Computer Science: An OverviewGeneral literature -- Introductory and Survey. |
From inside the book
Results 1-3 of 81
Page 173
... consider the problem of a university registrar who is faced with the task of retrieving and updating student records . Although the university has an enroll- ment of approximately 10,000 students , it actually maintains a current record ...
... consider the problem of a university registrar who is faced with the task of retrieving and updating student records . Although the university has an enroll- ment of approximately 10,000 students , it actually maintains a current record ...
Page 176
... consider this approach to program verification in more detail . Just as a formal mathematical proof is based on axioms ( geometric proofs are often founded on the axioms of Euclidean geometry while other proofs may be based on the ...
... consider this approach to program verification in more detail . Just as a formal mathematical proof is based on axioms ( geometric proofs are often founded on the axioms of Euclidean geometry while other proofs may be based on the ...
Page 371
... consider a total of 62 ( 2 + 4 + 6 +8 + 16 + 32 ) different future states . Moreover , if the control system wished to consider the ram- ifications of a sixth step , a total of 64 additional states would have to be considered . Because ...
... consider a total of 62 ( 2 + 4 + 6 +8 + 16 + 32 ) different future states . Moreover , if the control system wished to consider the ram- ifications of a sixth step , a total of 64 additional states would have to be considered . Because ...
Other editions - View all
Common terms and phrases
abstract data type activities actually algorithm Alice application application software array assign binary bit patterns block bulk storage called Carol Chapter COBOL concept contains current entry Current Pointer data control block data flow diagram database declare search deleted diagram disk employee example execution Figure FILLED-BY FORTRAN hashed head pointer hexadecimal identify implemented input insertion sort instruction integer linked list loop machine language machine's memory main memory memory cells modified module move notation operating system password perform pivot entry problem produce program counter programming languages pseudocode Questions/Exercises queue record relation represented request result retrieve routines schedule search a failure search a success search tree sequence sequential file solution solving stack statement step storage system stored string subprogram syntax tape target value task technique terminal time-sharing translator Turing machine