Computer Science: An OverviewIntroduction to Computer Science Computer Science: An Overview, Ninth Edition J. Glenn Brookshear, "Marquette University" Do you want your students to gain a fundamental understanding of the field of computer science? Would you like them to be excited by the opportunities computing presents for further studies and future careers? "Computer Science: An Overview "delivers a foundational framework of what computer science is all about. Each topic is presented with a historical perspective, its current state, and its future potential, as well as ethical issues for students to consider. This balanced, realistic picture helps students see that their future success depends on a solid overview in the rapidly changing field of computer science. Features:
|
From inside the book
Results 1-3 of 85
Page x
... problems to enhance the student's partici- pation - over 1,000 in this ninth edition . These are classified as Questions & Exercises , Chapter Review Problems , and Social Issues . The Questions & Exercises appear at the end of each ...
... problems to enhance the student's partici- pation - over 1,000 in this ninth edition . These are classified as Questions & Exercises , Chapter Review Problems , and Social Issues . The Questions & Exercises appear at the end of each ...
Page 110
An Overview J. Glenn Brookshear. Questions & Exercises 1. Referring back to Question 3 of Section 2.3 , if the machine used the pipeline technique discussed in the text , what will be in " the pipe " when the instruc- tion at address AA ...
An Overview J. Glenn Brookshear. Questions & Exercises 1. Referring back to Question 3 of Section 2.3 , if the machine used the pipeline technique discussed in the text , what will be in " the pipe " when the instruc- tion at address AA ...
Page 517
... q = 19 and the 4. Find the appropriate value for the decrypting keys n and d in an RSA public- key cryptography system based on the primes p encryption key e = 5 . Questions & Exercises Chapter Review Problems 1. Show how a structure of ...
... q = 19 and the 4. Find the appropriate value for the decrypting keys n and d in an RSA public- key cryptography system based on the primes p encryption key e = 5 . Questions & Exercises Chapter Review Problems 1. Show how a structure of ...
Contents
Introduction | 1 |
Data Manipulation | 79 |
Networking and the Internet | 147 |
Copyright | |
9 other sections not shown
Other editions - View all
Common terms and phrases
activities application application software Apply the procedure approach assigned binary search binary search algorithm bit pattern browser byte called Carol Chapter client communication components computer science consider containing data type database described diagram digits disk document domain employee encoded encryption entry example executed Figure goal hexadecimal identify implemented input insertion sort instruction integer Internet linked loop machine language machine's main memory mass storage means memory cell network layer node notation object-oriented operating system output perform pointer problem procedure Search produce program counter programming languages protocol pseudocode Questions & Exercises record recursive representation represented requests result retrieve Section sequence sequential server software engineering solving sort algorithm stack statement steps stored structure Suppose TargetValue task techniques TestEntry tion transferred transport layer tree Turing Turing machine two's complement unit variable