Computer Science: An OverviewGeneral literature -- Introductory and Survey. |
From inside the book
Results 1-3 of 97
Page 72
... execution phase by activating the binary addition circuitry with the inputs R5 and R6 . During this execution phase , the arithmetic / logic unit performs the requested addition , leaves the result in RO ( as requested by the control ...
... execution phase by activating the binary addition circuitry with the inputs R5 and R6 . During this execution phase , the arithmetic / logic unit performs the requested addition , leaves the result in RO ( as requested by the control ...
Page 112
... execute the requested program , it reports to the scheduler , which in turn reports the problem back to the command processor instead of scheduling the program for execution . ( In this case the command processor would properly chastise ...
... execute the requested program , it reports to the scheduler , which in turn reports the problem back to the command processor instead of scheduling the program for execution . ( In this case the command processor would properly chastise ...
Page 442
... execution sequence would be altered so that the next instruction executed would be the one located at memory address 3C . Otherwise , program execution would continue in its normal sequence . HALT execution . Example : C000 would cause ...
... execution sequence would be altered so that the next instruction executed would be the one located at memory address 3C . Otherwise , program execution would continue in its normal sequence . HALT execution . Example : C000 would cause ...
Contents
Contents | 1 |
PART ONE Machine Architecture | 19 |
Data Manipulation | 61 |
Copyright | |
10 other sections not shown
Other editions - View all
Common terms and phrases
abstract data type activities actually algorithm Alice application application software array ASCII assign binary bit patterns block bulk storage called Carol Chapter concept consider contains current entry Current Pointer data structures data types database declare search deleted devices diagram disk employee example execution Figure goal hash head pointer hexadecimal identified implemented input insertion sort instruction integer key field linked list loop machine language machine's memory main memory memory cells modified module move notation operating system parity bit password perform pivot entry position problem produce program counter programming languages pseudocode Questions/Exercises queue record represented request result retrieve routines search tree Section sequence sequential file solution solving sort algorithm stack statement step storage system stored string subprogram Tail pointer tape target value task technique terminal Turing machine two's complement