Komunita

Year 12 Computing

Vyžaduje sa predplatné

10 000+ výsledkov pre ' y12 computing '

Malware
Malware Spájačka
vytvoril(a)
Unit 2 LO2: 2.1 Information styles and their uses
Unit 2 LO2: 2.1 Information styles and their uses Spájačka
vytvoril(a)
2.3 Quality of Data
2.3 Quality of Data Pexeso
vytvoril(a)
Unit 2 1.2 Magnetic storage devices
Unit 2 1.2 Magnetic storage devices Doplňte vetu
vytvoril(a)
1.4 Wired internet connections [2]
1.4 Wired internet connections [2] Zoradenie skupiny
vytvoril(a)
Unit 2 LO6 6.2 Risks v 6.3 Impacts
Unit 2 LO6 6.2 Risks v 6.3 Impacts Zoradenie skupiny
vytvoril(a)
HTML Definitions Match-up
HTML Definitions Match-up Spájačka
vytvoril(a)
Unit 2 key words so far
Unit 2 key words so far Šibenica
vytvoril(a)
LO4: 4.1 UK Legislation [Match the Act]
LO4: 4.1 UK Legislation [Match the Act] Spájačka
vytvoril(a)
Take 2 Unit 2 4.3 Green IT
Take 2 Unit 2 4.3 Green IT Doplňte vetu
vytvoril(a)
TP2 - Tracking Point Revision
TP2 - Tracking Point Revision Doplňte vetu
vytvoril(a)
Python Keywords Match-Up
Python Keywords Match-Up Spájačka
vytvoril(a)
Organisational Security
Organisational Security Labyrint
vytvoril(a)
Unit 2 LO4 4.1 UK Legislation
Unit 2 LO4 4.1 UK Legislation Pravda alebo nepravda
vytvoril(a)
1.2 Types of information storage media
1.2 Types of information storage media Anagram
vytvoril(a)
Take 2 LO4: 4.1 UK Legislation [Match the Act]
Take 2 LO4: 4.1 UK Legislation [Match the Act] Spájačka
vytvoril(a)
Take 3: Can you remember? LO2 2.4 Information Management
Take 3: Can you remember? LO2 2.4 Information Management Označený diagram
vytvoril(a)
Communication skills in an IT environment
Communication skills in an IT environment Hľadanie slov
vytvoril(a)
Motherboard Components
Motherboard Components Označený diagram
vytvoril(a)
Computer Hardware
Computer Hardware Spájačka
vytvoril(a)
Unit 11 Revision
Unit 11 Revision Spájačka
vytvoril(a)
LO4 4.3 Personal attributes
LO4 4.3 Personal attributes Hľadanie slov
vytvoril(a)
Group the Python Examples
Group the Python Examples Zoradenie skupiny
vytvoril(a)
Take 2: 5.1 Data types and sources [2]
Take 2: 5.1 Data types and sources [2] Šibenica
vytvoril(a)
Take 2 3.6 Open v Closed Systems
Take 2 3.6 Open v Closed Systems Zoradenie skupiny
vytvoril(a)
Take 3 3.5 Data Analysis Tools
Take 3 3.5 Data Analysis Tools Spájačka
vytvoril(a)
Key aspects of digital forensics
Key aspects of digital forensics Spájačka
vytvoril(a)
Unit 2 LO1 1.6 Information Formats
Unit 2 LO1 1.6 Information Formats Prepichni balóny
vytvoril(a)
Key words Unit 2
Key words Unit 2 Hľadanie slov
vytvoril(a)
Unit 2 LO1 1.6 Information Formats - Second time lucky
Unit 2 LO1 1.6 Information Formats - Second time lucky Prepichni balóny
vytvoril(a)
TAKE 2: 2.1 Information Styles
TAKE 2: 2.1 Information Styles Nájdi zodpovedajúcu položku
vytvoril(a)
Take 2 Unit 2 5.2 DFDs
Take 2 Unit 2 5.2 DFDs Kvíz s obrázkami
vytvoril(a)
Unit 1 LO5 Physical v Digital Security
Unit 1 LO5 Physical v Digital Security Zoradenie skupiny
vytvoril(a)
Internal & External Stakeholders
Internal & External Stakeholders Zoradenie skupiny
vytvoril(a)
1.7 & 1.8 +/- The Internet
1.7 & 1.8 +/- The Internet Zoradenie skupiny
vytvoril(a)
2.1 Information Styles
2.1 Information Styles Nájdi zodpovedajúcu položku
vytvoril(a)
3.4 Stages of Data Analysis
3.4 Stages of Data Analysis Označený diagram
vytvoril(a)
Unit 2 LO1 - LO3 Key Words
Unit 2 LO1 - LO3 Key Words Sledujte a zapamätajte si
vytvoril(a)
Unit 2 LO5 5.1 Information sources
Unit 2 LO5 5.1 Information sources Zoradenie skupiny
vytvoril(a)
5.1 Data types and sources [2]
5.1 Data types and sources [2] Šibenica
vytvoril(a)
6.1 Principles of Information Security
6.1 Principles of Information Security Zoradenie skupiny
vytvoril(a)
Take 2: 1.7 & 1.8 +/- The Internet
Take 2: 1.7 & 1.8 +/- The Internet Zoradenie skupiny
vytvoril(a)
Holders and locations of Information
Holders and locations of Information Krížovka
vytvoril(a)
Chapter 14 - Multimedia and Interactive features
Chapter 14 - Multimedia and Interactive features Zoradenie skupiny
vytvoril(a)
Protecting the security and integrity of data
Protecting the security and integrity of data Anagram
vytvoril(a)
Unit 2 1.3 Access and Storage Devices
Unit 2 1.3 Access and Storage Devices Zoradenie skupiny
vytvoril(a)
3.5 Data Analysis Tools [2]
3.5 Data Analysis Tools [2] Spájačka
vytvoril(a)
Take 2 6.1 Principles of Information Security
Take 2 6.1 Principles of Information Security Zoradenie skupiny
vytvoril(a)
Types of Information Storage media
Types of Information Storage media Spájačka
vytvoril(a)
What Is It?
What Is It? Spájačka
vytvoril(a)
Computational Thinking: Missing Words
Computational Thinking: Missing Words Doplňte vetu
vytvoril(a)
Unit 2 1.5 World Wide Web Technologies
Unit 2 1.5 World Wide Web Technologies Zoradenie skupiny
vytvoril(a)
Unit 2 Key Terms
Unit 2 Key Terms Krížovka
vytvoril(a)
2.1 Information Styles - ATTEMPT #2
2.1 Information Styles - ATTEMPT #2 Nájdi zodpovedajúcu položku
vytvoril(a)
Obnoviť automaticky uložené: ?