<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url>
    <loc>https://software.gcgsjayden.com/Jayden's-computer-science-notes/AI/Machine-Learning/Building-a-neural-network/0.-Introduction-to-neural-networks</loc>
    <lastmod>2025-11-13T02:59:32.089Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/Jayden's-computer-science-notes/AI/Machine-Learning/Building-a-neural-network/1.-Neural-networks--and--neurons</loc>
    <lastmod>2025-11-13T02:59:32.203Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/Jayden's-computer-science-notes/AI/Machine-Learning/Building-a-neural-network/2.-The-dot-product</loc>
    <lastmod>2025-11-13T02:59:32.234Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/Jayden's-computer-science-notes/AI/Machine-Learning/Building-a-neural-network/3.-Hidden-layers</loc>
    <lastmod>2025-11-13T02:59:32.408Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/Jayden's-computer-science-notes/AI/Machine-Learning/Building-a-neural-network/4.-Activation-functions</loc>
    <lastmod>2025-11-13T02:59:32.518Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/Jayden's-computer-science-notes/AI/Machine-Learning/Building-a-neural-network/5.-Softmax-activation</loc>
    <lastmod>2025-11-13T02:59:32.583Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/Jayden's-computer-science-notes/Algorithms/Dijkstra's-algorithm</loc>
    <lastmod>2025-11-13T02:59:32.591Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/Jayden's-computer-science-notes/Algorithms/Introduction-to-algorithms</loc>
    <lastmod>2025-11-13T02:59:32.689Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/Jayden's-computer-science-notes/Algorithms/Searching-algorithms/Binary-search</loc>
    <lastmod>2025-11-13T02:59:32.700Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/Jayden's-computer-science-notes/Algorithms/Searching-algorithms/Breadth-first-search</loc>
    <lastmod>2025-11-13T02:59:32.769Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/Jayden's-computer-science-notes/Cybersecurity/Auth--and--auth/Authentication--and--authorization</loc>
    <lastmod>2025-11-13T02:59:32.773Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/Jayden's-computer-science-notes/Design-Patterns/Catalog/Abstract-Factory</loc>
    <lastmod>2025-11-13T02:59:32.779Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/Jayden's-computer-science-notes/Design-Patterns/Catalog/Catalog-list</loc>
    <lastmod>2025-11-13T02:59:32.787Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/Jayden's-computer-science-notes/Design-Patterns/Catalog/Decorator</loc>
    <lastmod>2025-11-13T02:59:32.804Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/Jayden's-computer-science-notes/Design-Patterns/Catalog/Singletons</loc>
    <lastmod>2025-11-13T02:59:32.812Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/Jayden's-computer-science-notes/Design-Patterns/Introduction-to-design-patterns</loc>
    <lastmod>2025-11-13T02:59:32.858Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/Jayden's-computer-science-notes/Design-Patterns/Solving-problems</loc>
    <lastmod>2025-11-13T02:59:32.886Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/Jayden's-computer-science-notes/Developer's-tools/Code/Languages,-abstractions-and-instructions!/Compiler/Introduction-to-compilers</loc>
    <lastmod>2025-11-13T02:59:32.947Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/Jayden's-computer-science-notes/Developer's-tools/Code/Languages,-abstractions-and-instructions!/Data-types</loc>
    <lastmod>2025-11-13T02:59:32.956Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/Jayden's-computer-science-notes/Developer's-tools/Code/Languages,-abstractions-and-instructions!/Programming-languages</loc>
    <lastmod>2025-11-13T02:59:32.974Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/Jayden's-computer-science-notes/Developer's-tools/Code/Programming-paradigms/Object-oriented-programming</loc>
    <lastmod>2025-11-13T02:59:32.988Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/Jayden's-computer-science-notes/Developer's-tools/Diagrams/Data-flow-diagrams-(DFDs)</loc>
    <lastmod>2025-11-13T02:59:33.155Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/Jayden's-computer-science-notes/Developer's-tools/Game-dev/Introduction-to-game-development</loc>
    <lastmod>2025-11-13T02:59:33.161Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/Jayden's-computer-science-notes/Developer's-tools/Git/Branching</loc>
    <lastmod>2025-11-13T02:59:33.163Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/Jayden's-computer-science-notes/Developer's-tools/Git/Introduction-to-Git</loc>
    <lastmod>2025-11-13T02:59:33.165Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/Jayden's-computer-science-notes/Low-level/Binary</loc>
    <lastmod>2025-11-13T02:59:33.171Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/Jayden's-computer-science-notes/Low-level/Bitwise-operations</loc>
    <lastmod>2025-11-13T02:59:33.187Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/Jayden's-computer-science-notes/Low-level/The-operating-system/Components-of-an-operating-system</loc>
    <lastmod>2025-11-13T02:59:33.195Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/Jayden's-computer-science-notes/Low-level/The-operating-system/Schedular</loc>
    <lastmod>2025-11-13T02:59:33.205Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/Jayden's-computer-science-notes/Low-level/The-operating-system/System-calls</loc>
    <lastmod>2025-11-13T02:59:33.209Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/VCE/Exam-preparation/Exam-questions</loc>
    <lastmod>2025-11-13T02:59:33.218Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/VCE/SAT/Evaluation-criteria</loc>
    <lastmod>2025-11-13T02:59:33.222Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/VCE/SAT/Introduction-to-the-School-Assessed-Task</loc>
    <lastmod>2025-11-13T02:59:33.225Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/VCE/SAT/Software-Requirements-Specification</loc>
    <lastmod>2025-11-13T02:59:33.230Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/VCE/Unit-1/Research-and-data-collection/Privacy</loc>
    <lastmod>2025-11-13T02:59:33.241Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/VCE/Unit-1/Research-and-data-collection/Quality-of-data</loc>
    <lastmod>2025-11-13T02:59:33.347Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/VCE/Unit-1/Research-and-data-collection/Research</loc>
    <lastmod>2025-11-13T02:59:33.382Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/VCE/Unit-3/Data/Data-collection-methods</loc>
    <lastmod>2025-11-13T02:59:33.397Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/VCE/Unit-3/Data/Data-integrity</loc>
    <lastmod>2025-11-13T02:59:33.402Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/VCE/Unit-3/Key-legislation</loc>
    <lastmod>2025-11-13T02:59:33.413Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/VCE/Unit-3/Project-management-skills/Gantt-charts</loc>
    <lastmod>2025-11-13T02:59:33.427Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/VCE/Unit-3/Project-management-skills/SRS-documents</loc>
    <lastmod>2025-11-13T02:59:33.429Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/VCE/Unit-3/The-problem-solving-methodology/1.-Analysis</loc>
    <lastmod>2025-11-13T02:59:33.436Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/VCE/Unit-3/The-problem-solving-methodology/2.-Design</loc>
    <lastmod>2025-11-13T02:59:33.456Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/VCE/Unit-3/The-problem-solving-methodology/Introduction-to-the-PSM</loc>
    <lastmod>2025-11-13T02:59:33.468Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/VCE/Unit-4/Cybersecurity/Ethics</loc>
    <lastmod>2025-11-13T02:59:33.477Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/VCE/Unit-4/Cybersecurity/Industry-frameworks</loc>
    <lastmod>2025-11-13T02:59:33.485Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/VCE/Unit-4/Cybersecurity/Introduction-to-cybersecurity</loc>
    <lastmod>2025-11-13T02:59:33.499Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/VCE/Unit-4/Cybersecurity/Mitigation-and-protection</loc>
    <lastmod>2025-11-13T02:59:33.511Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/VCE/Unit-4/Cybersecurity/Other-strategies-for-improving-security</loc>
    <lastmod>2025-11-13T02:59:33.521Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/VCE/Unit-4/Cybersecurity/Security-controls-in-software-development</loc>
    <lastmod>2025-11-13T02:59:33.533Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/VCE/Unit-4/Cybersecurity/Security-of-data</loc>
    <lastmod>2025-11-13T02:59:33.544Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/VCE/Unit-4/Cybersecurity/Social-engineering</loc>
    <lastmod>2025-11-13T02:59:33.565Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/VCE/Unit-4/Cybersecurity/Software-security</loc>
    <lastmod>2025-11-13T02:59:33.582Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/VCE/Unit-4/Cybersecurity/Types-of-vulnerabilities</loc>
    <lastmod>2025-11-13T02:59:33.600Z</lastmod>
  </url><url>
    <loc>https://software.gcgsjayden.com/</loc>
    <lastmod>2025-11-13T02:59:33.619Z</lastmod>
  </url></urlset>