61. AQA GCSE (8525) SLR10 - 3.2 Authentication routines
62. AQA GCSE (8525) SLR10 - 3.2 Test data
63. AQA GCSE (8525) SLR10 - 3.2 Types of errors
46. AQA GCSE (8525) SLR8 - 3.2 Variables & constants
64. AQA GCSE (8525) SLR10 - 3.2 Identifying syntax and logic errors
80. AQA GCSE (8525) SLR13 - 3.3 Characters
29. AQA GCSE (8525) SLR6 - 3.8 Privacy issues
Authentication Routines - AQA GCSE Computer Science
60. AQA GCSE (8525) SLR10 - 3.2 Data validation
44. AQA GCSE (8525) SLR7 - 3.1 Bubble sort
83. AQA GCSE (8525) SLR13 - 3.3 Compression
55. AQA GCSE (8525) SLR9 - 3.2 String manipulation
Iteration pt. 2 - AQA GCSE Computer Science
25. AQA GCSE (8525) SLR5 - 3.4 Operating systems 1
19. AQA GCSE (8525) SLR4 - 3.6 Social engineering threats
57. AQA GCSE (8525) SLR9 - 3.2 How to use subroutines
21. AQA GCSE (8525) SLR4 - 3.6 Penetration testing
16. AQA GCSE (8525) SLR3 - 3.5 The need for & methods of network security
54. AQA GCSE (8525) SLR9 - 3.2 Records
41. AQA GCSE (8525) SLR7 - 3.1 Linear search