SlideShare a Scribd company logo
All of these students were
   nominated in term 1 for their
outstanding efforts in their Business,
     ICT or Computing lessons.

    Two students were randomly
selected and they have won an HMV
            gift voucher.
Aaliyah
Towers
Alex
Carnohan
Alfie Hoar
Amina
Karmoun
Amy King
Ashleigh
 Sutton
Benn Bryant
Bethany
  Hitt
Brogan
Pearce
Charlotte
 Lucas
Charlotte
Stockden
Chloe
Hitchcock
Clare Parry
Connor
Latham-
Coward
Connor
Oakley-Wase
Daisy Turner
Dan
Andrews
Dan
Steadman
Danny
Purnell
David
Needham
Dawid
Deska
Ellis Farion
Emma
Whittern
Erin Goble
Ezra
Hawkins
Frejya
Devine
Hannah
Blackwell
Hannah
 Jones
Heidi
Burgess
Holly Ware
Ilana Tamplin
    Fenby
Jack Beavan
Jack
Wordley
Jamie
Phillips
Joanna
 Hudd
Joseph
Kilbane
Joshua
Paterson
Justine
Langston
Katherine
Stonham
Katie
Gowen
Katie
Messenger
Kira Baker
Kurtis
Betteridge
Lauren
 Airey
Leah Hare
Lee Oates
Leila
Thomas
Lewis
Blanks
Lewis
Wayman
Louis
Rabbits
Luke
Garland
Mason
Lockley
Matt
Chapman
Megan
Lucas
Mike Hoare
Mohammed
  Sellay
Mollie
Donelly
Mollie
Robinson
Nikki
Pardew
Niomi
Harvey
Ozzy Bull
Rachel
Bowen
Rebecca
Flounders
Rebecca
Snelling
Reece
Oliver
Ryan Owens
Sacha
Addicott
Sam Jones
Scott Baker
Sophie
Sutton
William
Seager
William
Stacey
Zak Harvey
Winner of an HMV Voucher


  Alix
Longmuir
Winner of an HMV Voucher


  Jack
Dimmock

More Related Content

Viewers also liked

Presentation Sophie
Presentation SophiePresentation Sophie
Presentation Sophie
Danuta W-Piwko
 
Fire of london_questions
Fire of london_questionsFire of london_questions
Fire of london_questions
mariarosadomorales
 
L4
L4L4
Sitton Spelling Review
Sitton Spelling ReviewSitton Spelling Review
Sitton Spelling Review
hansenmsu
 
L3 more networking
L3   more networkingL3   more networking
L3 more networking
listergc
 
L7
L7L7
Roll out the barrel
Roll out the barrelRoll out the barrel
Roll out the barrel
Allan Berry
 
L3
L3L3
L8
L8L8
Kane's Presentation
Kane's Presentation Kane's Presentation
Kane's Presentation
Danuta W-Piwko
 
L9
L9L9
Graphical User Interface
Graphical User InterfaceGraphical User Interface
Graphical User Interface
listergc
 
L2
L2L2
L1
L1L1
Planning Your Code
Planning Your CodePlanning Your Code
Planning Your Code
listergc
 
Graphical User Interface
Graphical User InterfaceGraphical User Interface
Graphical User Interface
listergc
 
Rainforests by Veronica
Rainforests by VeronicaRainforests by Veronica
Rainforests by Veronica
Danuta W-Piwko
 
Rainforests by Chloe
Rainforests by ChloeRainforests by Chloe
Rainforests by Chloe
Danuta W-Piwko
 
Anne frank vocab. 1
Anne frank vocab. 1Anne frank vocab. 1
Anne frank vocab. 1
Hank Maine
 
L1
L1L1

Viewers also liked (20)

Presentation Sophie
Presentation SophiePresentation Sophie
Presentation Sophie
 
Fire of london_questions
Fire of london_questionsFire of london_questions
Fire of london_questions
 
L4
L4L4
L4
 
Sitton Spelling Review
Sitton Spelling ReviewSitton Spelling Review
Sitton Spelling Review
 
L3 more networking
L3   more networkingL3   more networking
L3 more networking
 
L7
L7L7
L7
 
Roll out the barrel
Roll out the barrelRoll out the barrel
Roll out the barrel
 
L3
L3L3
L3
 
L8
L8L8
L8
 
Kane's Presentation
Kane's Presentation Kane's Presentation
Kane's Presentation
 
L9
L9L9
L9
 
Graphical User Interface
Graphical User InterfaceGraphical User Interface
Graphical User Interface
 
L2
L2L2
L2
 
L1
L1L1
L1
 
Planning Your Code
Planning Your CodePlanning Your Code
Planning Your Code
 
Graphical User Interface
Graphical User InterfaceGraphical User Interface
Graphical User Interface
 
Rainforests by Veronica
Rainforests by VeronicaRainforests by Veronica
Rainforests by Veronica
 
Rainforests by Chloe
Rainforests by ChloeRainforests by Chloe
Rainforests by Chloe
 
Anne frank vocab. 1
Anne frank vocab. 1Anne frank vocab. 1
Anne frank vocab. 1
 
L1
L1L1
L1
 

More from listergc

L2
L2L2
Validation, verification, output and backup
Validation, verification, output and backupValidation, verification, output and backup
Validation, verification, output and backup
listergc
 
L4 internet security
L4   internet securityL4   internet security
L4 internet security
listergc
 
L1 networking basics
L1   networking basicsL1   networking basics
L1 networking basics
listergc
 
L1 networking basics
L1   networking basicsL1   networking basics
L1 networking basics
listergc
 
L2 communication methods
L2   communication methodsL2   communication methods
L2 communication methods
listergc
 
Introduction to operating systems
Introduction to operating systemsIntroduction to operating systems
Introduction to operating systems
listergc
 
L6
L6L6
Y12 peripherals
Y12   peripherals Y12   peripherals
Y12 peripherals
listergc
 
Y12 peripherals
Y12   peripherals Y12   peripherals
Y12 peripherals
listergc
 
Describe primary and secondary memory inc
Describe primary and secondary memory incDescribe primary and secondary memory inc
Describe primary and secondary memory inc
listergc
 
Pp t3
Pp t3Pp t3
Pp t3
listergc
 
L7
L7L7
L6
L6L6
Systems software and applications packages
Systems software and applications packagesSystems software and applications packages
Systems software and applications packages
listergc
 
Components of a computer system
Components of a computer systemComponents of a computer system
Components of a computer system
listergc
 
Key database terms
Key database termsKey database terms
Key database terms
listergc
 
Normalisation
NormalisationNormalisation
Normalisation
listergc
 
L5
L5L5
L1
L1L1

More from listergc (20)

L2
L2L2
L2
 
Validation, verification, output and backup
Validation, verification, output and backupValidation, verification, output and backup
Validation, verification, output and backup
 
L4 internet security
L4   internet securityL4   internet security
L4 internet security
 
L1 networking basics
L1   networking basicsL1   networking basics
L1 networking basics
 
L1 networking basics
L1   networking basicsL1   networking basics
L1 networking basics
 
L2 communication methods
L2   communication methodsL2   communication methods
L2 communication methods
 
Introduction to operating systems
Introduction to operating systemsIntroduction to operating systems
Introduction to operating systems
 
L6
L6L6
L6
 
Y12 peripherals
Y12   peripherals Y12   peripherals
Y12 peripherals
 
Y12 peripherals
Y12   peripherals Y12   peripherals
Y12 peripherals
 
Describe primary and secondary memory inc
Describe primary and secondary memory incDescribe primary and secondary memory inc
Describe primary and secondary memory inc
 
Pp t3
Pp t3Pp t3
Pp t3
 
L7
L7L7
L7
 
L6
L6L6
L6
 
Systems software and applications packages
Systems software and applications packagesSystems software and applications packages
Systems software and applications packages
 
Components of a computer system
Components of a computer systemComponents of a computer system
Components of a computer system
 
Key database terms
Key database termsKey database terms
Key database terms
 
Normalisation
NormalisationNormalisation
Normalisation
 
L5
L5L5
L5
 
L1
L1L1
L1
 

Term 1 - C&B Stars