Computer Science: An OverviewGeneral literature -- Introductory and Survey. |
From inside the book
Results 1-3 of 88
Page 96
... machine interface . In Chapter 3 we begin our study of software and the role the software plays in human / machine communication by investigating the activities of a machine's oper- ating system , which is the program that begins ...
... machine interface . In Chapter 3 we begin our study of software and the role the software plays in human / machine communication by investigating the activities of a machine's oper- ating system , which is the program that begins ...
Page 188
... Machine Independence and Beyond With the development of third - generation languages , the goal of machine independence was largely achieved . Since the statements in a third - generation language did not refer to the attributes of any ...
... Machine Independence and Beyond With the development of third - generation languages , the goal of machine independence was largely achieved . Since the statements in a third - generation language did not refer to the attributes of any ...
Page 414
... machine Memory Actual machine Abstract Turing machine A finite number of cells organized in a . An infinite number of cells organized row with ... machine for incrementing a value Current 414 PART FOUR THE POTENTIAL OF ALGORITHMIC MACHINES.
... machine Memory Actual machine Abstract Turing machine A finite number of cells organized in a . An infinite number of cells organized row with ... machine for incrementing a value Current 414 PART FOUR THE POTENTIAL OF ALGORITHMIC MACHINES.
Contents
Contents | 1 |
PART ONE Machine Architecture | 19 |
Data Manipulation | 61 |
Copyright | |
10 other sections not shown
Other editions - View all
Common terms and phrases
abstract data type activities actually algorithm Alice application application software array ASCII assign binary bit patterns block bulk storage called Carol Chapter concept consider contains current entry Current Pointer data structures data types database declare search deleted devices diagram disk employee example execution Figure goal hash head pointer hexadecimal identified implemented input insertion sort instruction integer key field linked list loop machine language machine's memory main memory memory cells modified module move notation operating system parity bit password perform pivot entry position problem produce program counter programming languages pseudocode Questions/Exercises queue record represented request result retrieve routines search tree Section sequence sequential file solution solving sort algorithm stack statement step storage system stored string subprogram Tail pointer tape target value task technique terminal Turing machine two's complement