Computer Science: An OverviewGeneral literature -- Introductory and Survey. |
From inside the book
Results 1-3 of 64
Page 249
... ACTIVITIES and CONTROL MODIFICATION ACTIVITIES . The former module provides com- munication dialogue with the user in relation to the display of schedules only and is executed when a password is valid for access - only privileges . A ...
... ACTIVITIES and CONTROL MODIFICATION ACTIVITIES . The former module provides com- munication dialogue with the user in relation to the display of schedules only and is executed when a password is valid for access - only privileges . A ...
Page 250
... ACTIVITIES and CON- TROL DISPLAY ACTIVITIES can use the same DISPLAY submodule without complications . Advantages of Modular Design In conclusion , we should point out the benefits provided by a modular design during the implementation ...
... ACTIVITIES and CON- TROL DISPLAY ACTIVITIES can use the same DISPLAY submodule without complications . Advantages of Modular Design In conclusion , we should point out the benefits provided by a modular design during the implementation ...
Page 257
... activities taking place deal with communication with the user . Note that although these activities are logically similar , their actual functions vary greatly . Some of the dialogue centers around obtaining the user's password , while ...
... activities taking place deal with communication with the user . Note that although these activities are logically similar , their actual functions vary greatly . Some of the dialogue centers around obtaining the user's password , while ...
Contents
Contents | 1 |
PART ONE Machine Architecture | 19 |
Data Manipulation | 61 |
Copyright | |
10 other sections not shown
Other editions - View all
Common terms and phrases
abstract data type activities actually algorithm Alice application application software array ASCII assign binary bit patterns block bulk storage called Carol Chapter concept consider contains current entry Current Pointer data structures data types database declare search deleted devices diagram disk employee example execution Figure goal hash head pointer hexadecimal identified implemented input insertion sort instruction integer key field linked list loop machine language machine's memory main memory memory cells modified module move notation operating system parity bit password perform pivot entry position problem produce program counter programming languages pseudocode Questions/Exercises queue record represented request result retrieve routines search tree Section sequence sequential file solution solving sort algorithm stack statement step storage system stored string subprogram Tail pointer tape target value task technique terminal Turing machine two's complement