More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
post
page
Python IDE Dashboard
Author: Administrator

Object-Oriented Programming – Crossword

Are you confident with your knowledge of key Object-Oriented Programming concepts: Classes & Objects, Inheritance, Encapsulation, Polymorphism and Abstract Classes? You can find our more about OOP concepts on the following page.

Object-Oriented Programming – Terminology

Click on the picture below to check your knowledge of key Object-Oriented Programming concepts: Classes & Objects, Inheritance, Encapsulation, Polymorphism and Abstract Classes.  

Object-Oriented Programming – Quiz

Before taking this quiz, make sure you are confident with your understanding of key Object-Oriented Programming concepts. Take the Quiz! (open full screen) List of Keywords If you are stuck and need a clue, you can reveal below the list

Object-Oriented Programming Concepts

Object-Oriented Programming (OOP) is a programming approach based on objects and classes. The object-oriented paradigm allows us to organise software as a collection of objects that consist of both data/attributes and behaviours. This programming concept appeared in the 1980s and

Symmetric vs. Asymmetric Encryption

Cryptography is the art of encoding and decoding secret messages. Cryptographic techniques have been used for thousands of years, well before the introduction of computers, and the techniques have evolved since. (e.g. See how the Caesar Cipher was used by

Epoch/Unix Timestamp Converter

The Unix epoch (or Unix time or POSIX time or Unix timestamp) is the number of seconds that have elapsed since January 1, 1970 (midnight GMT). This explains how date & time values are actually stored on computers: using an

Hashing Algorithms for Integrity Validation

Imagine working for the British Secret Services during World War 2 or during the cold war. As part of your role, you would be expected to exchange secret messages with your allies. Your messages would most likely be encrypted using

Hashing Algorithms for Storing Sensitive Data

More and more online systems such as e-commerce websites, online banking apps, or social networks need to access some sensitive data about you including your password, your credit card details and more recently, some biometric data (e.g. for fingerprint authentication

Hashing Algorithms for Memory Addressing

In this blog post, we will investigate the use of hashing algorithms to quickly locate a record in a large database. Let’s consider the database of members of a social network such as Instagram, Twitter or Facebook. Every time the

Recursive vs. Iterative Palindrome Check

For this challenge we will investigate two algorithms used to find out if a word is a palindrome or not. The first algorithm will use an iterative approach, the second algorithm will use a recursive approach. Iterative Approach An iterative