Computer Science: An OverviewGeneral literature -- Introductory and Survey. |
From inside the book
Results 1-3 of 78
Page 50
... obtain the pattern for - 5 by complementing 0101 ( the representation for 5 ) to get 1010 and adding one to obtain 1011 ... obtained by reading the bit pattern as if it were a binary number . If , however , this bit is 1 , we negate the ...
... obtain the pattern for - 5 by complementing 0101 ( the representation for 5 ) to get 1010 and adding one to obtain 1011 ... obtained by reading the bit pattern as if it were a binary number . If , however , this bit is 1 , we negate the ...
Page 247
... obtained a password from the user , it hands the password ( most likely as a parameter of a subprogram ) to the password- checking module . The password is checked for validity , and a report is sent back to the dialogue module ( again ...
... obtained a password from the user , it hands the password ( most likely as a parameter of a subprogram ) to the password- checking module . The password is checked for validity , and a report is sent back to the dialogue module ( again ...
Page 430
... obtained . Thus , the depth of the tree is equal to the number of times ( starting with the number n ) that we could repeatedly divide by two until the result is no larger than one . This is nothing more than the logarithm of n ( base ...
... obtained . Thus , the depth of the tree is equal to the number of times ( starting with the number n ) that we could repeatedly divide by two until the result is no larger than one . This is nothing more than the logarithm of n ( base ...
Other editions - View all
Common terms and phrases
abstract data type activities actually algorithm Alice application application software array assign binary bit patterns block bulk storage called Carol Chapter COBOL concept contains current entry Current Pointer data control block data flow diagram database declare search deleted diagram disk employee example execution Figure FILLED-BY FORTRAN hashed head pointer hexadecimal identify implemented input insertion sort instruction integer linked list loop machine language machine's memory main memory memory cells modified module move notation operating system password perform pivot entry problem produce program counter programming languages pseudocode Questions/Exercises queue record relation represented request result retrieve routines schedule search a failure search a success search tree sequence sequential file solution solving stack statement step storage system stored string subprogram syntax tape target value task technique terminal time-sharing translator Turing machine