study Software Processes using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
Comp 361D1
Comp 361D1
By: Arok Khot
The Software Engineering Process: Phase 1, The Software Engineering Process: Phase 2, Design The Software Engineering Process: Phase 33Decks63Flashcards1Learner -
Interview Prep
Interview Prep
By: Suri D
Tell me about yourself, Metrics, Defect Life Cycle...34Decks570Flashcards41Learners -
Conducting a survey - chapter 1
Conducting a survey - chapter 1
By: tom kriger
Chapter 1: Introduction to online surveys, Chapter 3: Ethical considerations, Chapter 2: developing the survey...16Decks214Flashcards3Learners -
Software Engineering 1
Software Engineering 1
By: Kevin May
Is Software Engineering Dead? - Roger S. Pressman, No Silver Bullet - Frederick P. Brooks, Jr., Software Process, Ian Sommerville (CH 4)...5Decks74Flashcards2Learners -
new spqa
new spqa
By: Jim Unknown
Part A: Process & Requirements, Part B: Software Architecture, Part C: User Interface...6Decks80Flashcards2Learners -
Object Oriented Analysis & Design
Object Oriented Analysis & Design
By: K D P Hasendra
1.System Concepts for Object Modelling, 2.Object Oriented Software Development Process, 3.Computer Aided Systems Engineering...11Decks143Flashcards2Learners -
CIA PART 3 - Surgent
CIA PART 3 - Surgent
By: Aurélie BERRAJAH
Domain I – Business Acumen – Section A : Organizational Objectives, Behaviour, and Performance, Domain I – Business Acumen – Section A : Organizational Objectives, Behaviour, and Performance - Bis, Domain I – Business Acumen – Section B: Organizational Structure and Business Processes...17Decks469Flashcards20Learners -
Introduction to Operating Systems and Becoming a Power User
Introduction to Operating Systems and Becoming a Power User
By: Rebekah Pesquera
Module 1, day 1, Module 1, day 2, module 1, day 3: windows make directories in gui and cli) through windows moving a renaming files, directories...34Decks2,504Flashcards22Learners -
Computing
Computing
By: Daniel Barber
Topic 1.1 - Data Structures, Topic 1.2 - Logical Operations, 1.3 - Algorithms...17Decks251Flashcards5Learners -
PRMS
PRMS
By: user delete
Designprinzipien, Input Processing, Authentication...7Decks89Flashcards3Learners -
ICT Unit 2
ICT Unit 2
By: Matthew Grimsley
Data Representation, Data, information and knowledge, Architecture...10Decks120Flashcards2Learners -
CEN4020: Software Engineering I
CEN4020: Software Engineering I
By: Wynne Nicholas
Exam 3 Study, Exam 3 CMM Levels, Components of a Software Project Management Plan...10Decks171Flashcards2Learners -
Linux Plus
Linux Plus
By: Rasheed Hall
Storage : Partition, Storage: Logical Volumes, Storage: Mounting File Systems...21Decks265Flashcards1Learner -
I.T. EOT
I.T. EOT
By: Asia Wilson
Word Processing, Algorithms, Flow Charts...15Decks179Flashcards3Learners -
CDAP 350 Audiology
CDAP 350 Audiology
By: Emily Beacham
Amplification Systems and Aural Rehabilitation, Perscriptive Formulas, Compression And Hearing Software, Hearing Instrument Styles and Earmolds...4Decks84Flashcards4Learners -
HUGB
HUGB
By: Ævar Ástþórsson
Software Process, Life cycles, Agile methods...15Decks128Flashcards2Learners -
CompTIA Security+ SY0-501 - Based on Objectives X
CompTIA Security+ SY0-501 - Based on Objectives X
By: xavier Xavier
1.0 Threats, Attacks and Vulnerabilities (21%), 1.1 Given a scenario, analyze indicators of compromise and determine the type of malware., 1.2 Compare and contrast types of attacks....45Decks887Flashcards15Learners -
CompTIA Security+ SY0-501 - Objectives
CompTIA Security+ SY0-501 - Objectives
By: Eliza Hazard
1.0 Threats, Attacks and Vulnerabilities (21%), 1.1 Given a scenario, analyze indicators of compromise and determine the type of malware., 1.2 Compare and contrast types of attacks....45Decks887Flashcards11Learners -
INFO123
INFO123
By: Frazer Hawke
Week 7: Hardware, Software and Mobile Systems, Week 8: Data, Databases and Data Management, Week 9: Big Data and Business Intelligence Systems...8Decks125Flashcards4Learners -
Practice
Practice
By: Spirit Writer
(1)CyberSecurity Objectives, (1)Privacy Vs. Security, (1)Evaluating Security Risks...89Decks906Flashcards3Learners -
Test Analyst Interview
Test Analyst Interview
By: E Hole
Tell me about yourself, Metrics, Defect Life Cycle...35Decks572Flashcards5Learners -
Software Engineering
Software Engineering
By: Lukas W
Requirements Engineering, Use Cases, Domain Modelling...11Decks128Flashcards2Learners -
512
512
By: Damilola Ekanola
agile, Architectural pattern, Project mangement...6Decks58Flashcards1Learner -
Massey Subjects
Massey Subjects
By: Kelsey Martin
Topic 3.3 Confidentiality And Privacy, Topic 3.2 Information Systems Control For Systems Reliabilty, Topic 3.1 Fraud And AIS...12Decks316Flashcards7Learners -
Software Project Management
Software Project Management
By: Martin Grant
1 - Intro, 2 - Software Dev Process, 3 - Use Cases3Decks78Flashcards2Learners -
Computer Science
Computer Science
By: Jolyon Knagg
1.1 Hardware and Communication, 1.2 Logical Operations, 1.3 Data Transmission...17Decks193Flashcards2Learners -
I.T.
I.T.
By: Daniel Peart
Computer Fundamentals and information Processing, Computer Components, Memory...11Decks121Flashcards2Learners -
I40(0/1/2) Computer Science Bsc Year 1
I40(0/1/2) Computer Science Bsc Year 1
By: Aria Noroozi
ECM 1407 Electronic Machines, ECM 1407 The History of Computing, ECM 1407 Encryption...40Decks731Flashcards2Learners -
LPIC1
LPIC1
By: Kessi Diones O. Silva
Chapter 1 - Exploring Linux Command-Line Tools, Chapter 2 - Managing Software and Processes2Decks30Flashcards4Learners -
Functional Safety
Functional Safety
By: Jalal Elwazze
Module 2 - Process Safety and Functional Safety, Module 3 - IEC 61508 and IEC 61511, Module 4 - Hazard and Risk Assessment + Allocation of Protection Layers...15Decks164Flashcards7Learners