November 5, 2024

Nested function calls | Intro to CS – Python | Khan Academy

Author: Khan Academy via YouTube
Go to Source

What happens when a function calls another function? Trace how the computer uses stack frames to keep track of each function call’s state. Explore how breaking down a big function into several smaller functions can improve readability and reusability. View the program used in this video at: https://www.khanacademy.org/python-program/intruder-detection/6531095526293504

Courses on Khan Academy are always 100% free. Start practicing—and saving your progress—now with our Intro to Computer Science – Python course!

Course link: https://www.khanacademy.org/computing/intro-to-python-fundamentals/x5279a44ae0ab15d6:playing-games-with-functions
Course playlist: https://www.youtube.com/playlist?list=PLSQl0a2vh4HDkbhG0sDW0b-VZXykEIAe5

Khan Academy is a nonprofit organization with the mission of providing a free, world-class education for anyone, anywhere. We offer quizzes, questions, instructional videos, and articles on a range of academic subjects, including math, biology, chemistry, physics, history, economics, finance, grammar, preschool learning, and more. We provide teachers with tools and data so they can help their students develop the skills, habits, and mindsets for success in school and beyond. Khan Academy has been translated into dozens of languages, and 15 million people around the globe learn on Khan Academy every month. As a 501(c)(3) nonprofit organization, we would love your help!

Donate or volunteer today! Donate here: https://www.khanacademy.org/donate?utm_source=youtube&utm_medium=desc

Volunteer here: https://www.khanacademy.org/contribute?utm_source=youtube&utm_medium=desc

TIMESTAMPS:
00:00 – 00:21 : function execution review
00:22 – 01:21 : tracing a nested function call
01:22 – 01:55 : managing multiple stack frames
01:56 – 02:34 : game setup – intruder detection!
02:35 – 03:42 : why not use one big function?
03:43 – 04:51 : breaking down into smaller functions
04:52 – 05:25 : decoupling the detection check
05:26 – 06:23 : reusing function building blocks

Go to Source