Programming
Digital signitures PKI
chain of trust
Certificate authority
DSA
Data integrity
Nonrepudation
Symetric Key cryptography
Frequency analysis
Substitution ciphers
Shift cipher
Brute force attack
Ceasar Cipher
Plain text and cipher text
Abstraction
Logo Commands
Modeling
Error Detection
Parity Error Detection
Odd Parity Scheme
Even Parity Scheme
Procedural Abstraction
Program Defined Procedure
Representing Images
Run Length Coding
Binary Numbers
Hexadecimal and Octal Number
Logic Gates
Alogirthms
Heuristic algorithms
Loops
Each number loops
Sorting Algorithms
Bucket sort
Radix sort
Mergesort
Bubble sort
Search Algorithms
Sequential search
Binary search algorithm
Pseudo Random Number Generator (PRNG)
If/Else Algorithm
Pseudo Random Numbers
Sequence, Selection, and Repetition
Pseudocode
Block coding
Creativity
AppInventor
Quizz App
Parallel lists
Index variable
Logo
Parameters
Lights Off
ImageSprite
Randomness
Animation
Timing
Map Tour
TinyDb
Lists/List Pickers
Application Programming Interface
Paint Pot
Refactoring
Variable Use
Event driven progamming
Guidelines
Piracy
Fair use
DRM
DMCA
Creative commons
Copy right
Networking
Commons
Data storage
TPM
Sealed storage
Peer to peer
Peer to peer architecture
Open source
Gigabyte
Flooding
DRAM
Decentralized network
Centralized systems
Centralized network
Hash Function
Sha 1
psuderandom generator
Rainbow attack
Collision restraint
Message digest
Public Key cryptography
Subtopic
Elliptic curve
RSA
Key agreement algorithm
Data and Information
Cache
Cryptography
Steganography
Data Persistence
American Standard Code for Information Interchange (ASCII)
Metadata
Debugging
The Cloud
The Internet
HTML
URL
World Wide Web
Open Standard
Protocol
Global Impact
Firewall
Bots
The Travelling Salesman Probelem
The Halting Problem
Limits of Algorithms
Intractable problems
Undecidable problems
Real World Statistic Simulations
Open Source Software
Retouching
Digital Explosion
Ethics