Biographies, figures, and tables are indicated by “b,” “f,” and “t” following page numbers.
Absolute path name, 372
Abstract art, 8
Abstract numerals, 12
Abstract step, 205
Access control policy, 509
Access time, 137
Accumulator, in Pep/9, 154
Action-adventure games, 483
Action games, 483
Action responsibilities, 286
Ada (programming language), 10
Adams, E. N., 603
Addition
Address binding, 337
for fixed and dynamic partitions, 340
Address of argument, reference parameter and, 268
Address resolution, in partition memory management, 340, 340f
Addressability, 128
Addressing mode specifier, in Pep/9, 155
Adjacent vertices, 257
Adobe Flash, 84
ADT. Abstract data type
Adware, 288
Aibo, demise of, 444
AIFF format, 79
ALGOL (programming language), 293
Algorithmic thinking, 26
Algorithms, 27t, 44, 171. Boolean expressions; Boolean variables; Responsibility algorithms
Allen, Paul, 508
Allen, Robert, 602
Alliance for Affordable Internet, 539
Amazon Web Services, 516
Amazon.com, 407
AMBER Alert, 254
America Online (AOL), 24
American Management Association, 273
American National Standards Institute (ANSI), 404
American Standard Code for Information Interchange (ASCII). ASCII character set
Ampersand (&), in C++, 310
Analysis, algorithm design and, 197
Analysis and specification phase, in computer problem-solving process, 196, 196f
Andreesen, Marc, 24
Android, 331
Angle brackets, HTML tags within, 535
Annals of Mathematics, 248
AOL. America Online
APL, 293
APNG (Animated Portable Network Graphics), 83
Apple I, 17
Apple II, 395
Apple iPhone. iPhone
Apple Macintosh, 23
Applets, 541
Application (or user) level, 242
Application packages, 22f
Application systems, 6
Applications layer, in computing system, 5
Arithmetic, limits on
Arithmetic operations
Artists, computer graphics used by, 469
ASCII character set, 69–70, 70f, 302–303, 306, 362
output from operand in Pep/9, 159
.ASCII pseudo-op, 165
Asimov, Isaac, 443f
Asking questions strategy, 178
Assange, Julian, 577
directives, 165
Assertions, 299
Assignment
Association for Computing Machinery (ACM), 47, 100, 309
Code of Ethics, 115
Associative property, 107t
Asterisk (*)
AT&T™, 23
Atanasoff, John Vincent, 127
Atari 2600, 483
Atomic data types, 303
Atomic Energy Commission, 248
Attributes, 536
AU format, 79
Austin American-Statesman, 146
Authentication credentials, 560
Automobile diagnostic programs, 330
Auxiliary storage devices, 13, 15. Secondary storage devices
Availability of information, 559
Average wait time, in queuing model, 458
Axon, 432
Back door, 568
Backslash, root of directory system and, 369
Backus, John, 248
Baldwin, Alec, 572
Baldwin, Brooke, 572
Bardeen, John, 13
Base
Base case
Base register, 341
Batch jobs, 333
Batey, Mavis, 576b
Battery capacity, in laptops, 125
Bay, Austin, 146
Bell, Genevieve, 170
Bell Labs, 102
Bemer, Bob, 72
Berry, Clifford, 127
Best fit, 341
Bi-quinary number representation, 41
Big data, 408
Big-O analysis
Big-O notation, defined, 607
Bill and Melinda Gates Foundation, 508
Bina, Eric, 24
Binary floating-point value, 67
Binary programmable computer, 11
average number of comparisons with sequential search and, 213t
Biographies
Bioinformatics, 466
Biological neuron, 432
Biometrics, 560
Bit combinations, 60f
Bit-level parallelism, 142
Bitmap file, 82
Bits, 362
Blaster worm, 565
Block, 136
.BLOCK pseudo-op, 165
Block record, 516
presidential elections and, 411
Boggs, David, 17
Booch, Grady, 286
Boolean variables, 303
Booting, 330
Bottom-up approach, 5
Bounded rationality theory, 424
Bounded time, 610
Bounds register, 341
Braces, in Java and C++, 308
Branch instructions, 167
Brattain, Walter H., 13
Break-even calculations, spreadsheets and, 398
BREQ branch instruction, 167
Bricklin, Daniel, 395b
Broadband, 501
Buffer overflow, 568
Bullets, 536
Bullying, social networking and, 519
Bureau of Ordnance Computation Project (Harvard), 46
Burning, 134
Burroughs Corporation, 16
Burroughs, William, 10
width, 131
Bush, George H.W., 127
Bush, George W., 86
election strategies, 411
Business and economic forecasting models, 467
Business Software Alliance, 185
Byron, Lord George Gordon, 10
Byte, 47
Bytecode, 293
Cable modems, 500
Caesar cipher, 569
Cambridge Analytica, 574
Cambridge Mathematical Journal, 95
CAN-SPAM Act, 380
Cancellation error, 593
Capacitive touch screen, 140
Cardinality constraints, 406
Carry value, 108
Cartesian product operation, in SQL, 405
Case-sensitive languages, 305
Catenary curve, 479
CD. Compact disc
Cells, 128
Census Bureau, U.S., 130
Central Intelligence Agency (CIA), 86
Ceruzzi, Paul E., 18
Change directory, 372
Chat room, 528
Chatbot, 423
Check bit, 69
in Universal Product Code, 402
Chemistry Markup Language (CML), 546
Chip, 112
CPU, 113
Chrome, 24
Church, Alonzo, 615
Church-Turing thesis, 615
CIA (confidentiality, integrity, and availability) triad, 559, 559f
Cinepak, 85
Cipher, 569
Ciphertext, 569
Clapper, James, 86
Class (implementation phase), 314
Clock, 122
Clustering, 528
Clusters, 144
CODASYL, 72
Codd, E. F., 405
Code, 191
Code coverage (clear-box) testing, 182
Codec, 84
Codes of Ethics, 113
Collision detection algorithms, 484
Color
Color bleeding, 474
Color depth, 80
Color palette, restricted, 81f
Color photoreceptor cone cells, in retina, 80
Color space, 80
Column designations, spreadsheet cells, 389
Combinatorial theory, 195
Comment symbol, 304
Comments, 165
prefacing, 201
Commodore, 16
Communications, 5
Community cloud, 516
Commutative property, 107t
Compaction, 341
Compilation process, 292f
Complement property, 107t
Complex systems, 454
Complicated systems, 454
Components
Compositio Mathematica, 248
Compression ratio, 57
CompuServe, 83
Computational biomodeling, 467
Computational genomics, 467
Computer Addiction Service, 489
Computer-aided design (CAD), 468
Computer bugs. Bugs
Computer ethics. Ethical issues
Computer gaming, 482–487. Games and gaming
Computer hardware. Hardware
Computer History Museum, 19
Computer limitations. Limitations on computing
Computer network, defined, 496
Computer operations, 152
Computer operators, 335
Computer professionals
Computer programming and philosophy, 311
Computer science
Computer security. Security
Computer software. Software
Computer terminals, 21
Computers
Computers. Hardware; Limitations on computing; Software
Computing. Limitations on computing
Computing Curricula 1991 (ACM report), 100
Concept-based searches, 528
Concrete step, 205
Conditions, 299
Confidentiality, 559
Containers, 242
Context switch, 346
Control abstraction, 230
Control Data, 16
Conversion algorithm, walk-through of, 176f
Conversions
Cook, Tim, 349
Cookies, 530
Copy aspect, of spreadsheets, 394
Copy of the argument, value parameter and, 268
Copyright, open-source software and, 232
Cores, 122
Corporate responsibility, 574
Cost-benefit analysis, spreadsheets and, 398
Counterfeit software, 288
Counting and writing, 12
CPWA branch instruction, 167
Crackers and hackers, 267
Craft, Jon, 172
Craigslist, 407
Creativity, 27t
Credit/debit card thefts, 132
Cryptanalysis, 570
CSP concurrent programming model, 377
Customs and Border Protection, U.S., 575
Cyber-bullying, 519
Cybersecurity, 577
Cylinder, 137
Dahl, Ole-Johan, 458
Data abstraction, 230
Data center, 19
Data compression, 56
Data coverage (black-box) testing, 182
Data management, 5
Data objects, 286
Data Processing Management Association, 46
Data representations
images and graphics
numeric data
Data structures, 242
Data transfer rate (bandwidth), 496
atomic, 303
Database content, modifying, 405
Databases, 409
dBase IV, 23
De Morgan’s law, 107
Dean, Howard, 411
DECI branch instruction, 167
Decimal notation, 67t
Decimal number system, 5
Declarative paradigm
Decryption, 569
Deep Blue computer chess program, 429
Deferring details strategy, pseudocode algorithm and, 178
Delete statement, in SQL, 405
Deletions, spreadsheet formulas and, 393
Delta frames, 85
Demand paging, 343
Demultiplexer, 111
Dendrites, 432
Denial of service, 569
Denning, Peter, 26
Derived class, 316
Design skill, 26
Desk checking, 180
Desktop replacements, 125
Diagnostic and Statistical Manual of Mental Disorders (DSM), 490
Difference Engine, 14
Difference operation, in SQL, 405
Digital camera, built-in, for laptop, 125
Digital certificate, 571
Digital circuits, role of, 111
Digital currency, 341
Digital divide, 30
Digital signals, 58
Digital signature, 571
Digital subscriber line (DSL), 501
Digital trail, 408
Digital versatile disk (DVD), 138
Digital world, 482
Direct addressing mode, 155
Direct file access, 367
Discipline, 26
Disk drive, 136
Disks, varieties of, 136
Distributed computers, 144
Distributive law, 106
Distributive property, 107t
Divide and conquer strategy
Division, of integers, 302
DL DVD-R, 138
DNS. Domain name system
Document Type Definition (DTD), 544
Domain name servers, 514
Domain squatting, 512
Donner, Jan Hein, 158
“Dot-com” collapse of 2001, 407
Double quotes, strings enclosed within, 304
Downloads, 502
Drivers, 336
Dual layer, 138
Dumb terminal, 335
Dvorak, John C., 26
Dynamic-partition technique, 340
Dynamic systems, 454
E-Rate Program, 30
E-vote glitch, 138
eBay, 407
Eckert-Mauchly Computer Corporation, 46
Economist, The, 601
Edge, 24
EDVAC computer, 11
802.11 (wireless networking support) standard, 124
versions 802.11ac, 543
Einstein, Albert, 83
Electrical signal, 102
Electricity, 94
Electro-mechanical tabulator, 10
Electronic signals, 58
Electronic spreadsheets, 388
Electronic voting system, 138
ELEMENT tags, in DTD documents, 544
ELIZA, 442
Ellis Island website, 388
email, 3
opt-in or opt-out and marketing, 380
Emergency action notification, 254
Emitter, transistor, 102
Employee Internet monitoring (EIM), 273
Employee record, 208f
emWave, 375
Encryption, 569
.END pseudo-op, 165
Endangered species, managing, 153
eNeighbor system, 376
Engelbart, Doug, 503b
Enigma cipher, 576
Entities, in discrete-event models, 456
Entity-relationship (ER) modeling, 406
EPAM, 424
Epic Game’s Unreal Script for the Unreal Engine, 486
ePolicy Institute, 273
Equal sign (=), 392
Equal to relational operator, 300t
ER diagrams, 406
ER modeling. Entity-relationship modeling
Erasing data in file, 366
Erosion models, 474
Error-correcting code, 596
Error-detecting code, 595
Escape character, 72
ETA model, 464
cable, 125
Ethical issues
Euclid, 39
European Space Agency, rocket software error, 604
European Union, 380
Even parity, 595
Event-driven processing, 313
Events, in discrete-event models, 456
Excited state, neurons in, 432
Execution units, 142
Exponential time, 610
Extensible Markup Language (XML), 544
Extensible Stylesheet Language (XSL), 546
EZPass, 365
Factorial time, 611
False value, in Boolean data type, 303
Family laundry analogy, 609
Feigenbaum, E. A., 424
Fiedler, Edna, 160
Fifth Estate, The (movie), 578
Fighting games, 483
File Transfer Protocol (FTP), 507
First Amendment protection of bloggers, 580
First-come, first-served (FCFS) scheduling approach, 347–348, 375
First fit, 341
First-generation software, 13
Fixed-partition technique, 340
Fixed robots, 440
Flash drives, 139
Flash images, 84
Flight graph, data for, 258t
Flowers, Thomas, 11
Fonts, for data cells in spreadsheets, 391
FORTRANSIT, 72
Forward slashes
Four-level binary search tree, 252f
Fractal models, 474
Frame, 342
Franksten, Bob, 395
From clause, 404
FSB. Front-side bus
Game engine, defined, 484
Game loop, 487
Game play, 489
defined, 483
Gantt charts
Gantz, John, 185
Gates, Bill, 508
Gateway, 498
between LAN and other networks, 498
Gateway 2000, 594
General case
Genomics, computational, 467
Geophysical and Fluid Dynamics Laboratory (GFDL), 465
The George Polya Prize, 195
German Enigma and Lorenz ciphers, 576
image file, 364
Giga, 145
GIMPS project. Great Internet Mersenne Prime Search project
Glaser, Will, 172
Global impact, 27t
Goldstine, Herbert, 248
Chrome, 24
Google Cloud, 516
Google spider bots, 528
Grace Murray Hopper Award, 395
Grade point average, calculating, 285
Graph theory, 250
Graphics Interchange Format (GIF), 83
Graphics processor unit (GPU), 123
Great Internet Mersenne Prime Search (GIMPS) project, 39
Greater than or equal to relational operator, 300t
Greater than relational operator, 300t
Green trends, 529
Grid lines, in spreadsheets, 391
Grounded electrical signal, transistors and, 102
Group permissions, in UNIX operating system, 367
Growth rates, comparison of, 611t
Half adder, 108
Haptics, 470
Hardware layer, 5
Harris Interactive Poll, 489
Hashing, 38
HD. High definition
Head-mounted display (HMD), 462
Health Insurance Portability and Accountability Act (HIPAA), 352–353
Heart rate variability, 375
Heartbleed bug, 602
HeartMath, 375
Hertz, Heinrich R., 122
Hertz (Hz), 122
Heuristics, 567
High color, 80
High definition (HD), 123
High-definition multimedia interface (HDMI), 125
High-speed digital cameras, 282
History of Modern Computing, A (book), 18
Host. Nodes
Host table, 514
Hostnames, 510
Houses relationship, 425
How to Solve It: A New Aspect of Mathematical Method (book), 192, 195
Huffman, David, 75
Huynh, Justin, 247
HWRF, 465
Hybrid cloud, 516
Hybrid deliberate/reactive approach, 443
Hypermedia, 531
Hypertext, 531
Hypertext Transfer Protocol (HTTP), 507
IBM
ICs. Integrated circuits
ICT Development Index (IDI), 30
Identity property, 107t
Identity theft, 321
IF function, in spreadsheets, 394f
If statement, 308
If-then-else statement, 181
Ifrah, Georges, 37
Illumination model, 473
iMac, 349
Images/graphics, 527
Imitation Game, The (movie), 11
Immediate addressing mode, 155
Immigration database, 388
Imperative paradigm
Implementation level, 242
Inclusive OR gate, 99
Indention, in Python, 308
Indexed color, 83
Indexing techniques, search engines and, 528
Inference engine, 430
Infinite loop, 201
Infinite recursion, 223
Informatics, 26
Information Age, 30
Information layer, 5
Information Superhighway, 18
Information systems, 5, 387–412
and big data, 409
Infrared touch screen, 141
Inhibited state, neuron in, 432
Initial public offerings, 447
Input devices, 13
Input, in pseudocode algorithm, 172
Input statements, in four languages, 307
Input stream, 306
Input unit, 130
Insertion sort algorithm, 220, 220f
insert statement, in SQL, 405
Insertions, spreadsheet formulas and, 393
Inspection, 599
Instagram, 519
Instance, 282
Instance-of relationships, 425
Institute of Electrical and Electronics Engineers (IEEE), 124
Codes of Ethics, 114
Instruction register (IR), 131
Instruction specifier, in Pep/9, 155
Integrity, 559
Intelligent browsers, 26
Interactive systems, 454
International Species Inventory System (ISIS), 153
Internet backbone, 500
Internet Explorer (IE), 24
software piracy and copyrighting, 185
Internet gaming disorder, 490
Internet Protocol (IP), 506
Internet service providers (ISPs), 500, 514–515, 526
privacy and spam, 380
Internetworking, 498
Interoperability, 504
Intersection operation, in SQL, 405
Intractable problems, 617
Inventory control systems, 330
Inversion bubble, 97
Inverter, 96
Investigation of the Laws of Thought; on Which Are Founded the Mathematical Theories of Logic and Probabilities, An (book), 95
iOS mobile operating system, 331
iPad, 331
iPod, 348
iPod Touch, 331
ISBLANK function, in spreadsheets, 394f
Item number, in Universal Product Code, 402
Jacquard, Joseph, 9
Jacquard’s loom, 9
Java Bytecode, 542
Java Model Railroad Interface, 233
Java program compiled into, and run on different systems, 294f
Java Server Pages (JSPs), 542–543
scriptlets, 542
Java Virtual Machine (JVM), 293
JavaScript, in game development, 486
Job, 333
Journalism protection of bloggers, 580
JSPs. Java Server Pages
JVM. Java Virtual Machine
Labels, 168
Lambda calculus, 615
Landscape, computer-generated, 475f
LANs. Local-area networks
Laptop computers
Lardner, Dionysius, 14
Latin-1 Extended ASCII character set, 69
Leaf node, 249
LED. Light-emitting diode
Lee, J. A. N., 594
Left child, in binary trees, 247
LEFT function, in spreadsheets, 394f
Leibniz machine, 9
Lending clubs, 260
Less than or equal to relational operator, 300t
Less than relational operator, 300t
Leveson, Nancy, 597
Lexical ambiguity, 439
Licensing, of computer professionals, 180
Life-simulation games, 483
Light
Light-emitting diode (LED), 123
Lightweight laptops, 125
Like operation, in SQL, 405
Limitations on computing, 6, 587–620
ethical issues, 620
Lincoln, Abraham, 427
Linear accelerators, 620
Linear time, 610
Lines, 362
Linked structure, 245
LinkedIn, 519
Linkers, 21
List data structure and subprograms, in object-oriented design, 318–319
Lively (monitoring product), 393
Lives-in relationships, 425
Loebner, Hugh, 422
Loebner prize, 423
Logarithmic time, 610
Logic bomb, 566
Logic diagram, 94
of circuit, 104
Logic gates, 96
Logic Theorist, 424
Logical (or abstract) level, 242
Login process, 335
LOOK disk scheduling, 378
Loop control variable, 200
Looping, 298
selection statements nested within structures of, 310
Loops
Lorenz cipher, 576
Lossless compression, 57
Lossy compression, 57
Lotus, 23
Lotus 1-2-3, 395
Lovelace, Ada (Countess of Lovelace), 9
Machine code, 191
Machine translation, unrealized early promise of, 439
Macintosh, 23
Magnetic cores, 13
Magnetic drum, 13
Main module, 197
Mainframe, 335
Maintenance phase
Malware (malicious code), 208, 565–566
detection software, 125
Man-in-the-middle, 569
Manufacturer identification number, in Universal Product Code, 402
Many-to-many relationship, 406
Mariner 1 (Venus probe) error, 604
Markup language, 532, 532f, 547. Hypertext Markup Language
Mars Climate Orbiter Mission Failure, 604
Mars Reconnaissance Orbiter, 443
Mass storage devices, 135
Massively parallel processor, 144
Mathematical Analysis of Logic, The (book), 95
Mathematical logic, 27
Mathematics and Plausible Reasoning (book), 195
Mathematics education, 195
MAX function, in spreadsheets, 394f
MB (megabytes), 123
McAfee, 567
Medical diagnosis applications, 26
Medium-scale integration circuit, 112t
Megabyte, 123
Memory-mapped I/O, 159
Menabrea, Luigi, 14
Metalanguage, 544
Metcalfe, Robert, 17
Method (algorithm), 283
Metrics, scheduling algorithms evaluation and, 346
Metropolitan-area network (MAN), 498
Micro-taggant, 606
Microphones, 125
Microseconds, 125
Microsoft Research (England), 378
Miller’s law, 7
MIMD computers. Multiple-instruction, multiple-data-stream computers
Minicomputers, 335
Missile guidance programs, 330
Mnemonic letter codes, assembly languages and assignment of, 163
Mobile devices, in classroom, 244. iPhone; Laptop computers; Smartphones
Mobile robots, 440
Model Output Statistics (MOS) model, 464
Models, 455
Modem, 500
Modula-2, 23
Modulus operator, 302
Molecular modeling, 467
Moore, Gordon, 15
MOS model. Model Output Statistics model
Mosaic, 24
Motherboard, 131
Mozilla Firefox, 24
MS-DOS, 23
Multicore processors, 144
Multimedia, 56
Multiple-instruction, multiple-data-stream (MIMD) computers, 17
Multiplication, of integers, 302
Multiprogramming, 332
Music streaming, 177
N log2 N time, 610
Nanoscience, 96
Nanoseconds, 125
Nanotube transistors, 16
NASA twin robot launch, 444
National Medal of Technology, 127
National Oceanic and Atmospheric Administration (NOAA), 464
National Weather Service, 465
Natural join operation, in SQL, 405
Natural number, 36
NCR, 16
Negative number, 36
Negroponte, Nicholas, 30
Neiman Marcus (retailer), 146
Nested directories, 369
Nested Grid model (NGM), 464
Nested structure, 203
Netware (Novell), 18
Network neutrality, 515
Networked workstations, 16
Networking, 17–18. Social networks
over social media, 519
Networks, 6, 336, 495–518. Social networking
types of, 498f
Neurons, 432
New state, 344
Newell, Allen, 424
Newman, Max, 614
Newspapers, 529
NeXT, 349
NGM. Nested Grid model
Nigerian check scams, 160
Nike sensor, 348
Nixon–Kennedy debate, 427
Nonpreemptive scheduling, 346
Norton, 567
Norwegian Computing Center, 458
Not equal to relational operator, 300t
NOT expression, 97
Notes on Structured Programming (article), 307
Nouns, in object-oriented design, 286
NP-complete problems, 618
Nude Descending a Staircase (painting), 8f
Numbers. See also specific entries
Numeric values, 61
Nygaard, Kristen, 458
Obama, Barack
Object-oriented languages
Objects, 282
Odd parity, 595
Office suites, 24
Offset value, 343
OLPC computers. One Laptop per Child computers
Olsen, Ken, 25
1-bit binary adder, 11
One Laptop per Child (OLPC) program, 30
One-to-many relationship, 406
One-to-one relationship, 406
Online blogging, 24
Online transactions, future of, 516
Open Handset Alliance, 331
Open Source Hardware Bank, 247
Open systems, 504
Open Systems Interconnection (OSI) Reference Model, 504, 505f
Operand specifier, in Pep/9, 155
Operation codes (opcodes), in Pep/9, 155
Opt-in and opt-out, 380
combinational circuit and, 104
Orzack, Maressa Hecht, 489
OSI Reference Model. Open Systems Interconnection Reference Model
Output devices, 13
Output, in pseudocode algorithm, 172
Output statements, 306
Output unit, 130
Owner permissions, in UNIX operating system, 367
p-code, 293
P2P model. Peer-to-peer model
Pacific Marine Environmental Laboratory, 464
Packets, 502
Page-map table (PMT), 342
Page number value, 343
Page swap, 343
Paging, memory management with, 343
Paint programs, 469
Pandora, 177
Paradigms
Parent directory, 369
Parentheses, objects within, 298
Pareto’s law, 456
Parity bits, 595
Partition selection, approaches to, 341
Partition table, 341
Pascal, Blaise, 9
Path, 257
Paul, Ron, 411
PC-DOS, 23
PC Magazine, 26
PCs. Personal computers
Pentium chip, 594
Period, statements of fact ended with, 298
Peripheral devices, 13
Perlis, Alan, 133
Person class, in responsibility algorithm, 289
Personal privacy, 146
Philosophy and computer programming, 311
Phone-answering competition, 79
Phone data, 86
Physics engine, 484
PI function, in spreadsheets, 394f
Picoseconds, 125
Picture elements. Pixels
Piggybacking, 218
Ping, 506
Pipeline, processors in, 143f
Pipelining technique, 131
Pixar, 349
Plankalkul (Plan Calculus), 181
Planning systems, robotics and, 441
Plato, 224
Platters, 137
Playstation, 487
PMT. Page-map table
Point-and-click, 23
Polynomial-time algorithms, 611
Polynomials, 37
Pong, 483
Popping items, off stack, 243
Popular Mechanics, 25
Portability, standardized languages vs. interpretation by Bytecode, 294f
Portable Network Graphics (PNG), 83
Pratt, Terry, 293
Precision, 590
Preemptive scheduling, 345
Prefixes, used in computing, 126
Prentice Hall, 25
Presidential campaigns
Pretest loop, 201
Preventive maintenance, 594
Prime number, largest, 39
Princeton Ocean Model, 465
Privacy, 146
Private cloud, 516
Private fields, in class, 316
Problems
Procedural abstraction, 230
Procedural design, object-oriented design compared with, 318–319
Procedural programming, 295
Process, 332
Process control block (PCB), 345
Process life cycle, 344f
Process management, 332
Processing algorithms with arrays, 207
Processors, 122
Programming language paradigms
Programming Research Group, 377
Project operation, in SQL, 405
Proprietary systems, 504
Protein structure prediction, 467
Protocols, 496
Pseudo-operations, 165
Psychoacoustics, 79
Public cloud, 516
Public fields, 316
Public-key cryptography, 571
Pulse-code modulation (PCM), 58
Purdue University, 28
Pushing items, onto stack, 243
Python, 296
Race condition, 620
Radiation overdoses, 620
Radiosity, 474
Rag-doll physics, 484
Random access memory (RAM), 123, 134. See also Main memory
Random-number generator, 460
Range of cells, spreadsheet, 393
Raster-graphics format, 82
Rational number, 36
Ray tracing, 473
Ready state, 345
Real data type, 302
Real numbers
Real-time system, 336
Real Video, 85
Reclock, 58
Recurrence coding. Run-length encoding
Recursion, 221
Recursive algorithms
Recursive binary search, 224
Recursive call, 221
Recursive definition, 249
Recursive factorial, 223
Red Hat (Linux), 233
Reference Model, 504
value parameters vs., 269f
Referential ambiguity, 440
Reflections, 473
Register, 129
Relative path name, 372
Relays, 11
Relocatable models, 464
Remington Rand, 16
“Renaming the file,” 367
Rendering, 473
for graphics, 484
Rents database table, 403f
Repeaters, 504
Representation skill, 26
Representational error, 592
Resistive touch screen, 140
Resolution, 82
Response time, 336
Reuse, 318
inheritance and, 317
Rewritable DVD, 124
RGB values, 80
Right child, in binary trees, 247
Ring topology, 497
RISC architecture. Reduced-instruction-set computer architecture
Risk analysis, 560
Robotic whiskers, 441
Role-playing games, 483
ROM. Read-only memory
Room to Read, 23
Root directory, 369
Rosetta stone, 198
Ross, Blake, 331
Rotation delay, 137
Round-off error, 592
Route cipher, 570
Row designations, spreadsheet cells, 389
Rule-based system, 430
Running state, 345
Safari browser, 24
Sales estimates, spreadsheets and, 398
Savage Beast Technologies, 172
SAW touch screen. Surface acoustic wave touch screen
Scalable Vector Graphics (SVG), 84
Scanbuy Shopper, 559
Scanner fraud, 402
Scheduling algorithms, evaluating, 345
Scientific disciplines, 27
Scientific notation, 68
Scientific visualization systems, 470
Scriptlets, 542
Sculley, John, 349
SDRAM. Synchronous, dynamic RAM
Searching algorithms with arrays, 207
Second-generation computers
Secondary memory, operating system and tracking of, 365
Secondhand shopping, 407
Sectors, 136
Securities and Exchange Commission, U.S., 447
authentication credentials, 560
back door, 568
biometrics, 560
Blaster worm, 565
buffer overflow, 568
ciphers, 569
corporate responsibility, 574
cryptanalysis, 570
decryption, 569
denial of service, 569
digital certificate, 571
digital signature, 571
e-commerce and, 408
encryption, 569
man-in-the-middle, 569
password management software, 563
policy, 573
public-key cryptography, 571
smart cards, 560
spoofing, 568
user authentication, 560
viruses, 566
SEI Software Engineering Process Group, 599
Seismic models, 467
Select operation, in SQL, 405
Select signals (select control lines), 110
Select statements, 405
Selection construct, 173
example of, 216f
Self-auditing, 517
Semicolons
Semiconductor, 102
Sense-plan-act paradigm, 441f
Sequential circuit, 104
Sequential file access, 366
Server, in queuing model, 458. Web servers
Severe acute respiratory syndrome (SARS), 352
Shading model, 473
Shannon, Claude E., 11
Shared memory, 124
Shaw, J. C., 424
Shi Tao, 575
Shockley, William B., 13
Shortest job next, 348
Siemens, 181
Signature detection software, 567
Significant digits, 590
Silicon Valley, 19
Simon, Herbert A., 424b
Simple data types, 303
Simple Mail Transfer Protocol (SMTP), 507
Simple variables, algorithms with
Simulated worlds, 482
Simulation models, 455
Simulators, 293
SIN function, in spreadsheets, 394f
Single-instruction, multiple-data-stream (SIMD) computers, 17
Single instructions, multiple data (SIMD) parallelism, 143
Single quotes, characters enclosed within, 304
Six degrees of separation, 548
Size factor, 223
Slate Corporation, 396
Small world phenomenon, 548
Smalltalk, 296
Smart cards, 560
apps, 596
SNOBOL4, 293
Social networking, 24
Software Arts, 395
Software Engineering Institute (Carnegie Mellon University), 599
Software Garden, 396
Software piracy and copyrighting, 185
Software quality
Software requirements, 598
Software specifications, 598
Sojourner rover, 444
Sony Playstation, 483
Sorenson video codec, 85
Sorted arrays, 210f
Sound perception, 77
Source file, 363
Source, transistor, 103
SourceForge, 602
Space Shuttle Ground Processing System, 600
Spam, 380
Spatial video compression, 85
Special characters, 74
Special Interest Group for Computer Science Education, 46, 309
Splitting algorithm, 228f
Spoofing, 568
Spyware, 288
SSDs. Solid-state disks
SSI circuit. Small-scale integration circuit
Stack, Matt, 247
Standard Generalized Markup Language (SGML), 544
Stanford University, 28
Star topology, 497
Starvation, 376
Statistical Package for the Social Sciences (SPSS), 22
STDEV function, in spreadsheets, 394f
Stephenson, Arthur, 604
Stibitz, George, 11
STOP branch instruction, 168
Storage capacity, expressed in binary notation, 125
Storage devices, 13
Strachey, Christopher, 377
Strategy games, 483
Stress management, soothing software and, 375
binary search tree built from, 253f
STRO branch instruction, 167
Strong equivalence, 422
Strong typing, 301
Structure of Scientific Revolutions, The (book), 295
Structured design, 24
Styluses, 12
Subdirectory, 369
Substitution cipher, 569
Subtraction
SUM function, in spreadsheets, 394f
Superclass, 316
Superensembles, 465
Surface acoustic wave (SAW) touch screen, 141
Swap algorithm, 216
Symantec, 567
Symbolic logic and relays, 11
Symbols
Symmetric encryption, 571
Symmetric multiprocessors (SMPs), 144
Synapse, 432
Synchronous, dynamic RAM (SDRAM), 123
Synchronous processing, 143
Syntactic ambiguity, 440
Systems
Table, 400
Tablet computers, 331
Tablets for teaching, 244
Tag, 532
Tandy/Radio Shack, 16
Tape drives, 362
TeamAlpha, 368
Technology use, study of, 170
Telegraph, Einstein’s description of, 83
Television and elections, 427
Telnet, 507
Ten-level binary search tree, 252f
Ten’s complement, 63
Tenth strand, 100
Terminated state, 345
Terrorist detection software, 250
Test case, 182
Test plan, 182
Testing, 231
Textile counterfeiting, 606
Texting, 528
Texture mapping techniques, 472
Therac-25, 620
software errors, 603
Thrashing, 344
3D camera, 125
Thumb drive, 139
TIFF, 363
Time-driven simulation, 458
Time slice, 348
Titanic effect, 594
TLDs. Top-level domains
TODAY function, in spreadsheets, 394f
Torvolds, Linus, 601
Touch ID, 565
Track, 136
Training, 434
Transfer rate, 137
Transposition cipher, 570
Traveling Salesman problem, 618
Treatise on Differential Equations (book), 95
Treatise on the Calculus of Finite Differences (book), 95
Trees, 258
Trellix Corporation, 396
True color, 80
True value, in Boolean data type, 303
Trump, Donald, 574
Truth table, 94
Tsunami detection, 464
Turing Award, 11
Turnaround time, 345
Unary instructions, 155
Unconditional branch, 167
Underflow, 592
Undirected graph, 256
Union operation, in SQL, 405
Universal History of Computing, The (book), 37
University of Pennsylvania, 28
UNIX, 23
Unordered lists, 245
Unsorted arrays, 210f
Unsorted linked lists, 245f
Update statement, in SQL, 405
Uploads, 502
USA PATRIOT Act of 2001, 49
USB. Universal serial bus
User authentication, 560
User Datagram Protocol (UDP), 506
User-friendly software packages, 25
Users, ever-changing role of, 26
UTeach Institute, 244
reference parameters vs., 269f
Values, copying in spreadsheets, 394
van Dam, Andy, 503
Variables
VB .NET
Veeder, Jane, 469
Verbs, in top-down design, 286
Verification
Vertex (vertices)
Very large numbers, representing, 589
Video codecs (COmpressor/DECompressor), 84
Vinyl record album, 79
Virtual environments, 26
Virtual games, 140
Virtual memory, 343
VisiCalc, 395
Visio, 363
Visual system, human, 470
VLSI chips, 112
Voiceprint, 439
Voltage levels, 94
von Leibniz, Gottfried Wilhelm, 9
Voyager 1 and Voyager 2 space probes, 472
VQF format, 79
Waiting state, 345
Walk-through, 599
WAN. Wide-area network
Warford, Stanley, 153
WARPITOUT, 469
Watson, computing engine for smartphone apps, 596
Watson, Thomas, 25
Wayne, Ronald, 349
Weak equivalence, 421
Weather models, 456
Web pages, 526
Weblogs. Blogs and blogging
Websites, 526
Westergren, Tim, 172
What-if analysis, 398
Where clause, 404
While loop, count-controlled loop and, 201
While statement, 308
Whiskers, robotic, 441
Wide-area network (WAN), 498
Wiki, 575
Wikipedia, 24
Windows XP, 5
Wired magazine, 331
Wireless access points, 499
Wireless networking technology, 543
Wireless networks, 499
Wireless TV cameras, 282
Wood, John, 23
Word processors, 23
.WORD pseudo-op, 165
WordPerfect, 23
Words, 47
Working directory, 370
World of Warcraft players, addiction and, 489
World permissions, in UNIX operating system, 367
World Wide Web. Web
Worms, 566
Worst fit, 341
WPS-8 word processing product, 395
Writing and counting, 12
Wylie, Christopher, 574
Yahoo!, 527
3.133.108.241