Page 401 - Computer Science Class 11 Without Functions
P. 401

✥   Digital Rights Management: Digital Rights Management (DRM) is a way to control and limit access to intellectual property by
               using technology.
            ✥   Eavesdropping: Attacks that steal data being transmitted over a communication channel are known as eavesdropping, sniffing,
               or snooping.
            ✥   Escape Sequence: An escape sequence starts with a backslash (\) followed by one or more characters.
            ✥   E-waste Management: Electronic products that are no longer needed, are broken, or have reached the end of their useful lives
               are called e-waste. The e-waste includes smartphones, desktops, laptops, hard drives, cables, batteries, routers, switches, and
               hubs that are no longer required.

            ✥   Explicit Type Conversion: Explicit type conversion, also called typecasting, takes place when the programmer gives such
               instruction.
            ✥   Expressions: An expression is a valid combination of constants, variables, and operators.
            ✥   Fabrication: Illegitimate information is inserted along with authentic data.
            ✥   Firewall: A firewall is a piece of hardware, software, or a combination of both that prevents unwanted access to a network.
            ✥   Flowchart: A pictorial representation of an algorithm.
            ✥   General Public License (GPL): Under the General Public License (GPL), users can use, modify, and share the software.
            ✥   Hacking: Hacking is the act of gaining unauthorised access to a computer system or network in order to steal information
               (such as a password or private files) or damage the system or network.
            ✥   id(): The function id() yields the unique object identifier of an object.
            ✥   Identifiers: An identifier is a name for a Python object.
            ✥   Identity Operators: Identity operators are typically used for checking the data type of an object.
            ✥   Identity Theft: When someone steals your personal information to commit fraud, it is known as identity theft (ID theft).
            ✥   Implicit Type Conversion: Implicit type conversion, also known coercion, takes place when a data value is converted from one
               data type to another by the Python interpreter, without explicit type conversion by the programmer.
            ✥   Index: Position of a character in a string is called its index.
            ✥   Strings are Immutable!: Strings in Python are immutable, i.e., a string cannot be modified.
            ✥   Infinite Loop: A while loop becomes an infinite loop if the test condition never yields False.
            ✥   Input Devices: An input device takes input from a user in the form of data or instructions.
            ✥   input(): The input() function reads the text entered by a user until a newline is encountered.
            ✥   Intellectual Property Rights (IPR): The work done by a person or an organisation using their mind and creativity is called
               intellectual property.
            ✥   Interception: Unauthorised user gains access to private information.
            ✥   Interpreter: It converts the source code to an executable form and executes it instruction by instruction.
            ✥   Interruption: Network service is made unavailable to the legitimate user.
            ✥   Iterative Flow: Executing an instruction (Python statement) or sequence of instructions multiple times is called iteration.
            ✥   Keywords: Keywords (also called reserved words) are words whose meaning and usage is predefined in a programming language.
            ✥   Licensing: A licence is an agreement between a person or an organisation that wants to use software and the company that
               owns it.

            ✥   Literals: A literal refers to a constant or a fixed value.
            ✥   Malware: Malware is a program that aims to hurt a computer, server, client, or computer network.
            ✥   mean() function: The mean() method yields the mean of the elements of a list.
            ✥   Modification: Changing, inserting, and/or deleting information.
            ✥   Modular Approach: The process of dividing a complex problem into subproblems, solving the subproblems, and merging the
               solutions to the subproblems to solve the original problem is called the modular approach.

            ✥   Mutable Data Types: A modifiable object and its associated type are called mutable data types.
            ✥   myDict.items():The method items() returns a dict_items object comprising the set of items included in the dictionary.


                                                                                                      Glossary   399
   396   397   398   399   400   401   402   403   404   405   406