## Computer Science: An Overview |

### From inside the book

Results 1-3 of 38

Page 345

Having made this observation, we find that our problems can be solved by

redesigning the system in terms of three

preceding topics. Thus, we might keep the original

the EMPLOYEE ...

Having made this observation, we find that our problems can be solved by

redesigning the system in terms of three

**relations**— one for each of thepreceding topics. Thus, we might keep the original

**relation**(which we now callthe EMPLOYEE ...

Page 347

We begin with a look at some operations that we may wish to perform on a

certain tuples from a

We begin with a look at some operations that we may wish to perform on a

**relation**or**relations**. First note that there will be times when we will need to selectcertain tuples from a

**relation**. For example, to retrieve the information about an ...Page 348

The operation of MULTIPLYing the ASSIGNMENT

turns out to be the weapon we need, so let us look at what the product of two

The operation of MULTIPLYing the ASSIGNMENT

**relation**by the JOB**relation**turns out to be the weapon we need, so let us look at what the product of two

**relations**actually is. First we consider the smaller example of MULTIPLYing a**relation**...### What people are saying - Write a review

#### LibraryThing Review

User Review - readafew - LibraryThingThis book was assigned reading for the opening class to my MSIT. I found it a great refresher for a large part of my original CS degree. It is well put together and fairly easy to read. Lots of useful ... Read full review

#### LibraryThing Review

User Review - geekcowboy - LibraryThingGreat book to introduce the theory and practical concepts of computer science. Read full review

### Contents

Introduction | 1 |

PART ONE Machine Architecture | 19 |

Data Manipulation | 62 |

Copyright | |

11 other sections not shown

### Other editions - View all

### Common terms and phrases

activities actually algorithm Alice application application software ASCII assign binary bit patterns block bulk storage byte called Carol Chapter COBOL computer science concept consider consists contains current entry data control block database described devices diagram disk employee example execution Figure floating-point FORTRAN goal hash head pointer hexadecimal identified implemented input insertion sort instruction integer key field linked list loop machine language machine's main memory memory cells modified module move node operating system parity bit password perform pivot entry polynomial position problem produce program counter programming languages pseudocode Questions/Exercises queue record relation represented request result retrieve routine search tree Section segment sequence sequential file solution solving sort algorithm stack statement step stored string structure subprogram syntax tape target value task technique terminal translator Turing machine