Search results
Four ways to stop your social media past damaging your real-life future
We tend to think of social media like real life. We have a conversation or a thought and then move on – forgetting that in the digital world a copy could be kept forever, unless we take steps to remove it. This guide...
Track changes can be used to lock a document. Any changes made to the document after it has been locked will feature in a list of 'tracked changes' that can be approved or denied. These are similar to comments but will update the original document if approved.
Turning on...
Please visit the Password manger help page for details of how to reset your password or unlock your account.
Please visit the Password manger help page for details of how to unlock your account or reset your password.
Non-academic information is accessed through Moodle via the Student Services, Study Related, Campus Facilities, and Timetables options in the top horizontal menu
Log in to Moodle with your University username (e.g. cweb1) and password.
StaffChrome is the...
EAP method: PEAP
Phase...
Although we take all of the cyber security precautions that any other major organisation should do, there are some vulnerabilities that technology alone cannot fully avoid, and example of which, is social engineering (see section lower down). It is important that you are aware of how to...
MATLAB is a high-performance language for technical computing. It integrates computation, visualisation, and programming in an environment where problems and solutions are expressed in mathematical notation.
Simulink is a block diagram environment for multidomain simulation and model-based...