STARTING OUT W/C++,...(LL)-W/ACCESS
STARTING OUT W/C++,...(LL)-W/ACCESS
9th Edition
ISBN: 9780134596174
Author: GADDIS
Publisher: PEARSON
bartleby

Concept explainers

Expert Solution & Answer
Book Icon
Chapter 1, Problem 1RQE

Explanation of Solution

Difference between main memory and secondary storage:

Main Memory Secondary storage
In Main memory or Random Access Memory (RAM), the data is directly accessed by the processing unit. In secondary storage, the data is transferred to the main memory and then routed to the processing unit.
Main memory is volatile, which means the information stored in the memory would be erased when the computer is turned off. Secondary storage is non-volatile, which means the information stored in the memory is not erased when the computer is turned off.
Main memory has a limited storage capacity. Secondary storage can store bulk amount of data in a single unit.
Main memory devices are more expensive when compared to the secondary storage devices. Secondary storage devices are less expensive when compared to the main memory devices.

The examples of main memory are,

  • RAM
  • ROM
  • EPROM
  • PROM
  • Cache memory
  • Registers.

The examples of secondary storage  are,

  • Floppy Disks
  • Magnetic tapes
  • Optical Disc
  • Flash memory.

Want to see more full solutions like this?

Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
Consider the following database for some store: Customers (cid, cname, city, discount)Agents (aid, aname, city, percent)Products (pid, pname, city, quantity, price)Orders (ordno, mon, cid, aid, pid, qty, dollars) The relation Customers records the ID (cid), name (cname), location (city) of each customer and a discount percentage (discount) for this customer. The relation Agents records the ID (aid), name (aname), location (city) of each agent and a transaction fee (percent) charged by this agent. The relation Products lists the ID (pid), name (pname), location (city), quantity and price of available products. And finally, the relation Orders contains a unique order number (ordno), the month (mon), customer (cid), agent (aid), product (pid), quantity (qty) of each order as well as the total value (dollars) of the transaction.   1. Express the following query in SQL (a) List customers (names) who do not have discounts but purchased at least one product of price greater than $50. (b) Find…
Consider the following relational schema and briefly answer the questions that follow:   Emp(eid: integer, ename: string, age: integer, salary: real)  Works(eid: integer, did: integer, pct_time: integer)  Dept(did: integer, budget: real, managerid: integer)      a. Define a table constraint on Dept that will ensure that all managers have age > 30. b. Write SQL statements to delete all information about employees whose salaries exceed that of the manager of one or more departments that they work in. Be sure to ensure that all the relevant integrity constraints are satisfied after your updates.
Consider the following relations:     Student(snum: integer, sname: string, rmajor: string,          level: string, age: integer)   Class(cname: string, meets_at: time, room: string, fid: integer)   Enrolled(snum: integer, cname: string)   Faculty(fid: integer, fname: string, deptid: integer)     The meaning of these relations is straightforward; for example, Enrolled has one record per student-class pair such that the student is enrolled in the class.     2. Express each of the following integrity constraints in SQL unless it is implied by the primary and foreign key constraint; if so, explain how it is implied. If the constraint cannot be expressed in SQL, say so. For each constraint, state what operations (inserts, deletes, and updates on specific relations) must be monitored to enforce the constraint.   (a) Every faculty member must teach at least two courses. (b) Every student must be enrolled in the course called 'Math101'. (c) A student cannot add more than two courses at a time…

Chapter 1 Solutions

STARTING OUT W/C++,...(LL)-W/ACCESS

Ch. 1.3 - What is an algorithm?Ch. 1.3 - Why were computer programming languages invented?Ch. 1.3 - Prob. 1.13CPCh. 1.3 - Prob. 1.14CPCh. 1.3 - Prob. 1.15CPCh. 1.3 - Prob. 1.16CPCh. 1.3 - Prob. 1.17CPCh. 1.5 - Prob. 1.18CPCh. 1.5 - Prob. 1.19CPCh. 1.5 - Describe the difference between a program line and...Ch. 1.5 - Prob. 1.21CPCh. 1.5 - What happens to a variables current contents when...Ch. 1.5 - What must take place in a program before a...Ch. 1.5 - Prob. 1.24CPCh. 1.7 - What four items should you identify when defining...Ch. 1.7 - Prob. 1.26CPCh. 1.7 - What is a hierarchy chart?Ch. 1.7 - Prob. 1.28CPCh. 1.7 - Describe what a compiler does with a programs...Ch. 1.7 - Prob. 1.30CPCh. 1.7 - Is a syntax error (such as misspelling a key word)...Ch. 1.7 - What is the purpose of testing a program with...Ch. 1.7 - Briefly describe the difference between procedural...Ch. 1 - Prob. 1RQECh. 1 - What is the difference between system software and...Ch. 1 - Prob. 3RQECh. 1 - Why must programs written in a high-level language...Ch. 1 - Why is it easier to write a program in a...Ch. 1 - Prob. 6RQECh. 1 - Prob. 7RQECh. 1 - Prob. 8RQECh. 1 - The job of the ________ is to fetch instructions,...Ch. 1 - Internally, the CPU consists of the _______ and...Ch. 1 - Prob. 11RQECh. 1 - The two general categories of software are...Ch. 1 - A program is a set of _______.Ch. 1 - Prob. 14RQECh. 1 - _______ is the only language computers really...Ch. 1 - __________ languages are close to the level of...Ch. 1 - ________ languages are close to the level of the...Ch. 1 - Prob. 18RQECh. 1 - Words that have special meaning in a programming...Ch. 1 - Prob. 20RQECh. 1 - Prob. 21RQECh. 1 - __________ characters or symbols mark thebeginning...Ch. 1 - Prob. 23RQECh. 1 - Prob. 24RQECh. 1 - Prob. 25RQECh. 1 - Prob. 26RQECh. 1 - __________ is information a program gathers from...Ch. 1 - __________is information a program sends to the...Ch. 1 - Prob. 29RQECh. 1 - Available Credit The following steps should be...Ch. 1 - Sales Tax Design a hierarchy chart or flowchart...Ch. 1 - Account Balance Design a hierarchy chart or...Ch. 1 - The variable x starts with the value 0. The...Ch. 1 - The variable j starts with the value 10. The...Ch. 1 - The variable a starts with the value 1. The...Ch. 1 - Find the Error 36. The following pseudocode...
Knowledge Booster
Background pattern image
Computer Science
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning
Text book image
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Text book image
C++ for Engineers and Scientists
Computer Science
ISBN:9781133187844
Author:Bronson, Gary J.
Publisher:Course Technology Ptr
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
EBK JAVA PROGRAMMING
Computer Science
ISBN:9781337671385
Author:FARRELL
Publisher:CENGAGE LEARNING - CONSIGNMENT
Text book image
C++ Programming: From Problem Analysis to Program...
Computer Science
ISBN:9781337102087
Author:D. S. Malik
Publisher:Cengage Learning