Discover 160 Programming and learn computer coding ideas | computer coding, learn computer science, computer programming and more
Skip to content
When autocomplete results are available use up and down arrows to review and enter to select. Touch device users, explore by touch or with swipe gestures.

Programming

166 Pins
·
4mo
Niko Murusidze
By
Niko Murusidze
Related searches
We think you’ll love these

Related Interests

Learn Computer Coding
Computer Coding
Learn Computer Science
Computer Programming
Computer Science
Computer Basics
the data engineer roadmap is shown in this screenshote image, with several icons

More about this Pin

Related interests

Data Science Career Roadmap
Software Engineer Roadmap
Data Science Roadmap 2024
Data Analyst Roadmap
Data Science Roadmap For Industry
Data Engineer Roadmap
Data Analytics Roadmap
Software Engineering Career Path Diagram
Data Scientist Roadmap
Python Programming For Cybersecurity, Python Programming Educational Poster, Python Programming Coding, Python Programming Advantages, Python Programming Variables Tutorial, Python Code For Html Generation, Python Coding Language, Instant Download Python Cheat Sheet, Python Code Programming

More about this Pin

Related interests

Python Programming For Cybersecurity
Python Programming Educational Poster
Python Programming Coding
Python Programming Advantages
Python Programming Variables Tutorial
Python Code For Html Generation
Python Coding Language
Instant Download Python Cheat Sheet
Python Code Programming
an info poster with the words getting started with kubernets kls on it

More about this Pin

Related interests

Cloud Architect Roadmap
Kubernetes Service Mesh Guide
Cloud Architecture Planning Guide
Cloud Application Architecture Diagram
Cloud Computing Architecture
Kubernetes Architecture
Linkedin User Types Guide
Linkedin Algorithm
New Linkedin Features Guide
#securityengineering #kubernetes #tech | saed ‎
the top 10 free apps for web designers

More about this Pin

Related interests

Tips For Software Developers
Best Ide For Developers
Coding Sites
Coding Website Development
Best Skills For Software Developers
Vscode Themes For Programmers
Software Development Infographic
Web Dev
Guide For Software Developers
the differences between data engineer and data scientist

More about this Pin

Related interests

Data Science Software Resources
Data Scientist Sql Skills Improvement
Data Engineering Aesthetic
Guide For Data Scientists
Data Engineering
Data Analysis Tools For Scientists
Understanding Linked Data Systems
Data Engineer
Data Scientist Skills
the big o notation 101 poster is shown in different colors and sizes, including numbers

More about this Pin

Related interests

Big O Notation
Computer Science Programming
Basic Computer Programming
Data Science Learning
Learn Computer Coding
Computer Basic
Cloud Computing Services
Computer Coding
Computer Basics
𝗕𝗶𝗴 𝗢 𝗡𝗼𝘁𝗮𝘁𝗶𝗼𝗻 𝟭𝟬𝟭 𝗘𝘅𝗽𝗹𝗮𝗶𝗻𝗲𝗱 𝗙𝗼𝗿 𝗘𝘃𝗲𝗿𝘆𝗼𝗻𝗲: Big O Notation is a mathematical concept used to describe the performance or complexity of an algorithm. It helps in understanding how the time or space needed for an algorithm scales with the size of the input. 𝗕𝗶𝗴 𝗢 𝗡𝗼𝘁𝗮𝘁𝗶𝗼𝗻 𝗧𝘆𝗽𝗲𝘀: 1. 𝗢(𝟭) - Constant Time Complexity: ↳ The algorithm takes the same amount of time to execute, regardless of the input size. Example: Accessing an element from an array. 2. 𝗢(𝗹𝗼𝗴 𝗡) - Logarithmic Time Complexity: ↳ The...
the roadmap for etheric hacking

More about this Pin

Related interests

Hacker Project
Ethical Hacker Aesthetic
Ethical Hacking Aesthetic
Hacking Roadmap
Zero To One
Hacking Aesthetic
Ethical Hacking
How To Learn Ethical Hacking
Ethical Hacking Course
Want to Become an Ethical Hacker in 2025? Go through this step-by-step blueprint to go from zero to cyber hero in 29 steps— even if you’re starting with ZERO experience. 🔐 👇 Save this post if you want to: ✅ Master hacking skills ethically ✅ Build a 6-figure cybersecurity career ✅ Crack CTFs, Bug Bounties & land top certs 💥Each step is a LEVEL-UP. Miss one, and you could get stuck. Revisit this roadmap every time you feel lost. ⚠️ Don't just scroll. SAVE this post now and share it with...
a poster with different types of items in the form of letters and numbers on it

More about this Pin

Related interests

Factorial Design In Python
Ladder Logic Design Tool
Design Pattern Cheat Sheet
Design Patterns Programming
Javascript String Functions Infographic
Python Code For Factorial Design
Understanding Software Design Patterns
Python Language Popularity Infographic
Design System Development Matrix
If you write code, you should read this. 𝐖𝐡𝐲 𝐃𝐞𝐬𝐢𝐠𝐧… | Mayank Ahuja | 29 comments
👆 Fastest Way To Learn Cybersecurity 2025 Cybersecurity Best Practices, Cybersecurity Projects, Cybersecurity Guide 2020, How To Learn Cybersecurity Basics, Cybersecurity For Beginners, How To Learn Cybersecurity Skills, Cybersecurity Study Resources, Cybersecurity Study Tips, Fundamental Cybersecurity Training

More about this Pin

Related interests

Cybersecurity Best Practices
Cybersecurity Projects
Cybersecurity Guide 2020
How To Learn Cybersecurity Basics
Cybersecurity For Beginners
How To Learn Cybersecurity Skills
Cybersecurity Study Resources
Cybersecurity Study Tips
Fundamental Cybersecurity Training
👆 Fastest Way To Learn Cybersecurity 2025
the api master's guide is shown in this graphic, which shows how to use api

More about this Pin

Related interests

Guide For Software Engineers
Engineering Software Applications Guide
Software Testing And Programming Guide
Understanding Software Engineering Phases
Beginner's Guide To Software Engineering
Engineering Software Tools Comparison
Api Testing
Api Development Tips
Software Engineering Requirements Process
Understanding APIs is non-negotiable. No matter your role—developer… | Ashish Sahu
an image of a diagram with the words apache kafka architecture in red and green

More about this Pin

Related interests

Kafka Vs Flume Comparison
Kafka Data Processing Flow
Kafka Architecture Diagram
Kafka Connect Best Practices Slideshare
Software Architecture
Kafka Components Explained
Kafka Serialization Options
Feed | LinkedIn
the rest api best tips list is shown in blue, yellow and green text on a white

More about this Pin

Related interests

Html Coding Essentials Chart
Programming Algorithm Analysis Guide
As Computing Cheat Sheet
Developer Git Cheat Sheet
Rest Api Cheat Sheet
Basic Computing Guide Pdf
Api Development Resources
Sql Server Integration Api
Nina Fernanda Durán on LinkedIn: REST API Best Practices 🔥 Building and consuming APIs is a core skill… | 109 comments
API Architectures

More about this Pin

Related interests

Types Of Programming Diagram
Programming Language Types Diagram
Programming Types Infographic
Networking Api Diagram
Application Architecture Diagram
Extreme Programming Process Diagram
Code Refactoring Process Diagram
API Architectures You Should Know! 🚀 APIs are the backbone of modern applications, enabling seamless communication between systems. Here are six essential API architectures and their functions: 📝 1. REST (Representational State Transfer) A widely used web API style that relies on HTTP methods like GET, POST, PUT, and DELETE. RESTful APIs are stateless, scalable, and easy to implement, making them ideal for web services and mobile applications. 🔍 2. GraphQL (Graph Query Language) Unlike REST...
what is networked and what does it mean to be? infographical poster

More about this Pin

Related interests

Computer Networking Basics
Networking Basics
Computer Lessons
Computer Maintenance
Computer Learning
a red and black info sheet with the words nmap vs netcat on it

More about this Pin

Related interests

Understanding Network Interface Types
Nmap Commands Cheat Sheet
Network Security Standards Guide
Nmap Cheat Sheet
Understanding Network Security Systems
Networking Site Security Guide
Network Security Training Infographic
Mpls Networking Guide
Network Protocols Comparison
Explore the differences and capabilities of Nmap and NetCat, two essential tools for cybersecurity professionals. From network discovery and vulnerability scanning to troubleshooting and data transfer, this infographic breaks down their unique features, use cases, and advantages. Whether you’re scanning networks or establishing connections, understand how these tools empower your security strategy. Perfect for IT pros, SOC analysts, and ethical hackers.