Lernkarten Bibliothek Aktivierungscode eingeben
Informatik
MCP 1 Chapter 2 Statistical Mechanics
Questions about the lecture 'From Molecular to Continuum Physics 1' of the RWTH Aachen Chapter 2 Statistical Mechanics
Informatik
Requirements Engineering
Techniques to gather customer needs/Requirements; system context, methods, Stakeholder analysis - Creating good requirements - Documentation in agile Settings - User Stories - Story Mapping - Definition of Acceptance Criteria
Informatik
MCP 1 Chapter 3 Molecular Dynamics
Questions about the lecture 'From Molecular to Continuum Physics 1' of the RWTH Aachen Chapter 3 Molecular Dynamics
Informatik
ITI
ITI SATs
Informatik
SC Chapter 1 Introduction
Questions about the lecture 'From Molecular to Continuum Physics 1' of the RWTH Aachen Chapter 1 Introduction
Informatik
SC Chapter 2 Propositional Logic
Questions about the lecture 'Satisfiability Checking' of the RWTH Aachen Chapter 2 Propositional Logic
Informatik
SC Chapter 3 SAT Solving
Questions about the lecture 'Satisfiability Checking' of the RWTH Aachen Chapter 3 SAT Solving
Informatik
SC Chapter 4 First Order Logic
Questions about the lecture 'Satisfiability Checking' of the RWTH Aachen Chapter 4 First Order Logic
Informatik
AIT
Questions about the lecture 'Advanced Internet Technology' of the RWTH Aachen
Informatik
SC Chapter 5 SMT Solving
Questions about the lecture 'Satisfiability Checking' of the RWTH Aachen Chapter 5 SMT Solving
Informatik
SC Chapter 6 Bit Vectors
Questions about the lecture 'Satisfiability Checking' of the RWTH Aachen Chapter 6 Bit Vectors
Informatik
ML Chapter 1 Introduction
Questions about the lecture 'Machine Learning' of the RWTH Aachen Chapter 1 Introduction
Informatik
SC Chapter 7 Linear Real Arithmetic
Questions about the lecture 'Satisfiability Checking' of the RWTH Aachen Chapter 7 Linear Real Arithmetic
Informatik
Bruce Nikkel search_sort.pdf
Bruce Nikkel search_sort.pdf
Informatik
ICG Chapter 1 Introduction
Questions about the lecture 'Infinte computations and games' of the RWTH Aachen Chapter 1 Introduction
Informatik
Bruce Nikkel App_forensic_artifacts.pdf
Bruce Nikkel App_forensic_artifacts.pdf
Informatik
SAT 5 & 6
PMI
Informatik
AIT Chapter 5 Sensor Networks
Questions about the lecture 'Advanced Internet Technology' of the RWTH Aachen Chapter 5 Sensor Networks
Informatik
SC Chapter 8 Quantifier-free Non-linear Real Arithmetic
Questions about the lecture 'Satisfiability Checking' of the RWTH Aachen Chapter 8 Quantifier-free Non-linear Real Arithmetic
Informatik
MCS Design rules
Shneiderman, Nielsen and Norman
Informatik
AIT Chapter 6 Internet of Things
Questions about the lecture 'Advanced Internet Technology' of the RWTH Aachen Chapter 6 Internet of Things
Informatik
CYG Chapter 1 Introduction
Questions about the lecture 'Cryptography' of the RWTH Aachen Chapter 1 Introduction
Informatik
CYG Chapter 2 Classical Cryptography
Questions about the lecture 'Cryptography' of the RWTH Aachen Chapter 2 Classical Cryptography
Informatik
Qualitätsplanung
Im Rahmen dieser Kartei finden sich Fragen zum Thema Qualitätsplanung
Informatik
CYG Chapter 3 Cryptanalysis of Classical Systems
Questions about the lecture 'Cryptography' of the RWTH Aachen Chapter 3 Cryptanalysis of Classical Systems
Informatik
CYG Chapter 4 Entropy and Perfect Secrecy
Questions about the lecture 'Cryptography' of the RWTH Aachen Chapter 4 Entropy and Perfect Secrecy
Informatik
ISPMA (International Software Produkt Manager)
Diese Lernkartei dient zum Aufbau und der Überprüfung des Wissens zur Erreichung des Foundation Zertifikat ISPMA.
Informatik
CYG Chapter 5 Fast Block Ciphers
Questions about the lecture 'Cryptography' of the RWTH Aachen Chapter 5 Fast Block Ciphers
Informatik
Les classes d adresse IP
Les classes d adresse IP
Informatik
eBusiness (Teil 1)
eBusiness MWI 2016 MC Questions (Teil 1 - bis Seite 37)
Informatik
CYG Chapter 6 Number-Theoretic Reference Problems
Questions about the lecture 'Cryptography' of the RWTH Aachen Chapter 6 Number-Theoretic Reference Problems
Informatik
Asymmetrische Verschlüsselung
Asymmetrische Verschlüsselung