Hamjamiyat

Year 12 Computing

Obuna talab etiladi

10 000+ natijalari 'y12 computing'

Malware
Malware Tenglashtirish
tomonidan
Unit 2 LO2: 2.1 Information styles and their uses
Unit 2 LO2: 2.1 Information styles and their uses Tenglashtirish
tomonidan
Unit 2 LO1 1.6 Information Formats
Unit 2 LO1 1.6 Information Formats Balon pop
tomonidan
Key words Unit 2
Key words Unit 2 So'zlarni qidirish
tomonidan
TAKE 2: 2.1 Information Styles
TAKE 2: 2.1 Information Styles Oʻyinni qidirish
tomonidan
Take 2 Unit 2 5.2 DFDs
Take 2 Unit 2 5.2 DFDs Yangiliklar
tomonidan
Unit 1 LO5 Physical v Digital Security
Unit 1 LO5 Physical v Digital Security Guruh saralash
tomonidan
Internal & External Stakeholders
Internal & External Stakeholders Guruh saralash
tomonidan
Python Keywords Match-Up
Python Keywords Match-Up Tenglashtirish
tomonidan
Organisational Security
Organisational Security Labirent quvish
tomonidan
Unit 2 LO4 4.1 UK Legislation
Unit 2 LO4 4.1 UK Legislation Toʻgʻri yoki notoʻgʻri
tomonidan
1.2 Types of information storage media
1.2 Types of information storage media Anagramma
tomonidan
Take 2 LO4: 4.1 UK Legislation [Match the Act]
Take 2 LO4: 4.1 UK Legislation [Match the Act] Tenglashtirish
tomonidan
Take 3: Can you remember? LO2 2.4 Information Management
Take 3: Can you remember? LO2 2.4 Information Management Etiketli diagramma
tomonidan
Communication skills in an IT environment
Communication skills in an IT environment So'zlarni qidirish
tomonidan
Motherboard Components
Motherboard Components Etiketli diagramma
tomonidan
Computer Hardware
Computer Hardware Tenglashtirish
tomonidan
Unit 11 Revision
Unit 11 Revision Tenglashtirish
tomonidan
LO4 4.3 Personal attributes
LO4 4.3 Personal attributes So'zlarni qidirish
tomonidan
Group the Python Examples
Group the Python Examples Guruh saralash
tomonidan
Take 2: 5.1 Data types and sources [2]
Take 2: 5.1 Data types and sources [2] Askar
tomonidan
Take 2 3.6 Open v Closed Systems
Take 2 3.6 Open v Closed Systems Guruh saralash
tomonidan
Take 3 3.5 Data Analysis Tools
Take 3 3.5 Data Analysis Tools Tenglashtirish
tomonidan
Key aspects of digital forensics
Key aspects of digital forensics Tenglashtirish
tomonidan
Protecting the security and integrity of data
Protecting the security and integrity of data Anagramma
tomonidan
Unit 2 1.3 Access and Storage Devices
Unit 2 1.3 Access and Storage Devices Guruh saralash
tomonidan
3.5 Data Analysis Tools [2]
3.5 Data Analysis Tools [2] Tenglashtirish
tomonidan
Take 2 6.1 Principles of Information Security
Take 2 6.1 Principles of Information Security Guruh saralash
tomonidan
Types of Information Storage media
Types of Information Storage media Tenglashtirish
tomonidan
What Is It?
What Is It? Tenglashtirish
tomonidan
Protocols
Protocols Tenglashtirish
tomonidan
1.6 Information formats
1.6 Information formats Tenglashtirish
tomonidan
1.4 Internet [Connections Characteristics]
1.4 Internet [Connections Characteristics] Anagramma
tomonidan
3.5 Data analysis tools
3.5 Data analysis tools Askar
tomonidan
Unit 2 4.1 UK Legislation
Unit 2 4.1 UK Legislation Labirent quvish
tomonidan
Unit 2 4.3 Green IT
Unit 2 4.3 Green IT Gapni bajarish
tomonidan
Take 2: Can you remember? LO2 2.4 Information Management
Take 2: Can you remember? LO2 2.4 Information Management Etiketli diagramma
tomonidan
TAKE 2 Unit 2 LO1 1.6 Information Formats
TAKE 2 Unit 2 LO1 1.6 Information Formats Balon pop
tomonidan
Take 2 Unit 2 LO4 4.1 UK Legislation
Take 2 Unit 2 LO4 4.1 UK Legislation Toʻgʻri yoki notoʻgʻri
tomonidan
Take 2 3.4 Stages of Data Analysis
Take 2 3.4 Stages of Data Analysis Etiketli diagramma
tomonidan
Take 3 Unit 2 1.2 Magnetic storage devices
Take 3 Unit 2 1.2 Magnetic storage devices Gapni bajarish
tomonidan
DPA - Personal or Senstive Data
DPA - Personal or Senstive Data Guruh saralash
tomonidan
Internal threats
Internal threats Viktorina
tomonidan
BTEC: Implementation methods
BTEC: Implementation methods Guruh saralash
tomonidan
Headed Paper and Templates
Headed Paper and Templates Anagramma
tomonidan
1.6 Information Formats
1.6 Information Formats Whack-a-mole
tomonidan
LO4 Legislation protecting information
LO4 Legislation protecting information Tomosha qiling va yodlab oling
tomonidan
Input v Output
Input v Output Guruh saralash
tomonidan
BTEC Exam Keywords Crossword
BTEC Exam Keywords Crossword Krossword
tomonidan
Photoshop Tools
Photoshop Tools Anagramma
tomonidan
Matching words for ICT Health and Safety game
Matching words for ICT Health and Safety game Tenglashtirish
tomonidan
1.4 Internet connections
1.4 Internet connections Oʻyinni qidirish
tomonidan
LO2 Key terms
LO2 Key terms Labirent quvish
tomonidan
Unit 2 Global Information 2.2 Information Classification
Unit 2 Global Information 2.2 Information Classification O'yinlar namoyishi viktorinasi
tomonidan
Tahrirlashni davom ettirish: ?