Вы находитесь на странице: 1из 2

CONTENT

LESSON 16 40
COMPUTER SECURITY

LESSON 17 41
INTRODUCTION COMPUTER THREATS

LESSON 18 45
SECURITY MEASURES

LESSON 19 48
RELATIONSHIP BETWEEN SECURITY THREATS AND SECURITY
MEASURES

LESSON 20 50
SECURITY PROCEDURES
LESSON 21 52
COMPUTER APPLICATIONS IN THE SOCIETY

LESSON 22 57
COMPUTER USERS

LESSON 23 59
HOW TO CONDUCT A STUDY

LESSON 24 61
PRESENTING RESULT

LESSON 25 63
DELEGATION OF WORK

LESSON 26 65
TOPICS FOR STUDY

LESSON 27 67
OVERVIEW OF COMPUTER SYSTEM

LESSON 28 69
INTRODUCTION TO COMPUTER SYSTEM

LESSON 29 71
INFORMATION PROCESSING CYCLE

LESSON 30 73
DATA REPRESENTATION
LESSON 31 74
INTRODUCTION TO BINARY CODING

LESSON 32 77
DATA MEASUREMENT

LESSON 33 78
CLOCK SPEED MEASUREMENT

Вам также может понравиться