Computer Science: An OverviewGeneral literature -- Introductory and Survey. |
From inside the book
Results 1-3 of 83
Page 2
... application often far removed from the technicalities many associate with computing . In such cases , the person using the machine merely follows directions ( often supplied by the manufacturer ) expressed in terms of the application ...
... application often far removed from the technicalities many associate with computing . In such cases , the person using the machine merely follows directions ( often supplied by the manufacturer ) expressed in terms of the application ...
Page 341
... application programs while being hidden from others . We can see that the data organization presented to the application program by the database management system is not the actual organization but a modified , or conceptual , version ...
... application programs while being hidden from others . We can see that the data organization presented to the application program by the database management system is not the actual organization but a modified , or conceptual , version ...
Page 342
... Application software management User Database Database system In summary , a database system is constructed from layers in much the same manner as an operating system . In fact , the onion - skin diagram used to describe the ...
... Application software management User Database Database system In summary , a database system is constructed from layers in much the same manner as an operating system . In fact , the onion - skin diagram used to describe the ...
Contents
Contents | 1 |
PART ONE Machine Architecture | 19 |
Data Manipulation | 61 |
Copyright | |
10 other sections not shown
Other editions - View all
Common terms and phrases
abstract data type activities actually algorithm Alice application application software array ASCII assign binary bit patterns block bulk storage called Carol Chapter concept consider contains current entry Current Pointer data structures data types database declare search deleted devices diagram disk employee example execution Figure goal hash head pointer hexadecimal identified implemented input insertion sort instruction integer key field linked list loop machine language machine's memory main memory memory cells modified module move notation operating system parity bit password perform pivot entry position problem produce program counter programming languages pseudocode Questions/Exercises queue record represented request result retrieve routines search tree Section sequence sequential file solution solving sort algorithm stack statement step storage system stored string subprogram Tail pointer tape target value task technique terminal Turing machine two's complement