Previous Lecture
Complete and continue
Computer Course
Browse Topic
Computer Course
Computer and its Components
Introduction
(07:50)
Hardware and Software (Part 1)
(13:25)
Hardware and Software (Part 2)
(12:08)
Hardware and Software (Part 3)
(19:34)
Software
(19:58)
Computer Characteristics
(05:30)
Generations of Computers
(14:27)
Categories of Computers
(13:25)
Application of Computers and Input process output (IPO)
(06:17)
Computer Ports and Cables
(18:14)
Networking
Internet (part 1)
(19:20)
Internet (part 2)
(19:13)
Internet (part 3)
(30:50)
Internet (part 4)
(27:51)
Internet (part 5)
(22:38)
Internet (part 6)
(15:17)
Services available on the internet
(21:26)
Web services
(12:45)
Mobile technologies
(38:46)
HTML
HTML (PART 1)
(18:38)
HTML (PART 2)
(13:02)
HTML (PART 3)
(14:32)
HTML (PART 4)
(07:07)
HTML (PART 5)
(09:37)
HTML (PART 6)
(08:42)
HTML (PART 7)
(07:02)
HTML (PART 8)
(08:37)
HTML (PART 9)
(10:52)
HTML (PART 10)
(06:46)
HTML (PART 11)
(03:42)
Embed audio and video in a HTML page (part 1)
(15:18)
Embed audio and video in a HTML page (part 2)
(08:38)
Create a table using the tags (Part 1)
(08:50)
Create a table using the tags (Part 2)
(09:39)
Links
(12:59)
Security Threats and Safety Measures
COMPUTER VIRUS
(11:05)
WORMS
(05:12)
TROJAN HORSE
(07:28)
SPYWARE
(06:55)
MALWARE
(02:14)
SPAM
(05:27)
HACKERS AND CRACKERS
(03:33)
ANTI VIRUS TOOLS
(03:52)
DATA BACKUP AND SECURITY
(07:26)
Cyber ethics
INTRODUCTION
(10:24)
CYBER ETHICS
(08:18)
NETWORK SECURITY (BASIC TERMINOLOGY) - PART 1
(07:19)
NETWORK SECURITY (BASIC TERMINOLOGY) - PART 2
(09:58)
SOFTWARE LICENSE
(13:29)
CYBER CRIME
(03:31)
CYBER SAFETY
(12:46)
CYBER SECURITY
(05:53)
CYBER ATTACKS
(05:19)
MALWARE
(10:22)
CYBER ETHICS
Lecture content locked
If you're already enrolled,
you'll need to login.
Enroll in Course to Unlock
Log In
×
E-Mail Address
Password
Remember Me
Login
Forgot Your Password?