null
US
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
Next up
Copy and Edit
You need to log in to complete this action!
Register for Free
3483463
Maritza Lòpez Cruz
Description
MEDIDAS DE SEGURIDAD E HIGIENE EN EL USO DE LA COMPUTADORA
No tags specified
medidas de seguridad
e higiene
en el uso de la computadora
Mind Map by
Maritza López Cr
, updated more than 1 year ago
More
Less
Created by
Maritza López Cr
over 9 years ago
19
0
0
Resource summary
Maritza Lòpez Cruz
Media attachments
85871155-cf26-47c5-aa8d-5f8d4e6adb69 (image/jpg)
42aa574e-b6b9-4de7-b063-070b057d2cf0 (image/jpg)
174c5580-5eec-4be0-b313-d898d7d79c54 (image/jpg)
f095f235-84b3-4935-a72a-271870b8db77 (image/jpg)
6803402b-2ef5-44df-82e0-ede90898c257 (image/jpg)
47289449-d85a-4246-bf1e-a64b5f863f78 (image/jpg)
b1a6bd41-6a25-4cd2-ae25-9d38a74d982a (image/png)
ce141a00-df88-4a76-8de7-5b2022b531e9 (image/jpg)
98b84b59-914c-411b-86e9-2714316a1a3a (image/jpg)
0e546367-c396-4b13-bc30-f9b07762d5a6 (image/jpg)
aecd6b21-e202-45e5-9ff9-68fb7f42e94d (image/jpg)
0f58dd33-f49a-423d-8e93-5e1b02b70dac (image/jpg)
e34a3232-22bc-4068-9320-189b0db5560d (image/jpg)
68fabc5c-76e7-471f-8ae1-7d12a9b0ff52 (image/jpg)
fe8e2dd6-7a82-492c-b269-ef9114a01573 (image/jpg)
52ac03fd-1feb-4b20-a320-0dffd5b75e36 (image/jpg)
cdd8b5b0-ed51-49a4-90dd-0c7559997992 (image/jpg)
ad6d91d2-a815-4fee-9405-260e21cddcf4 (image/jpg)
Show full summary
Hide full summary
Want to create your own
Mind Maps
for
free
with GoConqr?
Learn more
.
Similar
Procedimiento
MERY ESCALONA
Lavoratorio De Biologia
Fatima Romero
Seguridad informatica
al211014
Soldadura electrica
Gabriela Escobar
Procedimientos Especiales
Marisol Pérez
Análisis de riesgos en la planificación para emergencias zoosanitarias
katyeh_cantu
MEDIDAS DE SEGURIDAD E HIGIENE EN EL USO DE LA COMPUTADORA
joseherminiofigu
SEGURIDAD INFORMÁTICA
Diego Poma
Informatica_1
Daniel mercado
Introduce el texto aquí
Diego Poma
SEGURIDAD INFORMÁTICA
Diego Poma
Browse Library