20191304 quotient Sohrab "Introduction to Information Security" the third week of learning summary

"Introduction to Information Security" Chapter II, Chapter III

Chapter two

There are other learning convert hex binary and decimal conversion, because the computer has only two low voltage, so take the information into binary.

third chapter

Learning data. Digital data to achieve a negative representation, as well as complement and the like. Text data compression. Audio data, the voltage signal varies in direct proportion to the acoustic wave. The image data of the bitmap, and vector graphics.

"Self-study is a craft" Chapter V

Section

Basic understanding of programming, input, output, process control functions, the compiler.

Section II

Type and value operator. The most basic operations plus a computer program that flow control.

Section III

Learning process control, if the language, for loops, while loops, and will not be used.

Section IV

Learning function print () function, but not really understand the optional parameter position as well as print () function usage.

Guess you like

Origin www.cnblogs.com/shoudeyunkaijianyueming/p/11711026.html