Skip to main content

A C Roynon

  • Blog
  • About
  • Contact
  • Links

Tag: computer science

Dependency Inversion Principle

8th April 202025th January 2020 acroynon Leave a comment

The Dependency Inversion Principle is a component of The SOLID Principles. These principles set out simple rules to follow that allow us to create maintainable and easily extensible codebases. The dependency inversion principle states that any entity should depend … Click to read more

Interface Segregation Principle

6th April 202025th January 2020 acroynon Leave a comment

The Interface Segregation Principle is a component of The SOLID Principles. The SOLID principles are useful tips and rules to follow when writing software and code to create a maintainable and easily extensible codebase. The interface segregation principle states … Click to read more

Liskov Substitution Principle

3rd April 202025th January 2020 acroynon Leave a comment

The Liskov Substitution Principle is a component of The SOLID Principles which helps you create maintainable and extensible code. This principle states that any class should be able to be substituted for any of its subclasses without any issues. This … Click to read more

Open-Closed Principle

1st April 202025th January 2020 acroynon Leave a comment

The Open-Closed Principle is a component of The SOLID Principles. These principles can help you write software that is easy to extend and maintain whilst also avoiding code smells and bad design in your codebase. The open-closed principle states … Click to read more

Single Responsibility Principle (SRP)

30th March 202025th January 2020 acroynon Leave a comment

The Single Responsibility Principle (SRP) is one of the aspects of The SOLID Principles. It states that every class or object should have one purpose, one responsibility and effectively one reason for existence. This principle is concerned mainly with … Click to read more

The SOLID Principles

27th March 202026th January 2020 acroynon 4 Comments

The SOLID principles are a set of 5 rules to follow for Object-Orientated Programming (OOP). These rules or principles can be used to create software that is easy to extend and maintain while avoiding code smells and allowing simple refactoring. … Click to read more

What is Steganography?

23rd March 202025th January 2020 acroynon Leave a comment

Steganography is the process of hiding a message, file, video, or picture within another message, file, video or picture. The key of steganography is that the medium that is used to hide the secret message, such as the image you … Click to read more

What is Defensive Coding?

29th January 202017th November 2019 acroynon Leave a comment

Defensive coding is a way of ensuring your program or code continues to function under unforeseen or unintended circumstances. Imagine a hacker or malicious user is trying to find vulnerabilities in your program, such as seeing the contents of a … Click to read more

What is Code Obfuscation?

30th December 20195th November 2019 acroynon Leave a comment

Code obfuscation is a way to disguise what code is actually doing while still allowing the code to be compiled or interpreted. Obfuscating code can be used to make it harder for someone else to understand and read the code. … Click to read more

What is Hashing?

23rd December 20195th November 2019 acroynon Leave a comment

Hashing is a way to convert readable information into a more secure non-readable format. You can use hashing to secure passwords or any other information you don’t want hackers to be able to access. Hashing can also be used to … Click to read more

Posts navigation

1 2 … 4 Older posts
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Privacy Policy

Popular

  • Relational Databases Explained
  • How To Create A Simple To Do List App Using HTML, CSS, JS, and PHP
  • What is Encryption?
  • The TCP/IP Model
  • How To Create A Simple To Do List App Using HTML, CSS, JS, and PHP – Part 5
  • What is Programming Syntax?
  • How To Create A Simple To Do List App Using HTML, CSS, JS, and PHP – Part 8
  • How To Create A Simple To Do List App Using HTML, CSS, JS, and PHP – Part 3
  • Concurrency vs. Parallelism
  • JavaScript Spread Operator Explained
  • What is PHP?
  • Functions in JavaScript
  • What is a Database?
  • Open-Closed Principle
  • JavaScript Scope Explained

Recent

  • Dependency Inversion Principle
  • Interface Segregation Principle
  • Liskov Substitution Principle
  • Open-Closed Principle
  • Single Responsibility Principle (SRP)
  • The SOLID Principles
  • What is a Firewall?
  • What is Steganography?
  • The Difference Between a LAN and a WAN
  • JavaScript Destructuring Explained
  • How To Create A Simple To Do List App Using HTML, CSS, JS, and PHP
  • How To Create A Simple To Do List App Using HTML, CSS, JS, and PHP – Part 11
  • JavaScript Spread Operator Explained
  • JavaScript Arrow Functions Explained
  • How To Create A Simple To Do List App Using HTML, CSS, JS, and PHP – Part 10
© A C Roynon - Copyright 2021