CONTENT LESSON 16 COMPUTER SECURITY
40
LESSON 17 INTRODUCTION COMPUTER THREATS
41
LESSON 18 SECURITY MEASURES
45
LESSON 19 RELATIONSHIP BETWEEN SECURITY THREATS AND SECURITY MEASURES
48
LESSON 20 SECURITY PROCEDURES LESSON 21 COMPUTER APPLICATIONS IN THE SOCIETY
50
LESSON 22 COMPUTER USERS
57
LESSON 23 HOW TO CONDUCT A STUDY
59
LESSON 24 PRESENTING RESULT
61
LESSON 25 DELEGATION OF WORK
63
LESSON 26 TOPICS FOR STUDY
65
LESSON 27 OVERVIEW OF COMPUTER SYSTEM
67
LESSON 28 INTRODUCTION TO COMPUTER SYSTEM
69
LESSON 29 INFORMATION PROCESSING CYCLE
71
LESSON 30 DATA REPRESENTATION
73
52
LESSON 31 INTRODUCTION TO BINARY CODING
74
LESSON 32 DATA MEASUREMENT
77
LESSON 33 CLOCK SPEED MEASUREMENT
78