Quick Viewrasha_alshowaikhSafety and Security (0)<p>Safety and Security | Chapter 8 | ICT | IGCSE ICT | Computer Science</p>
Quick Viewrasha_alshowaikhPseudocode (0)<p>#pseudocode #algorithm</p> <ul> <li> <p>Introduction to pseudocode</p> </li> <li> <p>examples of pseudocode</p> </li> </ul>
Quick Viewrasha_alshowaikhAlgorithm Introduction (0)<ul> <li> <p>Introduction to algorithms</p> </li> <li> <p>Tangram algorithm activity</p> </li> <li> <p>algorithm vs program</p> </li> <li> <p>examples of algorithms</p> </li> </ul>
Quick Viewrasha_alshowaikhSearching algorithm (0)<p>algorithm, searching algorithm, computer science</p>
Quick Viewrasha_alshowaikhString handling (0)<p>programming, pseudocode, strings, computer science</p>
Quick Viewrasha_alshowaikhFOR..TO..Next loop (0)<p>Computer science_Iteration</p> <p>For TO Next loop</p>
Quick Viewrasha_alshowaikhRepeat..Until loop (0)<p>IGCSE Computer science_Iteration</p> <p>Repeat Until loop</p>
Quick Viewrasha_alshowaikhAutomated and emerging technologies (0)<p>IGCSE Computer Science chapter 6 - Automated and emerging technologies</p>
Quick Viewrasha_alshowaikhWhile loop (0)<p>IGCSE Computer science_Iteration</p> <p>While Do Endwhile loop</p>
Quick Viewrasha_alshowaikhSoftware (0)<p>IGCSE Computer Science Chapter 4 - Software with past papers questions</p>
Quick Viewrasha_alshowaikhComputer architecture (0)<p>IGCSE Computer science_Chapter 3.1</p> <p>Computer architecture</p>
Quick Viewrasha_alshowaikhComputer networks and the effects of using them (0)<p>IGCSE ICT_Chapter 4</p> <p>Computer networks and the effects of using them</p>
Quick Viewrasha_alshowaikhData storage and file compression (0)<p>IGCSE Computer science_Chapter 1.3</p> <p>Data storage and file compression</p>