Społeczność

Information technology

Przykłady z naszej społeczności

Liczba wyników dla zapytania „information technology”: 1 335

Malware - Comptia A+ 1102
Malware - Comptia A+ 1102 Połącz w pary
autor:
Microsoft Features and Tools - Comptia A+ 1102
Microsoft Features and Tools - Comptia A+ 1102 Połącz w pary
autor:
Microsoft Features and Tools - CompTIA A+ 1102
Microsoft Features and Tools - CompTIA A+ 1102 Połącz w pary
Social Engineering - Comptia A+ 1102
Social Engineering - Comptia A+ 1102 Połącz w pary
autor:
Windows Commands - Comptia A+ 1102
Windows Commands - Comptia A+ 1102 Połącz w pary
autor:
steps for malware removal (Simple)
steps for malware removal (Simple) Połącz w pary
autor:
IT Back up's
IT Back up's Połącz w pary
autor:
a+ 1102 1.3 Microsoft Management Console
a+ 1102 1.3 Microsoft Management Console Połącz w pary
a+ 1102 1.5 - Windows Settings
a+ 1102 1.5 - Windows Settings Połącz w pary
a+ 1102 1.9 - perform OS installations and upgrades in a diverse OS environment.
a+ 1102 1.9 - perform OS installations and upgrades in a diverse OS environment. Połącz w pary
a+ 1102 1.4 - The Windows Control Panel
a+ 1102 1.4 - The Windows Control Panel Połącz w pary
Common Port Numbers (Detailed)
Common Port Numbers (Detailed) Połącz w pary
autor:
Text Annotations
Text Annotations Połącz w pary
autor:
Text Features
Text Features Labirynt
autor:
TECH SAVVY
TECH SAVVY Połącz w pary
Tech Tools Word Search
Tech Tools Word Search Znajdź słowo
autor:
Microsoft Word Window Review
Microsoft Word Window Review Rysunek z opisami
autor:
Microsoft Office Word
Microsoft Office Word Labirynt
autor:
t568-B | Ethernet UTP Wiring Standard
t568-B | Ethernet UTP Wiring Standard Połącz w pary
CompTIA A+ 220-1101 Laser Printing Process
CompTIA A+ 220-1101 Laser Printing Process Rysunek z opisami
autor:
Technology
Technology Połącz w pary
Microsoft Office Excel
Microsoft Office Excel Samolot
autor:
Microsoft Excel Window Review
Microsoft Excel Window Review Rysunek z opisami
autor:
Chapter 15 CLI | 59. Understanding the CLI 60. Navigating the CLI 61. Working with folders
Chapter 15 CLI | 59. Understanding the CLI 60. Navigating the CLI 61. Working with folders Połącz w pary
autor:
Personal Information Review
Personal Information Review Test
autor:
Final review 2
Final review 2 Test
autor:
Label the Parts of an Online Article
Label the Parts of an Online Article Rysunek z opisami
Vocab 2 patent
Vocab 2 patent Test
autor:
review11 statistics
review11 statistics Połącz w pary
autor:
Technology
Technology Anagram
autor:
 PERSONAL INFORMATION
PERSONAL INFORMATION Koło fortuny
autor:
Technology or Nature?
Technology or Nature? Samolot
autor:
PERSONAL INFORMATION
PERSONAL INFORMATION Koło fortuny
EdTech Vocabulary Flashcards
EdTech Vocabulary Flashcards Fiszki
Asking WH Questions to Get Information
Asking WH Questions to Get Information Koło fortuny
autor:
Technology Wins The Game
Technology Wins The Game Połącz w pary
Personal Information
Personal Information Koło fortuny
autor:
Personal Information
Personal Information Połącz w pary
autor:
Social Networking & Gaming in the Classroom
Social Networking & Gaming in the Classroom Teleturniej
autor:
US History Technology
US History Technology Memory
autor:
Micro:Bit Activity 1
Micro:Bit Activity 1 Rysunek z opisami
autor:
Parts of an Email
Parts of an Email Rysunek z opisami
autor:
Robots Pre-Quiz
Robots Pre-Quiz Teleturniej
autor:
 Personal Information Questions
Personal Information Questions Losowe karty
autor:
Personal vs. Private Information
Personal vs. Private Information Labirynt
autor:
Unit 1 Digital Information
Unit 1 Digital Information Połącz w pary
autor:
Technology in Astronomy
Technology in Astronomy Teleturniej
autor:
a+ 1102 1.1 os feature differences
a+ 1102 1.1 os feature differences Połącz w pary
a+1102 3.3 use best practice procedures for malware removal
a+1102 3.3 use best practice procedures for malware removal Połącz w pary
a+1102 2.1 Summarize various security measures and their purposes
a+1102 2.1 Summarize various security measures and their purposes Połącz w pary
a+1102 2.8 use common data destruction and disposal methods
a+1102 2.8 use common data destruction and disposal methods Połącz w pary
a+1102 2.1 continued Summarize various security measures and their purposes
a+1102 2.1 continued Summarize various security measures and their purposes Połącz w pary
a+1102 1.10 Identify common features and tools of the macOS/desktop OS
a+1102 1.10 Identify common features and tools of the macOS/desktop OS Połącz w pary
a+1102 2.4 Explain common social-engineering attacks, threats, and vulnerabilities
a+1102 2.4 Explain common social-engineering attacks, threats, and vulnerabilities Połącz w pary
a+1102 2.5 manage and configure basic security settings in the Microsoft Windows OS.
a+1102 2.5 manage and configure basic security settings in the Microsoft Windows OS. Połącz w pary
Przywrócić automatycznie zapisane ćwiczenie: ?