Results 1-3 of 19
We begin with a module called CONTROL ACCESS that controls the user's
access to the schedules depending on the password provided. This module uses
its subordinate GET PRIVILEGE to obtain the privilege level of the current user.
For example, consider the problem of writing and debugging the main module
DIALOGUE in our first design in relation to doing the same for the module
CHECK PASSWORD. The development of neither of these depends on the other.
To write ...
You might argue at this point that the actual transfer of the password from
DIALOGUE to CHECK PASSWORD is simple enough that no harm should come
from it. After all, parameter passing is quite straightforward in high-level
What people are saying - Write a review
LibraryThing ReviewUser Review - readafew - LibraryThing
This book was assigned reading for the opening class to my MSIT. I found it a great refresher for a large part of my original CS degree. It is well put together and fairly easy to read. Lots of useful ... Read full review
LibraryThing ReviewUser Review - geekcowboy - LibraryThing
Great book to introduce the theory and practical concepts of computer science. Read full review
PART ONE Machine Architecture
11 other sections not shown