Search

21279 results for: ‘%s’

  • Fundamentals of Evidence Based Practice

    Module code: NU1018 This module is facilitated using a combination of lectures and workshops including on-line lectures, Pod casts and practice based learning, delivered in small uni-professional groups and in multi-professional groups that involve students from midwifery and...

  • Fundamentals of Evidence Based Practice

    Module code: NU1018 This module is facilitated using a combination of lectures and workshops including on-line lectures, Pod casts and practice based learning, delivered in small uni-professional groups and in multi-professional groups that involve students from midwifery and...

  • Analysis and Design of Algorithms

    Module code: CO7002 Algorithms are step-by-step procedures, such as those executed by computers, to solve problems.

  • Fundamentals of Evidence Based Practice

    Module code: NU1018 This module is facilitated using a combination of lectures and workshops including on-line lectures, Pod casts and practice based learning, delivered in small uni-professional groups and in multi-professional groups that involve students from midwifery and...

  • Analysis and Design of Algorithms

    Module code: CO7002 Algorithms are step-by-step procedures, such as those executed by computers, to solve problems.

  • Analysis and Design of Algorithms

    Module code: CO7002 Algorithms are step-by-step procedures, such as those executed by computers, to solve problems.

  • Leicestershire Secondary SCITT

    Discover details of how you can study PGCE teacher training with Leicestershire Secondary SCITT

  • Why Leicester?

    Find out how you can benefit from a geology degree at the University of Leicester.

  • R for Data Science

    Module code: GY4472 In this module you will focus on the programming language R as an effective tool for data science.

  • Foundations of Cybersecurity

    Module code: CO7099 How can computer systems defend themselves against network attacks? How can we ensure that our data has not been tampered with, or disclosed without our consent? How can we be sure of the identity of the party whom we are communicating...

Back to top
MENU