{"batchcomplete":"","continue":{"lecontinue":"20250414184515|3796","continue":"-||"},"query":{"logevents":[{"logid":3806,"ns":0,"title":"Functions","pageid":8394,"logpage":8394,"revid":13166,"params":{},"type":"create","action":"create","user":"Admin","timestamp":"2025-06-27T00:36:15Z","comment":"Created page with \"A function is a block of code that only runs when it is called.  You can pass data to a function.  A function can return data as a result.  You can create a function by defining it:  <code> def my_function():  print(\"Hello from a function\") </code>  ... and call it thusly:  <code> my_function() </code>\""},{"logid":3805,"ns":0,"title":"Print","pageid":8393,"logpage":8393,"revid":13158,"params":{},"type":"create","action":"create","user":"Admin","timestamp":"2025-06-27T00:13:27Z","comment":"Created page with \"Print prints stuff to the screen.  [code]print(\"Print this.\")[/code]  Will print:  Print this.\""},{"logid":3804,"ns":0,"title":"Basic Stuff","pageid":8392,"logpage":8392,"revid":13157,"params":{},"type":"create","action":"create","user":"Admin","timestamp":"2025-06-27T00:11:35Z","comment":"Created page with \"[[Print]]\""},{"logid":3803,"ns":6,"title":"File:Sec DAD.jpg","pageid":8391,"logpage":8391,"revid":13150,"params":{},"type":"create","action":"create","user":"Admin","timestamp":"2025-06-05T23:50:53Z","comment":""},{"logid":3802,"ns":6,"title":"File:Sec DAD.jpg","pageid":8391,"logpage":8391,"revid":13150,"params":{"img_sha1":"h9i4bm38nt7mvfhnn59cpjgsj4dumba","img_timestamp":"2025-06-05T23:50:53Z"},"type":"upload","action":"upload","user":"Admin","timestamp":"2025-06-05T23:50:53Z","comment":""},{"logid":3801,"ns":6,"title":"File:Sec objectives.jpg","pageid":8390,"logpage":8390,"revid":13147,"params":{},"type":"create","action":"create","user":"Admin","timestamp":"2025-06-05T23:36:29Z","comment":""},{"logid":3800,"ns":6,"title":"File:Sec objectives.jpg","pageid":8390,"logpage":8390,"revid":13147,"params":{"img_sha1":"juq07xzjs5qg4dtnv96biryarmadn77","img_timestamp":"2025-06-05T23:36:29Z"},"type":"upload","action":"upload","user":"Admin","timestamp":"2025-06-05T23:36:29Z","comment":""},{"logid":3799,"ns":0,"title":"Basic Concepts","pageid":8389,"logpage":8389,"revid":13146,"params":{},"type":"create","action":"create","user":"Admin","timestamp":"2025-06-05T23:35:37Z","comment":"Created page with \"  The three key objectives of cybersecurity programs are confidentiality, integrity, and availability.\""},{"logid":3798,"ns":0,"title":"Security","pageid":8388,"logpage":8388,"revid":13144,"params":{},"type":"create","action":"create","user":"Admin","timestamp":"2025-06-05T23:30:55Z","comment":"Created page with \"= Security  Information on general security, and stuff for Security+  Basic Concepts\""},{"logid":3797,"ns":0,"title":"Other Tools","pageid":8387,"logpage":8387,"revid":13127,"params":{},"type":"create","action":"create","user":"Admin","timestamp":"2025-04-15T18:13:34Z","comment":"Created other tools page"}]}}