Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Computer-Amp'
Computer-Amp published presentations and documents on DocSlides.
Origins of Computing – Post 1900
by hotmountain
Raj . Reddy. Carnegie Mellon University. Jan 16, 2...
ECOM 2314 Computer Programming
by markes
I. Introduction to JAVA programming. Instructor: R...
The Usability of KONE DCS:
by dsuser1
How. (and why) . the characteristics of the group...
Computer Architecture Lecture 4a: Memory Solution Ideas
by groundstimulus
Prof. Onur Mutlu. ETH Zürich. Fall 2019. 27 Septe...
Hardware Presentation by:
by laobeast
Serena, Ann & Nicole. Hardware. Computer hardw...
This is CS50 AP . an introduction to the intellectual enterprises
by jideborn
of computer science and the art of . programming. ...
Introduction to computers and programs
by genderadidas
Chapter 1. Compilers/interpreters. Programs must b...
Examplify I n st a ll a
by unisoftsm
t. i. on. . & . R. eg. i. s. t. r. a. t. i. o...
CSC 341 Human-Computer Interaction
by leventiser
Department of Computer Science. Misr. Internation...
Chapter 5 IT Infrastructures and Emerging Technologies
by mentegor
IT Infrastructure. Hardware and software (IT), and...
Use Basic A djectives ELIT 14 – Episode 49
by reportperfect
Use basic adjectives. Today’s . FABULOUS. lesso...
INTRODUCTION TO COMPUTERS
by cheeserv
1617 . Napiers. Bones : John Napier. 1642 Calcula...
TECHNOLOGY AND LIFESTYLE
by mentegor
Kamarul . hawari. , faculty of electrical and elec...
A New Way to Learn Auburn University
by opelogen
College of Veterinary Medicine. Tablet Program. Co...
Statistical Fundamentals
by chiquity
: . Using Microsoft Excel for . Univariate. and B...
Intrusion Detection Chapter 25
by ellena-manuel
Version 1.0. Computer Security: Art and Science. ...
Collaboration Universidad de Chile (DCC) - GITS
by lindy-dunigan
. The DCC. . History. . Perspectives. DCC –...
Computing Educations How do I get there?
by trish-goza
At Chemeketa. IS / IT. Chemeketa. CIS Department...
09 – Inheritance 3.1 Introduction to Inheritance and Class Hierarchies
by danika-pritchard
09 – Inheritance 3.1 Introduction to Inheritanc...
Chapter 12: Legal, Ethical, Health, and Environmental Issues in Computing
by test
Chapter 12: Legal, Ethical, Health, and Environme...
New Mexico Broadband Program
by luanne-stotts
New Mexico Broadband Program Basic Computer Skill...
New Mexico Broadband Program
by calandra-battersby
New Mexico Broadband Program Selecting and Mainta...
LARGE CROWD COUNTING
by karlyn-bohler
LARGE CROWD COUNTING by MIRTES CO...
New Mexico Broadband Program
by sherrill-nordquist
New Mexico Broadband Program Basic Computer Skill...
Legal and Ethical Issues in Computer Security
by olivia-moreira
Legal and Ethical Issues in Computer Security Ado...
Evolution and Generation of Computers
by briana-ranney
Evolution and Generation of Computers Samuel Kizi...
Computer-Aided Design (CAD) Competition
by debby-jeon
Computer-Aided Design (CAD) Competition Overview ...
Introduction to Algorithms:
by marina-yarberry
Introduction to Algorithms: Shortest Paths I Intr...
Collaboration Universidad de Chile (DCC) - GITS The DCC
by briana-ranney
Collaboration Universidad de Chile (DCC) - GITS ...
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols
by tatyana-admore
A Performance Comparison of Multi-Hop Wireless Ad...
CS10 The Beauty and Joy of Computing
by danika-pritchard
Lecture #11 : Recursion II. Instructor : Sean Mor...
LAW OF COMPUTER TECHNOLOGY FALL 2018
by myesha-ticknor
Internet Taxes. Michael I. Shamos, Ph.D., J.D.. I...
News Item PowerPoint Presentation
by stefany-barnette
XX. CRIME DESCRIPTION: By Eugene Perez. Cyber cri...
CS1102 Lec05 - Software Computer Science Department
by liane-varnes
City University of Hong Kong. Objectives. Describ...
Investigating Internet Safety
by tatyana-admore
Tips and tools to keep you and your information s...
Computer Science at the University of Portland
by karlyn-bohler
Choosing your major. Skills. Interest. Opportunit...
Computer Concepts 2018 Module
by min-jolicoeur
7. Digital Security. Copyright © 2019 Cengage. ...
Invitation to theoretical computer science
by liane-varnes
Innovation by using mathematics. 写真等は講...
Lesson 3 Cyber Legal Environment:
by tatyana-admore
One of the Prime Drivers for Incident Response. O...
Data and Computer Communications
by natalia-silvester
Tenth . Edition. by William Stallings. Data and C...
Load More...