Previous Lecture
Complete and continue
Computer Course
Browse Topic
Computer Course
Computer and its Components
Introduction
(07:50)
Hardware and Software (Part 1)
(13:25)
Hardware and Software (Part 2)
(12:08)
Hardware and Software (Part 3)
(19:34)
Software
(19:58)
Computer Characteristics
(05:30)
Generations of Computers
(14:27)
Categories of Computers
(13:25)
Application of Computers and Input process output (IPO)
(06:17)
Computer Ports and Cables
(18:14)
Networking
Internet (part 1)
(19:20)
Internet (part 2)
(19:13)
Internet (part 3)
(30:50)
Internet (part 4)
(27:51)
Internet (part 5)
(22:38)
Internet (part 6)
(15:17)
Services available on the internet
(21:26)
Web services
(12:45)
Mobile technologies
(38:46)
HTML
HTML (PART 1)
(18:38)
HTML (PART 2)
(13:02)
HTML (PART 3)
(14:32)
HTML (PART 4)
(07:07)
HTML (PART 5)
(09:37)
HTML (PART 6)
(08:42)
HTML (PART 7)
(07:02)
HTML (PART 8)
(08:37)
HTML (PART 9)
(10:52)
HTML (PART 10)
(06:46)
HTML (PART 11)
(03:42)
Embed audio and video in a HTML page (part 1)
(15:18)
Embed audio and video in a HTML page (part 2)
(08:38)
Create a table using the tags (Part 1)
(08:50)
Create a table using the tags (Part 2)
(09:39)
Links
(12:59)
Security Threats and Safety Measures
COMPUTER VIRUS
(11:05)
WORMS
(05:12)
TROJAN HORSE
(07:28)
SPYWARE
(06:55)
MALWARE
(02:14)
SPAM
(05:27)
HACKERS AND CRACKERS
(03:33)
ANTI VIRUS TOOLS
(03:52)
DATA BACKUP AND SECURITY
(07:26)
Cyber ethics
INTRODUCTION
(10:24)
CYBER ETHICS
(08:18)
NETWORK SECURITY (BASIC TERMINOLOGY) - PART 1
(07:19)
NETWORK SECURITY (BASIC TERMINOLOGY) - PART 2
(09:58)
SOFTWARE LICENSE
(13:29)
CYBER CRIME
(03:31)
CYBER SAFETY
(12:46)
CYBER SECURITY
(05:53)
CYBER ATTACKS
(05:19)
MALWARE
(10:22)
Computer Characteristics
Lecture content locked
If you're already enrolled,
you'll need to login.
Enroll in Course to Unlock
Log In
×
E-Mail Address
Password
Remember Me
Login
Forgot Your Password?
By using Geometry School App you accept our cookies and agree to our privacy policy, including cookie policy.
Read privacy policy
Ok