Page 469 - Computer Science Class 11 With Functions
P. 469

✥   Digital Footprints: A digital footprint is a trail of personal data that one leaves behind while using the Internet.
            ✥   Digital Rights Management: Digital Rights Management (DRM) is a way to control and limit access to intellectual property by
               using technology.
            ✥   Eavesdropping: Attacks that steal data being transmitted over a communication channel are known as eavesdropping.
            ✥   Escape Sequence: An escape sequence starts with a backslash (\) followed by one or more characters.
            ✥   E-waste Management: Electronic products that are no longer needed, are broken, or have reached the end of their useful lives
               are called e-waste. The e-waste includes smartphones, desktops, laptops, hard drives, cables, batteries, routers, switches, and
               hubs that are no longer required.
            ✥   Explicit Type Conversion: Explicit conversion, also called typecasting, takes place when the programmer gives such instruction.
            ✥   Expression: An expression is a valid combination of constants, variables, and operators.
            ✥   Fabrication: Illegitimate information is inserted along with authentic data.
            ✥   Firewall: A firewall is a piece of hardware, software, or a combination of both that prevents unwanted access to a network.
            ✥   Flowchart: A pictorial representation of an algorithm.
            ✥   General Public License (GPL): Under the General Public License (GPL), users can use, modify, and share the software.
            ✥   Hacking: Hacking is the act of gaining unauthorised access to a computer system or network in order to steal information
               (such as a password or private files) or damage the system or network. A bad hacker breaks into the system to do something
               bad, while a good hacker tries to break into the system to find its weaknesses so they can be fixed.
            ✥   id(): Function id() yields the unique object identifier of an object.
            ✥   Identifier: An identifier is a name for a Python object.
            ✥   Identity Operators: Identity operators are typically used for checking the data type of an object.
            ✥   Identity Theft: When someone steals your personal information to commit fraud, it is known as identity theft (ID theft).
            ✥   Implicit Type Conversion: Implicit type conversion, also known as coercion, takes place when a data value is converted from
               one data type to another by the Python interpreter, without explicit type conversion by the programmer.
            ✥   Index: Position of a character in a string is called its index.
            ✥   Infinite Loop: A while loop becomes an infinite loop if the test condition never yields False.
            ✥   Input Devices: An input device takes input from a user in the form of data or instructions.
            ✥   input(): input() function reads the text entered by a user until a newline is encountered.
            ✥   Intellectual Property Rights (IPR): Work done by a person or an organisation using their mind and creativity is called intellectual
               property.

            ✥   Python Shell: The interactive Python interpreter is also known as the Python Shell.
            ✥   Interception: Unauthorised user gains access to private information.
            ✥   Interpreter: It converts the source code to an executable form and executes it instruction by instruction.
            ✥   Interruption: Network service is made unavailable to the legitimate user.
            ✥   Iterative Flow: Executing an instruction (Python statement) or a sequence of instructions multiple times is called iteration, or
               looping.
            ✥   Keywords: Keywords (also called reserved words) are words whose meaning and usage is predefined in a programming
               language.
            ✥   Licensing: A licence is an agreement between a person or an organisation that wants to use software and the company that
               owns it.
            ✥   Literal: A literal refers to a constant or a fixed value.
            ✥   Malware: Malware is a program that aims to hurt a computer, server, client, or computer network.
            ✥   max(): max() function returns the largest value from the sequence of values provided as the input argument.
            ✥   min(): min() function returns the smallest value from the sequence of values provided as the argument.
            ✥   Modification: Changing, inserting, and/or deleting information.
            ✥   Modular Approach: The process of dividing a complex problem into subproblems, solving the subproblems, and merging the
               solutions to the subproblems to solve the original problem is called the modular approach.
            ✥   Modular Programming: The programming methodology that focuses on organising a computer program into separate blocks
               of code or sub-programs (each having a name and functionality) is called modular programming.



                                                                                                      Glossary   467
   464   465   466   467   468   469   470   471   472   473   474