Unit 7 Vocabulary - IT Security
Try to collect as many vegetables as you can to make your own delicious chakalaka!
Unit 2 - Perisian Komputer
Mengenal dan menerangkan berkenaan dengan perisian komputer dengan menyatakan maksud dan jenis perisian
Understanding Netiquette
Netiquette Basics
Under the Hood
Threat Modeling (STRIDE)
You'll be asked to match definitions within the STRIDE categories, which is used in risk analysis and threat modeling.
Threat Modeling (DREAD)
You'll learn definitions within the DREAD categories, which is used in risk analysis and threat modeling.
The Tar Utility - Linux
You'll receive a crash course on the tar command and its options.
The Profession of IT
History of computing.
The Internet: DNS, IP Addresses, Packets & Routing
The Internet and Representing Data
The Internet and Representing Data Chap 2 Vocabulary