All articles (204)
A
- A state machine for a non-regular language
- AND gates
- ASCII
- ASCII85 encoding
- About TenMinuteTutor
- Abstract data types
- Abstraction
- Adding binary numbers
- Algorithms
- Amount of RAM
- Analogue electronics
- Analogue integrated circuits
- Applications of hashes
- Applications of symmetric encryption
- Array lists
- Arrays
- Assembly language
- Attacks on hash algorithms
- Attacks on symmetric ciphers
B
- Base32 encoding
- Base64 encoding
- Basic drawing
- Basic rules
- Binary
- Binary numbers
- Binary search
- Binary shift
- Bitmap images
- Bits and bytes
- Bitwise logical operations
- Block padding methods
- Bubble sort algorithm
C
- Cache memory
- Change control
- Character representation
- Chronometers
- Circular queues
- Clock speed
- Cloud storage
- Colour depth
- Colours
- Combining gates
- Comments and layout
- Common MAC algorithms
- Common hash algorithms
- Comparison of encoding schemes
- Compilers
- Computational logic
- Computational thinking
- Computer Music with Supercollider
- Computer architecture
- Computer colour
- Computer music
- Computer science
- Computer sound
- Computer sound
- Conditions and programming logic
- Converting hexadecimal
- Coordinate system
- Creating robust programs
- Cryptographic hashes
- Cryptographic modes
- Cryptography
D
- Data formats
- Data representation
- Data structures
- Decomposition
- Dictionary attacks on keys
- Difference engine
- Digital images
- Digital sound
- Diodes
- Discrete semiconductors
E
- Electrical power
- Electricity
- Error page not found
- Ethernet
- Example - SQL injection
- Exploits and defences
- Extended ASCII
- External storage
F
- File servers
- Fill and stroke
- Finite state machines
- Flash memory
- Functional programming
- Functional programming - what are functions?
G
H
- HMAC algorithm
- HTML canvas
- Hard disk drives (HDD)
- Hardware platforms
- Hex (base 16) encoding
- Hexadecimal numbers
- Hub
I
- IP address and MAC address compared
- IP addresses
- If and while statements
- Image file formats
- In-place algorithms
- Insertion sort algorithm
- Inverting gates
- Iterative hashes
K
- Key derivation
- Key derivation standards
- Key derivation using hash functions
- Key derivation using random number generators
- Kirchoffs's laws
L
- LEDs
- Linear search
- Linked lists
- List based queues
- Lists
- Local Area Networks (LANs)
- Logic gates
- Logic gates resources
M
- MAC addresses
- Machine code
- Maintainable code
- Major scales
- Malicious attacks
- Memory and storage
- Mesh network topology
- Message authentication codes
- Modem
- Motives
- Music basics
- Music theory
N
- NOT gates
- Naming items
- Negative binary numbers
- Network attached storage
- Network hardware
- Network interface card
- Network topologies
- Networks
- Notes and octaves
- Number of cores
O
P
- Packet switching
- Passive components
- Paths and lines
- Performance
- Playing sound
- Powers of two
- Primary storage
- Processor type
- Programming languages
- Programming logic
- Programming paradigms
Q
R
- Random access memory
- Read-only memory
- Recognising patterns
- Recording sound
- Regular languages
- Representing numbers
- Router
S
- Salting
- Search algorithms
- Search algorithms - resources
- Secondary storage
- Security concepts
- Simple sound waves in Supercollider
- Solid state drives (SSD)
- Sort algorithms
- Sorting algorithms - resources
- Sound
- Sound file formats
- Sound volume and decibels
- Star networks
- Star vs mesh network comparison
- Static vs dynamic data structures
- Strong hashing functions
- Switch
- Symmetric block ciphers
- Symmetric encryption
- Symmetric encryption algorithms
- Systems architecture
T
U
V
W
X
Y
Other
Sign up to the Creative Coding Newletter
Join my newsletter to receive occasional emails when new content is added, using the form below:
Popular tags
555 timer abstract data type abstraction addition algorithm and gate array ascii ascii85 base32 base64 battery binary binary encoding binary search bit block cipher block padding byte canvas colour coming soon computer music condition cryptographic attacks cryptography decomposition decryption deduplication dictionary attack encryption file server flash memory hard drive hashing hexadecimal hmac html image insertion sort ip address key derivation lamp linear search list mac mac address mesh network message authentication code music nand gate network storage none nor gate not gate op-amp or gate pixel private key python quantisation queue raid ram relational operator resources rgb rom search sort sound synthesis ssd star network supercollider svg switch symmetric encryption truth table turtle graphics yenc