Learn Software Processes
Study Software Processes using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
CEN4020: Software Engineering I
CEN4020: Software Engineering I
By: Wynne Nicholas
Exam 3 Study, Exam 3 CMM Levels, Components of a Software Project Management Plan ...10Decks171Flashcards2Learners -
ICT Unit 2
ICT Unit 2
By: Matthew Grimsley
Data Representation, Data, information and knowledge, Architecture ...10Decks120Flashcards2Learners -
CDAP 350 Audiology
CDAP 350 Audiology
By: Emily Beacham
Amplification Systems and Aural Rehabilitation, Perscriptive Formulas, Compression And Hearing Software, Hearing Instrument Styles and Earmolds ...4Decks84Flashcards4Learners -
CompTIA Security+ SY0-501 - Based on Objectives X
CompTIA Security+ SY0-501 - Based on Objectives X
By: xavier Xavier
1.0 Threats, Attacks and Vulnerabilities (21%), 1.1 Given a scenario, analyze indicators of compromise and determine the type of malware., 1.2 Compare and contrast types of attacks. ...45Decks887Flashcards13Learners -
I40(0/1/2) Computer Science Bsc Year 1
I40(0/1/2) Computer Science Bsc Year 1
By: Aria Noroozi
ECM 1407 Electronic Machines, ECM 1407 The History of Computing, ECM 1407 Encryption ...40Decks731Flashcards1Learner -
Test Analyst Interview
Test Analyst Interview
By: E Hole
Tell me about yourself, Metrics, Defect Life Cycle ...35Decks572Flashcards5Learners -
512
512
By: Damilola Ekanola
agile, Architectural pattern, Project mangement ...6Decks58Flashcards1Learner -
Computer Science
Computer Science
By: Jolyon Knagg
1.1 Hardware and Communication, 1.2 Logical Operations, 1.3 Data Transmission ...17Decks193Flashcards2Learners -
CompTIA Security+ SY0-501 - Objectives
CompTIA Security+ SY0-501 - Objectives
By: Eliza Hazard
1.0 Threats, Attacks and Vulnerabilities (21%), 1.1 Given a scenario, analyze indicators of compromise and determine the type of malware., 1.2 Compare and contrast types of attacks. ...45Decks887Flashcards9Learners -
Advance Analysis and Design
Advance Analysis and Design
By: Derice McDonald
Information Systems Development, Planning, Project Management ...20Decks265Flashcards1Learner -
Massey Subjects
Massey Subjects
By: Kelsey Martin
Topic 3.3 Confidentiality And Privacy, Topic 3.2 Information Systems Control For Systems Reliabilty, Topic 3.1 Fraud And AIS ...12Decks316Flashcards6Learners -
LPIC1
LPIC1
By: Kessi Diones O. Silva
Chapter 1 - Exploring Linux Command-Line Tools, Chapter 2 - Managing Software and Processes2Decks30Flashcards4Learners -
SDD
SDD
By: Mothiver Chat
Development Approaches, Copyright, Languages ...15Decks135Flashcards1Learner -
Software Project Management
Software Project Management
By: Martin Grant
1 - Intro, 2 - Software Dev Process, 3 - Use Cases3Decks78Flashcards2Learners -
Functional Safety
Functional Safety
By: Jalal Elwazze
Module 2 - Process Safety and Functional Safety, Module 3 - IEC 61508 and IEC 61511, Module 4 - Hazard and Risk Assessment + Allocation of Protection Layers ...15Decks164Flashcards7Learners -
Computer Science
Computer Science
By: Andre Davis
Deadlock, Operating System, Memory Management, Virtual Memory, Paging and Thrashing ...13Decks64Flashcards1Learner -
Software
Software
By: Shelly Y
Software, Software 2, Software 3 ...5Decks46Flashcards1Learner -
System Design
System Design
By: Toni Ashe
Waterfall Model, Agile Methodology, Software Development Lifecycle ...8Decks30Flashcards2Learners -
IS Development and Implementation
IS Development and Implementation
By: Camilla Toft
Lecture 1 - Introduction, Lecture 2 - Implementation, Configuration (And Failures), Lecture 3 - History of ISD and Current practice and problems ...15Decks256Flashcards9Learners -
Practice
Practice
By: Spirit Writer
(1)CyberSecurity Objectives, (1)Privacy Vs. Security, (1)Evaluating Security Risks ...89Decks906Flashcards1Learner -
ISD
ISD
By: Frederik Bendz
ISD Lecture 2 Systems development, ISD Lecture 4 From systems development to technochange, ISD Lecture 5 Requirement Analysis: Benefits & Strategies ...9Decks269Flashcards4Learners -
Software Engineering
Software Engineering
By: Stephen Allen
Project Management, Software Development Process, Requirements Engineering ...8Decks117Flashcards1Learner -
PSWT
PSWT
By: Quang Trung
I. Basics and Process Models, II. Project Management, III. Requirements as the Foundation of Software ...12Decks296Flashcards1Learner -
Rapid Track Commands and Options
Rapid Track Commands and Options
By: Solomon Scott
Validate Network Configuration, Configure Networking from the Command Line, Edit Network Configuration Files ...44Decks278Flashcards1Learner -
BTEC ICT
BTEC ICT
By: Ellen Kennedy
Digital devices, uses of digital devices, input and output devices ...40Decks279Flashcards10Learners -
Computer Science
Computer Science
By: Yong Han
BC1-Hardware and Software, BC2- IPO Model, BC3- Computer System Storage ...28Decks313Flashcards3Learners -
Additive Manufacturing
Additive Manufacturing
By: Tina Ko
Ch.1 Introduction, Ch.2 and Ch.3 Development of AM, Ch.4 VAT Photopolymerization ...12Decks223Flashcards1Learner -
I.T.
I.T.
By: Daniel Peart
Computer Fundamentals and information Processing, Computer Components, Memory ...11Decks121Flashcards1Learner -
M362 Revision
M362 Revision
By: Joanne Bremner
Unit 1, Unit 2 Processes, Units 3 and 4 ...8Decks173Flashcards6Learners -
operating systemns
operating systemns
By: Abdullah Mumtaz
x64 OS Internals, Programming in RISC-V Assembly Language, Low level software develompent tools/WEEK3 ...8Decks125Flashcards1Learner