Formal methods terminology | Conditional constructs

Guard (computer science)

In computer programming, a guard is a boolean expression that must evaluate to true if the program execution is to continue in the branch in question. Regardless of which programming language is used, a guard clause, guard code, or guard statement, is a check of integrity preconditions used to avoid errors during execution. (Wikipedia).

Video thumbnail

Certificate Overview: Advanced Cybersecurity

More information: https://online.stanford.edu/professional-education/cybersecurity?utm_source=youtube&utm_medium=social&utm_campaign=webinar Gain vital skills needed for today’s cyber workforce. From state-of-the-art software security design principles to concrete programming techniques,

From playlist Computer Science & Cybersecurity

Video thumbnail

Why Study Computer Science? | College Majors | College Degrees | Study Hall

What can you do with a Computer Science major? In Computer Science you can expect to study discrete mathematics, probability and statistics, linear algebra, physics and so much more. Basically, Computer Science is the study of computer systems and how they function. If you want to dig de

From playlist Fast Guides: To Electives and Majors

Video thumbnail

Staysafe.org: Protect your computer

The Internet is a global network that connects us to limitless information and opportunities. But there are risks involved with connecting to the Internet, such as downloading viruses and spyware onto computers and devices. Watch this video for four easy steps to help protect your computer

From playlist awareness

Video thumbnail

Certificate Overview: Advanced Cybersecurity

More information: online.stanford.edu/advanced-cybersecurity Gain vital skills needed for today’s cyber workforce. From state-of-the-art software security design principles to concrete programming techniques, this online computer science program exposes you to expert instruction and rese

From playlist Computer Science & Cybersecurity

Video thumbnail

Computer Basics: Protecting Your Computer

There are many different online threats that you need to be aware of. In this video, we're going to show you some of these threats and talk about how to protect the files and personal data that you have stored on your computer. We hope you enjoy! For more info, check out our written less

From playlist Starting out with Technology

Video thumbnail

Intrusion Detection: Part 1

Fundamental concepts of intrusion detection are discussed. Various types of intrusion are analyzed. Password management is explained.

From playlist Network Security

Video thumbnail

What is Computer Engineering?

STEMerch Store: https://stemerch.com/Support the Channel: https://www.patreon.com/zachstar PayPal(one time donation): https://www.paypal.me/ZachStarYT Computer engineering is the combination of electrical engineering and computer science. Computer engineering majors will take basic circu

From playlist Computer Science/Computer Engineering

Video thumbnail

The Search for Jim Gray

May 28, 2008 lecture for the Stanford University Computer Systems Colloquium (EE380). When Jim Gray, a noted computer scientist and Turing award winner, disappeared at sea, a massive effort was mounted to find him. A panel of speakers touches on both the technical approaches employed in

From playlist Lecture Collection | Computer Systems Laboratory Colloquium (2007-2008)

Video thumbnail

Zimbardo prison study The Stanford prison experiment | Behavior | MCAT | Khan Academy

Visit us (http://www.khanacademy.org/science/healthcare-and-medicine) for health and medicine content or (http://www.khanacademy.org/test-prep/mcat) for MCAT related content. These videos do not provide medical advice and are for informational purposes only. The videos are not intended to

From playlist Behavior | MCAT | Khan Academy

Video thumbnail

How U.S. Airports Might Revamp Security... Using Game Theory

For the past few years, airports have been working with game theorists to step up their security game. Hosted by: Olivia Gordon Head to https://scishowfinds.com/ for hand selected artifacts of the universe! ---------- Support SciShow by becoming a patron on Patreon: https://www.patreon.

From playlist Uploads

Video thumbnail

Intrusion Detection: Part 2

Fundamental concepts of intrusion detection are discussed. Various types of intrusion are analyzed. Password management is explained.

From playlist Network Security

Video thumbnail

A closer look at the Stanford prison experiment | Behavior | MCAT | Khan Academy

Visit us (http://www.khanacademy.org/science/healthcare-and-medicine) for health and medicine content or (http://www.khanacademy.org/test-prep/mcat) for MCAT related content. These videos do not provide medical advice and are for informational purposes only. The videos are not intended to

From playlist Behavior | MCAT | Khan Academy

Video thumbnail

Teleportation: Tearing the Fabric of Spacetime

Teleportation: Tearing the Fabric of Spacetime Take back your internet privacy today with 3 free months https://www.expressvpn.com/aperture Follow me on Instagram!: https://www.instagram.com/mcewen/ Teleportation is one of the most sought after ideas in science fiction. Is this doomed to

From playlist Science & Technology 🚀

Video thumbnail

Episode 5: Vectors - The Mechanical Universe

Episode 5. Vectors: Physics must explain not only why and how much, but also where and which way. “The Mechanical Universe,” is a critically-acclaimed series of 52 thirty-minute videos covering the basic topics of an introductory university physics course. Each program in the series open

From playlist The Mechanical Universe

Video thumbnail

COMPUTER SCIENCE TERMINOLOGY

Welcome to part one of computer science terminology, where we take a dive into understanding some of the terms used in computer science and software development. We've started with the basics and will continue to get more complex as this series progresses. --------------------------------

From playlist Computer Science

Video thumbnail

How Lever Action Rifles Are Made! | How It’s Made | Science Channel

An inside look at how lever action rifles are made. #howitsmade #sciencechannel Stream How It's Made: https://www.discoveryplus.com/show/how-its-made About How It's Made: Explore the fascinating world of how everyday items are manufactured and produced. From aluminum foil to contact

From playlist Recent Uploads

Video thumbnail

We've Been Ignoring Female Birdsong for Centuries

Birdsong has historically been described as a male trait to compete for female mates, but there's a good chance that you've never learned about female birdsong, and they do indeed sing! Go to http://Brilliant.org/SciShow to try their Math History course. The first 200 subscribers get 20%

From playlist Biology

Video thumbnail

Social influences | Individuals and Society | MCAT | Khan Academy

Created by Shreena Desai. Watch the next lesson: https://www.khanacademy.org/test-prep/mcat/individuals-and-society/self-identity/v/george-herbert-mead-the-i-and-the-me?utm_source=YT&utm_medium=Desc&utm_campaign=mcat Missed the previous lesson? https://www.khanacademy.org/test-prep/mcat/

From playlist Individuals and society | MCAT | Khan Academy

Video thumbnail

Unix for Programmers - My Computer Science Degree in the Real World

I took a unix for programmers in college while pursuing my computer science degree. Today as a software engineer, I want to see what was carried over from that classroom to the real world of software development. ---------------------------------------------------------- I share and docu

From playlist Computer Science

Video thumbnail

How to biohack your cells to fight cancer - Greg Foot

Check out the science of biohacking, where biologists go into a patient’s genetic code and reprogram their immune system to recognize and fight cancer cells. -- The human body is made up of about 30 trillion cells that carry a code which has been duplicated over and over for billions of

From playlist New TED-Ed Originals

Related pages

Guarded Command Language | Idempotence | Formal methods | Switch statement | Scala (programming language) | Promela | Logical conjunction | Pattern matching | Precondition | Iverson bracket