онлайн
Просмотр PPT файлов онлайн
Лучшие презентации на тему «Информатика» за день на английском
фильтры
на всех языках
на русском
на украинском
на английском
на казахском
The ways we use computer
From rock, paper, scissors to street fighter II: proof by construction
Job developer. Pluses and minuses
Maximizing your chances for getting published and some real examples
Apache HTTP server. User guide
GM GMS overview problem solving
User-centered design
How to make a presentation
Information technology
How to make people happy
Cyber Security PowerPoint Templates
Mass media. Types of mass media
Computer basics computer hardware and software
Information technology
Information technology in our daily lives
Cyber Security
ICT in Core Sectors of Development. ICT Standardization
Information and communication technologies
Programming Logic and Design Seventh Edition. Chapter 4. Making Decisions
Introduction to computer systems. Architecture of a computer systems
Artificial Intelligence
Mass Media
Шаблоны слайдов от McKinsey
Module 28: Digital Forensics and Incident Analysis and Response
Cluster analysis. (Lecture 6-8)
Operating System Concepts – 10h Edition (сhapter 1)
Timer-counter. The AVR microcontroller and embedded systems. (Chapter 9)
Parts of the Computer
Intrusion Detection. Chapter 8. Computer Security: Principles and Practice
Computer Software. Operating systems. Desktop applications
Advance BBMA
Network Security. Essentials. Chapter 2
Advanced Encryption Standard
Endpoint Security and Analysis
The project mass media
The UK Newspapers
Mass Media. Newspapers
Modern technologies as a way of communication
LDI Plus Presentation EN
Computer - Input Devices, Output Devices
Mass media
Информационная безопасность. Cyber security
The mass media
Gradient Conference
Public Speaking
Introduction to IT
Human-Computer Interaction
Applied Computing is a field within SCIENCE which applies practical approaches of computer science to real world problems
Multimedia technologies
Информационные системы
Information and Communication Technologies (ICT)
Writing letters and emails
Computer Parts
Ways of communicating
Introduction to Informational and Communication Technologies
M106 - 09 MDMP STEP 2: Mission Analysis - ISR Development
Основы языка Kotlin
Neural networks
Cryptography and Network Security. Chapter 5. Fifth Edition by William Stallings
Programming logic and design seventh edition. Chapter 5. Looping
Spring teplates. Thymeleaf & spring framework
Mathematics for Computing 2016-2017. Lecture 1: Course Introduction and Numerical Representation
Computer Security: Principles and Practice. Firewalls and Intrusion Prevention Systems. Chapter 9
Surf Safely with a “Clean” Computer
Informatics. History of computers
Cyber security
Information and Communication Technologies
COMP290-084 Clockless Logic
Mass media
Key Management. Cryptography applications
Printer and scanner
PPTX test file
Genome assembly with SPAdes
Radio and Television today
Creation of the IMRAD model
Intro to Linux
Протокол TCP. Соединение
Computer engineering
Connect to the VDR
Anomaly detection
Multimedia technology (lecture 11)
Introduction to Computer systems. Computer architecture
Architecture of integrated information systems (ARIS)
Introduction to computer systems. Architecture of computer systems
Television: its advantages and disadvantages
Types of computer
Chapter 9. File Upload vulnerabilities
Mass media
Printer and scanner
Introduction to computer systems. Architecture of computer systems
Artificial intelligence
Communication technologies
Logistic regression
Android Manual USB Driver Manual
Technologies
Science end technical. Progress
The role of the computer in our life
Cryptography for Confidentiality. Hash and Symmetric Encryption
Private Key Encryption. Symmetric Block Ciphers
Internet
«
0
1
2
3
4
5
6
»
English
Русский
Правила