Hi, what do you want to do?
Khan Academy
Khan Academy: Public Key Encryption
Learn how public key encryption can protect computer data.
Khan Academy
Khan Academy: Symmetric Encryption Techniques
Learn how symmetric encryption techniques help protect computer data.
Khan Academy
Khan Academy: Encryption, Decryption, and Cracking
Find out about data encryption, decryption and cracking computer data to avoid virsus and cyberattacks.
Khan Academy
Khan Academy: The Need for Encryption
Find out why we need to encrypt computer data to avoid hackers.
Khan Academy
Khan Academy: Conditionals With If, Else, and Booleans
A tutorial explainning the use of if, else, and Boolean logic in computer programming.
Khan Academy
Khan Academy: Nested Conditionals
Learn how nested conditionals work in computer programming.
Khan Academy
Khan Academy: Compound Booleans With Logical Operators
Learn about computer programming using compound booleans with logical operators.
Khan Academy
Khan Academy: Internet Routing Protocol
Learn how computers split messages into packets and those packets hop from router to router on the way to their destination.
Khan Academy
Khan Academy: Physical Network Connections
Learn that the internet is a network of computers connected to each other. But what does each physical connection look like? It depends on the needs of the connection and the size of the network.
Khan Academy
Khan Academy: Number Limits, Overflow, and Roundoff
Learn about the limitations of storing numbers in computer programming.
Khan Academy
Khan Academy: Random Numbers
See how we can generate random values in our computer programs, and use those to make decisions and simulate natural processes.
Khan Academy
Khan Academy: String Operations
Computer programs don't just store strings, they also manipulate them. With string operations, we can chop strings up, mash strings together, or transform strings in all sorts of ways. Learn how here.
Khan Academy
Khan Academy: Unit: Online Data Security
Readings and practice problems about online data security.
Khan Academy
Khan Academy: Secondary Memory
Types of long term storage of data on the computer and retrieval are examined.
Khan Academy
Khan Academy: File Types
Computers store all files as binary data, long strings of 111s and 000s. Files represent all types of data: images, videos, documents, text files, spreadsheets, and applications. Files are stored as binary data.
Khan Academy
Khan Academy: File Sizes
Small and large computer file sizes are examined with examples of storage data.
Khan Academy
Khan Academy: Input & Output Devices
Computer input and output devices are examined in this article.
Khan Academy
Khan Academy: Hexadecimal Numbers
The Hexadecimal number is explained as well as its relationship and need in computers.
Khan Academy
Khan Academy: Numbered Repetition of Instructions
Computer programs are full of repetition, since our programs automate and simulate the world around us. Programmers use for loops to repeat a set of instructions a specific number of times.
Khan Academy
Khan Academy: Undecidable Problems
Problems a computer can never solve are called "undecidable problems". No algorithm exist that can answer the problem on all inputs.
Khan Academy
Khan Academy: Public Key Encryption
Public Key Encryption, an asymmetric encryption technique, is used to allow computers to securely communicate. The high level process is explained in this article.
Khan Academy
Khan Academy: Bit Rate, Bandwidth, and Latency
Explore how binary information is sent and how quickly they can be sent.
Khan Academy
Khan Academy: The Internet Protocol Suite Practice
Practice problems with the internet protocol suite of networks.