This tutorial is the first tutorial in a series of five Pygame tutorials: Pong Tutorial 1: Getting Started Pong Tutorial 2: Adding the Paddles Pong Tutorial 3: Controlling the Paddles Pong Tutorial 4: Adding a Bouncing Ball Pong Tutorial 5:…
The Pomodoro Technique is a time management method that can be used for a wide range of tasks. Many students use this technique to organise their revision time before an exam. This Pomodoro Technique was developed by Francesco Cirillo in…
During World War II, Enigma machines were used by the Germans to encrypt and decrypt military radio communications. An Enigma machine consists of a complex sets of interconnected rotors used to performs substitution and transposition ciphers to encrypt data. The…
In our Enigma – mission X challenge, we looked at how the Enigma machine was used by the Germans during WWII to encrypt radio communications and how code breakers were assigned the job to crack the code of the Enigma…
Before attempting this challenge, you should familiarise yourself with the Enigma machine by completing the Enigma Mission X challenge. Code Books were used by the Germans to list all the settings needed to set up the Enigma machines before starting…
Dear code breaker, I am contacting you from Bletchley Park as we are intercepting an increased volume of encrypted radio signals. We are working day and night to break the enigma codes that the German Navy are updating every day.…
The Enigma machines are a series of electro-mechanical rotor cipher machines. The first machines were invented at the end of World War I by German engineer Arthur Scherbius and were mainly used to protect commercial, diplomatic and military communication. Enigma…
In this challenge, we will write a Python program to estimate the total stopping distance of a vehicle based on its speed. The stopping distance consists of two components. The first component is the reaction distance covered by the vehicle…
Did You Know?Everything that is stored on a computer is stored as binary code. Binary code is made of bits (0 or 1). We often use Bytes to store data. A Byte is made of eight bits and can be…
Complementary colours are pairs of colours which, when combined or mixed, cancel each other out by producing a grayscale colour like white or black. When placed next to each other, they create the strongest contrast for those two colours. Complementary…