Activity: Computer Game: Shuffled Words +===========+ Language: Any Time: 30 minutes Difficulty: easy Feel free to discuss step 1) in the chat, we'll have a fun time :) +========+
0) Make a list of words 1) Write a function that picks a word and garbles up the letters up
The function should never pick the same word twice in a row.
2) Make the user input his guess for the full word and tell him if he found the right word
+=============+ Thank you to Prajwal for suggesting this challenge 💚. He implemented a solution here. If you have more ideas for challenges, please send it to @BinaryByter for a chance to be featured on this channel
Activity: Computer Game: Shuffled Words +===========+ Language: Any Time: 30 minutes Difficulty: easy Feel free to discuss step 1) in the chat, we'll have a fun time :) +========+
0) Make a list of words 1) Write a function that picks a word and garbles up the letters up
The function should never pick the same word twice in a row.
2) Make the user input his guess for the full word and tell him if he found the right word
+=============+ Thank you to Prajwal for suggesting this challenge 💚. He implemented a solution here. If you have more ideas for challenges, please send it to @BinaryByter for a chance to be featured on this channel
BY Programming Challenges
Warning: Undefined variable $i in /var/www/tg-me/post.php on line 283
The cloud-based messaging platform is also adding Anonymous Group Admins feature. As per Telegram, this feature is being introduced for safer protests. As per the Telegram blog post, users can “Toggle Remain Anonymous in Admin rights to enable Batman mode. The anonymized admin will be hidden in the list of group members, and their messages in the chat will be signed with the group name, similar to channel posts.”
Newly uncovered hack campaign in Telegram
The campaign, which security firm Check Point has named Rampant Kitten, comprises two main components, one for Windows and the other for Android. Rampant Kitten’s objective is to steal Telegram messages, passwords, and two-factor authentication codes sent by SMS and then also take screenshots and record sounds within earshot of an infected phone, the researchers said in a post published on Friday.
Programming Challenges How to be a breathtaking Programmer from tw