Computer Science: An OverviewGeneral literature -- Introductory and Survey. |
From inside the book
Results 1-3 of 84
Page 174
... single link . On the second morning , retrieve the single link and give the hotel the two - link piece . On the third morning , give the hotel the single link . On the fourth morning , retrieve the three links held by the hotel and give ...
... single link . On the second morning , retrieve the single link and give the hotel the two - link piece . On the third morning , give the hotel the single link . On the fourth morning , retrieve the three links held by the hotel and give ...
Page 204
... single bit . Examples of the occurrence of such a data type include the result of comparisons such as " IS TAX EQUAL ... single letter followed by the symbol $ to represent data of type character and names consisting of a single letter ...
... single bit . Examples of the occurrence of such a data type include the result of comparisons such as " IS TAX EQUAL ... single letter followed by the symbol $ to represent data of type character and names consisting of a single letter ...
Page 257
... single activity . Unfortunately , the use of the phrase " single activity " results in our definition being somewhat vague since what constitutes a single activity depends on one's point of view . In the broad sense , the entire airline ...
... single activity . Unfortunately , the use of the phrase " single activity " results in our definition being somewhat vague since what constitutes a single activity depends on one's point of view . In the broad sense , the entire airline ...
Contents
Contents | 1 |
PART ONE Machine Architecture | 19 |
Data Manipulation | 61 |
Copyright | |
10 other sections not shown
Other editions - View all
Common terms and phrases
abstract data type activities actually algorithm Alice application application software array ASCII assign binary bit patterns block bulk storage called Carol Chapter concept consider contains current entry Current Pointer data structures data types database declare search deleted devices diagram disk employee example execution Figure goal hash head pointer hexadecimal identified implemented input insertion sort instruction integer key field linked list loop machine language machine's memory main memory memory cells modified module move notation operating system parity bit password perform pivot entry position problem produce program counter programming languages pseudocode Questions/Exercises queue record represented request result retrieve routines search tree Section sequence sequential file solution solving sort algorithm stack statement step storage system stored string subprogram Tail pointer tape target value task technique terminal Turing machine two's complement