Search

21270 results for: ‘%s’

  • Fundamentals of Evidence Based Practice

    Module code: NU1018 This module is facilitated using a combination of lectures and workshops including on-line lectures, Pod casts and practice based learning, delivered in small uni-professional groups and in multi-professional groups that involve students from midwifery and...

  • Analysis and Design of Algorithms

    Module code: CO7002 Algorithms are step-by-step procedures, such as those executed by computers, to solve problems.

  • Fundamentals of Evidence Based Practice

    Module code: NU1018 This module is facilitated using a combination of lectures and workshops including on-line lectures, Pod casts and practice based learning, delivered in small uni-professional groups and in multi-professional groups that involve students from midwifery and...

  • Analysis and Design of Algorithms

    Module code: CO7002 Algorithms are step-by-step procedures, such as those executed by computers, to solve problems.

  • Analysis and Design of Algorithms

    Module code: CO7002 Algorithms are step-by-step procedures, such as those executed by computers, to solve problems.

  • Complaints procedure

    Feedback and complaints procedure for the University Library

  • Causes you can support

    It's easy to ensure that your gift can be put to good use in an area you care about. See our range of projects and choose where you'd like your gift to go.

  • 28th October 2013 Sol 436

    Posted by jbridges in Mars Science Laboratory Blog on October 28, 2013 Today is a soliday on Mars and no science activities.  We are parked close to our next Waypoint called Cooperstown.

  • R for Data Science

    Module code: GY4472 In this module you will focus on the programming language R as an effective tool for data science.

  • Foundations of Cybersecurity

    Module code: CO7099 How can computer systems defend themselves against network attacks? How can we ensure that our data has not been tampered with, or disclosed without our consent? How can we be sure of the identity of the party whom we are communicating...

Back to top
MENU