Fellesskap

Year 12 Computing

Abonnement kreves

10 000+ resultater for y12 computing

Malware
Malware Match opp
etter
2.3 Quality of Data
2.3 Quality of Data Samsvarende par
etter
Unit 2 1.2 Magnetic storage devices
Unit 2 1.2 Magnetic storage devices Fullfør setningen
etter
1.4 Wired internet connections [2]
1.4 Wired internet connections [2] Gruppe sortering
etter
Unit 2 LO6 6.2 Risks v 6.3 Impacts
Unit 2 LO6 6.2 Risks v 6.3 Impacts Gruppe sortering
etter
HTML Definitions Match-up
HTML Definitions Match-up Match opp
Unit 2 key words so far
Unit 2 key words so far Bøddel
etter
Take 2 Unit 2 4.3 Green IT
Take 2 Unit 2 4.3 Green IT Fullfør setningen
etter
TP2 - Tracking Point Revision
TP2 - Tracking Point Revision Fullfør setningen
etter
Python Keywords Match-Up
Python Keywords Match-Up Match opp
etter
Organisational Security
Organisational Security Labyrintjakt
etter
Unit 2 LO4 4.1 UK Legislation
Unit 2 LO4 4.1 UK Legislation Sann eller usann
etter
Communication skills in an IT environment
Communication skills in an IT environment Wordsearch
etter
Motherboard Components
Motherboard Components Merket diagram
etter
Computer Hardware
Computer Hardware Match opp
etter
Unit 11 Revision
Unit 11 Revision Match opp
etter
LO4 4.3 Personal attributes
LO4 4.3 Personal attributes Wordsearch
etter
Group the Python Examples
Group the Python Examples Gruppe sortering
Take 2: 5.1 Data types and sources [2]
Take 2: 5.1 Data types and sources [2] Bøddel
etter
Take 2 3.6 Open v Closed Systems
Take 2 3.6 Open v Closed Systems Gruppe sortering
etter
Take 3 3.5 Data Analysis Tools
Take 3 3.5 Data Analysis Tools Match opp
etter
Key aspects of digital forensics
Key aspects of digital forensics Match opp
etter
Unit 2 LO1 1.6 Information Formats
Unit 2 LO1 1.6 Information Formats Ballong pop
etter
Key words Unit 2
Key words Unit 2 Wordsearch
etter
TAKE 2: 2.1 Information Styles
TAKE 2: 2.1 Information Styles Finn treffet
etter
Take 2 Unit 2 5.2 DFDs
Take 2 Unit 2 5.2 DFDs Bildequiz
etter
Unit 1 LO5 Physical v Digital Security
Unit 1 LO5 Physical v Digital Security Gruppe sortering
etter
Internal & External Stakeholders
Internal & External Stakeholders Gruppe sortering
etter
1.7 & 1.8 +/- The Internet
1.7 & 1.8 +/- The Internet Gruppe sortering
etter
2.1 Information Styles
2.1 Information Styles Finn treffet
etter
3.4 Stages of Data Analysis
3.4 Stages of Data Analysis Merket diagram
etter
Unit 2 LO1 - LO3 Key Words
Unit 2 LO1 - LO3 Key Words Se og husk
etter
Unit 2 LO5 5.1 Information sources
Unit 2 LO5 5.1 Information sources Gruppe sortering
etter
5.1 Data types and sources [2]
5.1 Data types and sources [2] Bøddel
etter
6.1 Principles of Information Security
6.1 Principles of Information Security Gruppe sortering
etter
Take 2: 1.7 & 1.8 +/- The Internet
Take 2: 1.7 & 1.8 +/- The Internet Gruppe sortering
etter
Holders and locations of Information
Holders and locations of Information Kryssord
etter
Unit 2 1.3 Access and Storage Devices
Unit 2 1.3 Access and Storage Devices Gruppe sortering
etter
3.5 Data Analysis Tools [2]
3.5 Data Analysis Tools [2] Match opp
etter
Take 2 6.1 Principles of Information Security
Take 2 6.1 Principles of Information Security Gruppe sortering
etter
Types of Information Storage media
Types of Information Storage media Match opp
etter
What Is It?
What Is It? Match opp
etter
Computational Thinking: Missing Words
Computational Thinking: Missing Words Fullfør setningen
etter
Unit 2 1.5 World Wide Web Technologies
Unit 2 1.5 World Wide Web Technologies Gruppe sortering
etter
Unit 2 Key Terms
Unit 2 Key Terms Kryssord
etter
2.1 Information Styles - ATTEMPT #2
2.1 Information Styles - ATTEMPT #2 Finn treffet
etter
Gjenopprett automatisk lagring: ?