online
Display PPT file online
«informatics»: top viewed presentations this week in english
filters
all languages
in russian
in ukrainian
in english
in kazakh
all time
this month
this week
this day
Smart technology. Internet of Things. Big data
Presentation and protection of the main results of design activity in the specialty
Evolution of computer systems
Information technologies in the professional sphere. Industrial ICT
Introduction to computer systems. Architecture of computer systems
Telecommunications and Networks
Multimedia technologies
Influence of mass media on society
Storage devices
Cyber-Safety
Living in the Age of Communication
Mass Media
Cyber Security
Mass media in Kazakhstan
Mass media in Kazakhstan
Information communication technologies in oil and gas industry
Multimedia technology and applications
2012 Component Training Ivy Platform Series
Architecture of computer systems
Cluster analysis. (Lecture 6-8)
Introduction to computer systems. Architecture of a computer systems
Human-Computer Interaction
The language of headlines. Types of newspapers
Cyber Security PowerPoint Templates
Mass media
Artificial neural networks
Introduction to Informational and Communication Technologies
GM GMS overview problem solving
Information and Communication Technologies
Input devices
Data analysis. Data management. Lecture 6
Instructions for use. Edit in Google slides edit in PowerPoint®
This is your presentation title
Protecting the Network
Roderigo · SlidesCarnival
Multimedia technology. Lecture №11
Introduction in Medical informatics
Information Security review
Introduction to computer systems. Architecture of computer systems
Introduction to computer systems. Architecture of computer systems. Lecture2
Networks and Telecommunications
Application layer. Computer networking. (Chapter 2)
Computer role in the Human Life
Boutique Hotel Social Media
Virtual reality
Cryptography and Network Security. Chapter 5. Fifth Edition by William Stallings
Introduction to Computer systems. Computer architecture
Printer and scanner
Advertising media
The role of ICTs in key sectors of society. ICT Standards
Information and communications technology
The definition of a computer system pefmoRmance metrics
Introduction to Mendeley
Printer and scanner
Hecate SlidesCarnival
Адаптация шаблона
Data analysis. Data management
Information technology
Writing letters and emails
Introduction to computer systems. Architecture of computer systems
The Frequency Domain
DCT – Wavelet – Filter Bank
Information Technologies: Concepts and Management
The project mass media
Mass Media
LED Video Processor Introduction
Malicious Software. Chapter 6. Computer Security: Principles and Practice
Cyber-safety basics
What is the information and communication technologies
Information and communication technologies
Global Regulatory Reporting
Classification of access systems and networks (continuation). Lecture 2
Asimmetrical DSL technologies. Lecture 4
Exploring Assumptions Normality and Homogeneity of Variance
Human-computer interaction
Module 1. Lecture 03 - Data Modeling
Computers in our life. Компьютеры в нашей жизни
Java input output-library
Neural networks
Interrupt. The AVR microcontroller and embedded systems. (Chapter 10)
Programming Logic and Design Seventh Edition. Chapter 4. Making Decisions
Elementary programming. Motivations
Computer systems
Serialization in Java
Denial-of-Service Attacks. Chapter 7. Computer Security: Principles and Practice
Intrusion Detection. Chapter 8. Computer Security: Principles and Practice
What is cloud computing
Chapter 7. Securing information systems
Human-computer interaction
Statistics toolbox
This is your presentation title
Addressing the Network - IPV4. Part I
Cyber security
ICT in Core Sectors of Development. ICT Standardization
Cybercrime in the field of information technologies
Green technologies use in computer science and programming
Types of interfaces: command line interface, text interface, graphic interface
Computer Software. Operating systems. Desktop applications
Introduction to Computer Systems
Cryptography Theory and Practice. Applied Cryptography
«
0
1
»
English
Русский
Rules