Channel Avatar

Christopher Kalodikis @UCm0gX5V8-meiz_1CHtc24cA@youtube.com

12K subscribers - no pronouns :c

Welcome! This Channel has been developed to aid students stu


05:06
Structured & Unstructured Datasets
05:47
Informatics Explained
05:29
Errors, Uncertainty & Limitations
07:23
Interpret & Present Data
09:07
Primary & Secondary Data
09:26
Spreadsheets Explained: Inserting Filters, Tables & Slicers
08:54
Data Sampling
06:54
Levels Of Measurement Applied To Data
05:11
Quantitative & Qualitative Data
07:03
Evaluate Transmission Technology
12:12
Optimise Network Performance
13:28
Configure Network Devices
11:01
Implement Security Protocols
06:43
Network Diagram Example 2: Creating Larger Networks
10:59
Intelligent Home Network Security
09:41
Machine Learning (ML) & IoT
08:36
IoT Communication Protocols
08:01
Internet of Things (IoT) & SCADA
11:56
Improving Data Flow
09:02
Transmission Interference
15:05
Transmission Media - Wired & Wireless Mediums
09:52
Key Components of IT Infrastructure in Modern Networks
26:15
Enterprise Computing Year 12 Unit 3: Intelligent Systems
23:59
Enterprise Computing Year 12 Unit 2: Data Visualisation
24:32
Enterprise Computing Year 12 Unit 1: Data Science
22:59
Enterprise Computing Year 12 Unit 4: Enterprise Project
09:50
Network Hardware: Central Nodes
04:27
Network Hardware: Nodes & Endpoint Devices
03:48
Network Diagram Example 1: Wired & Wireless Connections
07:41
Network Diagrams Explained
06:12
Network Access Security Part 2: CAPTCHA, Automatic Software Updates & TPM
04:03
Graph & Network Theory Example 1: Social media Friendships
09:55
Graph & Network Theory Diagrams Explained (Basic)
07:23
Types Of Cloud Based Data Storage
08:05
Cloud Computing Services
09:21
Data Storage Requirements
10:48
Developments in Network Connectivity
09:25
Digital Workflows: Benefits & Limitations
04:44
Algorithm: FOR, NEXT Iteration
10:04
The Success Of Start Ups
09:58
IoT & IoMe
09:22
Influence Of Apps in Social Networking
08:42
Graph & Network Theory in Social Media
11:23
Effects Of Disruptive Technology
05:24
Agile Approach to System Development
04:24
End-User Approach to System Development
05:16
Outsourcing Approach to System Development
04:40
Prototyping Approach to System Development
07:18
Waterfall (Structured) Approach to System Development
12:54
Apply Features of User Interaction & User Experience (UX)
08:53
System Conversion Methods
11:23
Current & Emerging Cyber Threats
10:08
Impact Of Cybersecurity Breaches
07:42
Cyber Risk Management
07:07
Strategies Used to Protect Data Part 3: Physically Protecting Data
06:00
Strategies Used to Protect Data Part 2: System Tools
07:58
Strategies Used to Protect Data Part 1: User Authentication
08:46
Cyber Risk Management Matrix
08:59
Cybercrime Threats
14:02
Software Engineering Year 11 Unit 3: Programming Mechatronics