Computer Science: An OverviewGeneral literature -- Introductory and Survey. |
From inside the book
Results 1-3 of 43
Page 30
... Bulk Storage Regardless of the size of a machine's main memory , it seems that applications always require still more data storage area . Thus , most machines are provided with a bulk storage system ( also called secondary memory ) in ...
... Bulk Storage Regardless of the size of a machine's main memory , it seems that applications always require still more data storage area . Thus , most machines are provided with a bulk storage system ( also called secondary memory ) in ...
Page 34
... bulk storage devices often proves to be the bottleneck in computer systems . It is not surprising that an attempt is made to minimize the number of times such a device is accessed . One technique for this is to transfer large ...
... bulk storage devices often proves to be the bottleneck in computer systems . It is not surprising that an attempt is made to minimize the number of times such a device is accessed . One technique for this is to transfer large ...
Page 323
... bulk storage along with the file . To access a record , we first retrieve the index into main memory where we search through it for the desired entry before returning to bulk storage for the record in question . Because the index must ...
... bulk storage along with the file . To access a record , we first retrieve the index into main memory where we search through it for the desired entry before returning to bulk storage for the record in question . Because the index must ...
Contents
Contents | 1 |
PART ONE Machine Architecture | 19 |
Data Manipulation | 61 |
Copyright | |
10 other sections not shown
Other editions - View all
Common terms and phrases
abstract data type activities actually algorithm Alice application application software array ASCII assign binary bit patterns block bulk storage called Carol Chapter concept consider contains current entry Current Pointer data structures data types database declare search deleted devices diagram disk employee example execution Figure goal hash head pointer hexadecimal identified implemented input insertion sort instruction integer key field linked list loop machine language machine's memory main memory memory cells modified module move notation operating system parity bit password perform pivot entry position problem produce program counter programming languages pseudocode Questions/Exercises queue record represented request result retrieve routines search tree Section sequence sequential file solution solving sort algorithm stack statement step storage system stored string subprogram Tail pointer tape target value task technique terminal Turing machine two's complement