Page 470 - Computer Science Class 11 With Functions
P. 470

✥   Multiplication Operator *: The multiplication operator concatenates the string the specified number of times.
        ✥   Mutable: A modifiable object and its associated type are called mutable.
        ✥   myDict.items(): The method items() returns a dict_items object comprising the set of items included in the dictionary.
        ✥   myDict.keys(): The method keys() returns a dict_keys object comprising all the keys included in the dictionary.
        ✥   myDict.update(): The method update() adds all key-value pairs of another dictionary in an existing dictionary.
        ✥   myDict.values(): The method values() returns a dict_values object comprising all the values included in the dictionary.
        ✥   Nested Lists: A list that includes lists as its elements is called a nested list.
        ✥   Nested Loops: When a loop appears within another loop, it is called a nested loop.
        ✥   Operating System: An operating system provides an interface between the users of a computer and the computer hardware
            so that they can operate the computer.
        ✥   Operator: An operator is used to perform a specific operation on an object or objects.
        ✥   Operators: Operators are tokens that perform a particular operation on the given values, called operands.
        ✥   Output Devices: The output devices receive data from a computer and deliver the desired output on a suitable device for a
            user.

        ✥   Patent: A patent is a property right that an autonomous body (or a sovereign state) grants to the inventor for a specific
            amount of time.
        ✥   Plagiarism: When someone passes off the words, ideas, or expressions of another author as their own, it is an act of plagiarism.
        ✥   Primary Memory: Primary memory is used to store data and instructions to be processed by the CPU.
        ✥   Program(code): A sequence of instructions in a programming language for solving a problem.
        ✥   Pseudocode: It describes an algorithm using constructs similar to a programming language but not specific to any programming
            language.
        ✥   Python module: A Python program file is called a Python module.
        ✥   RAM: RAM is a random access memory in which data can be read from and written onto any random memory location.
        ✥   Ransomware: It is a type of malicious software that holds data or devices hostage for a ransom.
        ✥   Relational Operator: A relational operator is used to compare the values of operands on either side.
        ✥   ROM: ROM is a non-volatile memory that stores the data permanently.
        ✥   Sequential Flow: In a sequential flow, the statements are execute d sequentially, one after the other.
        ✥   Set: A set is an unordered and unindexed collection of data items separated by a comma and enclosed within curly brackets:{}.
        ✥   Software: A set of programs that performs a useful task is called software.
        ✥   sorted(): The method sorted() is used to sort the dictionary by the keys or by the values.
        ✥   Source Code: A program written in a high -level programming language is called the source code.
        ✥   Spam: Spam is unsolicited junk mail that is typically sent in bulk for advertising purposes.
        ✥   String (str): String refers to a sequence of characters.
        ✥   Strings are Immutable!: Strings in Python are immutable, i.e., a string cannot be modified.
        ✥   sum(): sum() function returns sum of all numeric values in the given input sequence.
        ✥   Tokens: A statement in python is a sequence of its lexical components, called tokens, such as numbers, parentheses, and
            commas.
        ✥   Trademark Infringement: Unauthorised use of a brand or service mark is known as trademark infringement.
        ✥   Trademark: A trademark is a distinctive symbol, pattern, or phrase that sets one source’s goods and services apart from those
            of other sources.
        ✥   Trojan Horse: A Trojan horse is malware that presents itself as desirable and helpful program but actually causes harm to the
            system. Trojan horse makes a backdoor entry into the system that hackers can use to get into the system.
        ✥   Tuples (tuple): A tuple is a sequence of objects (not necessarily of the same type) enclosed in parenthesis: ().
        ✥   Viruses: A virus is a piece of software code that can damage your system by replacing or messing up the system files.
        ✥   Worm: A worm is a malicious program that replicates itself. So, a networked device could have several copies of a worm
            infecting many files.




         468   Touchpad Computer Science-XI
   465   466   467   468   469   470   471   472   473   474