61. AQA GCSE (8525) SLR10 - 3.2 Authentication routines
62. AQA GCSE (8525) SLR10 - 3.2 Test data
60. AQA GCSE (8525) SLR10 - 3.2 Data validation
63. AQA GCSE (8525) SLR10 - 3.2 Types of errors
22. AQA GCSE (8525) SLR4 - 3.6 Security measures
19. AQA GCSE (8525) SLR4 - 3.6 Social engineering threats
83. AQA GCSE (8525) SLR13 - 3.3 Compression
Iteration pt. 2 - AQA GCSE Computer Science
Authentication Routines - AQA GCSE Computer Science
55. AQA GCSE (8525) SLR9 - 3.2 String manipulation
57. AQA GCSE (8525) SLR9 - 3.2 How to use subroutines
50. AQA GCSE (8525) SLR8 - 3.2 Meaningful identifiers
46. AQA GCSE (8525) SLR8 - 3.2 Variables & constants
44. AQA GCSE (8525) SLR7 - 3.1 Bubble sort
21. AQA GCSE (8525) SLR4 - 3.6 Penetration testing
80. AQA GCSE (8525) SLR13 - 3.3 Characters
GCSE Computer Science: Detecting and preventing cyber security threats
25. AQA GCSE (8525) SLR5 - 3.4 Operating systems 1
58. AQA GCSE (8525) SLR9 - 3.2 Local variables
41. AQA GCSE (8525) SLR7 - 3.1 Linear search
54. AQA GCSE (8525) SLR9 - 3.2 Records
61. OCR A Level (H446) SLR11 - 1.3 Network security threats
GCSE Computer Science Unit 2 Part 4: Test Data
Authentication iGCSE Computer Science
Authentication