Binary numbers: Adding and convertingQuick View
hermanoduor

Binary numbers: Adding and converting

(0)
In this activity, you will learn about binary numbers. Binary numbers use only 0 and 1. You will practice adding binary numbers and changing them to regular numbers (decimal). The activity includes solving problems with increasing difficulty. This activity is in word format allowing students to complete the work and submit to the teacher. Please delete the answer key section before sharing with the students. You can have two copies. One with the answers and another with questions only.
Predicting Floods with AIQuick View
hermanoduor

Predicting Floods with AI

(0)
Predicting Floods with AI explores how technology can help us tackle real-world challenges linked to clean water, sanitation, and climate action. Discover how floods occur, how AI tools can predict them, and how communities can reduce their impact. Through interactive activities and Google AI Quests, learners will build simple prediction models and apply them to real scenarios. This engaging presentation equips students with practical skills to understand and respond to environmental challenges.
Privacy and Security of DataQuick View
hermanoduor

Privacy and Security of Data

(1)
This material is ideal for GCE A level Applied ICT. It can also be used for the new Computing syllabus. Compiled by Herman Oduor. Author Computing Science Books for Kenya and Rwanda. Currently Director of ICT.
A Deep Dive into Cybersecurity Threat Actors: Unmasking OilRigQuick View
hermanoduor

A Deep Dive into Cybersecurity Threat Actors: Unmasking OilRig

(0)
In the ever-evolving landscape of cybersecurity, understanding threat actors is crucial for both individuals and organizations. This analysis focuses on OilRig, one of the most notorious cyber threat groups operating in Asia. It examines the group’s tactics, techniques, and the broader impact of their activities - both at the personal and community level. By shedding light on OilRig’s operations, this discussion also explores key mitigation strategies to counter such threats. A valuable resource for cybersecurity professionals, this piece is particularly relevant for those pursuing the CISSP certification, providing real-world insights into the complexities of cyber defense.
FlowchartsQuick View
hermanoduor

Flowcharts

(0)
This resource is ideal for Computer Studies, Computing and Applied ICT. Be a Creator of Technology.
Protocols A2 IT Unit 13 9626.Quick View
hermanoduor

Protocols A2 IT Unit 13 9626.

(0)
This resource is ideal for students taking A2 IT Unit 13. There are virtually no detailed resources in this topic which has proved very challenging for most A LEVEL STUDENTS. It has past paper questions at the end. Objectives achieved by this resource: It describe what a protocol is and different types of protocols (including: Wide Area Network protocols and Local Area Network access protocols) It also describe how the BitTorrent protocol provides peer-to-peer file sharing