Computer Science: An OverviewGeneral literature -- Introductory and Survey. |
From inside the book
Results 1-3 of 27
Page 324
... Segment location C F A File divided into storage segments B C E Z F : X Y Z would consist of finding the first entry in the index that is equal to or greater than the desired entry and then searching the corresponding sequential segment ...
... Segment location C F A File divided into storage segments B C E Z F : X Y Z would consist of finding the first entry in the index that is equal to or greater than the desired entry and then searching the corresponding sequential segment ...
Page 361
... segment might be composed of such fields as name , specialty , and office number ; the patient segment may contain fields relating to name , address , and next of kin ; and the visit segment may contain date , reason for visit , and ...
... segment might be composed of such fields as name , specialty , and office number ; the patient segment may contain fields relating to name , address , and next of kin ; and the visit segment may contain date , reason for visit , and ...
Page 362
... segment or the second JOB - ASSIGNMENT appearing under the EMPLOYEE segment with EMPL - ID equal to 25X56 . With this sequential order established , we are in a position to present the oper- ations used to interrogate a hierarchical ...
... segment or the second JOB - ASSIGNMENT appearing under the EMPLOYEE segment with EMPL - ID equal to 25X56 . With this sequential order established , we are in a position to present the oper- ations used to interrogate a hierarchical ...
Contents
Contents | 1 |
PART ONE Machine Architecture | 19 |
Data Manipulation | 61 |
Copyright | |
10 other sections not shown
Other editions - View all
Common terms and phrases
abstract data type activities actually algorithm Alice application application software array ASCII assign binary bit patterns block bulk storage called Carol Chapter concept consider contains current entry Current Pointer data structures data types database declare search deleted devices diagram disk employee example execution Figure goal hash head pointer hexadecimal identified implemented input insertion sort instruction integer key field linked list loop machine language machine's memory main memory memory cells modified module move notation operating system parity bit password perform pivot entry position problem produce program counter programming languages pseudocode Questions/Exercises queue record represented request result retrieve routines search tree Section sequence sequential file solution solving sort algorithm stack statement step storage system stored string subprogram Tail pointer tape target value task technique terminal Turing machine two's complement