Skip to main content

Home/ ACSE Discussion/ Group items tagged execution

Rss Feed Group items tagged

Peter Beens

Online Python Tutor - Learn programming by visualizing code execution - 0 views

  •  
    "Online Python Tutor is a free educational tool that helps students overcome a fundamental barrier to learning programming: understanding what happens as the computer executes each line of a program's source code. Using this tool, a teacher or student can write a Python program directly in the web browser and visualize what the computer is doing step-by-step as it executes the program."
  •  
    Online Python Tutor is a free educational tool that helps students overcome a fundamental barrier to learning programming: understanding what happens as the computer executes each line of a program's source code. Using this tool, a teacher or student can write a Python program directly in the web browser and visualize what the computer is doing step-by-step as it executes the program.
tech vedic

How to check USB drives from spreading viruses? - 0 views

  •  
    Sometimes being unaware of the USB virus-or malware-infection, you may put your computer security at stake. The AutoPlay feature of the Windows, executes the file or program stored on your device, without asking for permission, and that may bring havoc on the operating system as well as the confidential data stored on the machine. Thus, you need to disable the AutoPlay feature to deter such security breaching.
tech vedic

How to know that my computer is virus or malware infected? - 0 views

  •  
    Malware, as you know is a class of malicious software such as spyware, adware, or viruses that compromise with the system's performance and security. And in majority of cases they infiltrate through general Internet activities --- browsing, surfing, and downloading, or executing programs or files. Hence, most of the virus or malware defense methods are based on encouraging secure Internet access. Though, virus or malware authors are using astute development techniques, keeping a keen eye on the behavior of your machine, can be helpful in winning the battle of computer security. Following are a few notable symptoms, which can be perceived as an indication of virus or malware attack:
Peter McAsh

Java Basics: GUI: Lesson 1 - Introduction - 0 views

  • Giving up control - Event-driven programming. The GUI programming style is referred to as event-driven programming. In this style of programming you set up the graphical user interface and initialize things. It appears that the program just stops and sits there doing nothing! There is no input loop; your program isn't trying to read from the user. You, the programmer, have to learn to give up control in two ways. Your program gives control to the GUI system, and you only get control back to when your listeners are called. At an even higher level, your program has given control to the user. It's the user who selects which of your methods to call by their choice of buttons to click on, menu items to select, etc. Listeners. When the user clicks a button (or uses another GUI component), an event is sent to listener method. Your job as a programmer is to write a listener method for each component. It's the user, not the programmer, who has control, indirectly choosing methods in your program to execute by interacting with graphical user interface components.
1 - 5 of 5
Showing 20 items per page