Computer Science: An OverviewGeneral literature -- Introductory and Survey. |
From inside the book
Results 1-3 of 19
Page 327
... field in each record as the key field . Our first task is to convert any key field value into a numeric value . This step may seem meaningless to you since the key field is , in fact , the employee identifi- cation number . However ...
... field in each record as the key field . Our first task is to convert any key field value into a numeric value . This step may seem meaningless to you since the key field is , in fact , the employee identifi- cation number . However ...
Page 328
An Overview J. Glenn Brookshear. Figure 8-7 Hashing the key field value 25X3Z to one of 40 storage sections Key field value : 25X3Z ASCII representation : 01100100110101101100001100111011010 Equivalent base ten value : 13,534,320,266 ...
An Overview J. Glenn Brookshear. Figure 8-7 Hashing the key field value 25X3Z to one of 40 storage sections Key field value : 25X3Z ASCII representation : 01100100110101101100001100111011010 Equivalent base ten value : 13,534,320,266 ...
Page 335
... key field value , when interpreted as a binary value , reduces to the integer 124 ? 16. If the division hash algorithm as presented in the text is being used , why is clustering more likely to occur when the file storage space is ...
... key field value , when interpreted as a binary value , reduces to the integer 124 ? 16. If the division hash algorithm as presented in the text is being used , why is clustering more likely to occur when the file storage space is ...
Other editions - View all
Common terms and phrases
abstract data type activities actually algorithm Alice application application software array assign binary bit patterns block bulk storage called Carol Chapter COBOL concept contains current entry Current Pointer data control block data flow diagram database declare search deleted diagram disk employee example execution Figure FILLED-BY FORTRAN hashed head pointer hexadecimal identify implemented input insertion sort instruction integer linked list loop machine language machine's memory main memory memory cells modified module move notation operating system password perform pivot entry problem produce program counter programming languages pseudocode Questions/Exercises queue record relation represented request result retrieve routines schedule search a failure search a success search tree sequence sequential file solution solving stack statement step storage system stored string subprogram syntax tape target value task technique terminal time-sharing translator Turing machine