1/11
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Brute Force Attacks
A method used by hackers to guess passwords by trying every possible combination, such as '1234', '1111', '4321', etc.
Two-Factor Authentication
A security process that requires two different forms of identification to access an account, often involving a code sent to your phone.
Encryption
The process of encoding a message so that only authorized parties can access its content; examples include substitution ciphers like the Caesar cipher.
Caesar Cipher
A type of substitution cipher where each letter in the text is shifted a certain number of places down or up the alphabet.
Machine Learning
A subset of artificial intelligence that allows systems to learn and improve from experience without being explicitly programmed.
Spam Filter
A machine learning application that identifies and filters out spam emails based on specific keywords.
Decision Tree Classifier
A machine learning model that uses a tree-like model of decisions to predict outcomes based on input data.
For Loop
A control flow statement for specifying iteration, allowing code to be executed repeatedly for a set range of values.
While Loop
A control flow statement that allows code to be executed as long as a condition is true.
IF Statements
Conditional statements that execute specific blocks of code based on whether a condition is true or false.
Event Handling
In programming, particularly games, it refers to the way a program responds to user actions, like key presses.
Collision Detection
The computational technique used in games to determine whether two objects (like a player and an enemy) have collided.