A. PYTHON BASICS



1.1 THONNY PYTHON SETUP

CERT CODE *** KAS COMPUTING 1.1 : SCREEN SHOT THE THONNY EDITOR

1.2 ITERATION-WHILE

CERT CODE *** KAS COMPUTING 1.2 : RUN A PROGRAM WITH WHILE, SCREEN SHOT IT

1.3 ITERATION-FOR

CERT CODE *** KAS COMPUTING 1.3 : RUN A PROGRAM WITH FOR, SCREEN SHOT IT

1.4 IF ELSE

CERT CODE *** KAS COMPUTING 1.4 : RUN A PROGRAM WITH IFELSE, SCREEN SHOT IT

1.5 FUNCTION

CERT CODE *** KAS COMPUTING 1.5 : RUN A PROGRAM WITH FUNCTION, SCREEN SHOT IT

1.6 CLASSES AND OBJECTS

CERT CODE *** KAS COMPUTING 1.6 : RUN A PROGRAM WITH CLASS AND OBJECT, SCREEN SHOT IT

1.7. VALIDATION - TRY/EXCEPT

CERT CODE *** KAS COMPUTING 1.7 : RUN A PROGRAM WITH TRYEXCEPT, SCREEN SHOT IT

1.8 FILES (OPTIONAL)


CERT CODE *** KAS COMPUTING 1.8 : RUN A PROGRAM WITH FOR, SCREEN SHOT IT

B

1.1 Data Management

1.1.1 Finding minmax

CERT CODE *** KAS COMPUTING 1.1 .1 :

RUN A PROGRAM WITH MINMAX, SCREEN SHOT IT

1.1.2 Conditional Statements (Python)

CERT CODE *** KAS COMPUTING 1.1.2 : RUN A PROGRAM WITH IFELSE, SCREEN SHOT IT

1.1.3 Functions (Python)

CERT CODE *** KAS COMPUTING 1.1.3 :

RUN A PROGRAM WITH FUNCTION, SCREEN SHOT IT

OLC CB1.1.4 RUN A PROGRAM WITH LIST, SCREEN SHOT IT

1.2 Data Representation

1.2.1 Numbers in Binary

1.2.2 Conversion of Number systems

CERT CODE *** KAS COMPUTING 1.2.2 : Provide the answer below.

1.2.3 Application of Number systems

(ASCII Codes, Internet Protocol and Media Access Control addresses and Red Green Blue codes)

CERT CODE *** KAS COMPUTING 1.2.3 : Provide the answer below.

1.3 Ethics, Social and Economic Issues

1.3.1 Keeping Data Safe (Data corruption, human errors, malicious actions)

1.3.2 Effects of cyber-attacks and use of safety measures