Computer Science: An OverviewGeneral literature -- Introductory and Survey. |
From inside the book
Results 1-3 of 13
Page 247
... password from the user , it hands the password ( most likely as a parameter of a subprogram ) to the password- checking module . The password is checked for validity , and a report is sent back to the dialogue module ( again through a ...
... password from the user , it hands the password ( most likely as a parameter of a subprogram ) to the password- checking module . The password is checked for validity , and a report is sent back to the dialogue module ( again through a ...
Page 248
... PASSWORD , DISPLAY , DELETE , and INSERT subordinate to DIALOGUE . Note the technique used in the structure chart to indicate the information that is passed among the modules . For example , the arrow pointing from DIALOGUE to CHECK ...
... PASSWORD , DISPLAY , DELETE , and INSERT subordinate to DIALOGUE . Note the technique used in the structure chart to indicate the information that is passed among the modules . For example , the arrow pointing from DIALOGUE to CHECK ...
Page 253
... password in the first place . To appreciate this , consider what would be involved if it later became necessary to modify the software to accommodate longer passwords . In the first example , two modules , DIALOGUE and CHECK PASSWORD ...
... password in the first place . To appreciate this , consider what would be involved if it later became necessary to modify the software to accommodate longer passwords . In the first example , two modules , DIALOGUE and CHECK PASSWORD ...
Other editions - View all
Common terms and phrases
abstract data type activities actually algorithm Alice application application software array assign binary bit patterns block bulk storage called Carol Chapter COBOL concept contains current entry Current Pointer data control block data flow diagram database declare search deleted diagram disk employee example execution Figure FILLED-BY FORTRAN hashed head pointer hexadecimal identify implemented input insertion sort instruction integer linked list loop machine language machine's memory main memory memory cells modified module move notation operating system password perform pivot entry problem produce program counter programming languages pseudocode Questions/Exercises queue record relation represented request result retrieve routines schedule search a failure search a success search tree sequence sequential file solution solving stack statement step storage system stored string subprogram syntax tape target value task technique terminal time-sharing translator Turing machine