SlideShare a Scribd company logo
TWGHs Ko Ho Ning Memorial Primary School
資訊科技組邵英傑老師
Intro
Primary Limited Resource
45
410
455 Virtual Desktop
Dual WAN 10Gbps backbone
All servers
Virtualized
Student + Teacher
Virtual Desktop
Teacher
+ Clerk
Student
Current Condition
教職員用
電腦
學生用
電腦
教室用
電腦
IT+TSS
用電腦
45TB
8TB 8TB
9TB
6TB
Base Arrangement
教職員用
電腦
學生用
電腦
教室用
電腦
IT+TSS
用電腦
Base Arrangement
3 Host
Servers
MainVM
ReplicateVM
ExportVM
GroupA
MainVM
ReplicateVM
ExportVM
GroupB
MainVM
ReplicateVM
ExportVM
GroupC
Base Arrangement
3 Host
Servers
MainVM
ReplicateVM
ExportVM
GroupA
MainVM
ReplicateVM
ExportVM
GroupB
MainVM
ReplicateVM
ExportVM
GroupC
Different
Sectors /
Groups
SnapShot / Replication
Warning Alert
AntiVirus / Protect
Authorized / Quota
Active Backup: O365, G-Suite
Sync: Files, User Profile
Raid10
Raid10
Raid5
Base Arrangement
3 Host
Servers
MainVM
ReplicateVM
ExportVM
GroupA
MainVM
ReplicateVM
ExportVM
GroupB
MainVM
ReplicateVM
ExportVM
GroupC
Different
Sectors /
Groups
SnapShot / Replication
Warning Albert
AntiVirus / Protect
Authorized / Quota
Active Backup: O365, G-Suite
Sync: Files, User Profile
Raid10
Raid10
Raid5
VM Arrangement
SnapShots
SnapShots
VM Arrangement
MainVM
ReplicateVM
ExportVM
SnapShots
Schedules
Software Snapshot before
change or system update
SnapShots
SnapShots
VM Arrangement
MainVM
ReplicateVM
ExportVM
SnapShots
Schedules
Software Snapshot before
change or system update
Basic Protection
Basic Protection
Run minimum services
AntiVirus
Only accessible by authorized
Application Control
Internal firewall and police setting
Open limited ports
Bandwidth management
IPaddr lock
Accesible time schedule
System and patch update
Log / Audit record
File / Directory Sync
Basic Protection
Run minimum services
AntiVirus
Only accessible by authorized
Application Control
Internal firewall and police setting
Open limited ports
Bandwidth management
IPaddr lock
Accesible time schedule
System and patch update
Log / Audit record
File / Directory Sync
Basic Protection
Run minimum services
AntiVirus
Only accessible by authorized
Application Control
Internal firewall and police setting
Open limited ports
Bandwidth management
IPaddr lock
Accesible time schedule
System and patch update
Log / Audit record
File / Directory Sync
學生用
電腦
Basic Protection
學生用
電腦
AntiVirus Brand A
Accessible by:
Students
IT Teachers
教職員用
電腦
AntiVirus Brand A
Accessible by:
That teacher
IT Admin
Student File
Server
User
Profile
Server
Teacher
File
Server
AntiVirus
Brand B
AntiVirus
Brand B
AntiVirus
Brand B
AntiVirus
Gateway
Basic Protection
AntiVirus Brand A
Accessible by:
Students
IT Teachers
That teacher
IT Admin
教職員用
電腦
AntiVirus Brand A
Accessible by:
Student File
Server
User
Profile
Server
Teacher
File
Server
AntiVirus
Brand B
AntiVirus
Brand B
AntiVirus
Brand B
AntiVirus
Gateway
學生用
電腦
School base Protection
Screen Capture
School base Protection
學生用
電腦
Activity History
Direct Control
Speed Management
Virtual Application
Strict Accessible Area
學生用
電腦
Screen Capture
School base Protection
Activity History
Direct Control
Speed Management
Virtual Application
Strict Accessible Area
學生用
電腦
Screen Capture
School base Protection
Activity History
Direct Control
Speed Management
Virtual Application
Strict Accessible Area
學生用
電腦
Screen Capture
School base Protection
Activity History
Direct Control
Speed Management
Virtual Application
Strict Accessible Area
學生用
電腦
Screen Capture
School base Protection
Activity History
Direct Control
Speed Management
Virtual Application
Strict Accessible Area
學生用
電腦
Screen Capture
Activity History
School base Protection
Direct Control
Speed Management
Virtual Application
Strict Accessible Area
學生用
電腦
Activity History
School base Protection
Direct Control
Speed Management
Virtual Application
Virtual Portal
Bounded Accessible Area
學生用
電腦
Activity History
Direct Control
School base Protection
Speed Management
Virtual Application
Strict Accesible Area
學生用
電腦
Direct Control
School base Protection
Speed Management
Virtual Application
Strict Accessible Area
學生用
電腦
Direct Control
Speed Management
Strict Accessible Area
Student Desktop
School base Protection 學生用
電腦
Virtual Application
Virtual Browser
Server for
Virtual App
Strict Accessible Area
School base Protection 學生用
電腦
Virtual Application
Student Desktop
Virtual Browser
Server for
Virtual App
Strict Accessible Area
School base Protection 學生用
電腦
Strict Accessible Area
App Locker
User Quota Management
Folder/File Management
Child AD Server
Security settings of browsers
Audit Log
Network Management / VLAN
AntiVirus / Anti Spyware etc
Secure Password
Firewall / Port Management
OS / Software update
Auto Logoff when unattended
Data Sync / Backup policy
後話
規劃先行
軟硬結合
珍惜資源
要了解更多
請訪問本校電腦科網頁
www.twghkhnmp.edu.hk

More Related Content

Similar to 高可寧的保安安排

高性能网站建设指南
高性能网站建设指南高性能网站建设指南
高性能网站建设指南
Da Zhao
 
高性能网站建设指南
高性能网站建设指南高性能网站建设指南
高性能网站建设指南
fgghyyfk
 
Unix.shell范例精解(第4版)
Unix.shell范例精解(第4版)Unix.shell范例精解(第4版)
Unix.shell范例精解(第4版)gavin shaw
 
OSDC 2017 | Taming the Modern Data Center by Seth Vargo
OSDC 2017 | Taming the Modern Data Center by Seth VargoOSDC 2017 | Taming the Modern Data Center by Seth Vargo
OSDC 2017 | Taming the Modern Data Center by Seth Vargo
NETWAYS
 
OSDC 2017 - Seth Vargo - Taming the modern data center
OSDC 2017 - Seth Vargo - Taming the modern data centerOSDC 2017 - Seth Vargo - Taming the modern data center
OSDC 2017 - Seth Vargo - Taming the modern data center
NETWAYS
 
OSDC 2017 | Modern Secrets Management with Vault by Seth Vargo
OSDC 2017 | Modern Secrets Management with Vault by Seth VargoOSDC 2017 | Modern Secrets Management with Vault by Seth Vargo
OSDC 2017 | Modern Secrets Management with Vault by Seth Vargo
NETWAYS
 
Nakivo Slides 2014 12-17
Nakivo Slides 2014 12-17Nakivo Slides 2014 12-17
Nakivo Slides 2014 12-17
Nick Luchkov
 
Perl语言入门(第五版)
Perl语言入门(第五版)Perl语言入门(第五版)
Perl语言入门(第五版)gavin shaw
 
Evolving Archetecture
Evolving ArchetectureEvolving Archetecture
Evolving Archetecture
leo lapworth
 
[Python.unix和linux系统管理指南].(美)基弗特.扫描版
[Python.unix和linux系统管理指南].(美)基弗特.扫描版[Python.unix和linux系统管理指南].(美)基弗特.扫描版
[Python.unix和linux系统管理指南].(美)基弗特.扫描版
Xian Liu
 
HPE + Veeam Technical Hands ON Workshop #1
HPE + Veeam Technical Hands ON Workshop #1HPE + Veeam Technical Hands ON Workshop #1
HPE + Veeam Technical Hands ON Workshop #1
Tanawit Chansuchai
 
PDC Highlights
PDC HighlightsPDC Highlights
PDC Highlights
MS Innovation Days
 
My sql技术内幕innodb存储引擎
My sql技术内幕innodb存储引擎My sql技术内幕innodb存储引擎
My sql技术内幕innodb存储引擎山城 碧海
 
[Python参考手册(第4版)].(美)比兹利.扫描版
[Python参考手册(第4版)].(美)比兹利.扫描版[Python参考手册(第4版)].(美)比兹利.扫描版
[Python参考手册(第4版)].(美)比兹利.扫描版
lovingprince58
 
V ranger 5 headlines paulm feb11
V ranger 5 headlines paulm feb11V ranger 5 headlines paulm feb11
V ranger 5 headlines paulm feb11bluechipper
 
[MySQL.Cookbook(第2版)].(美)迪布瓦.中文版.扫描版
[MySQL.Cookbook(第2版)].(美)迪布瓦.中文版.扫描版[MySQL.Cookbook(第2版)].(美)迪布瓦.中文版.扫描版
[MySQL.Cookbook(第2版)].(美)迪布瓦.中文版.扫描版gavin shaw
 
[精通Perl.中文版].(美)福瓦.扫描版
[精通Perl.中文版].(美)福瓦.扫描版[精通Perl.中文版].(美)福瓦.扫描版
[精通Perl.中文版].(美)福瓦.扫描版gavin shaw
 
Veeam back up and replication presentation
Veeam back up and replication presentation Veeam back up and replication presentation
Veeam back up and replication presentation BlueChipICT
 
Evento Veeam & Assyrus - 6 Pianificare lato sorgente
Evento Veeam & Assyrus - 6 Pianificare lato sorgenteEvento Veeam & Assyrus - 6 Pianificare lato sorgente
Evento Veeam & Assyrus - 6 Pianificare lato sorgente
Andrea Mauro
 
Veeam Webinar - Backing up Zarafa with SureBackup
Veeam Webinar - Backing up Zarafa with SureBackupVeeam Webinar - Backing up Zarafa with SureBackup
Veeam Webinar - Backing up Zarafa with SureBackupJoep Piscaer
 

Similar to 高可寧的保安安排 (20)

高性能网站建设指南
高性能网站建设指南高性能网站建设指南
高性能网站建设指南
 
高性能网站建设指南
高性能网站建设指南高性能网站建设指南
高性能网站建设指南
 
Unix.shell范例精解(第4版)
Unix.shell范例精解(第4版)Unix.shell范例精解(第4版)
Unix.shell范例精解(第4版)
 
OSDC 2017 | Taming the Modern Data Center by Seth Vargo
OSDC 2017 | Taming the Modern Data Center by Seth VargoOSDC 2017 | Taming the Modern Data Center by Seth Vargo
OSDC 2017 | Taming the Modern Data Center by Seth Vargo
 
OSDC 2017 - Seth Vargo - Taming the modern data center
OSDC 2017 - Seth Vargo - Taming the modern data centerOSDC 2017 - Seth Vargo - Taming the modern data center
OSDC 2017 - Seth Vargo - Taming the modern data center
 
OSDC 2017 | Modern Secrets Management with Vault by Seth Vargo
OSDC 2017 | Modern Secrets Management with Vault by Seth VargoOSDC 2017 | Modern Secrets Management with Vault by Seth Vargo
OSDC 2017 | Modern Secrets Management with Vault by Seth Vargo
 
Nakivo Slides 2014 12-17
Nakivo Slides 2014 12-17Nakivo Slides 2014 12-17
Nakivo Slides 2014 12-17
 
Perl语言入门(第五版)
Perl语言入门(第五版)Perl语言入门(第五版)
Perl语言入门(第五版)
 
Evolving Archetecture
Evolving ArchetectureEvolving Archetecture
Evolving Archetecture
 
[Python.unix和linux系统管理指南].(美)基弗特.扫描版
[Python.unix和linux系统管理指南].(美)基弗特.扫描版[Python.unix和linux系统管理指南].(美)基弗特.扫描版
[Python.unix和linux系统管理指南].(美)基弗特.扫描版
 
HPE + Veeam Technical Hands ON Workshop #1
HPE + Veeam Technical Hands ON Workshop #1HPE + Veeam Technical Hands ON Workshop #1
HPE + Veeam Technical Hands ON Workshop #1
 
PDC Highlights
PDC HighlightsPDC Highlights
PDC Highlights
 
My sql技术内幕innodb存储引擎
My sql技术内幕innodb存储引擎My sql技术内幕innodb存储引擎
My sql技术内幕innodb存储引擎
 
[Python参考手册(第4版)].(美)比兹利.扫描版
[Python参考手册(第4版)].(美)比兹利.扫描版[Python参考手册(第4版)].(美)比兹利.扫描版
[Python参考手册(第4版)].(美)比兹利.扫描版
 
V ranger 5 headlines paulm feb11
V ranger 5 headlines paulm feb11V ranger 5 headlines paulm feb11
V ranger 5 headlines paulm feb11
 
[MySQL.Cookbook(第2版)].(美)迪布瓦.中文版.扫描版
[MySQL.Cookbook(第2版)].(美)迪布瓦.中文版.扫描版[MySQL.Cookbook(第2版)].(美)迪布瓦.中文版.扫描版
[MySQL.Cookbook(第2版)].(美)迪布瓦.中文版.扫描版
 
[精通Perl.中文版].(美)福瓦.扫描版
[精通Perl.中文版].(美)福瓦.扫描版[精通Perl.中文版].(美)福瓦.扫描版
[精通Perl.中文版].(美)福瓦.扫描版
 
Veeam back up and replication presentation
Veeam back up and replication presentation Veeam back up and replication presentation
Veeam back up and replication presentation
 
Evento Veeam & Assyrus - 6 Pianificare lato sorgente
Evento Veeam & Assyrus - 6 Pianificare lato sorgenteEvento Veeam & Assyrus - 6 Pianificare lato sorgente
Evento Veeam & Assyrus - 6 Pianificare lato sorgente
 
Veeam Webinar - Backing up Zarafa with SureBackup
Veeam Webinar - Backing up Zarafa with SureBackupVeeam Webinar - Backing up Zarafa with SureBackup
Veeam Webinar - Backing up Zarafa with SureBackup
 

More from eLearning Consortium 電子學習聯盟

AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位
AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位
AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位
eLearning Consortium 電子學習聯盟
 
ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?
ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?
ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?
eLearning Consortium 電子學習聯盟
 
2. How Data Analytics Transforming Digital Marketing - Ralph Szeto.pdf
2. How Data Analytics Transforming Digital Marketing - Ralph Szeto.pdf2. How Data Analytics Transforming Digital Marketing - Ralph Szeto.pdf
2. How Data Analytics Transforming Digital Marketing - Ralph Szeto.pdf
eLearning Consortium 電子學習聯盟
 
1. How Data Analytics Transforming Digital Marketing - Saron Leung
1. How Data Analytics Transforming Digital Marketing - Saron Leung1. How Data Analytics Transforming Digital Marketing - Saron Leung
1. How Data Analytics Transforming Digital Marketing - Saron Leung
eLearning Consortium 電子學習聯盟
 
HKTVMall: Leading Technology Evolution for eCommerce Industry
HKTVMall: Leading Technology Evolution for eCommerce IndustryHKTVMall: Leading Technology Evolution for eCommerce Industry
HKTVMall: Leading Technology Evolution for eCommerce Industry
eLearning Consortium 電子學習聯盟
 
How Blockchain affecting us - Dr Sin.pdf
How Blockchain affecting us - Dr Sin.pdfHow Blockchain affecting us - Dr Sin.pdf
How Blockchain affecting us - Dr Sin.pdf
eLearning Consortium 電子學習聯盟
 
5-Hot-Chain Bento.pdf
5-Hot-Chain Bento.pdf5-Hot-Chain Bento.pdf
4-Herbal ID.pdf
4-Herbal ID.pdf4-Herbal ID.pdf
3-VisualSonic.pdf
3-VisualSonic.pdf3-VisualSonic.pdf
2-kNOw Touch.pdf
2-kNOw Touch.pdf2-kNOw Touch.pdf
1-C-POLAR Air Filter.pdf
1-C-POLAR Air Filter.pdf1-C-POLAR Air Filter.pdf
1-C-POLAR Air Filter.pdf
eLearning Consortium 電子學習聯盟
 
3 - Interaction between Cyber Security and School IT Policy .pdf
3 - Interaction between Cyber Security and School IT Policy .pdf3 - Interaction between Cyber Security and School IT Policy .pdf
3 - Interaction between Cyber Security and School IT Policy .pdf
eLearning Consortium 電子學習聯盟
 
2 - ELC學校網絡安全與防護.pdf
2 - ELC學校網絡安全與防護.pdf2 - ELC學校網絡安全與防護.pdf
2 - ELC學校網絡安全與防護.pdf
eLearning Consortium 電子學習聯盟
 
1 - HKT Reporting.pdf
1 - HKT Reporting.pdf1 - HKT Reporting.pdf
02 學校網絡安全漏洞的評估分享, 管理挑戰及趨勢。
02 學校網絡安全漏洞的評估分享, 管理挑戰及趨勢。02 學校網絡安全漏洞的評估分享, 管理挑戰及趨勢。
02 學校網絡安全漏洞的評估分享, 管理挑戰及趨勢。
eLearning Consortium 電子學習聯盟
 
08 Transform Endpoint Security with the World’s Most Secure PCs and Printers
08 Transform Endpoint Security with the World’s Most Secure PCs and Printers08 Transform Endpoint Security with the World’s Most Secure PCs and Printers
08 Transform Endpoint Security with the World’s Most Secure PCs and Printers
eLearning Consortium 電子學習聯盟
 
07 2020 網絡安全趨勢和安全小貼士
07 2020 網絡安全趨勢和安全小貼士07 2020 網絡安全趨勢和安全小貼士
07 2020 網絡安全趨勢和安全小貼士
eLearning Consortium 電子學習聯盟
 
06 網絡安全挑戰與防衛
06 網絡安全挑戰與防衛06 網絡安全挑戰與防衛
06 網絡安全挑戰與防衛
eLearning Consortium 電子學習聯盟
 
04 提升網絡安全 - 為電子學習打造先決條件
04 提升網絡安全 - 為電子學習打造先決條件04 提升網絡安全 - 為電子學習打造先決條件
04 提升網絡安全 - 為電子學習打造先決條件
eLearning Consortium 電子學習聯盟
 
03 學校網絡安全與防衛
03 學校網絡安全與防衛03 學校網絡安全與防衛
03 學校網絡安全與防衛
eLearning Consortium 電子學習聯盟
 

More from eLearning Consortium 電子學習聯盟 (20)

AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位
AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位
AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位
 
ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?
ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?
ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?
 
2. How Data Analytics Transforming Digital Marketing - Ralph Szeto.pdf
2. How Data Analytics Transforming Digital Marketing - Ralph Szeto.pdf2. How Data Analytics Transforming Digital Marketing - Ralph Szeto.pdf
2. How Data Analytics Transforming Digital Marketing - Ralph Szeto.pdf
 
1. How Data Analytics Transforming Digital Marketing - Saron Leung
1. How Data Analytics Transforming Digital Marketing - Saron Leung1. How Data Analytics Transforming Digital Marketing - Saron Leung
1. How Data Analytics Transforming Digital Marketing - Saron Leung
 
HKTVMall: Leading Technology Evolution for eCommerce Industry
HKTVMall: Leading Technology Evolution for eCommerce IndustryHKTVMall: Leading Technology Evolution for eCommerce Industry
HKTVMall: Leading Technology Evolution for eCommerce Industry
 
How Blockchain affecting us - Dr Sin.pdf
How Blockchain affecting us - Dr Sin.pdfHow Blockchain affecting us - Dr Sin.pdf
How Blockchain affecting us - Dr Sin.pdf
 
5-Hot-Chain Bento.pdf
5-Hot-Chain Bento.pdf5-Hot-Chain Bento.pdf
5-Hot-Chain Bento.pdf
 
4-Herbal ID.pdf
4-Herbal ID.pdf4-Herbal ID.pdf
4-Herbal ID.pdf
 
3-VisualSonic.pdf
3-VisualSonic.pdf3-VisualSonic.pdf
3-VisualSonic.pdf
 
2-kNOw Touch.pdf
2-kNOw Touch.pdf2-kNOw Touch.pdf
2-kNOw Touch.pdf
 
1-C-POLAR Air Filter.pdf
1-C-POLAR Air Filter.pdf1-C-POLAR Air Filter.pdf
1-C-POLAR Air Filter.pdf
 
3 - Interaction between Cyber Security and School IT Policy .pdf
3 - Interaction between Cyber Security and School IT Policy .pdf3 - Interaction between Cyber Security and School IT Policy .pdf
3 - Interaction between Cyber Security and School IT Policy .pdf
 
2 - ELC學校網絡安全與防護.pdf
2 - ELC學校網絡安全與防護.pdf2 - ELC學校網絡安全與防護.pdf
2 - ELC學校網絡安全與防護.pdf
 
1 - HKT Reporting.pdf
1 - HKT Reporting.pdf1 - HKT Reporting.pdf
1 - HKT Reporting.pdf
 
02 學校網絡安全漏洞的評估分享, 管理挑戰及趨勢。
02 學校網絡安全漏洞的評估分享, 管理挑戰及趨勢。02 學校網絡安全漏洞的評估分享, 管理挑戰及趨勢。
02 學校網絡安全漏洞的評估分享, 管理挑戰及趨勢。
 
08 Transform Endpoint Security with the World’s Most Secure PCs and Printers
08 Transform Endpoint Security with the World’s Most Secure PCs and Printers08 Transform Endpoint Security with the World’s Most Secure PCs and Printers
08 Transform Endpoint Security with the World’s Most Secure PCs and Printers
 
07 2020 網絡安全趨勢和安全小貼士
07 2020 網絡安全趨勢和安全小貼士07 2020 網絡安全趨勢和安全小貼士
07 2020 網絡安全趨勢和安全小貼士
 
06 網絡安全挑戰與防衛
06 網絡安全挑戰與防衛06 網絡安全挑戰與防衛
06 網絡安全挑戰與防衛
 
04 提升網絡安全 - 為電子學習打造先決條件
04 提升網絡安全 - 為電子學習打造先決條件04 提升網絡安全 - 為電子學習打造先決條件
04 提升網絡安全 - 為電子學習打造先決條件
 
03 學校網絡安全與防衛
03 學校網絡安全與防衛03 學校網絡安全與防衛
03 學校網絡安全與防衛
 

Recently uploaded

The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 

Recently uploaded (20)

The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 

高可寧的保安安排