Programming
Global Impact
Digital Explosion
Ethics
Retouching
Open Source Software
Real World Statistic Simulations
Limits of Algorithms
Undecidable problems
Intractable problems
The Halting Problem
The Travelling Salesman Probelem
Bots
Firewall
The Internet
Protocol
Open Standard
World Wide Web
URL
HTML
Data and Information
The Cloud
Debugging
Metadata
American Standard Code for Information Interchange (ASCII)
Data Persistence
Cryptography
Steganography
Cache
Public Key cryptography
Key agreement algorithm
RSA
Elliptic curve
Subtopic
Hash Function
Message digest
Collision restraint
Rainbow attack
psuderandom generator
Sha 1
Networking
Centralized network
Centralized systems
Decentralized network
DRAM
Flooding
Gigabyte
Open source
Peer to peer
Peer to peer architecture
Sealed storage
TPM
Data storage
Commons
Guidelines
Copy right
Creative commons
Subtopic
DMCA
DRM
Fair use
Piracy
Creativity
AppInventor
Paint Pot
Event driven progamming
Variable Use
Refactoring
Map Tour
Application Programming Interface
Lists/List Pickers
TinyDb
Lights Off
ImageSprite
Timing
Animation
Randomness
Logo
Parameters
Quizz App
Index variable
Parallel lists
Alogirthms
Pseudocode
Block coding
Sequence, Selection, and Repetition
Pseudo Random Numbers
If/Else Algorithm
Pseudo Random Number Generator (PRNG)
Search Algorithms
Binary search algorithm
Sequential search
Sorting Algorithms
Bubble sort
Mergesort
Radix sort
Bucket sort
Loops
Each number loops
Heuristic algorithms
Abstraction
Logic Gates
Binary Numbers
Hexadecimal and Octal Number
Representing Images
Run Length Coding
Procedural Abstraction
Program Defined Procedure
Error Detection
Parity Error Detection
Even Parity Scheme
Odd Parity Scheme
Modeling
Logo Commands
Symetric Key cryptography
Plain text and cipher text
Ceasar Cipher
Brute force attack
Shift cipher
Substitution ciphers
Frequency analysis
Digital signitures PKI
Nonrepudation
Data integrity
DSA
Certificate authority
chain of trust