图书介绍

计算机科学概论 英文版 第5版PDF|Epub|txt|kindle电子书版本下载

计算机科学概论 英文版 第5版
  • (美)戴尔(Nell Dale),刘易斯(John Lewis)著 著
  • 出版社: 北京:机械工业出版社
  • ISBN:7111448136
  • 出版时间:2015
  • 标注页数:665页
  • 文件大小:70MB
  • 文件页数:692页
  • 主题词:

PDF下载


点此进入-本书在线PDF格式电子书下载【推荐-云解压-方便快捷】直接下载PDF格式图书。移动端-PC端通用
种子下载[BT下载速度快]温馨提示:(请使用BT下载软件FDM进行下载)软件下载地址页直链下载[便捷但速度慢]  [在线试读本书]   [在线获取解压码]

下载说明

计算机科学概论 英文版 第5版PDF格式电子书版下载

下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。

建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!

(文件页数 要大于 标注页数,上中下等多册电子书除外)

注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具

图书目录

1 Laying the Groundwork2

Chapter 1 The Big Picture3

1.1 Computing Systems4

Layers of a Computing System4

Abstraction6

1.2 The History of Computing8

A Brief History of Computing Hardware8

A Brief History of Computing Software17

Predictions23

1.3 Computing as a Tool and a Discipline24

Summary27

Ethical Issues:The Tenth Strand27

Key Terms28

Exercises28

Thought Questions31

2 The Information Layer32

Chapter 2 Binary Values and Number Systems33

2.1 Numbers and Computing34

2.2 Positional Notation34

Binary,Octal,and Hexadecimal36

Arithmetic in Other Bases39

Power-of-2 Number Systems40

Converting from Base 10 to Other Bases42

Binary Values and Computers43

Summary45

Ethical Issues:Knowledge Units for the Tenth Strand46

Key Terms46

Exercises47

Thought Questions51

Chapter 3 Data Representation53

3.1 Data and Computers54

Analog and Digital Data55

Binary Representations57

3.2 Representing Numeric Data59

Representing Negative Values59

Representing Real Numbers63

3.3 Representing Text66

The ASCII Character Set67

The Unicode Character Set67

Text Compression69

3.4 Representing Audio Data73

Audio Formats75

The MP3 Audio Format76

3.5 Representing Images and Graphics76

Representing Color76

Digitized Images and Graphics78

Vector Representation of Graphics79

3.6 Representing Video80

Video Codecs80

Summary82

Ethical Issues:Codes of Ethics82

Key Terms84

Exercises84

Thought Questions89

3 The Hardware Layer90

Chapter 4 Gates and Circuits91

4.1 Computers and Electricity92

4.2 Gates94

NOT Gate94

AND Gate95

OR Gate96

XOR Gate96

NAND and NOR Gates97

Review of Gate Processing98

Gates with More Inputs98

4.3 Constructing Gates99

Transistors99

4.4 Circuits101

Combinational Circuits102

Adders105

Multiplexers107

4.5 Circuits as Memory108

4.6 Integrated Circuits109

4.7 CPU Chips110

Summary110

Ethical Issues:Has a Professional Code of Ethics Been Violated?111

Key Terms111

Exercises112

Thought Questions117

Chapter 5 Computing Components119

5.1 Individual Computer Components120

5.2 Stored-Program Concept125

von Neumann Architecture125

The Fetch-Execute Cycle130

RAM and ROM132

Secondary Storage Devices133

Touch Screens137

5.3 Embedded Systems139

5.4 Parallel Architectures140

Parallel Computing140

Classes of Parallel Hardware142

Summary143

Ethical Issues:The Digital Divide144

Key Terms144

Exercises145

Thought Questions148

4 The Programming Layer150

Chapter 6 Low-Level Programming Languages and Pseudocode151

6.1 Computer Operations152

6.2 Machine Language152

Pep/8:A Virtual Computer153

6.3 A Program Example160

Hand Simulation161

Pep/8 Simulator163

6.4 Assembly Language165

Pep/8 Assembly Language166

Assembler Directives167

Assembly-Language Version of Program Hello167

A New Program168

A Program with Branching170

A Program with a Loop173

6.5 Expressing Algorithms175

Pseudocode Functionality175

Following a Pseudocode Algorithm179

Writing a Pseudocode Algorithm181

Translating a Pseudocode Algorithm184

6.6 Testing186

Summary187

Ethical Issues:Copyrighting and Software Piracy188

Key Terms188

Exercises189

Thought Questions193

Chapter 7 Problem Solving and Algorithms195

7.1 How to Solve Problems196

Ask Questions196

Look for Familiar Things197

Divide and Conquer198

Algorithms198

Computer Problem-Solving Process200

Summary of Methodology202

Testing the Algorithm202

7.2 Algorithms with Simple Variables203

An Algorithm with Selection203

Algorithms with Repetition204

7.3 Composite Variables210

Arrays210

Records211

7.4 Searching Algorithms212

Sequential Search212

Sequential Search in a Sorted Array213

Binary Search215

7.5 Sorting218

Selection Sort218

Bubble Sort221

Insertion Sort222

7.6 Recursive Algorithms223

Subprogram Statements224

Recursive Factorial225

Recursive Binary Search226

Quicksort227

7.7 Important Threads232

Information Hiding232

Abstraction233

Naming Things234

Testing235

Summary235

Ethical Issues:Open-Source Software236

Key Terms237

Exercises237

Thought Questions243

Chapter 8 Abstract Data Types and Subprograms245

8.1 What Is an Abstract Data Type?246

8.2 Stacks246

8.3 Queues247

8.4 Lists248

8.5 Trees251

Binary Trees251

Binary Search Trees254

Other Operations259

8.6 Graphs260

Creating a Graph262

Graph Algorithms263

8.7 Subprograms268

Parameter Passing269

Value and Reference Parameters271

Summary274

Ethical Issues:Workplace Monitoring275

Key Terms276

Exercises276

Thought Questions283

Chapter 9 Object-Oriented Design and High-Level Programming Languages285

9.1 Object-Oriented Methodology286

Object Orientation286

Design Methodology287

Example290

9.2 Translation Process295

Compilers295

Interpreters295

9.3 Programming Language Paradigms298

Imperative Paradigm298

Declarative Paradigm299

9.4 Functionality in High-Level Languages301

Boolean Expressions301

Data Typing303

Input/Output Structures308

Control Structures310

9.5 Functionality of Object-Oriented Languages317

Encapsulation317

Classes318

Inheritance320

Polymorphism321

9.6 Comparison of Procedural and Object-Oriented Designs322

Summary324

Ethical Issues:Hoaxes and Scams325

Key Terms326

Exercises326

Thought Questions331

5 The Operating Systems Layer332

Chapter 10 Operating Systems333

10.1 Roles of an Operating System334

Memory,Process,and CPU Management336

Batch Processing337

Timesharing338

Other OS Factors339

10.2 Memory Management340

Single Contiguous Memory Management341

Partition Memory Management343

Paged Memory Management345

10.3 Process Management347

The Process States347

The Process Control Block349

10.4 CPU Scheduling349

First Come,First Served350

Shortest Job Next351

Round Robin351

Summary353

Ethical Issues:Medical Privacy:HIPAA354

Key Terms355

Exercises355

Thought Questions361

Chapter 11 File Systems and Directories363

11.1 File Systems364

Text and Binary Files364

File Types365

File Operations367

File Access368

File Protection369

11.2 Directories370

Directory Trees371

Path Names372

11.3 Disk Scheduling375

First-Come,First-Served Disk Scheduling377

Shortest-Seek-Time-First Disk Scheduling377

SCAN Disk Scheduling378

Summary379

Ethical Issues:Privacy:Opt-In or Opt-Out?379

Key Terms380

Exercises380

Thought Questions385

6 The Applications Layer386

Chapter 12 Information Systems387

12.1 Managing Information388

12.2 Spreadsheets389

Spreadsheet Formulas391

Circular References394

Spreadsheet Analysis397

12.3 Database Management Systems398

The Relational Model398

Relationships401

Structured Query Language402

Database Design404

12.4 E-Commerce405

Summary406

Ethical Issues:Politics and the Internet:The Candidate's View408

Key Terms408

Exercises409

Thought Questions413

Chapter 13 Artificial Intelligence415

13.1 Thinking Machines416

The Turing Test417

Aspects of AI419

13.2 Knowledge Representation419

Semantic Networks420

Search Trees422

13.3 Expert Systems424

13.4 Neural Networks427

Biological Neural Networks427

Artificial Neural Networks429

13.5 Natural Language Processing430

Voice Synthesis431

Voice Recognition432

Natural Language Comprehension433

13.6 Robotics435

The Sense-Plan-Act Paradigm435

Subsumption Architecture438

Physical Components439

Summary439

Ethical Issues:Politics and the Internet:The Public's View440

Key Terms441

Exercises441

Thought Questions445

Chapter 14 Simulation,Graphics,Gaming,and Other Applications447

14.1 What Is Simulation?448

Complex Systems448

Models449

Constructing Models449

14.2 Specific Models451

Queuing Systems451

Meteorological Models454

Computational Biology460

Other Models460

Computing Power Necessary461

14.3 Computer Graphics461

How Light Works464

Object Shape Matters465

Simulating Light466

Modeling Complex Objects468

Getting Things to Move474

14.4 Gaming475

History of Gaming476

Creating the Virtual World477

Game Design and Development478

Game Programming479

Summary480

Ethical Issues:Gaming as an Addiction481

Key Terms482

Exercises482

Thought Questions485

7 The Communications Layer486

Chapter 15 Networks487

15.1 Networking488

Types of Networks489

Internet Connections491

Packet Switching494

15.2 Open Systems and Protocols495

Open Systems495

Network Protocols496

TCP/IP496

High-Level Protocols497

MIME Types498

Firewalls498

15.3 Network Addresses500

Domain Name System501

15.4 Cloud Computing503

Summary504

Ethical Issues:Effects of Social Networking506

Key Terms507

Exercises507

Thought Questions511

Chapter 16 The World Wide Web513

16.1 Spinning the Web514

Search Engines515

Instant Messaging516

Weblogs516

Cookies517

16.2 HTML518

Basic HTML Formatting521

Images and Links522

HTML5524

16.3 Interactive Web Pages525

Java Applets525

Java Server Pages526

16.4 XML527

16.5 Social Networks530

Summary532

Ethical Issues:Gambling and the Internet534

Key Terms534

Exercises535

Thought Questions539

Chapter 17 Computer Security541

17.1 Security at All Levels542

Information Security542

17.2 Preventing Unauthorized Access544

Passwords545

CAPTCHA547

Fingerprint Analysis548

17.3 Malicious Code549

Antivirus Software550

Security Attacks551

17.4 Cryptography552

17.5 Protecting Your Information Online555

Security and Portable Devices557

WikiLeaks558

Summary559

Ethical Issues:Blogging561

Key Terms562

Exercises563

Thought Questions565

8 In Conclusion566

Chapter 18 Limitations of Computing567

18.1 Hardware568

Limits on Arithmetic568

Limits on Components574

Limits on Communications575

18.2 Software576

Complexity of Software577

Current Approaches to Software Quality578

Notorious Software Errors582

18.3 Problems585

Comparing Algorithms585

Turing Machines592

Halting Problem595

Classification of Algorithms597

Summary599

Ethical Issues:Therac-25:Anatomy of a Disaster600

Key Terms600

Exercises601

Thought Questions605

Glossary607

Endnotes625

Index633

Photo Credits663

热门推荐