Computing in Python II: Control Structures
About this Course
Building on your prior knowledge of variables and operators, this course gets into the meat of programming. Organized into five chapters, this course starts by covering the fundamentals of what control structures are and what they do, then moves on to four common control structures in Python. Conditionals let you modify what your program does based on the values of incoming variables. Loops let you repeat tasks for multiple values or while certain conditions hold true. Functions let you encapsulate complex reasoning into reusable chunks of code. Error handling lets you intelligently recover from anticipated and unanticipated glitches. By the end of this course, you'll be able to write complex programs in Python that perform useful reasoning. For example, you could write a program that calculates your weight on other planets, calculates the standard deviation of a series of numbers, or checks for the validity of an incoming password. Structurally, the course is comprised of several parts. Instruction is delivered via a series of short (2-3 minute) videos. In between those videos, you'll complete both multiple choice questions and coding problems to demonstrate your knowledge of the material that was just covered.Created by: The Georgia Institute of Technology
Level: Introductory

Related Online Courses
The course introduces the basic elements and trends for performing a through built environment assessment and develops the tools for urban sustainability policy impact analysis. During the first... more
This course is designed to show you how to teach computational thinking to children aged 7-12+. The course will be valuable to you, whether you are new to this approach or an enthusiastic... more
El mayor activo de las empresas actuales son sus datos, datos que, mayoritariamente se alojan en bases de datos relacionales en línea. Prácticamente todos los sistemas de gestión de bases de da... more
Malicious software, or malware, is typically delivered over a network and is designed to cause disruption to a computer, client, server, or network. Disruptions can include leaked private... more
How do you protect the critical data that is increasingly being stored in the cloud? Learn how to build a security strategy that keeps data safe and mitigates risk. In this course, part of the... more