图书介绍
计算机科学概论 英文版 第5版PDF|Epub|txt|kindle电子书版本下载
![计算机科学概论 英文版 第5版](https://www.shukui.net/cover/4/34433521.jpg)
- (美)戴尔(Nell Dale),刘易斯(John Lewis)著 著
- 出版社: 北京:机械工业出版社
- ISBN:7111448136
- 出版时间:2015
- 标注页数:665页
- 文件大小:70MB
- 文件页数:692页
- 主题词:
PDF下载
下载说明
计算机科学概论 英文版 第5版PDF格式电子书版下载
下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!
(文件页数 要大于 标注页数,上中下等多册电子书除外)
注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具
图书目录
1 Laying the Groundwork2
Chapter 1 The Big Picture3
1.1 Computing Systems4
Layers of a Computing System4
Abstraction6
1.2 The History of Computing8
A Brief History of Computing Hardware8
A Brief History of Computing Software17
Predictions23
1.3 Computing as a Tool and a Discipline24
Summary27
Ethical Issues:The Tenth Strand27
Key Terms28
Exercises28
Thought Questions31
2 The Information Layer32
Chapter 2 Binary Values and Number Systems33
2.1 Numbers and Computing34
2.2 Positional Notation34
Binary,Octal,and Hexadecimal36
Arithmetic in Other Bases39
Power-of-2 Number Systems40
Converting from Base 10 to Other Bases42
Binary Values and Computers43
Summary45
Ethical Issues:Knowledge Units for the Tenth Strand46
Key Terms46
Exercises47
Thought Questions51
Chapter 3 Data Representation53
3.1 Data and Computers54
Analog and Digital Data55
Binary Representations57
3.2 Representing Numeric Data59
Representing Negative Values59
Representing Real Numbers63
3.3 Representing Text66
The ASCII Character Set67
The Unicode Character Set67
Text Compression69
3.4 Representing Audio Data73
Audio Formats75
The MP3 Audio Format76
3.5 Representing Images and Graphics76
Representing Color76
Digitized Images and Graphics78
Vector Representation of Graphics79
3.6 Representing Video80
Video Codecs80
Summary82
Ethical Issues:Codes of Ethics82
Key Terms84
Exercises84
Thought Questions89
3 The Hardware Layer90
Chapter 4 Gates and Circuits91
4.1 Computers and Electricity92
4.2 Gates94
NOT Gate94
AND Gate95
OR Gate96
XOR Gate96
NAND and NOR Gates97
Review of Gate Processing98
Gates with More Inputs98
4.3 Constructing Gates99
Transistors99
4.4 Circuits101
Combinational Circuits102
Adders105
Multiplexers107
4.5 Circuits as Memory108
4.6 Integrated Circuits109
4.7 CPU Chips110
Summary110
Ethical Issues:Has a Professional Code of Ethics Been Violated?111
Key Terms111
Exercises112
Thought Questions117
Chapter 5 Computing Components119
5.1 Individual Computer Components120
5.2 Stored-Program Concept125
von Neumann Architecture125
The Fetch-Execute Cycle130
RAM and ROM132
Secondary Storage Devices133
Touch Screens137
5.3 Embedded Systems139
5.4 Parallel Architectures140
Parallel Computing140
Classes of Parallel Hardware142
Summary143
Ethical Issues:The Digital Divide144
Key Terms144
Exercises145
Thought Questions148
4 The Programming Layer150
Chapter 6 Low-Level Programming Languages and Pseudocode151
6.1 Computer Operations152
6.2 Machine Language152
Pep/8:A Virtual Computer153
6.3 A Program Example160
Hand Simulation161
Pep/8 Simulator163
6.4 Assembly Language165
Pep/8 Assembly Language166
Assembler Directives167
Assembly-Language Version of Program Hello167
A New Program168
A Program with Branching170
A Program with a Loop173
6.5 Expressing Algorithms175
Pseudocode Functionality175
Following a Pseudocode Algorithm179
Writing a Pseudocode Algorithm181
Translating a Pseudocode Algorithm184
6.6 Testing186
Summary187
Ethical Issues:Copyrighting and Software Piracy188
Key Terms188
Exercises189
Thought Questions193
Chapter 7 Problem Solving and Algorithms195
7.1 How to Solve Problems196
Ask Questions196
Look for Familiar Things197
Divide and Conquer198
Algorithms198
Computer Problem-Solving Process200
Summary of Methodology202
Testing the Algorithm202
7.2 Algorithms with Simple Variables203
An Algorithm with Selection203
Algorithms with Repetition204
7.3 Composite Variables210
Arrays210
Records211
7.4 Searching Algorithms212
Sequential Search212
Sequential Search in a Sorted Array213
Binary Search215
7.5 Sorting218
Selection Sort218
Bubble Sort221
Insertion Sort222
7.6 Recursive Algorithms223
Subprogram Statements224
Recursive Factorial225
Recursive Binary Search226
Quicksort227
7.7 Important Threads232
Information Hiding232
Abstraction233
Naming Things234
Testing235
Summary235
Ethical Issues:Open-Source Software236
Key Terms237
Exercises237
Thought Questions243
Chapter 8 Abstract Data Types and Subprograms245
8.1 What Is an Abstract Data Type?246
8.2 Stacks246
8.3 Queues247
8.4 Lists248
8.5 Trees251
Binary Trees251
Binary Search Trees254
Other Operations259
8.6 Graphs260
Creating a Graph262
Graph Algorithms263
8.7 Subprograms268
Parameter Passing269
Value and Reference Parameters271
Summary274
Ethical Issues:Workplace Monitoring275
Key Terms276
Exercises276
Thought Questions283
Chapter 9 Object-Oriented Design and High-Level Programming Languages285
9.1 Object-Oriented Methodology286
Object Orientation286
Design Methodology287
Example290
9.2 Translation Process295
Compilers295
Interpreters295
9.3 Programming Language Paradigms298
Imperative Paradigm298
Declarative Paradigm299
9.4 Functionality in High-Level Languages301
Boolean Expressions301
Data Typing303
Input/Output Structures308
Control Structures310
9.5 Functionality of Object-Oriented Languages317
Encapsulation317
Classes318
Inheritance320
Polymorphism321
9.6 Comparison of Procedural and Object-Oriented Designs322
Summary324
Ethical Issues:Hoaxes and Scams325
Key Terms326
Exercises326
Thought Questions331
5 The Operating Systems Layer332
Chapter 10 Operating Systems333
10.1 Roles of an Operating System334
Memory,Process,and CPU Management336
Batch Processing337
Timesharing338
Other OS Factors339
10.2 Memory Management340
Single Contiguous Memory Management341
Partition Memory Management343
Paged Memory Management345
10.3 Process Management347
The Process States347
The Process Control Block349
10.4 CPU Scheduling349
First Come,First Served350
Shortest Job Next351
Round Robin351
Summary353
Ethical Issues:Medical Privacy:HIPAA354
Key Terms355
Exercises355
Thought Questions361
Chapter 11 File Systems and Directories363
11.1 File Systems364
Text and Binary Files364
File Types365
File Operations367
File Access368
File Protection369
11.2 Directories370
Directory Trees371
Path Names372
11.3 Disk Scheduling375
First-Come,First-Served Disk Scheduling377
Shortest-Seek-Time-First Disk Scheduling377
SCAN Disk Scheduling378
Summary379
Ethical Issues:Privacy:Opt-In or Opt-Out?379
Key Terms380
Exercises380
Thought Questions385
6 The Applications Layer386
Chapter 12 Information Systems387
12.1 Managing Information388
12.2 Spreadsheets389
Spreadsheet Formulas391
Circular References394
Spreadsheet Analysis397
12.3 Database Management Systems398
The Relational Model398
Relationships401
Structured Query Language402
Database Design404
12.4 E-Commerce405
Summary406
Ethical Issues:Politics and the Internet:The Candidate's View408
Key Terms408
Exercises409
Thought Questions413
Chapter 13 Artificial Intelligence415
13.1 Thinking Machines416
The Turing Test417
Aspects of AI419
13.2 Knowledge Representation419
Semantic Networks420
Search Trees422
13.3 Expert Systems424
13.4 Neural Networks427
Biological Neural Networks427
Artificial Neural Networks429
13.5 Natural Language Processing430
Voice Synthesis431
Voice Recognition432
Natural Language Comprehension433
13.6 Robotics435
The Sense-Plan-Act Paradigm435
Subsumption Architecture438
Physical Components439
Summary439
Ethical Issues:Politics and the Internet:The Public's View440
Key Terms441
Exercises441
Thought Questions445
Chapter 14 Simulation,Graphics,Gaming,and Other Applications447
14.1 What Is Simulation?448
Complex Systems448
Models449
Constructing Models449
14.2 Specific Models451
Queuing Systems451
Meteorological Models454
Computational Biology460
Other Models460
Computing Power Necessary461
14.3 Computer Graphics461
How Light Works464
Object Shape Matters465
Simulating Light466
Modeling Complex Objects468
Getting Things to Move474
14.4 Gaming475
History of Gaming476
Creating the Virtual World477
Game Design and Development478
Game Programming479
Summary480
Ethical Issues:Gaming as an Addiction481
Key Terms482
Exercises482
Thought Questions485
7 The Communications Layer486
Chapter 15 Networks487
15.1 Networking488
Types of Networks489
Internet Connections491
Packet Switching494
15.2 Open Systems and Protocols495
Open Systems495
Network Protocols496
TCP/IP496
High-Level Protocols497
MIME Types498
Firewalls498
15.3 Network Addresses500
Domain Name System501
15.4 Cloud Computing503
Summary504
Ethical Issues:Effects of Social Networking506
Key Terms507
Exercises507
Thought Questions511
Chapter 16 The World Wide Web513
16.1 Spinning the Web514
Search Engines515
Instant Messaging516
Weblogs516
Cookies517
16.2 HTML518
Basic HTML Formatting521
Images and Links522
HTML5524
16.3 Interactive Web Pages525
Java Applets525
Java Server Pages526
16.4 XML527
16.5 Social Networks530
Summary532
Ethical Issues:Gambling and the Internet534
Key Terms534
Exercises535
Thought Questions539
Chapter 17 Computer Security541
17.1 Security at All Levels542
Information Security542
17.2 Preventing Unauthorized Access544
Passwords545
CAPTCHA547
Fingerprint Analysis548
17.3 Malicious Code549
Antivirus Software550
Security Attacks551
17.4 Cryptography552
17.5 Protecting Your Information Online555
Security and Portable Devices557
WikiLeaks558
Summary559
Ethical Issues:Blogging561
Key Terms562
Exercises563
Thought Questions565
8 In Conclusion566
Chapter 18 Limitations of Computing567
18.1 Hardware568
Limits on Arithmetic568
Limits on Components574
Limits on Communications575
18.2 Software576
Complexity of Software577
Current Approaches to Software Quality578
Notorious Software Errors582
18.3 Problems585
Comparing Algorithms585
Turing Machines592
Halting Problem595
Classification of Algorithms597
Summary599
Ethical Issues:Therac-25:Anatomy of a Disaster600
Key Terms600
Exercises601
Thought Questions605
Glossary607
Endnotes625
Index633
Photo Credits663