Documentation for all Karel Commands and Syntax.
Calling a function actually gives the command, so the computer will run the code for that function.
A function is like a command that you get to invent and name. It allows us to break our program into smaller parts, making the program easier to understand.
Defining a function means to teach the computer a new command and explain what it should do when receiving that command.
In Python functions, the function body is the indented block of code that comes after the `def my_function():` line. The function body is what will be executed when the function is called.
`snake case` refers to the style of writing in which each space is replaced by an underscore `_` character and the first letter of each word is lowercase.
Top down design is a method for breaking our program down into smaller parts.
Assumptions we make about what must be true before the function is called.
A message in your code that explains what is going on.
Managing complexity by "abstracting away" information and detail, in order to focus on the relevant concepts.
The ability to use methods and programs that we do not fully understand, or are unable to write.
SuperKarel is like Karel but already knows how to turnRight() and turnAround()
APIs and libraries simplify complex programming tasks by providing sets of clearly defined methods of communication among various computing components.
Written instructions detailing the functions, methods, and variables available and how to use them.
A for loop lets us repeat code a **fixed number of times.**
Executes code only if condition is true
Control structure that lets us run either one section of code or another depending on a test.
Lets us repeat code as long as something is true.
A control structure lets us change the flow of the code.
An algorithm is a set of steps or rules to follow to solve a particular problem.
Sequencing, or sequential execution, is step by step execution of instructions in the order they are given.
Repetition of instructions a specified number of times, or until a condition is met.
Using a condition to determine which part of an algorithm is executed.
Pieces of information you can give to functions when you define them. When the function is called the arguments are the data you pass into the function's parameters. Parameter is the variable in the declaration of the function. Argument is the actual value of this variable that gets passed to the function.
Ultra Karel is the same as Super Karel, except Ultra Karel has the ability to paint the grid world!
Indentation is the visual structure of how your code is laid out. It uses tabs to organize code into a hierarchy.
The information about a particular person that exists on the Internet as a result of their online activity
the use of electronic communication to bully a person
Legal document outlining how a company can collect and use your data
any data that can be used to identify an individual, such as their name, address, or social security number
Information literacy is having the ability to find information, evaluate information credibility, and use information effectively.
A computer system able to perform tasks that ordinarily require human intelligence
a video or image of a person in which their face or body has been digitally altered so that they appear to be someone else, typically used maliciously or to spread false information.
A law that grants the creator of an original work exclusive rights to its use, distribution, and sale
The moral principle that governs a person's behavior.
refers to an external mechanism of control
A specific group of hackers who are motivated by their ideological views.
Have political motivations with the intent to harm, typically resulting in violence.
Sponsored by and funded by a government with the goal of giving their country a competitive advantage on a global scale.
The process of identifying a user and granting them access. Authentication is proving that someone is who they say they are.
A type of authentication that is similar to a password but longer and is usually a sentence or a series of words
(2FA) A type of multifactor authentication that typically combines something the user knows (like a password) with something the user has (like a mobile phone)
(MFA) An extra layer of authentication that requires two or more factors for authentication. Typically, these factors fall into three categories: something you know (password), something you have (such as a phone), or something you are (such as your fingerprint).
A form of authentication that uses an individual’s physical or behavioral characteristics to verify their identity
Tools that store and manage passwords for various accounts, generating strong passwords and auto-filling login credentials.
Any type of software that is designed to intentionally harm or damage a computer or network.
A type of malware that attaches itself onto a host program, such as a document. It can cause serious damage to files or an entire device.
A software that prevents users from accessing their files or network until a ransom is paid.
Once downloaded onto a user’s computer, the software secretly gathers information about a person or organization and sends it to the attacker.
A cybercrime in which a person is contacted by email, telephone or text message by someone who is posing as a legitimate company.
A network security device that monitors and filters incoming and outgoing network traffic.
The practice of encrypting information so only authorized people can read it.
A process of converting information into an unreadable form to keep it secure from unauthorized access.
The process of breaking an encryption by trial and error.
When the same key is used to both encrypt and decrypt.
When one key encrypts and a different key decrypts.
A cipher that changes one character or symbol into another.
A cipher that groups bits into blocks of plaintext before applying the encryption.
A cipher that shifts the positions of plaintext character (or groups of characters) according to a regular system.
The primary software that runs applications and manages all the hardware, memory and other software on a computer.
A set of computer instructions that tells the computer how to work.
Most commonly used on a desktop or laptop computer and can perform many tasks without an internet connection.
An operating system used on mobile devices, such as a mobile phone or tablet.
Used on specialized computers that take in requests and send back a response (mail server, web server, etc).
Will only perform one type of task and are used in machines such as an ATM or a GPS system.
An operating system that is permanently etched into a hardware device such as a keyboard or a video card.
Operating systems that are most commonly used to run multiple operating systems on a computer system at the same time.
The suffix at the end of a filename that indicates what the type of file.
The electronic part of a computer that executes the instructions that are passed to it by the operating system. It’s also called a CPU, or central processing unit.
An operating system such as Windows, Mac OS, Android or iOS.
Software that only works on one platform, such as only on Android phones, or only on Mac computers.
Software that works on multiple platforms.
Legally binding guidelines for use and distribution of software.
Software that is available for anyone to access and modify.
Software that is owned by an individual or company.
Refers to the design of the essential parts of an application and how they are connected to each other.
Software installation that is performed on your local computer.
Software installation that is performed on a local area network (LAN).
Software that is installed, hosted and accessed entirely from a remote server or location.
Updates that address and fix security vulnerabilities within a program or product.
A type of computer program that can spread by modifying other computer programs and inserting its own code (rules).
A copy or snapshot of the state of your computer.
Backs up everything on your computer.
Backs up only what has changed since the last backup.
Used to navigate the world wide web and view HTML files.
A collection of data and files used to increase the speed of the browser.
Program code, usually written in JavaScript, that is executed on the client's browser.
An intermediary between the user and the Internet that takes requests from the user and returns a response.
Confirms the identity and authenticity of a website.
Processes commands to a computer program in the form of lines of text.
Bit means "binary digit". A bit is a single digit in a binary number. A bit can either be 0 or 1.
A byte is 8 bits.
Number system that has 2 digits, 0 and 1. This is how computers represent numbers at the base level.
A semiconductor device used to amplify or switch electronic signals and electrical power, functioning as an on/off switch in computing
The process of converting information or data into a specific format that can be understood or processed by a computer.
Stands for Uniform Resource Locator. You are locating a resource that exists somewhere on the internet.
A philosophy of making information and knowledge open and accessible to all people. A network of networks built on open, agreed upon protocols.
A network where devices are connected via physical cables.
A network where devices connect without physical cables, typically using radio waves.
The process of varying a signal to transmit data.
Undersea cables used for transmitting telecommunications signals across oceans.
A new 128 bit version of the Internet Protocol.
The protocol that defines the payout of an an Internet address.
An agreed upon set of rules that outlines how to communicate or send information.
The original 32 bit IP protocol that was created in the 1980s.
The process of sending data between two computers on the internet. The data is sent through routers that determine the route.
Allows for sending MULTIPLE packets between two computers. TCP checks that all packets arrived and can be put back in the proper order. The metadata must include a destination IP address, a from IP address, the message size and the packet order number.
An access point that allows for network management and security configuration.
a system that will operate with no interruption when one or more of its components fail
When data is passed from one network segment to another.
The number of hops it takes for data to get to its final destination.
Advanced Research Projects Agency Network, precursor to the modern internet
UDP is often used in real-time applications where timely delivery of data is more important than the accuracy of delivery. UDP does not number the packets and it does not retransmit packets that are lost.
Used to translate domain names into IP addresses.
Protocol that standardizes the language for talking to web servers to send and receive web resources. Defines how computers send and receive hypertext information. (HTTPS: The “S” denotes a secure connection using HTTP.)
The unique address that is assigned to each device connected to the internet. It is part of the Internet Protocol.
A computer that stores web pages and makes them available to users on the internet.
A circuit board with ports and sockets used to connect the main devices of a computer.
A special kind of firmware that runs programs strictly to start up your computer.
The core component of a device that accepts and executes instructions.
A fast type of computer memory which temporarily stores all the information your device needs right away.
A fast access storage device used in computers.
A component designed to speed up the creation of images and output them to a display device, like a monitor.
A component with a built in wired network port that allows the computer to connect to a network.
A device that will be recognized by your computer and install on its own.
A group of files that allows a device to communicate with the computer’s operating system.
A short-range wireless communication technology that uses radio waves to transmit information.
Enables short-range communication between compatible devices.
An electronic device which is required for communication between devices.
An internal component of a computer that is used for communicating over a network.
A network device that allows a device to connect to the Internet.
Enables wired connections between more than one computer or device.
A network device that allows other Wi-Fi devices to connect to a wired network.
Storage that is available only while the system is on and disappears when the system is turned off.
Storage that is saved and available even when the system is shut down.
Storage that contains one or more drives that can be accessed over a network.
Network attached storage that is equipped with powerful network adapters.
A wireless LAN that uses radio frequency technology to send and receive data.
A virtual LAN that allows for the setup of separate networks by configuring a network device.
A set of protocols that specify how your Wi-Fi network and other data transmissions work.
A systematic approach to solving a problem.