Computer Science: An OverviewGeneral literature -- Introductory and Survey. |
From inside the book
Results 1-3 of 58
Page 103
An Overview J. Glenn Brookshear. operating systems are given the responsibility of resource management so that such conflicts will not occur . Our discussion of operating system functions thus far has concentrated on a system's role in ...
An Overview J. Glenn Brookshear. operating systems are given the responsibility of resource management so that such conflicts will not occur . Our discussion of operating system functions thus far has concentrated on a system's role in ...
Page 109
... system . In a sense , the irony is twofold . As more and more users acquire their own machines there seems to be more and more desire to link the machines for the exchange of information . Thus , coupled computer ... OPERATING SYSTEMS 109.
... system . In a sense , the irony is twofold . As more and more users acquire their own machines there seems to be more and more desire to link the machines for the exchange of information . Thus , coupled computer ... OPERATING SYSTEMS 109.
Page 332
... statement for request- ing the construction of a data control block in addition to conveying the information that will not be supplied later in other statements and 332 PART THREE : DATA ORGANIZATION 8-4 The Role of the Operating System.
... statement for request- ing the construction of a data control block in addition to conveying the information that will not be supplied later in other statements and 332 PART THREE : DATA ORGANIZATION 8-4 The Role of the Operating System.
Contents
Contents | 1 |
PART ONE Machine Architecture | 19 |
Data Manipulation | 61 |
Copyright | |
10 other sections not shown
Other editions - View all
Common terms and phrases
abstract data type activities actually algorithm Alice application application software array ASCII assign binary bit patterns block bulk storage called Carol Chapter concept consider contains current entry Current Pointer data structures data types database declare search deleted devices diagram disk employee example execution Figure goal hash head pointer hexadecimal identified implemented input insertion sort instruction integer key field linked list loop machine language machine's memory main memory memory cells modified module move notation operating system parity bit password perform pivot entry position problem produce program counter programming languages pseudocode Questions/Exercises queue record represented request result retrieve routines search tree Section sequence sequential file solution solving sort algorithm stack statement step storage system stored string subprogram Tail pointer tape target value task technique terminal Turing machine two's complement