20. AQA GCSE (8525) SLR4 - 3.6 Malware
19. AQA GCSE (8525) SLR4 - 3.6 Social engineering threats
21. AQA GCSE (8525) SLR4 - 3.6 Penetration testing
22. AQA GCSE (8525) SLR4 - 3.6 Security measures
46. AQA GCSE (8525) SLR8 - 3.2 Variables & constants
87. AQA GCSE (8525) SLR14 - 3.7 Relational databases concepts
Character Sets and Images - AQA GCSE Computer Science
28. GCSE AQA (8525) SLR6 - 3.8 Discussing technologies
29. AQA GCSE (8525) SLR6 - 3.8 Privacy issues
31. AQA GCSE (8525) SLR6 - 3.8 Environmental impacts
4. AQA GCSE (8525) SLR1 - 3.4 Fetch-execute cycle
30. AQA GCSE (8525) SLR6 - 3.8 Legislation
81. AQA GCSE (8525) SLR13 - 3.3 Images
Types of Threat part 1 - AQA GCSE Computer Science
20. OCR A Level (H046-H446) SLR4 - 1.2 Virtual machines
79. AQA GCSE (8525) SLR13 - 3.3 Binary shifts
34. AQA GCSE (8525) SLR7 - 3.1 Decomposition
Identifying and Preventing Vulnerabilities - AQA GCSE Computer Science
83. AQA GCSE (8525) SLR13 - 3.3 Compression
SQL - AQA GCSE Computer Science