https://www.dropbox.com/s/k2ybpj3njjck7n8/Gr12IT2014%202_2%20Sekuriteitskonsepte%20AKTIWITEIT.doc
https://www.dropbox.com/s/sjce0flk8vduv1h/Gr12IT%202_2%20Sekuriteitskonsepte%20PP.pptx
https://www.dropbox.com/s/cs3174y570wld0a/2_2%20Sekuriteitskonsepte.pdf
https://www.dropbox.com/s/ax76vzmavx9nmkb/Gr12IT2014%203_1%20HouBy%20AKTIWITEIT.docx
https://www.dropbox.com/s/kqvc75zz5jah7eo/Gr12%20IT%202014%203_1%20HouBy.pdf
https://www.dropbox.com/s/1gipzck6x4b0ixz/Gr12%20IT%201_2%20Rekenaargebruik%20in%20die%20Cloud.pptx
https://www.dropbox.com/s/v1qpp0j40iywgen/1_2%20CloudComputing%20AFR.pdf
https://www.dropbox.com/s/6sd0xl7e3btet0t/1_2%20CloudComputing%20AFR%20AKTIWITEIT.docx
No comments:
Post a Comment