В категории материалов: 22
Показано материалов: 1-10
Страницы: 1 2 3 »


Protect data from unauthorized access

  1. Methods and strategies
  2. Questions
  3. Exercises
  4. Exam questions

12.1.2.3 protect data from unauthorised access

Protection data | Просмотров: 2567 | Добавил: bzfar77 | Дата: 18.04.2023 | Комментарии (0)

Access rights to data

  1. Description
  2. Questions
  3. Exercises
  4. Exam questions

11.1.2.4 describe data protection measures such as encryption and access rights to data (authorisation)

Protection data | Просмотров: 2032 | Добавил: bzfar77 | Дата: 18.04.2023 | Комментарии (0)

Cloud technologies

  1. Definition
  2. Vendors
  3. Cloud-based services
  4. Advantages of using cloud technologies
  5. Risks of using cloud technologies
  6. Questions
  7. Exercises
  8. Exam questions

11.1.3.5 evaluate the risks of using cloud technologies

Internet technology | Просмотров: 2368 | Добавил: bzfar77 | Дата: 07.04.2023 | Комментарии (0)

Access restriction

  1. Definition
  2. Ways of implementing access restriction
  3. Questions
  4. Exercises
  5. Exam questions

11.1.3.4 restrict access to data made available through the Internet using a variety of methods

Protection data | Просмотров: 2553 | Добавил: bzfar77 | Дата: 07.04.2023 | Комментарии (0)

Open-source & Closed-source software

  1. The explanation for Open-source software
  2. Key characteristics of open-source software
  3. The explanation for Closed-source software
  4. Key characteristics of open-source software
  5. Questions
  6. Exercises
  7. Exam questions

11.1.3.2 describe the specifics of open-source software
11.1.3.3 describe the specifics of closed-source software

Applications | Просмотров: 2588 | Добавил: bzfar77 | Дата: 07.04.2023 | Комментарии (0)

Understanding Copyright Law and its importance in application development

  1. Theory
  2. Questions
  3. Exercises
  4. Exam questions

11.1.3.1 follow the copyright law when developing applications

Protection data | Просмотров: 2723 | Добавил: bzfar77 | Дата: 07.04.2023 | Комментарии (0)

Computer viruses

  1. Definition
  2. Common types of computer viruses
  3. Questions
  4. Exercises
  5. Exam questions

12.1.3.2 analyze problems arising due to malware

Protection data | Просмотров: 3254 | Добавил: bzfar77 | Дата: 10.10.2021 | Комментарии (0)

Ссылки на материалы для подготовки к экзаменам

Input/Ouput devices | Просмотров: 9419 | Добавил: bzfar77 | Дата: 25.08.2021 | Комментарии (0)

Blockchain technology

11.1.2.6 explain the function and operation of Blockchain technologies

Protection data | Просмотров: 5151 | Добавил: bzfar77 | Дата: 20.04.2021 | Комментарии (0)

Validation & Verification

  1. Validation
  2. Validation methods
  3. Verification
  4. Verification methods
  5. Questions
  6. Exercises
  7. Exam questions

11.1.2.5 explain the difference between the terms verification and validation
 

Programming languages | Просмотров: 5635 | Добавил: bzfar77 | Дата: 02.04.2021 | Комментарии (0)


1-10 11-20 21-22