Page 543 - Computer_Science_F5
P. 543
Computer Science Datagram Service 145, 533 Execute 59, 63, 84, 92, 99, 122, Hierarchical database model
data Level parallelism iii, 82,
232, 477, 479, 495, 496,
437, 534
Hit Rate 39, 534
109, 533
534
Expressions 256, 257, 258, 391,
Hold and wait 426, 534
Data Level Parallelism iii, 116,
534
533
I
Data link layer 136, 533
F
FOR ONLINE READING ONLY
data packets 142, 144, 145, 146,
147, 148, 151, 171, 199,
IDEs 302, 377, 387, 388, 534
526, 533 Fetching of Instruction 63, 534 ICMP 149, 150, 200, 534
Data Partitioning 117, 119, 533 Fibre Optical Cables (FOC) 182, IDLE 388, 389, 398, 534
Datapath and Control 62, 533 534 increment operators 252, 534
Data types 237, 238, 322, 392, file-based system 434, 436, 437, Infrared waves 183, 184, 534
444, 533 534 Inheritance 215, 216, 218, 295,
Data Warehouse 489, 533 Final 341, 342, 367, 368, 534 314, 354, 357, 371, 377,
Deadlock 425, 426, 534 Finalize() method 353, 534 378, 399, 404, 534
Decoding the Instruction 63, Firewalls 200, 534 Input and output streams 247,
534
First Come First Served (FCFS)
534
decrement operators 249, 252, 421, 427, 534 Instruction execution cycles 62,
253, 534 First Normal Form (1NF) 458, 534
DeMorgan’s theorem 18, 19, 20, 459, 460, 534 Instruction Level Parallelism
23, 534 Fish Tapes 187, 534 (ILP) iii, 82, 95, 96, 97,
Denial-of-Service Attacks 199, Flash Memory 40, 534 101, 102, 534
534 Flat file Database model 440, Instruction Set Architectures 52,
Derived data types 239, 534 534 84, 534
Designing Local Area Network Float data types 238, 534 Integer data types 237, 534
iv, 191, 534 Flow control 164, 172, 534 Intel x86 52, 53, 534
Destructors in Java 352, 534 Flynn’s taxonomy architecture Interface 24, 84, 140, 198, 226,
Device Drivers 415, 534 9, 534 313, 355, 357, 358, 415,
Direct Mapping 44, 534 Foreign Key 446, 447, 534 432, 529, 534
Distributed Database Systems forwarding 90, 92, 93, 94, 95, Internet Control Message Proto-
482, 483, 534 101, 102, 122, 138, 140, col 149, 534
DMA Technology 73, 534 195, 526, 534 Internet Protocol Version 6
DMA Transfers 72, 534 Fully Associative Mapping 45, (IPV6), 534
DNS Hacking Attacks 199, 534 534 Interrupts 74, 534
Domain vi, 119, 174, 199, 445, G IPv4 Subnetting 158, 534
534 Iteration 105, 106, 107, 269, 534
DRAM 40, 42, 534 Getter 369, 370, 384, 403, 534 J
E Getter and setter methods 370, Java Classes 345, 534
534
Echo Statement 501, 534 GRANT 475, 534 java comments 321, 534
Emerging database models 484, Graph databases 484, 487, 534 Java Interfaces 357, 534
534 GSM (Global System for Mobile K
Encapsulation 131, 133, 134,
213, 214, 298, 313, 361, Communications) 534 kernel 414, 415, 418, 534
369, 376, 378, 399, 403, Guided transmission media 178,
533, 534 179, 534 L
Entity Relationship 439, 440,
442, 453, 534 H logical AND 67, 257, 336, 534
Entity-relationship model 451, Harvard architecture 2, 7, 8, 534 Logical Data model 442, 534
534 Hazards 89, 90, 534 logical OR 257, 336, 534
evolution 206, 412, 534 Header format 161, 162, 534 Logic circuits iii, 30, 534
Exceptions 74, 534 Hello fellow Africans 388, 534 Logic errors 235, 534
534
for Advanced Secondary Schools
Computer Science Form 5.indd 534 23/07/2024 12:35

