2.10.2 top down design answers

Function
Allows us to break down our program into smaller parts, and makes the program easier to understand.

Rules for defining a function*Name should start with a letter, and cannot have any spaces*The name should describe what this function does

*The code in the function goes between the { and the } character, and this is called the “function body.”

Start function
All of our programs start with

We use functions to*Break down our program into smaller parts*Avoid repeated code

*Make our program more readable

Comments
Notes that you leave in your code so others can know what your code is doing

For loops
Repeats a section of code a fixed number of times

Conditions
is a function that returns a true/false answer

If statements
a programming conditional statement that, if proved true, performs a function or displays information.

if-else statements
it executes a block of code if is true. If it’s false, another block of code can be executed.

While loops
allows us to repeat a section of code as long as some condition is true.

Computer
is a computing machine that performs calculations according to precise instructions.

Uses for computers*To keep counts*Marketplace*Calculate astronomical positions*Solves math problems

*Military and business use

Hardware
Physical components

Software
Programs that run on the computer

System software
Programs that run on the computer that helps the computer perform tasks.

Binary
Is a number system with only 0’s and 1’s.

Byte
Unit of digital data.

Digital Information
Information stored as numerical digits.

Data Abstraction
The process of simplifying complicated data into manageable chunks.

Decimal Number System
A system with 10 numeric values, 0 through 9.

ASCII
American Standard Code for Information Interchange.

Pixels
The building blocks of digital images.

Hexadecimal Number System
a base-16 system, consisting of the 16 symbols 0 through 9 and A through F.

RGB Color Scheme
allows us to encode colors as numeric data.

R = Math.min (R + 50, 255);
G = Math.min (G + 50, 255);
B = Math.min (B + 50, 255);
Brightness Filter

R = Math.max (R – 50, 0);
G = Math.max (G -50, 0);
B = Math.max (B – 50, 0);
Darkness Filter

Internet
A global network connecting millions of computers, making it possible to exchange information.

Networks
A group of 2 or more computer systems linked together.

Bandwidth
The capacity of data transfer in a system and it’s measured by bitrate.

Latency
The time it takes for a bit to travel from its sender to its receiver.

The Internet Protocol
A protocol that defines the layout of an Internet address.

DNS
The service that translates URLs to IP addresses.

Routing
the process of deciding which path to take on a network. This is determined by the type of network and the software used to transmit data.

Packets
Small chunks of information that have been carefully formed from larger chunks of information.

Cybersecurity
The protection of computer systems, networks, and data from digital attacks.

CIA Triad
Confidentiality, Integrity, Availability

Confidentiality
The protection of information from people who are not authorized to view it.

Integrity
Aims at ensuring that information is protected from unauthorized or unintentional alteration.

Availability
The assurance that systems and data are accessible by authorized users when and where needed.

Digital Footprint
All of the information about a person can be found online due to their activity.

Cyberbullying
The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.

Privacy
The appropriate use of your data.

Copyright
A form of protection for intellectual property, usually applying to artistic work.

Hacker
a person who uses computers to gain unauthorized access to data on the internet.

White hat hackers
ethical hackers that break into the systems for non-malicious reasons such as to test the system security vulnerabilities or to expose undisclosed weaknesses

Black hat hackers
break into other people’s computer systems and may just look around or may steal and destroy information

Grey hat hackers
A cross between black and white—they will often illegally break into systems merely to flaunt their expertise to the administrator of the system they penetrated or to attempt to sell their services in repairing security breaches.

Cryptography
The study and use of techniques for securing communication.

Encrypt
Scramble

Decrypt
Unscramble

Cryptanalysis
The process of decrypting a message without knowing the cipher or key used to encrypt it.

Cryptology
The study of solving and writing encryptions.

Symmetric Encryption
the same key is used to encode and decode

Asymmetric Encryption
two keys are used; one key encodes the message, and the other key decodes the message

Hashing
Changing a message into an unreadable string of numbers.

CodeHS All Lesson Answer Keys [Watch Video]

About CodeHS

Powered by passion and inspired by innovation, CodeHS is a digital platform designed with an intention to deliver well-versed and in-depth knowledge of coding. They intend to bridge the gap between teachers and students by providing limitless learning opportunities and possibilities around the world.

When it comes to exploring avenues in the field of computer sciences, They took a unique approach to empower students, teachers, and society with professional skills that transcend cultural boundaries. A perfect blend of excellence and brilliance.

The ambition to offer everyone the same basic principles, curriculum, and learning environment about computer knowledge is reaping fruits through growth, potential, and talent. The interactive display makes it all fun and entertaining to use the platform while giving a wide range of modern techniques and tools to transform your hunger into professional success.

The seamless integration of all the major programming languages and other modules in one place makes CodeHS the finest medium for online learning for every aspirant. From learning to advancing your skills and talent, CodeHS is your one-stop solution that answers your every problem.

Visit ClassroomStruggle Homepage for other related course answers.

Hope you all find the right CodeHS answers and once again please do share with your friends if it helped you in any way.