Khan Academy
Khan Academy: Using Recursion to Determine Whether a Word Is a Palindrome
Learn how to use recursion to determine whether a word is a palindrome.
Khan Academy
Khan Academy: Multiple Recursion With the Sierpinski Gasket
See a good example of a mathematical construct that is a fractal known as a Sierpinski gasket.
Khan Academy
Khan Academy: The Factorial Function
See examples of recursion, and look how to compute the factorial function.
Khan Academy
Khan Academy: Recursion
Learn about recursion and how it applies to different situations.
Khan Academy
Khan Academy: Storing Strings in Variables
When we're making a program, we often want to store sequences of letters. In programming lingo, we call each letter a character and we call the sequence a string.
Khan Academy
Khan Academy: Rogue Access Points
Learn about rogue access points to understand wireless internet access.
Khan Academy
Khan Academy: Modular Multiplication
Practice problems over modular multiplication in cryptography.
Khan Academy
Khan Academy: Modular Addition
Practice problems for reviewing modular addition in cryptography.
Khan Academy
Khan Academy: Sensor Networks
The concept of sensor data as related to a sensor network is examined and its applications.
Khan Academy
Khan Academy: Computing Basic Statistics
Computing data statistics by examining data patterns.
Khan Academy
Khan Academy: The Sources of Big Data
Sources of big data and the issues of storage are examined.
Khan Academy
Khan Academy: Copyright, Drm, and the Dmca
Copyright laws as established by the Berne Convention, Fair Use, Digital Rights Management, and The Digital Millennium Copyright Act of 1998 are discussed.
Khan Academy
Khan Academy: Shift Cipher
The use of the Shift Cipher to encrypt and decrypt information.
Khan Academy
Khan Academy: Creative Commons and Open Source
After creative work has been copyrighted, licensing under Creative Commons, Open Source, or Public Domain allows digital information to be widely shared while not being compromised and maintaining attribution.
Khan Academy
Khan Academy: Hypertext Transfer Protocol (Http)
Explanation of HTML (Hypertext Transfer Protocol) and how it works.
Khan Academy
Khan Academy: Sensors
Part of the Internet of Things, types of sensors are examined including acoustic, visual, weather, GPS, and others.
Khan Academy
Khan Academy: Http Secure (Https)
The article examines Hypertext Transfer Protocol Secure (HTTPS) and how it protects the privacy of their user and prevents tampering of the website.
Khan Academy
Khan Academy: Smart Buildings, Transport, and Grids
The advantages and security risks of "Smart" uses of technology in buildings, transportation, and grids are discussed.
Khan Academy
Khan Academy: Domain Name System (Dns)
The Domain Name System (DNS) and its relationship to IP addresses is explained and illustrated. The article also discusses the anatomy of a domain name and issues of DNS spoofing.
Khan Academy
Khan Academy: Symmetric Encryption Techniques
Symmetric encryption techniques are explained including the Vigenere Cipher and AES-128.
Khan Academy
Khan Academy: Encryption, Decryption, and Cracking
Julius Caesar encrypted messages two thousand years ago. By knowing the techniques of deciphering a code--frequency analysis, known text, and brute force--one can begin to understand the three key aspects of data encryption, decryption,...
Other popular searches
- Computer Science Excel
- Computer Science Java
- B Ed Computer Science
- History of Computer Science
- Computer Science History
- Computer Science Worksheets
- Networking Computer Science
- Computer Science C Programs
- Computer Science C++programs
- Computer Science Engineering
- Science and Computer Science
- Computer Science Terms