More cards in this set

Card 6

Front

State the name of a two part user authentication which can be used a security measure

Back

Preview of the front of card 6

Card 7

Front

Describe the roll of an ethical hacker

Back

Preview of the front of card 7

Card 8

Front

Identify one alternative usage model to a client server network, where all workstations have equal statue

Back

Preview of the front of card 8

Card 9

Front

Describe the role of a client workstation

Back

Preview of the front of card 9

Card 10

Front

Key points about RAM

Back

Preview of the front of card 10

Card 11

Front

Key points about ROM

Back

Preview of the front of card 11

Card 12

Front

Cache Memory

Back

Preview of the front of card 12

Card 13

Front

Bits to Bytes

Back

Preview of the front of card 13

Card 14

Front

Bytes to Bits

Back

Preview of the front of card 14

Card 15

Front

Bytes to kilobytes, kilobytes to megabytes, megabytes to gigabytes

Back

Preview of the front of card 15
View more cards