Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Brookshear J.G. — Computer Science: An Overview
Brookshear J.G. — Computer Science: An Overview



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Computer Science: An Overview

Автор: Brookshear J.G.

Аннотация:

This classic book provides an overview to the field of computing, with new material on networking, C#, XML, and Java, making it the most current book available. The seventh edition has been thoroughly updated to discuss important trends in such areas as networking and the Internet, software engineering, public-key encryption, and artificial intelligence. The discussions of the ethical and legal issues revolving around computing have been expanded in this edition. This book is for those who are interested in taking a tour of the field of computer science, as well as those taking an introductory course on these topics.


Язык: en

Рубрика: Computer science/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Издание: Ninth Edition

Год издания: 2005

Количество страниц: 615

Добавлена в каталог: 16.11.2009

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
Reactive robot      490
Read operation      44 96
Read-only memory (ROM)      145
Ready (process)      148
REAL data type      278
Real-time processing      138
Real-world knowledge      452 476
Recursion      240 246
Recursive function theory      502
Recursive structures      240 559
Reduced Instruction Set Computer (RISC)      99 102
Reference      379
Reflex action      452
Refresh circuit      44
Region finding      458
register      96
registrar      173
Reinforcement (learning by)      478
Relation (database)      413
Relational database model      413
Relative addressing      566
Relative encoding      78
Reliable protocol      195
Repeat control structure      234
Repeater      168
Requirements (of software)      333
Reserved words      298
Resolution      314
Resolvent      315
Responsible technology      538
Right-child pointer      381
Ring network topology      164 166
Ripple adder      547
RISC      see “Reduced instruction set computer”
Risks forum      345
Ritchie, Dennis      551
Rivest, Ron      200 529
RMI      see “Remote method invocation”
Robocup      490
Robotics      489
Rogerian thesis      456
roll back      428
ROM      see “Read-only memory”
root node      368
Root pointer      381
Rotation      115
Rotation delay      48
Round-off error      74
router      169
Row major order      373
RSA algorithm      200 529 531
Run-length encoding      77
Scalable fonts      57
Scaling      139
Scheduler      145
Schema      408
Scope (of a variable)      289
SDRAM      see “Synchronous DRAM”
Search engine      182
Search tree      467
Second-generation language      269
Sector      47
Secure Shell (SSH)      180
Secure Sockets Layer (SSL)      200
Security      155 196
Seek time      48
SELECT (database operation)      417
selection sort algorithm      239 241
Selective Service      442
Self-reference      515
Self-terminating program      516
Semantic anatysis      460
Semantic net      462
Semantic Web      188 461
Semantics      217
Semaphore      152
Sempron (cpu)      96
Sentinel      432
Sequential file      430
Sequential pattern analysis      440
Sequential search algorithm      231 249
Sequential search algorithm, complexity of      249 521
Serial communication      121
server      170
Server-side      188
servlet      189
Set theory      255
SGML      see “Standard Generalized Markup Language”
Shamir, Adi      200 529
Shared lock      429
Shell      142
Siblings (in a tree)      368
Sign bit      67 72
SIMD      124
Simulation oriented research      455
SISD      124
Sloan, Alfred      133
Smoothing      459
Sniffing software      156 197
Social Security Administration      443
Software      18
Software analyst      334
Software engineering      328
software life cycle      331
Software requirements document      333
software verification      253
Source (version of web page)      183
Source program      296
Space complexity      524
Spam      198
spam filters      199
Special-purpose register      96
Specifications (of software)      333
Spoofing      198
Spooling      153
Spreadsheet systems      76 478
Spy ware      197
SQL      see “Structured Query Language”
SSH      see “Secure shell”
SSL      see “Secure sockets layer”
STACK      366 378
Stack pointer      378
Standard Generalized Markup Language (SGML)      187
Standard Template Library (STL)      343 396
Star network topology      164
Starvation      160
State graph      464
State of process      147
State of production system      464
State of Tliring machine      505
Status word      120
stepwise refinement      227
Stibitz, George      22
Stored program concept      98
Stream      41
Strong AI      459
Strongly typed      302
Stroustrup, Bjarne      552
Structure chart      338
Structured programming      285
Structured Query Language (SQL)      422
Structured walkthrough      351
Subprogram      220
SUBROUTINE      220
Subschema      409
Substantial similarity      356
Subtree      368
Successor function      507 513
Sun Microsystems      172 189 298 344 352 558
super user      155
Supervised training      478
switch      168
Symbol table      302
Synapse      481
Synchronous DRAM      45
Syntactic analysis      460
Syntax      217
Syntax diagram      298
system documentation      354
system requirements      333
system software      140
System specifications      333
System/360 (IBM)      357
Tag (in markup language)      183
Tail (of a list)      366
tail pointer      379
Task      312
TCP      see “Transmission Control Protocol”
TCP/IP protocols      194
technical documentation      355
Telnet      179
Temporal masking      81
Terminal (in a syntax diagram)      299
Terminal node      368
termination condition      233
Test-and-set instruction      152
testing (software)      257
Text editor      54
text file      54 431
Text file (FTP)      178
Therac-25      345
Third-generation language      269
Thoreau, Henry David      162
Thread      312
Threshold      481
Throughput      124
Throwaway prototyping      336
TIFF      81
Time complexity      521
Time slice      148
Time-sharing      139 148
TLD      see “Top-level domain”
Token (in a network)      167
Token (in a translator)      297
Token ring protocol      166
Top of stack      366
Top-down methodology      227
top-level domain (tld)      176
Topology (of a network)      164
Torvalds, Linus      142
Towers of Hanoi      262
Track      47
Trade secret law      357
Training set      478
transaction file      432
Transcendental functions      595
Transfer rate      48
Translation      296
Translator      270
Transmission Control Protocol (TCP)      194
Transport layer (Internet)      191
Traveling salesman problem      526
TREE      367
Trigonometric functions      503
Trojan Horse      197
TrueType      57
Truncation error      74
Tuple (in a relation)      413
Turing computable      507
Turing machine      504 508
Turing Test      455
Turing, Alan M.      455 456 504 507 508
Turn key system      147
Two's complement notation      56 66
TYPE      See “Data type”
U.S. Department of Defense      333 551
UDP      See “User Datagram Protocol”
UML      See “Unified Modeling Language”
Unconditional jump      100
Unicode      54
Unification      317
Unified Modeling Language (UML)      348
Uniform resource locator (URL)      181
Universal programming language      509
Universal serial bus (USB)      118 121
University of Helsinki      142
University of Pennsylvania      23 105
UNIX      136 179
Unmanned Aerial Vehicle (UAV)      490
Unsolvable problem      519
URL      see “Uniform resource locator”
USA Patriot Act      204
USB      see “Universal serial bus”
Use case      348
Use case diagram      348
User Datagram Protocol (UDP)      195
User documentation      354
User-defined data type      392
Utilitarianism      30
Utility software      141
validation testing      335
Variable      278
Variable-length codes      77
Vector (image representation)      56
Verification (of software)      253
Virtual memory      145
virus      197 456
Visual Basic      290
Voice over Internet      177
Voice over IP      see “Voice over Internet”
VoIP      see “Voice over Internet”
von Helmholtz, H.      226
Von Neumann architecture      120 124
von Neumann bottleneck      120
von Neumann, John      98 105
W3      see “World Wide Web”
W3C      see “World Wide Web Consortium”
Waiting (process)      148
Waltz, D.      592
WAN      see “Wide area network”
Waterfall model      89
Weak AI      459
Web      181
Web page      181
Web server      181
Website      181
Weight (in a processing unit)      482
Weighted sum      481
Weizenbaum, Joseph      456 493
Welsh, Terry      78
while control structure      220 234 285 432
Wide Area Network (WAN)      164
Window (in GUI)      143
window manager      143
Windows (operating system)      136 290
Word processor      54 478
World War II      23 270
World Wide Web      181
World Wide Web Consortium (W3C)      183
WORM      197
Worst-case analysis      250
Wound-wait protocol      430
Wozniak, Stephen      23
Wright brothers      105
Write operation      44 96
WWW      see “World Wide Web”
XHTML      187
XML      see “Extensible Markup Language”
XOR      see “Exclusive or”
XP      see “Extreme programming”
1 2 3 4 5
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте