J277 2.1.1 |
Computational Thinking |
Computers |
2023-09-11 |
weirdog |
5 |
0 |
edit |
|
J277 2.1.2 |
Designing, creating and refining algorithms |
Computers |
2023-09-11 |
weirdog |
10 |
0 |
edit |
|
J277 2.1.3 |
Search and Sort Algorithms |
Computers |
2023-09-11 |
weirdog |
5 |
0 |
edit |
|
J277 2.2.1 |
Programming Fundamentals |
Computers |
2023-09-11 |
weirdog |
14 |
0 |
edit |
|
J277 2.2.2 |
Data Types |
Computers |
2023-09-11 |
weirdog |
7 |
0 |
edit |
|
J277 2.2.3 |
Additional Programming Techniques |
Computers |
2023-09-11 |
weirdog |
10 |
0 |
edit |
|
J277 2.3.1 |
Defensive Design |
Computers |
2023-09-11 |
weirdog |
11 |
0 |
edit |
|
J277 2.3.2 |
Testing |
Computers |
2023-09-11 |
weirdog |
8 |
0 |
edit |
|
J277 2.5.1 |
Languages |
Computers |
2023-09-11 |
weirdog |
8 |
0 |
edit |
|
J277 2.4.1 |
Computational Logic |
Computers |
2023-09-11 |
weirdog |
4 |
0 |
edit |
|
J277 2.5.2 |
Integrated Development Environment (IDE) |
Computers |
2023-09-11 |
weirdog |
3 |
0 |
edit |
|
J277 Paper 2 |
Full Paper 2 |
Computers |
2023-09-11 |
weirdog |
83 |
0 |
edit |
|
J277 Paper 1 |
Full Paper 1 |
Computers |
2023-09-11 |
weirdog |
162 |
0 |
edit |
|
J277 1.1.1 |
Architecture of the CPU |
Computers |
2023-09-11 |
weirdog |
11 |
0 |
edit |
|
J277 1.1.2 |
CPU performance |
Computers |
2023-09-11 |
weirdog |
3 |
0 |
edit |
|
J277 1.1.3 |
Embedded Systems |
Computers |
2023-09-11 |
weirdog |
1 |
0 |
edit |
|
j277 1.2.1 |
Primary storage (Memory) |
Computers |
2023-09-11 |
weirdog |
5 |
0 |
edit |
|
J277 1.2.2 |
Secondary Storage |
Computers |
2023-09-11 |
weirdog |
11 |
0 |
edit |
|
J277 1.2.3 |
Units |
Computers |
2023-09-11 |
weirdog |
9 |
0 |
edit |
|
J277 1.2.4 |
Data Storage |
Computers |
2023-09-11 |
weirdog |
21 |
0 |
edit |
|
J277 1.3.1 |
Networks and topologies |
Computers |
2023-09-11 |
weirdog |
48 |
0 |
edit |
|
J277 1.2.5 |
Compression |
Computers |
2023-09-11 |
weirdog |
3 |
0 |
edit |
|
J277 1.4.1 |
Threats to computer systems and networks |
Computers |
2023-09-11 |
weirdog |
13 |
0 |
edit |
|
J277 1.4.2 |
Identifying and preventing vulnerabilities |
Computers |
2023-09-11 |
weirdog |
9 |
0 |
edit |
|
J277 1.5.1 |
Operating systems |
Computers |
2023-09-11 |
weirdog |
7 |
0 |
edit |
|
J277 1.5.2 |
Utility software |
Computers |
2023-09-11 |
weirdog |
5 |
0 |
edit |
|
J277 1.6.1 |
Ethical, legal, cultural and environmental impact |
Computers |
2023-09-11 |
weirdog |
20 |
0 |
edit |
|
J837 - E & M |
Enterprise and Marketing Full Course |
Business |
2023-09-16 |
weirdog |
149 |
0 |
edit |
|
J837 - 1.1 |
Characteristics of successful entrepreneurs |
Business |
2023-09-16 |
weirdog |
7 |
0 |
edit |
|
J837 - 1.2 |
Potential rewards for risk taking |
Business |
2023-09-16 |
weirdog |
4 |
0 |
edit |
|
J837 - 1.3 |
Potential drawbacks for risk taking |
Business |
2023-09-16 |
weirdog |
4 |
0 |
edit |
|
J837 - TA2 |
Market research to target a specific customer |
Business |
2023-09-16 |
weirdog |
36 |
0 |
edit |
|
J837 - TA1 |
Characteristics, risk and reward for enterprise |
Business |
2023-09-16 |
weirdog |
15 |
0 |
edit |
|
J837 - TA3 |
What makes a product financially viable |
Business |
2023-09-16 |
weirdog |
25 |
0 |
edit |
|
J837 - TA4 |
Creating a marketing mix to support a product |
Business |
2023-09-16 |
weirdog |
48 |
0 |
edit |
|
J837 - TA5 |
Factors to consider when starting up and running an enterprise |
Business |
2023-09-16 |
weirdog |
25 |
0 |
edit |
|
KS3 - Cybersecurity |
KS3 - Cybersecurity ~Keywords |
Computers |
2023-10-20 |
weirdog |
22 |
0 |
edit |
|
KS3 - Impact |
KS3 - Impact of ICT |
Computers |
2023-10-20 |
weirdog |
18 |
0 |
edit |
|
MOCK EXAM YEAR 10 |
MOCK EXAM YEAR 10 |
Business |
2024-06-04 |
weirdog |
93 |
0 |
edit |
|