Page 469 - Computer Science Class 11 With Functions
P. 469
✥ Digital Footprints: A digital footprint is a trail of personal data that one leaves behind while using the Internet.
✥ Digital Rights Management: Digital Rights Management (DRM) is a way to control and limit access to intellectual property by
using technology.
✥ Eavesdropping: Attacks that steal data being transmitted over a communication channel are known as eavesdropping.
✥ Escape Sequence: An escape sequence starts with a backslash (\) followed by one or more characters.
✥ E-waste Management: Electronic products that are no longer needed, are broken, or have reached the end of their useful lives
are called e-waste. The e-waste includes smartphones, desktops, laptops, hard drives, cables, batteries, routers, switches, and
hubs that are no longer required.
✥ Explicit Type Conversion: Explicit conversion, also called typecasting, takes place when the programmer gives such instruction.
✥ Expression: An expression is a valid combination of constants, variables, and operators.
✥ Fabrication: Illegitimate information is inserted along with authentic data.
✥ Firewall: A firewall is a piece of hardware, software, or a combination of both that prevents unwanted access to a network.
✥ Flowchart: A pictorial representation of an algorithm.
✥ General Public License (GPL): Under the General Public License (GPL), users can use, modify, and share the software.
✥ Hacking: Hacking is the act of gaining unauthorised access to a computer system or network in order to steal information
(such as a password or private files) or damage the system or network. A bad hacker breaks into the system to do something
bad, while a good hacker tries to break into the system to find its weaknesses so they can be fixed.
✥ id(): Function id() yields the unique object identifier of an object.
✥ Identifier: An identifier is a name for a Python object.
✥ Identity Operators: Identity operators are typically used for checking the data type of an object.
✥ Identity Theft: When someone steals your personal information to commit fraud, it is known as identity theft (ID theft).
✥ Implicit Type Conversion: Implicit type conversion, also known as coercion, takes place when a data value is converted from
one data type to another by the Python interpreter, without explicit type conversion by the programmer.
✥ Index: Position of a character in a string is called its index.
✥ Infinite Loop: A while loop becomes an infinite loop if the test condition never yields False.
✥ Input Devices: An input device takes input from a user in the form of data or instructions.
✥ input(): input() function reads the text entered by a user until a newline is encountered.
✥ Intellectual Property Rights (IPR): Work done by a person or an organisation using their mind and creativity is called intellectual
property.
✥ Python Shell: The interactive Python interpreter is also known as the Python Shell.
✥ Interception: Unauthorised user gains access to private information.
✥ Interpreter: It converts the source code to an executable form and executes it instruction by instruction.
✥ Interruption: Network service is made unavailable to the legitimate user.
✥ Iterative Flow: Executing an instruction (Python statement) or a sequence of instructions multiple times is called iteration, or
looping.
✥ Keywords: Keywords (also called reserved words) are words whose meaning and usage is predefined in a programming
language.
✥ Licensing: A licence is an agreement between a person or an organisation that wants to use software and the company that
owns it.
✥ Literal: A literal refers to a constant or a fixed value.
✥ Malware: Malware is a program that aims to hurt a computer, server, client, or computer network.
✥ max(): max() function returns the largest value from the sequence of values provided as the input argument.
✥ min(): min() function returns the smallest value from the sequence of values provided as the argument.
✥ Modification: Changing, inserting, and/or deleting information.
✥ Modular Approach: The process of dividing a complex problem into subproblems, solving the subproblems, and merging the
solutions to the subproblems to solve the original problem is called the modular approach.
✥ Modular Programming: The programming methodology that focuses on organising a computer program into separate blocks
of code or sub-programs (each having a name and functionality) is called modular programming.
Glossary 467

