Data manipulation language dml a language used to

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: ogram: An operating system program, which controls the operations and management of resources of a computer system. The control program's major functions are job scheduling, input/output scheduling, and program monitoring. Control unit: The unit of a computer system that manages and coordinates the operations of all the other components of the computer system. It is one of the components of the central processing unit (CPU) of the computer. Cost/benefit analysis: A procedure for evaluation and selection of hardware and/or software in which lists are made of all the costs and benefits of each proposed data processing system. Counter: A device, register or storage location for storing integers that is suitably incremented or decremented to represent the number of occurrences of an event. CPU scheduler: The part of the operating system that is concerned with deciding which of the ready jobs should be allotted the CPU for execution. CPU-bound jobs: Jobs which heavily utilize the CPU operations during the course of their processing. Crash: A hardware or software failure that causes a computer system to stop functioning. Cryptography: A means of protecting private information against unauthorized access in those situations where it is difficult to ensure access control. The basic idea behind this security technique is that if it is not possible to ensure access control, it is better to prevent comprehension of information. Cursor: A highlight on the screen of a monitor that indicates the location of the next keyed-in character on the display screen. It can appear as a small rectangular object, line, arrow, or I-beam pointer, or in a spreadsheet, as a large block covering an entire cell. Cybernatics: The use of computers coupled with automatic machinery to carry out complex operations. Cyberspace: The world-wide network of computers. Cycle stealing: A memory cycle taken by the DMA controller from the CPU to enable it to transfer data directly to memory. Cycle time: The time interval between the instant at which a read/write command is given to a memory and the instant when the next such instruc...
View Full Document

This document was uploaded on 04/07/2014.

Ask a homework question - tutors are online