Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Computer program

From Wikipedia, the free encyclopedia
(Redirected fromComputer programs)
Instructions a computer can execute
For the TV program, seeThe Computer Programme.
Source code for a computer program written in theJavaScript language. It demonstrates theappendChild method. The method adds a new child node to an existing parent node. It is commonly used to dynamically modify the structure of an HTML document.
Program execution
General concepts
Types of code
Compilation strategies
Notable runtimes
Notable compilers & toolchains

Acomputer program is asequence or set[a] of instructions in aprogramming language for acomputer toexecute. It is one component ofsoftware, which also includesdocumentation and other intangible components.[1]

Acomputer program in itshuman-readable form is calledsource code. Source code needs another computer program toexecute because computers can only execute their nativemachine instructions. Therefore, source code may betranslated to machine instructions using acompiler written for the language. (Assembly language programs are translated using anassembler.) The resulting file is called anexecutable. Alternatively, source code may execute within aninterpreter written for the language.[2]

If the executable is requested for execution, then theoperating systemloads it intomemory and starts aprocess.[3] Thecentral processing unit will soonswitch to this process so it canfetch, decode, and then execute each machine instruction.[4]

If the source code is requested for execution, then the operating system loads the corresponding interpreter into memory and starts a process. The interpreter then loads the source code into memory to translate and execute eachstatement. Running the source code is slower than running anexecutable.[5][b] Moreover, the interpreter must be installed on the computer.

Example computer program

[edit]

The"Hello, World!" program is used to illustrate a language's basicsyntax. The syntax of the languageBASIC (1964) was intentionally limited to make the language easy to learn.[6] For example,variables are notdeclared before being used.[7] Also, variables are automatically initialized to zero.[7] Here is an example computer program, in Basic, toaverage a list of numbers:[8]

10INPUT"How many numbers to average?",A20FORI=1TOA30INPUT"Enter number:",B40LETC=C+B50NEXTI60LETD=C/A70PRINT"The average is",D80END

Once the mechanics of basic computer programming are learned, more sophisticated and powerful languages are available to build large computer systems.[9]

History

[edit]
See also:Computer programming § History,Programmer § History,History of computing,History of programming languages, andHistory of software

Improvements insoftware development are the result of improvements incomputer hardware. At each stage in hardware's history, the task ofcomputer programming changed dramatically.

Analytical Engine

[edit]
Lovelace's description from Note G

In 1837,Jacquard's loom inspiredCharles Babbage to attempt to build theAnalytical Engine.[10]The names of the components of the calculating device were borrowed from the textile industry. In the textile industry, yarn was brought from the store to be milled. The device had astore which consisted of memory to hold 1,000 numbers of 50 decimal digits each.[11] Numbers from thestore were transferred to themill for processing. The engine was programmed using two sets of perforated cards. One set directed the operation and the other set inputted the variables.[10][12] However, the thousands of cogged wheels and gears never fully worked together.[13]

Ada Lovelace worked for Charles Babbage to create a description of the Analytical Engine (1843).[14] The description contained Note G which completely detailed a method for calculatingBernoulli numbers using the Analytical Engine. This note is recognized by some historians as the world's firstcomputer program.[13]

Universal Turing machine

[edit]

In 1936,Alan Turing introduced theUniversal Turing machine, a theoretical device that can model every computation.[15]It is afinite-state machine that has an infinitely long read/write tape. The machine can move the tape back and forth, changing its contents as it performs analgorithm. The machine starts in the initial state, goes through a sequence of steps, and halts when it encounters the halt state.[16] All present-day computers areTuring complete.[17]

ENIAC

[edit]
Glenn A. Beck changing a tube in ENIAC

TheElectronic Numerical Integrator And Computer (ENIAC) was built between July 1943 and Fall 1945. It was aTuring complete, general-purpose computer that used 17,468vacuum tubes to create thecircuits. At its core, it was a series ofPascalines wired together.[18] Its 40 units weighed 30 tons, occupied 1,800 square feet (167 m2), and consumed $650 per hour (in 1940s currency) in electricity when idle.[18] It had 20base-10accumulators. Programming the ENIAC took up to two months.[18] Three function tables were on wheels and needed to be rolled to fixed function panels. Function tables were connected to function panels by plugging heavy black cables intoplugboards. Each function table had 728 rotating knobs. Programming the ENIAC also involved setting some of the 3,000 switches. Debugging a program took a week.[19] It ran from 1947 until 1955 atAberdeen Proving Ground, calculating hydrogen bomb parameters, predicting weather patterns, and producing firing tables to aim artillery guns.[20]

Stored-program computers

[edit]

Instead of plugging in cords and turning switches, astored-program computer loads its instructions intomemory just like it loads its data into memory.[21] As a result, the computer could be programmed quickly and perform calculations at very fast speeds.[22]Presper Eckert andJohn Mauchly built the ENIAC. The two engineers introduced thestored-program concept in a three-page memo dated February 1944.[23] Later, in September 1944,John von Neumann began working on the ENIAC project. On June 30, 1945, von Neumann published theFirst Draft of a Report on the EDVAC, which equated the structures of the computer with the structures of the human brain.[22] The design became known as thevon Neumann architecture. The architecture was simultaneously deployed in the constructions of theEDVAC andEDSAC computers in 1949.[24]

TheIBM System/360 (1964) was a family of computers, each having the sameinstruction set architecture. TheModel 20 was the smallest and least expensive. Customers could upgrade and retain the sameapplication software.[25] TheModel 195 was the most premium. Each System/360 model featuredmultiprogramming[25]—having multipleprocesses inmemory at once. When one process was waiting forinput/output, another could compute.

IBM planned for each model to be programmed usingPL/1.[26] A committee was formed that includedCOBOL,Fortran andALGOL programmers. The purpose was to develop a language that was comprehensive, easy to use, extendible, and would replace Cobol and Fortran.[26] The result was a large and complex language that took a long time tocompile.[27]

Switches for manual input on aData General Nova 3, manufactured in the mid-1970s

Computers manufactured until the 1970s had front-panel switches for manual programming.[28] The computer program was written on paper for reference. An instruction was represented by a configuration of on/off settings. After setting the configuration, an execute button was pressed. This process was then repeated. Computer programs also were automatically inputted viapaper tape,punched cards ormagnetic-tape. After the medium was loaded, the starting address was set via switches, and the execute button was pressed.[28]

Very Large Scale Integration

[edit]
A VLSI integrated-circuitdie

A major milestone in software development was the invention of theVery Large Scale Integration (VLSI) circuit (1964).[29] FollowingWorld War II, tube-based technology was replaced withpoint-contact transistors (1947) andbipolar junction transistors (late 1950s) mounted on acircuit board.[29]During the 1960s, theaerospace industry replaced the circuit board with anintegrated circuit chip.[29]

Robert Noyce, co-founder ofFairchild Semiconductor (1957) andIntel (1968), achieved a technological improvement to refine theproduction offield-effect transistors (1963).[30] The goal is to alter theelectrical resistivity and conductivity of asemiconductor junction. First, naturally occurringsilicate minerals are converted intopolysilicon rods using theSiemens process.[31] TheCzochralski process then converts the rods into amonocrystalline silicon,boule crystal.[32] Thecrystal is then thinly sliced to form awafersubstrate. Theplanar process ofphotolithography thenintegrates unipolar transistors,capacitors,diodes, andresistors onto the wafer to build a matrix ofmetal–oxide–semiconductor (MOS) transistors.[33][34] The MOS transistor is the primary component inintegrated circuit chips.[30]

Originally, integrated circuit chips had their function set during manufacturing. During the 1960s, controlling the electrical flow migrated to programming amatrix ofread-only memory (ROM). The matrix resembled a two-dimensional array of fuses.[29] The process to embed instructions onto the matrix was to burn out the unneeded connections.[29] There were so many connections,firmware programmers wrote acomputer program on another chip to oversee the burning.[29] The technology became known asProgrammable ROM. In 1971, Intelinstalled the computer program onto the chip and named it theIntel 4004microprocessor.[35]

IBM's System/360 (1964) CPU was not a microprocessor.

The termsmicroprocessor andcentral processing unit (CPU) are now used interchangeably. However, CPUs predate microprocessors. For example, theIBM System/360 (1964) had a CPU made fromcircuit boards containing discrete components on ceramic substrates.[36]

Sac State 8008

[edit]
Artist's depiction of Sacramento State University's Intel 8008 microcomputer (1972)

The Intel 4004 (1971) was a 4-bit microprocessor designed to run theBusicom calculator. Five months after its release, Intel released theIntel 8008, an 8-bit microprocessor. Bill Pentz led a team atSacramento State to build the firstmicrocomputer using the Intel 8008: theSac State 8008 (1972).[37] Its purpose was to store patient medical records. The computer supported adisk operating system to run aMemorex, 3-megabyte,hard disk drive.[29] It had a color display and keyboard that was packaged in a single console. The disk operating system was programmed usingIBM's Basic Assembly Language (BAL). The medical records application was programmed using aBASIC interpreter.[29] However, the computer was an evolutionary dead-end because it was extremely expensive. Also, it was built at a public university lab for a specific purpose.[37] Nonetheless, the project contributed to the development of theIntel 8080 (1974)instruction set.[29]

x86 series

[edit]
The originalIBM Personal Computer (1981) used an Intel 8088 microprocessor.

In 1978, the modernsoftware development environment began when Intel upgraded theIntel 8080 to theIntel 8086. Intel simplified the Intel 8086 to manufacture the cheaperIntel 8088.[38]IBM embraced the Intel 8088 when they entered thepersonal computer market (1981). Asconsumerdemand for personal computers increased, so did Intel's microprocessor development. The succession of development is known as thex86 series. Thex86 assembly language is a family ofbackward-compatiblemachine instructions. Machine instructions created in earlier microprocessors were retained throughout microprocessor upgrades. This enabled consumers to purchase new computers without having to purchase newapplication software. The major categories of instructions are:[c]

Changing programming environment

[edit]
TheDECVT100 (1978) was a widely usedcomputer terminal.

VLSI circuits enabled theprogramming environment to advance from acomputer terminal (until the 1990s) to agraphical user interface (GUI) computer. Computer terminals limited programmers to a singleshell running in acommand-line environment. During the 1970s, full-screen source code editing became possible through atext-based user interface. Regardless of the technology available, the goal is to program in aprogramming language.

Programming paradigms and languages

[edit]

Programming language features exist to provide building blocks to be combined to express programming ideals.[39] Ideally, a programming language should:[39]

  • express ideas directly in the code.
  • express independent ideas independently.
  • express relationships among ideas directly in the code.
  • combine ideas freely.
  • combine ideas only where combinations make sense.
  • express simple ideas simply.

Theprogramming style of a programming language to provide these building blocks may be categorized intoprogramming paradigms.[40] For example, different paradigms may differentiate:[40]

Each of these programming styles has contributed to the synthesis of differentprogramming languages.[40]

Aprogramming language is a set ofkeywords,symbols,identifiers, and rules by which programmers can communicate instructions to the computer.[41] They follow a set of rules called asyntax.[41]

Programming languages get their basis fromformal languages.[42] The purpose of defining a solution in terms of itsformal language is to generate analgorithm to solve the underlining problem.[42] Analgorithm is a sequence of simple instructions that solve a problem.[43]

Generations of programming language

[edit]
Main article:Programming language generations
Machine language monitor on aW65C816Smicroprocessor

The evolution of programming languages began when theEDSAC (1949) used the firststored computer program in itsvon Neumann architecture.[44] Programming the EDSAC was in the firstgeneration of programming language.

  • The basic structure of an assembly language statement is a label,operation,operand, and comment.[47]
  • Labels allow the programmer to work withvariable names. The assembler will later translate labels into physicalmemory addresses.
  • Operations allow the programmer to work with mnemonics. The assembler will later translate mnemonics into instruction numbers.
  • Operands tell the assembler which data the operation will process.
  • Comments allow the programmer to articulate a narrative because the instructions alone are vague.
The key characteristic of an assembly language program is it forms a one-to-one mapping to its corresponding machine language target.[48]

Imperative languages

[edit]
Main article:Imperative programming
A computer program written in an imperative language

Imperative languages specify a sequentialalgorithm usingdeclarations,expressions, andstatements:[52]

  • Adeclaration introduces avariable name to thecomputer program and assigns it to adatatype[53] – for example:var x: integer;
  • Anexpression yields a value – for example:2 + 2 yields 4
  • Astatement mightassign an expression to a variable or use the value of a variable to alter the program'scontrol flow – for example:x := 2 + 2;if x = 4 then do_something();

Fortran

[edit]

FORTRAN (1958) was unveiled as "The IBM Mathematical FORmula TRANslating system". It was designed for scientific calculations, withoutstring handling facilities. Along withdeclarations,expressions, andstatements, it supported:

It succeeded because:

  • programming and debugging costs were below computer running costs.
  • it was supported by IBM.
  • applications at the time were scientific.[54]

However, non-IBM vendors also wrote Fortran compilers, but with a syntax that would likely fail IBM's compiler.[54] TheAmerican National Standards Institute (ANSI) developed the first Fortran standard in 1966. In 1978, Fortran 77 became the standard until 1991. Fortran 90 supports:

COBOL

[edit]

COBOL (1959) stands for "COmmon Business Oriented Language". Fortran manipulated symbols. It was soon realized that symbols did not need to be numbers, sostrings were introduced.[55] TheUS Department of Defense influenced COBOL's development, withGrace Hopper being a major contributor. The statements were English-like and verbose. The goal was to design a language so managers could read the programs. However, the lack of structured statements hindered this goal.[56]

COBOL's development was tightly controlled, so dialects did not emerge to require ANSI standards. As a consequence, it was not changed for 15 years until 1974. The 1990s version did make consequential changes, likeobject-oriented programming.[56]

Algol

[edit]

ALGOL (1960) stands for "ALGOrithmic Language". It had a profound influence on programming language design.[57] Emerging from a committee of European and American programming language experts, it used standard mathematical notation and had a readable, structured design. Algol was first to define itssyntax using theBackus–Naur form.[57] This led tosyntax-directed compilers. It added features like:

Algol's direct descendants includePascal,Modula-2,Ada,Delphi andOberon on one branch. On another branch the descendants includeC,C++ andJava.[57]

Basic

[edit]

BASIC (1964) stands for "Beginner's All-Purpose Symbolic Instruction Code". It was developed atDartmouth College for all of their students to learn.[8] If a student did not go on to a more powerful language, the student would still remember Basic.[8] A Basic interpreter was installed in themicrocomputers manufactured in the late 1970s. As the microcomputer industry grew, so did the language.[8]

Basic pioneered theinteractive session.[8] It offeredoperating system commands within its environment:

  • The 'new' command created an empty slate.
  • Statements evaluated immediately.
  • Statements could be programmed by preceding them with line numbers.[f]
  • The 'list' command displayed the program.
  • The 'run' command executed the program.

However, the Basic syntax was too simple for large programs.[8] Recent dialects added structure and object-oriented extensions.Microsoft'sVisual Basic is still widely used and produces agraphical user interface.[7]

C

[edit]

C programming language (1973) got its name because the languageBCPL was replaced withB, andAT&T Bell Labs called the next version "C". Its purpose was to write theUNIXoperating system.[50] C is a relatively small language, making it easy to write compilers. Its growth mirrored the hardware growth in the 1980s.[50] Its growth also was because it has the facilities ofassembly language, but uses ahigh-level syntax. It added advanced features like:

Computer memory map

C allows the programmer to control which region of memory data is to be stored.Global variables andstatic variables require the fewestclock cycles to store. Thestack is automatically used for the standard variabledeclarations.Heap memory is returned to apointer variable from themalloc() function.

  • Theglobal and static data region is located just above theprogram region. (The program region is technically called thetext region. It is where machine instructions are stored.)
  • The global and static data region is technically two regions.[58] One region is called theinitializeddata segment, where variables declared with default values are stored. The other region is called theblock started by segment, where variables declared without default values are stored.
  • Variables stored in theglobal and static data region have theiraddresses set at compile-time. They retain their values throughout the life of the process.
  • The global and static region stores theglobal variables that are declared on top of (outside) themain() function.[59] Global variables are visible tomain() and every other function in the source code.
On the other hand, variable declarations inside ofmain(), other functions, or within{}block delimiters arelocal variables. Local variables also includeformal parameter variables. Parameter variables are enclosed within the parenthesis of a function definition.[60] Parameters provide aninterface to the function.
  • Local variables declared using thestatic prefix are also stored in theglobal and static data region.[58] Unlike global variables, static variables are only visible within the function or block. Static variables always retain their value. An example usage would be the functionint increment_counter(){static int counter = 0; counter++; return counter;}[g]
  • Thestack region is a contiguous block of memory located near the top memory address.[61] Variables placed in the stack are populated from top to bottom.[h][61] Astack pointer is a special-purposeregister that keeps track of the last memory address populated.[61] Variables are placed into the stack via theassembly language PUSH instruction. Therefore, the addresses of these variables are set duringruntime. The method for stack variables to lose theirscope is via the POP instruction.
  • Local variables declared without thestatic prefix, including formal parameter variables,[62] are calledautomatic variables[59] and are stored in the stack.[58] They are visible inside the function or block and lose their scope upon exiting the function or block.
  • Theheap region is located below the stack.[58] It is populated from the bottom to the top. Theoperating system manages the heap using aheap pointer and a list of allocated memory blocks.[63] Like the stack, the addresses of heap variables are set during runtime. Anout of memory error occurs when the heap pointer and the stack pointer meet.
  • C provides themalloc() library function toallocate heap memory.[i][64] Populating the heap with data is an additional copy function.[j] Variables stored in the heap are economically passed to functions using pointers. Without pointers, the entire block of data would have to be passed to the function via the stack.

C++

[edit]

In the 1970s,software engineers needed language support to break large projects down intomodules.[65] One obvious feature was to decompose large projectsphysically into separatefiles. A less obvious feature was to decompose large projectslogically intoabstract data types.[65] At the time, languages supportedconcrete (scalar) datatypes likeinteger numbers,floating-point numbers, andstrings ofcharacters. Abstract datatypes arestructures of concrete datatypes, with a new name assigned. For example, alist of integers could be calledinteger_list.

In object-oriented jargon, abstract datatypes are calledclasses. However, aclass is only a definition; no memory is allocated. When memory is allocated to a class andbound to anidentifier, it is called anobject.[66]

Object-oriented imperative languages developed by combining the need for classes and the need for safefunctional programming.[67] A function, in an object-oriented language, is assigned to a class. An assigned function is then referred to as amethod,member function, oroperation.Object-oriented programming is executingoperations onobjects.[68]

Object-oriented languages support a syntax to modelsubset/superset relationships. Inset theory, anelement of a subset inherits all the attributes contained in the superset. For example, a student is a person. Therefore, the set of students is a subset of the set of persons. As a result, students inherit all the attributes common to all persons. Additionally, students have unique attributes that other people do not have.Object-oriented languages modelsubset/superset relationships usinginheritance.[69]Object-oriented programming became the dominant language paradigm by the late 1990s.[65]

C++ (1985) was originally called "C with Classes".[70] It was designed to expandC's capabilities by adding the object-oriented facilities of the languageSimula.[71]

An object-oriented module is composed of two files. The definitions file is called theheader file. Here is a C++header file for theGRADE class in a simple school application:

// grade.h// -------// Used to allow multiple source files to include// this header file without duplication errors.// ----------------------------------------------#ifndef GRADE_H#define GRADE_HclassGRADE{public:// This is the constructor operation.// ----------------------------------GRADE(constcharletter);// This is a class variable.// -------------------------charletter;// This is a member operation.// ---------------------------intgrade_numeric(constcharletter);// This is a class variable.// -------------------------intnumeric;};#endif

Aconstructor operation is a function with the same name as the class name.[72] It is executed when the calling operation executes thenew statement.

A module's other file is thesource file. Here is a C++ source file for theGRADE class in a simple school application:

// grade.cpp// ---------#include"grade.h"GRADE::GRADE(constcharletter){// Reference the object using the keyword 'this'.// ----------------------------------------------this->letter=letter;// This is Temporal Cohesion// -------------------------this->numeric=grade_numeric(letter);}intGRADE::grade_numeric(constcharletter){if((letter=='A'||letter=='a'))return4;elseif((letter=='B'||letter=='b'))return3;elseif((letter=='C'||letter=='c'))return2;elseif((letter=='D'||letter=='d'))return1;elseif((letter=='F'||letter=='f'))return0;elsereturn-1;}

Here is a C++header file for thePERSON class in a simple school application:

// person.h// --------#ifndef PERSON_H#define PERSON_HclassPERSON{public:PERSON(constchar*name);constchar*name;};#endif

Here is a C++source file for thePERSON class in a simple school application:

// person.cpp// ----------#include"person.h"PERSON::PERSON(constchar*name){this->name=name;}

Here is a C++header file for theSTUDENT class in a simple school application:

// student.h// ---------#ifndef STUDENT_H#define STUDENT_H#include"person.h"#include"grade.h"// A STUDENT is a subset of PERSON.// --------------------------------classSTUDENT:publicPERSON{public:STUDENT(constchar*name);GRADE*grade;};#endif

Here is a C++source file for theSTUDENT class in a simple school application:

// student.cpp// -----------#include"student.h"#include"person.h"STUDENT::STUDENT(constchar*name):// Execute the constructor of the PERSON superclass.// -------------------------------------------------PERSON(name){// Nothing else to do.// -------------------}

Here is a driver program for demonstration:

// student_dvr.cpp// ---------------#include<iostream>#include"student.h"intmain(void){STUDENT*student=newSTUDENT("The Student");student->grade=newGRADE('a');std::cout// Notice student inherits PERSON's name<<student->name<<": Numeric grade = "<<student->grade->numeric<<"\n";return0;}

Here is amakefile to compile everything:

# makefile# --------all:student_dvrclean:rmstudent_dvr*.ostudent_dvr:student_dvr.cppgrade.ostudent.operson.oc++student_dvr.cppgrade.ostudent.operson.o-ostudent_dvrgrade.o:grade.cppgrade.hc++-cgrade.cppstudent.o:student.cppstudent.hc++-cstudent.cppperson.o:person.cppperson.hc++-cperson.cpp

Declarative languages

[edit]
Main article:Declarative programming

Imperative languages have one major criticism: assigning an expression to anon-local variable may produce an unintendedside effect.[73]Declarative languages generally omit the assignment statement and the control flow. They describewhat computation should be performed and nothow to compute it. Two broad categories of declarative languages arefunctional languages andlogical languages.

The principle behind afunctional language is to uselambda calculus as a guide for a well definedsemantic.[74] In mathematics, a function is a rule that maps elements from anexpression to a range ofvalues. Consider the function:

times_10(x) = 10 * x

Theexpression10 * x is mapped by the functiontimes_10() to a range ofvalues. Onevalue happens to be 20. This occurs when x is 2. So, the application of the function is mathematically written as:

times_10(2) = 20

Afunctional language compiler will not store this value in a variable. Instead, it willpush the value onto the computer'sstack before setting theprogram counter back to the calling function. The calling function will thenpop the value from the stack.[75]

Imperative languages do support functions. Therefore,functional programming can be achieved in an imperative language, if the programmer uses discipline. However, afunctional language will force this discipline onto the programmer through its syntax. Functional languages have a syntax tailored to emphasize thewhat.[76]

A functional program is developed with a set of primitive functions followed by a single driver function.[73] Consider thesnippet:

function max( a, b ){/* code omitted */}

function min( a, b ){/* code omitted */}

function range( a, b, c ) {

return max( a, max( b, c ) ) - min( a, min( b, c ) );

}

The primitives aremax() andmin(). The driver function isrange(). Executing:

put( range( 10, 4, 7) ); will output 6.

Functional languages are used incomputer science research to explore new language features.[77] Moreover, their lack of side-effects have made them popular inparallel programming andconcurrent programming.[78] However, application developers prefer theobject-oriented features ofimperative languages.[78]

Lisp

[edit]

Lisp (1958) stands for "LISt Processor".[79] It is tailored to processlists. A full structure of the data is formed by building lists of lists. In memory, atree data structure is built. Internally, the tree structure lends nicely forrecursive functions.[80] The syntax to build a tree is to enclose the space-separatedelements within parenthesis. The following is alist of three elements. The first two elements are themselves lists of two elements:

((A B) (HELLO WORLD) 94)

Lisp has functions to extract and reconstruct elements.[81] The functionhead() returns a list containing the first element in the list. The functiontail() returns a list containing everything but the first element. The functioncons() returns a list that is the concatenation of other lists. Therefore, the following expression will return the listx:

cons(head(x), tail(x))

One drawback of Lisp is when many functions are nested, the parentheses may look confusing.[76] Modern Lispenvironments help ensure parenthesis match. As an aside, Lisp does support theimperative language operations of the assignment statement and goto loops.[82] Also,Lisp is not concerned with thedatatype of the elements at compile time.[83] Instead, it assigns (and may reassign) the datatypes atruntime. Assigning the datatype at runtime is calleddynamic binding.[84] Whereas dynamic binding increases the language's flexibility, programming errors may linger until late in thesoftware development process.[84]

Writing large, reliable, and readable Lisp programs requires forethought. If properly planned, the program may be much shorter than an equivalentimperative language program.[76]Lisp is widely used inartificial intelligence. However, its usage has been accepted only because it hasimperative language operations, making unintended side-effects possible.[78]

ML

[edit]

ML (1973)[85] stands for "Meta Language". ML checks to make sure only data of the same type are compared with one another.[86] For example, this function has one input parameter (an integer) and returns an integer:

funtimes_10(n:int):int=10*n;

ML is not parenthesis-eccentric likeLisp. The following is an application oftimes_10():

times_10 2

It returns "20 : int". (Both the results and the datatype are returned.)

LikeLisp,ML is tailored to process lists. UnlikeLisp, each element is the same datatype.[87] Moreover,ML assigns the datatype of an element atcompile-time. Assigning the datatype at compile-time is calledstatic binding. Static binding increases reliability because the compiler checks the context of variables before they are used.[88]

Prolog

[edit]

Prolog (1972) stands for "PROgramming in LOGic". It is alogic programming language, based on formallogic. The language was developed byAlain Colmerauer and Philippe Roussel in Marseille, France. It is an implementation ofSelective Linear Definite clause resolution, pioneered byRobert Kowalski and others at theUniversity of Edinburgh.[89]

The building blocks of a Prolog program arefacts andrules. Here is a simple example:

cat(tom).% tom is a catmouse(jerry).% jerry is a mouseanimal(X):-cat(X).% each cat is an animalanimal(X):-mouse(X).% each mouse is an animalbig(X):-cat(X).% each cat is bigsmall(X):-mouse(X).% each mouse is smalleat(X,Y):-mouse(X),cheese(Y).% each mouse eats each cheeseeat(X,Y):-big(X),small(Y).% each big animal eats each small animal

After all the facts and rules are entered, then a question can be asked:

Will Tom eat Jerry?
?-eat(tom,jerry).true

The following example shows how Prolog will convert a letter grade to its numeric value:

numeric_grade('A',4).numeric_grade('B',3).numeric_grade('C',2).numeric_grade('D',1).numeric_grade('F',0).numeric_grade(X,-1):-notX='A',notX='B',notX='C',notX='D',notX='F'.grade('The Student','A').
?-grade('The Student',X),numeric_grade(X,Y).X='A',Y=4

Here is a comprehensive example:[90]

1) All dragons billow fire, or equivalently, a thing billows fire if the thing is a dragon:

billows_fire(X):-is_a_dragon(X).

2) A creature billows fire if one of its parents billows fire:

billows_fire(X):-is_a_creature(X),is_a_parent_of(Y,X),billows_fire(Y).

3) A thing X is a parent of a thing Y if X is the mother of Y or X is the father of Y:

is_a_parent_of(X,Y):-is_the_mother_of(X,Y).is_a_parent_of(X,Y):-is_the_father_of(X,Y).

4) A thing is a creature if the thing is a dragon:

is_a_creature(X):-is_a_dragon(X).

5) Norberta is a dragon, and Puff is a creature. Norberta is the mother of Puff.

is_a_dragon(norberta).is_a_creature(puff).is_the_mother_of(norberta,puff).

Rule (2) is arecursive (inductive) definition. It can be understood declaratively, without the need to understand how it is executed.

Rule (3) shows howfunctions are represented by using relations. Here, the mother and father functions ensure that every individual has only one mother and only one father.

Prolog is an untyped language. Nonetheless,inheritance can be represented by using predicates. Rule (4) asserts that a creature is a superclass of a dragon.

Questions are answered usingbackward reasoning. Given the question:

?-billows_fire(X).

Prolog generates two answers :

X=norbertaX=puff

Practical applications for Prolog areknowledge representation andproblem solving inartificial intelligence.

Object-oriented programming

[edit]

Object-oriented programming is a programming method to executeoperations (functions) onobjects.[91] The basic idea is to group the characteristics of aphenomenon into an objectcontainer and give the container a name. Theoperations on the phenomenon are also grouped into the container.[91]Object-oriented programming developed by combining the need for containers and the need for safefunctional programming.[92] This programming method need not be confined to anobject-oriented language.[93] In an object-oriented language, an object container is called aclass. In a non-object-oriented language, adata structure (which is also known as arecord) may become an object container. To turn a data structure into an object container, operations need to be written specifically for the structure. The resulting structure is called anabstract datatype.[94] However,inheritance will be missing. Nonetheless, this shortcoming can be overcome.

Here is aC programming languageheader file for theGRADE abstract datatype in a simple school application:

/* grade.h *//* ------- *//* Used to allow multiple source files to include *//* this header file without duplication errors.   *//* ---------------------------------------------- */#ifndef GRADE_H#define GRADE_Htypedefstruct{charletter;}GRADE;/* Constructor *//* ----------- */GRADE*grade_new(charletter);intgrade_numeric(charletter);#endif

Thegrade_new() function performs the same algorithm as the C++constructor operation.

Here is a C programming languagesource file for theGRADE abstract datatype in a simple school application:

/* grade.c *//* ------- */#include"grade.h"GRADE*grade_new(charletter){GRADE*grade;/* Allocate heap memory *//* -------------------- */if(!(grade=calloc(1,sizeof(GRADE)))){fprintf(stderr,"ERROR in %s/%s/%d: calloc() returned empty.\n",__FILE__,__FUNCTION__,__LINE__);exit(1);}grade->letter=letter;returngrade;}intgrade_numeric(charletter){if((letter=='A'||letter=='a'))return4;elseif((letter=='B'||letter=='b'))return3;elseif((letter=='C'||letter=='c'))return2;elseif((letter=='D'||letter=='d'))return1;elseif((letter=='F'||letter=='f'))return0;elsereturn-1;}

In the constructor, the functioncalloc() is used instead ofmalloc() because each memory cell will be set to zero.

Here is a C programming languageheader file for thePERSON abstract datatype in a simple school application:

/* person.h *//* -------- */#ifndef PERSON_H#define PERSON_Htypedefstruct{char*name;}PERSON;/* Constructor *//* ----------- */PERSON*person_new(char*name);#endif

Here is a C programming languagesource file for thePERSON abstract datatype in a simple school application:

/* person.c *//* -------- */#include"person.h"PERSON*person_new(char*name){PERSON*person;if(!(person=calloc(1,sizeof(PERSON)))){fprintf(stderr,"ERROR in %s/%s/%d: calloc() returned empty.\n",__FILE__,__FUNCTION__,__LINE__);exit(1);}person->name=name;returnperson;}

Here is a C programming languageheader file for theSTUDENT abstract datatype in a simple school application:

/* student.h *//* --------- */#ifndef STUDENT_H#define STUDENT_H#include"person.h"#include"grade.h"typedefstruct{/* A STUDENT is a subset of PERSON. *//* -------------------------------- */PERSON*person;GRADE*grade;}STUDENT;/* Constructor *//* ----------- */STUDENT*student_new(char*name);#endif

Here is a C programming languagesource file for theSTUDENT abstract datatype in a simple school application:

/* student.c *//* --------- */#include"student.h"#include"person.h"STUDENT*student_new(char*name){STUDENT*student;if(!(student=calloc(1,sizeof(STUDENT)))){fprintf(stderr,"ERROR in %s/%s/%d: calloc() returned empty.\n",__FILE__,__FUNCTION__,__LINE__);exit(1);}/* Execute the constructor of the PERSON superclass. *//* ------------------------------------------------- */student->person=person_new(name);returnstudent;}

Here is a driver program for demonstration:

/* student_dvr.c *//* ------------- */#include<stdio.h>#include"student.h"intmain(void){STUDENT*student=student_new("The Student");student->grade=grade_new('a');printf("%s: Numeric grade = %d\n",/* Whereas a subset exists, inheritance does not. */student->person->name,/* Functional programming is executing functions just-in-time (JIT) */grade_numeric(student->grade->letter));return0;}

Here is amakefile to compile everything:

# makefile# --------all:student_dvrclean:rmstudent_dvr*.ostudent_dvr:student_dvr.cgrade.ostudent.operson.ogccstudent_dvr.cgrade.ostudent.operson.o-ostudent_dvrgrade.o:grade.cgrade.hgcc-cgrade.cstudent.o:student.cstudent.hgcc-cstudent.cperson.o:person.cperson.hgcc-cperson.c

The formal strategy to build object-oriented objects is to:[95]

  • Identify the objects. Most likely these will be nouns.
  • Identify each object's attributes. What helps to describe the object?
  • Identify each object's actions. Most likely these will be verbs.
  • Identify the relationships from object to object. Most likely these will be verbs.

For example:

  • A person is a human identified by a name.
  • A grade is an achievement identified by a letter.
  • A student is a person who earns a grade.

Syntax and semantics

[edit]
Production rules consist of a set of terminals and non-terminals.

Thesyntax of acomputer program is alist ofproduction rules which form itsgrammar.[96] A programming language's grammar correctly places itsdeclarations,expressions, andstatements.[97] Complementing thesyntax of a language are itssemantics. Thesemantics describe the meanings attached to various syntactic constructs.[98] A syntactic construct may need a semantic description because a production rule may have an invalid interpretation.[99] Also, different languages might have the same syntax; however, their behaviors may be different.

The syntax of a language is formally described by listing the production rules. Whereas the syntax of anatural language is extremely complicated, a subset of the English language can have this production rule listing:[100]

  1. asentence is made up of anoun-phrase followed by averb-phrase;
  2. anoun-phrase is made up of anarticle followed by anadjective followed by anoun;
  3. averb-phrase is made up of averb followed by anoun-phrase;
  4. anarticle is 'the';
  5. anadjective is 'big' or
  6. anadjective is 'small';
  7. anoun is 'cat' or
  8. anoun is 'mouse';
  9. averb is 'eats';

The words inbold-face are known asnon-terminals. The words in 'single quotes' are known asterminals.[101]

From this production rule listing, complete sentences may be formed using a series of replacements.[102] The process is to replacenon-terminals with either a validnon-terminal or a validterminal. The replacement process repeats until onlyterminals remain. One valid sentence is:

  • sentence
  • noun-phraseverb-phrase
  • articleadjectivenounverb-phrase
  • theadjectivenounverb-phrase
  • thebignounverb-phrase
  • thebigcatverb-phrase
  • thebigcatverbnoun-phrase
  • thebigcateatsnoun-phrase
  • thebigcateatsarticleadjectivenoun
  • thebigcateatstheadjectivenoun
  • thebigcateatsthesmallnoun
  • thebigcateatsthesmallmouse

However, another combination results in an invalid sentence:

  • thesmallmouseeatsthebigcat

Therefore, asemantic is necessary to correctly describe the meaning of aneat activity.

Oneproduction rule listing method is called theBackus–Naur form (BNF).[103] BNF describes the syntax of a language and itself has asyntax. This recursive definition is an example of ameta-language.[98] Thesyntax of BNF includes:

  • ::= which translates tois made up of a[n] when a non-terminal is to its right. It translates tois when a terminal is to its right.
  • | which translates toor.
  • < and> which surroundnon-terminals.

Using BNF, a subset of the English language can have thisproduction rule listing:

<sentence>::=<noun-phrase><verb-phrase><noun-phrase>::=<article><adjective><noun><verb-phrase>::=<verb><noun-phrase><article>::= the<adjective>::= big | small<noun>::= cat | mouse<verb>::= eats

Using BNF, a signed-integer has theproduction rule listing:[104]

<signed-integer>::=<sign><integer><sign>::= + | -<integer>::=<digit> |<digit><integer><digit>::= 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9

Notice the recursive production rule:

<integer>::=<digit> |<digit><integer>

This allows for an infinite number of possibilities. Therefore, asemantic is necessary to describe a limitation of the number of digits.

Notice the leading zero possibility in the production rules:

<integer>::=<digit> |<digit><integer><digit>::= 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9

Therefore, asemantic is necessary to describe that leading zeros need to be ignored.

Two formal methods are available to describesemantics. They aredenotational semantics andaxiomatic semantics.[105]

Software engineering and computer programming

[edit]
Prior to programming languages,Betty Jennings andFran Bilas programmed theENIAC by moving cables and setting switches.

Software engineering is a variety of techniques to producequalitycomputer programs.[106]Computer programming is the process of writing or editingsource code. In a formal environment, asystems analyst will gather information from managers about all the organization's processes to automate. This professional then prepares adetailed plan for the new or modified system.[107] The plan is analogous to an architect's blueprint.[107]

Performance objectives

[edit]

The systems analyst has the objective to deliver the right information to the right person at the right time.[108] The critical factors to achieve this objective are:[108]

  1. The quality of the output. Is the output useful for decision-making?
  2. The accuracy of the output. Does it reflect the true situation?
  3. The format of the output. Is the output easily understood?
  4. The speed of the output. Time-sensitive information is important when communicating with the customer in real time.

Cost objectives

[edit]

Achieving performance objectives should be balanced with all of the costs, including:[109]

  1. Development costs.
  2. Uniqueness costs. A reusable system may be expensive. However, it might be preferred over a limited-use system.
  3. Hardware costs.
  4. Operating costs.

Applying asystems development process will mitigate the axiom: the later in the process an error is detected, the more expensive it is to correct.[110]

Waterfall model

[edit]

Thewaterfall model is an implementation of asystems development process.[111] As thewaterfall label implies, the basic phases overlap each other:[112]

  1. Theinvestigation phase is to understand the underlying problem.
  2. Theanalysis phase is to understand the possible solutions.
  3. Thedesign phase is toplan the best solution.
  4. Theimplementation phase is to program the best solution.
  5. Themaintenance phase lasts throughout the life of the system. Changes to the system after it is deployed may be necessary.[113] Faults may exist, including specification faults, design faults, or coding faults. Improvements may be necessary. Adaption may be necessary to react to a changing environment.

Computer programmer

[edit]

Acomputer programmer is a specialist responsible for writing or modifying the source code to implement the detailed plan.[107] A programming team is likely to be needed because most systems are too large to be completed by a single programmer.[114] However, adding programmers to a project may not shorten the completion time. Instead, it may lower the quality of the system.[114] To be effective, program modules need to be defined and distributed to team members.[114] Also, team members must interact with one another in a meaningful and effective way.[114]

Computer programmers may beprogramming in the small: programming within a single module.[115] Chances are a module will execute modules located in other source code files. Therefore, computer programmers may beprogramming in the large: programming modules so they will effectively couple with each other.[115] Programming-in-the-large includes contributing to theapplication programming interface (API).

Program modules

[edit]

Modular programming is a technique to refineimperative language programs. Refined programs may reduce the software size, separate responsibilities, and thereby mitigatesoftware aging. Aprogram module is a sequence of statements that are bounded within ablock and together identified by a name.[116] Modules have afunction,context, andlogic:[117]

  • Thefunction of a module is what it does.
  • Thecontext of a module are the elements being performed upon.
  • Thelogic of a module is how it performs the function.

The module's name should be derived first by itsfunction, then by itscontext. Itslogic should not be part of the name.[117] For example,function compute_square_root( x ) orfunction compute_square_root_integer( i : integer ) are appropriate module names. However,function compute_square_root_by_division( x ) is not.

The degree of interactionwithin a module is its level ofcohesion.[117]Cohesion is a judgment of the relationship between a module's name and itsfunction. The degree of interactionbetween modules is the level ofcoupling.[118]Coupling is a judgement of the relationship between a module'scontext and the elements being performed upon.

Cohesion

[edit]

The levels of cohesion from worst to best are:[119]

  • Coincidental Cohesion: A module has coincidental cohesion if it performs multiple functions, and the functions are completely unrelated. For example,function read_sales_record_print_next_line_convert_to_float(). Coincidental cohesion occurs in practice if management enforces silly rules. For example, "Every module will have between 35 and 50 executable statements."[119]
  • Logical Cohesion: A module has logical cohesion if it has available a series of functions, but only one of them is executed. For example,function perform_arithmetic( perform_addition, a, b ).
  • Temporal Cohesion: A module has temporal cohesion if it performs functions related to time. One example,function initialize_variables_and_open_files(). Another example,stage_one(),stage_two(), ...
  • Procedural Cohesion: A module has procedural cohesion if it performs multiple loosely related functions. For example,function read_part_number_update_employee_record().
  • Communicational Cohesion: A module has communicational cohesion if it performs multiple closely related functions. For example,function read_part_number_update_sales_record().
  • Informational Cohesion: A module has informational cohesion if it performs multiple functions, but each function has its own entry and exit points. Moreover, the functions share the same data structure. Object-oriented classes work at this level.
  • Functional Cohesion: a module has functional cohesion if it achieves a single goal working only on local variables. Moreover, it may be reusable in other contexts.

Coupling

[edit]

The levels of coupling from worst to best are:[118]

  • Content Coupling: A module has content coupling if it modifies a local variable of another function. COBOL used to do this with thealter verb.
  • Common Coupling: A module has common coupling if it modifies a global variable.
  • Control Coupling: A module has control coupling if another module can modify itscontrol flow. For example,perform_arithmetic( perform_addition, a, b ). Instead, control should be on the makeup of the returned object.
  • Stamp Coupling: A module has stamp coupling if an element of a data structure passed as a parameter is modified. Object-oriented classes work at this level.
  • Data Coupling: A module has data coupling if all of its input parameters are needed and none of them are modified. Moreover, the result of the function is returned as a single object.

Data flow analysis

[edit]
A sample function-level data-flow diagram

Data flow analysis is a design method used to achieve modules offunctional cohesion anddata coupling.[120] The input to the method is adata-flow diagram. A data-flow diagram is a set of ovals representing modules. Each module's name is displayed inside its oval. Modules may be at the executable level or the function level.

The diagram also has arrows connecting modules to each other. Arrows pointing into modules represent a set of inputs. Each module should have only one arrow pointing out from it to represent its single output object. (Optionally, an additional exception arrow points out.) Adaisy chain of ovals will convey an entirealgorithm. The input modules should start the diagram. The input modules should connect to the transform modules. The transform modules should connect to the output modules.[121]

Functional categories

[edit]
A diagram showing that theuser interacts with theapplication software. The application software interacts with theoperating system, which interacts with thehardware.

Computer programs may be categorized along functional lines. The main functional categories areapplication software andsystem software. System software includes theoperating system, which couplescomputer hardware with application software.[122] The purpose of the operating system is to provide an environment where application software executes in a convenient and efficient manner.[122] Both application software and system software executeutility programs. At the hardware level, amicrocode program controls the circuits throughout thecentral processing unit.

Application software

[edit]
Main article:Application software

Application software is the key to unlocking the potential of the computer system.[123]Enterprise application software bundles accounting, personnel, customer, and vendor applications. Examples includeenterprise resource planning,customer relationship management, andsupply chain management software.

Enterprise applications may be developed in-house as a one-of-a-kindproprietary software.[124] Alternatively, they may be purchased asoff-the-shelf software. Purchased software may be modified to providecustom software. If the application is customized, then either the company's resources are used or the resources are outsourced. Outsourced software development may be from the original software vendor or a third-party developer.[125]

The potential advantages of in-house software are features and reports may be developed exactly to specification.[126] Management may also be involved in the development process and offer a level of control.[127] Management may decide to counteract a competitor's new initiative or implement a customer or vendor requirement.[128] A merger or acquisition may necessitate enterprise software changes. The potential disadvantages of in-house software are time and resource costs may be extensive.[124] Furthermore, risks concerning features and performance may be looming.

The potential advantages of off-the-shelf software are upfront costs are identifiable, the basic needs should be fulfilled, and its performance and reliability have a track record.[124] The potential disadvantages of off-the-shelf software are it may have unnecessary features that confuse end users, it may lack features the enterprise needs, and the data flow may not match the enterprise's work processes.[124]

Application service provider

[edit]

One approach to economically obtaining a customized enterprise application is through anapplication service provider.[129] Specialty companies provide hardware, custom software, and end-user support. They may speed the development of new applications because they possess skilled information system staff. The biggest advantage is it frees in-house resources from staffing and managing complex computer projects.[129] Many application service providers target small, fast-growing companies with limited information system resources.[129] On the other hand, larger companies with major systems will likely have their technical infrastructure in place. One risk is having to trust an external organization with sensitive information. Another risk is having to trust the provider's infrastructure reliability.[129]

Operating system

[edit]
See also:Operating system
Program vs.Process vs.Thread
Scheduling,Preemption,Context Switching

Anoperating system is the low-level software that supports a computer's basic functions, such asschedulingprocesses and controllingperipherals.[122]

In the 1950s, the programmer, who was also the operator, would write a program and run it. After the program finished executing, the output may have been printed, or it may have been punched onto paper tape or cards for later processing.[28] More often than not the program did not work. The programmer then looked at the console lights and fiddled with the console switches. If less fortunate, a memory printout was made for further study. In the 1960s, programmers reduced the amount of wasted time by automating the operator's job. A program called anoperating system was kept in the computer at all times.[130]

The termoperating system may refer to two levels of software.[131] The operating system may refer to thekernel program that manages theprocesses,memory, anddevices. More broadly, the operating system may refer to the entire package of the central software. The package includes a kernel program,command-line interpreter,graphical user interface,utility programs, andeditor.[131]

Kernel Program

[edit]
A kernel connects the application software to the hardware of a computer.

The kernel's main purpose is to manage the limited resources of a computer:

Physical memory is scattered around RAM and the hard disk. Virtual memory is one continuous block.
  • When the kernel initiallyloads an executable into memory, it divides the address space logically intoregions.[133] The kernel maintains a master-region table and many per-process-region (pregion) tables—one for each runningprocess.[133] These tables constitute thevirtual address space. The master-region table is used to determine where its contents are located inphysical memory. The pregion tables allow each process to have its own program (text) pregion, data pregion, and stack pregion.
  • The program pregion stores machine instructions. Since machine instructions do not change, the program pregion may be shared by many processes of the same executable.[133]
  • To save time and memory, the kernel may load only blocks of execution instructions from the disk drive, not the entire execution file completely.[132]
  • The kernel is responsible for translating virtual addresses intophysical addresses. The kernel may request data from thememory controller and, instead, receive apage fault.[134] If so, the kernel accesses thememory management unit to populate the physical data region and translate the address.[135]
  • The kernel allocates memory from theheap upon request by a process.[64] When the process is finished with the memory, the process may request for it to befreed. If the process exits without requesting all allocated memory to be freed, then the kernel performsgarbage collection to free the memory.
  • The kernel also ensures that a process only accesses its own memory, and not that of the kernel or other processes.[132]
  • The kernel program should performfile system management.[132] The kernel has instructions to create, retrieve, update, and delete files.
  • The kernel program should performdevice management.[132] The kernel provides programs to standardize and simplify the interface to the mouse, keyboard, disk drives, printers, and other devices. Moreover, the kernel should arbitrate access to a device if two processes request it at the same time.
  • The kernel program should performnetwork management.[136] The kernel transmits and receivespackets on behalf of processes. One key service is to find an efficientroute to the target system.
  • The kernel program should providesystem level functions for programmers to use.[137]
    • Programmers access files through a relatively simple interface that in turn executes a relatively complicated low-level I/O interface. The low-level interface includes file creation,file descriptors, file seeking, physical reading, and physical writing.
    • Programmers create processes through a relatively simple interface that in turn executes a relatively complicated low-level interface.
    • Programmers perform date/time arithmetic through a relatively simple interface that in turn executes a relatively complicated low-level time interface.[138]
  • The kernel program should provide acommunication channel between executing processes.[139] For a large software system, it may be desirable toengineer the system into smaller processes. Processes may communicate with one another by sending and receivingsignals.

Originally, operating systems were programmed inassembly; however, modern operating systems are typically written in higher-level languages likeC,Objective-C, andSwift.[k]

Utility program

[edit]

Autility program is designed to aid system administration and software execution. Operating systems execute hardware utility programs to check the status of disk drives, memory, speakers, and printers.[140] A utility program may optimize the placement of a file on a crowded disk. System utility programs monitor hardware and network performance. When a metric is outside an acceptable range, a trigger alert is generated.[141]

Utility programs include compression programs so data files are stored on less disk space.[140] Compressed programs also save time when data files are transmitted over the network.[140] Utility programs can sort and merge data sets.[141] Utility programs detectcomputer viruses.[141]

Microcode program

[edit]
Main article:Microcode
NOT gate
NAND gate
NOR gate
AND gate
OR gate

Amicrocode program is the bottom-level interpreter that controls thedata path of software-driven computers.[142](Advances inhardware have migrated these operations tohardware execution circuits.)[142] Microcode instructions allow the programmer to more easily implement thedigital logic level[143]—the computer's real hardware. The digital logic level is the boundary betweencomputer science andcomputer engineering.[144]

Alogic gate is a tinytransistor that can return one of two signals: on or off.[145]

  • Having one transistor forms theNOT gate.
  • Connecting two transistors in series forms theNAND gate.
  • Connecting two transistors in parallel forms theNOR gate.
  • Connecting a NOT gate to a NAND gate forms theAND gate.
  • Connecting a NOT gate to a NOR gate forms theOR gate.

These five gates form the building blocks ofbinary algebra—the digital logic functions of the computer.

Microcode instructions aremnemonics programmers may use to execute digital logic functions instead of forming them in binary algebra. They are stored in acentral processing unit's (CPU)control store.[146]These hardware-level instructions move data throughout thedata path.

The micro-instruction cycle begins when themicrosequencer uses its microprogram counter tofetch the nextmachine instruction fromrandom-access memory.[147] The next step is todecode the machine instruction by selecting the proper output line to the hardware module.[148]The final step is toexecute the instruction using the hardware module's set of gates.

A symbolic representation of an ALU

Instructions to perform arithmetic are passed through anarithmetic logic unit (ALU).[149] The ALU has circuits to perform elementary operations to add, shift, and compare integers. By combining and looping the elementary operations through the ALU, the CPU performs its complex arithmetic.

Microcode instructions move data between the CPU and thememory controller. Memory controller microcode instructions manipulate tworegisters. Thememory address register is used to access each memory cell's address. Thememory data register is used to set and read each cell's contents.[150]

Microcode instructions move data between the CPU and the manycomputer buses. Thedisk controller bus writes to and reads fromhard disk drives. Data is also moved between the CPU and other functional units via theperipheral component interconnect express bus.[151]

Notes

[edit]
  1. ^TheProlog language allows for a database of facts and rules to be entered in any order. However, a question about a database must be at the very end.
  2. ^An executable has eachmachine instruction ready for theCPU.
  3. ^For more information, visitX86 assembly language#Instruction types.
  4. ^introduced in 1999
  5. ^Operators likex++ will usually compile to a single instruction.
  6. ^The line numbers were typically incremented by 10 to leave room if additional statements were added later.
  7. ^This function could be written more concisely asint increment_counter(){ static int counter; return ++counter;}. 1) Static variables are automatically initialized to zero. 2)++counter is a prefixincrement operator.
  8. ^This is despite the metaphor of astack, which normally grows from bottom to top.
  9. ^C also provides thecalloc() function to allocate heap memory. It provides two additional services: 1) It allows the programmer to create anarray of arbitrary size. 2) It sets eachmemory cell to zero.
  10. ^Forstring variables,C provides thestrdup() function. It executes both the allocation function and the copy function.
  11. ^TheUNIX operating system was written in C,macOS was written in Objective-C, and Swift replaced Objective-C.

References

[edit]
  1. ^"ISO/IEC 2382:2015".ISO. 2020-09-03.Archived from the original on 2016-06-17. Retrieved2022-05-26.[Software includes] all or part of the programs, procedures, rules, and associated documentation of an information processing system.
  2. ^Wilson, Leslie B. (2001).Comparative Programming Languages, Third Edition. Addison-Wesley. p. 7.ISBN 0-201-71012-9.An alternative to compiling a source program is to use an interpreter. An interpreter can directly execute a source program[.]
  3. ^Silberschatz, Abraham (1994).Operating System Concepts, Fourth Edition. Addison-Wesley. p. 98.ISBN 978-0-201-50480-4.
  4. ^Tanenbaum, Andrew S. (1990).Structured Computer Organization, Third Edition. Prentice Hall. p. 32.ISBN 978-0-13-854662-5.
  5. ^Wilson, Leslie B. (2001).Comparative Programming Languages, Third Edition. Addison-Wesley. p. 7.ISBN 0-201-71012-9.
  6. ^Wilson, Leslie B. (2001).Comparative Programming Languages, Third Edition. Addison-Wesley. p. 30.ISBN 0-201-71012-9.Their intention was to produce a language that was very simple for students to learn[.]
  7. ^abcWilson, Leslie B. (2001).Comparative Programming Languages, Third Edition. Addison-Wesley. p. 31.ISBN 0-201-71012-9.
  8. ^abcdefWilson, Leslie B. (2001).Comparative Programming Languages, Third Edition. Addison-Wesley. p. 30.ISBN 0-201-71012-9.
  9. ^Wilson, Leslie B. (2001).Comparative Programming Languages, Third Edition. Addison-Wesley. p. 30.ISBN 0-201-71012-9.The idea was that students could be merely casual users or go on from Basic to more sophisticated and powerful languages[.]
  10. ^abMcCartney, Scott (1999).ENIAC – The Triumphs and Tragedies of the World's First Computer. Walker and Company. p. 16.ISBN 978-0-8027-1348-3.
  11. ^Tanenbaum, Andrew S. (1990).Structured Computer Organization, Third Edition. Prentice Hall. p. 14.ISBN 978-0-13-854662-5.
  12. ^Bromley, Allan G. (1998)."Charles Babbage's Analytical Engine, 1838"(PDF).IEEE Annals of the History of Computing.20 (4):29–45.doi:10.1109/85.728228.S2CID 2285332.Archived(PDF) from the original on 2016-03-04. Retrieved2015-10-30.
  13. ^abTanenbaum, Andrew S. (1990).Structured Computer Organization, Third Edition. Prentice Hall. p. 15.ISBN 978-0-13-854662-5.
  14. ^J. Fuegi; J. Francis (October–December 2003), "Lovelace & Babbage and the creation of the 1843 'notes'",Annals of the History of Computing,25 (4): 16, 19, 25,doi:10.1109/MAHC.2003.1253887
  15. ^Rosen, Kenneth H. (1991).Discrete Mathematics and Its Applications. McGraw-Hill, Inc. p. 654.ISBN 978-0-07-053744-6.Turing machines can model all the computations that can be performed on a computing machine.
  16. ^Linz, Peter (1990).An Introduction to Formal Languages and Automata. D. C. Heath and Company. p. 234.ISBN 978-0-669-17342-0.
  17. ^Linz, Peter (1990).An Introduction to Formal Languages and Automata. D. C. Heath and Company. p. 243.ISBN 978-0-669-17342-0.[A]ll the common mathematical functions, no matter how complicated, are Turing-computable.
  18. ^abcMcCartney, Scott (1999).ENIAC – The Triumphs and Tragedies of the World's First Computer. Walker and Company. p. 102.ISBN 978-0-8027-1348-3.
  19. ^McCartney, Scott (1999).ENIAC – The Triumphs and Tragedies of the World's First Computer. Walker and Company. p. 94.ISBN 978-0-8027-1348-3.
  20. ^McCartney, Scott (1999).ENIAC – The Triumphs and Tragedies of the World's First Computer. Walker and Company. p. 107.ISBN 978-0-8027-1348-3.
  21. ^McCartney, Scott (1999).ENIAC – The Triumphs and Tragedies of the World's First Computer. Walker and Company. p. 120.ISBN 978-0-8027-1348-3.
  22. ^abMcCartney, Scott (1999).ENIAC – The Triumphs and Tragedies of the World's First Computer. Walker and Company. p. 118.ISBN 978-0-8027-1348-3.
  23. ^McCartney, Scott (1999).ENIAC – The Triumphs and Tragedies of the World's First Computer. Walker and Company. p. 119.ISBN 978-0-8027-1348-3.
  24. ^McCartney, Scott (1999).ENIAC – The Triumphs and Tragedies of the World's First Computer. Walker and Company. p. 123.ISBN 978-0-8027-1348-3.
  25. ^abTanenbaum, Andrew S. (1990).Structured Computer Organization, Third Edition. Prentice Hall. p. 21.ISBN 978-0-13-854662-5.
  26. ^abWilson, Leslie B. (2001).Comparative Programming Languages, Third Edition. Addison-Wesley. p. 27.ISBN 0-201-71012-9.
  27. ^Wilson, Leslie B. (2001).Comparative Programming Languages, Third Edition. Addison-Wesley. p. 29.ISBN 0-201-71012-9.
  28. ^abcSilberschatz, Abraham (1994).Operating System Concepts, Fourth Edition. Addison-Wesley. p. 6.ISBN 978-0-201-50480-4.
  29. ^abcdefghi"Bill Pentz — A bit of Background: the Post-War March to VLSI". Digibarn Computer Museum. August 2008.Archived from the original on March 21, 2022. RetrievedJanuary 31, 2022.
  30. ^abTo the Digital Age: Research Labs, Start-up Companies, and the Rise of MOS. Johns Hopkins University Press. 2002.ISBN 9780801886393.Archived from the original on February 2, 2023. RetrievedFebruary 3, 2022.
  31. ^Chalamala, Babu (2017)."Manufacturing of Silicon Materials for Microelectronics and Solar PV". Sandia National Laboratories.Archived from the original on March 23, 2023. RetrievedFebruary 8, 2022.
  32. ^"Fabricating ICs Making a base wafer". Britannica.Archived from the original on February 8, 2022. RetrievedFebruary 8, 2022.
  33. ^"Introduction to NMOS and PMOS Transistors". Anysilicon. 4 November 2021.Archived from the original on 6 February 2022. RetrievedFebruary 5, 2022.
  34. ^"microprocessor definition". Britannica.Archived from the original on April 1, 2022. RetrievedApril 1, 2022.
  35. ^"Chip Hall of Fame: Intel 4004 Microprocessor". Institute of Electrical and Electronics Engineers. July 2, 2018.Archived from the original on February 7, 2022. RetrievedJanuary 31, 2022.
  36. ^"360 Revolution"(PDF). Father, Son & Co. 1990.Archived(PDF) from the original on 2022-10-10. RetrievedFebruary 5, 2022.
  37. ^ab"Inside the world's long-lost first microcomputer". c/net. January 8, 2010.Archived from the original on February 1, 2022. RetrievedJanuary 31, 2022.
  38. ^"Bill Gates, Microsoft and the IBM Personal Computer". InfoWorld. August 23, 1982.Archived from the original on 18 February 2023. Retrieved1 February 2022.
  39. ^abStroustrup, Bjarne (2013).The C++ Programming Language, Fourth Edition. Addison-Wesley. p. 10.ISBN 978-0-321-56384-2.
  40. ^abcStroustrup, Bjarne (2013).The C++ Programming Language, Fourth Edition. Addison-Wesley. p. 11.ISBN 978-0-321-56384-2.
  41. ^abStair, Ralph M. (2003).Principles of Information Systems, Sixth Edition. Thomson. p. 159.ISBN 0-619-06489-7.
  42. ^abLinz, Peter (1990).An Introduction to Formal Languages and Automata. D. C. Heath and Company. p. 2.ISBN 978-0-669-17342-0.
  43. ^Weiss, Mark Allen (1994).Data Structures and Algorithm Analysis in C++. Benjamin/Cummings Publishing Company, Inc. p. 29.ISBN 0-8053-5443-3.
  44. ^Tanenbaum, Andrew S. (1990).Structured Computer Organization, Third Edition. Prentice Hall. p. 17.ISBN 978-0-13-854662-5.
  45. ^abcdefStair, Ralph M. (2003).Principles of Information Systems, Sixth Edition. Thomson. p. 160.ISBN 0-619-06489-7.
  46. ^abcTanenbaum, Andrew S. (1990).Structured Computer Organization, Third Edition. Prentice Hall. p. 399.ISBN 978-0-13-854662-5.
  47. ^Tanenbaum, Andrew S. (1990).Structured Computer Organization, Third Edition. Prentice Hall. p. 400.ISBN 978-0-13-854662-5.
  48. ^Tanenbaum, Andrew S. (1990).Structured Computer Organization, Third Edition. Prentice Hall. p. 398.ISBN 978-0-13-854662-5.
  49. ^Wilson, Leslie B. (2001).Comparative Programming Languages, Third Edition. Addison-Wesley. p. 26.ISBN 0-201-71012-9.
  50. ^abcdWilson, Leslie B. (2001).Comparative Programming Languages, Third Edition. Addison-Wesley. p. 37.ISBN 0-201-71012-9.
  51. ^Stair, Ralph M. (2003).Principles of Information Systems, Sixth Edition. Thomson. p. 160.ISBN 0-619-06489-7.With third-generation and higher-level programming languages, each statement in the language translates into several instructions in machine language.
  52. ^Wilson, Leslie B. (1993).Comparative Programming Languages, Second Edition. Addison-Wesley. p. 75.ISBN 978-0-201-56885-1.
  53. ^Stroustrup, Bjarne (2013).The C++ Programming Language, Fourth Edition. Addison-Wesley. p. 40.ISBN 978-0-321-56384-2.
  54. ^abWilson, Leslie B. (2001).Comparative Programming Languages, Third Edition. Addison-Wesley. p. 16.ISBN 0-201-71012-9.
  55. ^Wilson, Leslie B. (2001).Comparative Programming Languages, Third Edition. Addison-Wesley. p. 24.ISBN 0-201-71012-9.
  56. ^abWilson, Leslie B. (2001).Comparative Programming Languages, Third Edition. Addison-Wesley. p. 25.ISBN 0-201-71012-9.
  57. ^abcdWilson, Leslie B. (2001).Comparative Programming Languages, Third Edition. Addison-Wesley. p. 19.ISBN 0-201-71012-9.
  58. ^abcd"Memory Layout of C Programs". 12 September 2011.Archived from the original on 6 November 2021. Retrieved6 November 2021.
  59. ^abKernighan, Brian W.; Ritchie, Dennis M. (1988).The C Programming Language Second Edition. Prentice Hall. p. 31.ISBN 0-13-110362-8.
  60. ^Wilson, Leslie B. (2001).Comparative Programming Languages, Third Edition. Addison-Wesley. p. 128.ISBN 0-201-71012-9.
  61. ^abcKerrisk, Michael (2010).The Linux Programming Interface. No Starch Press. p. 121.ISBN 978-1-59327-220-3.
  62. ^Kerrisk, Michael (2010).The Linux Programming Interface. No Starch Press. p. 122.ISBN 978-1-59327-220-3.
  63. ^Kernighan, Brian W.; Ritchie, Dennis M. (1988).The C Programming Language Second Edition. Prentice Hall. p. 185.ISBN 0-13-110362-8.
  64. ^abKernighan, Brian W.; Ritchie, Dennis M. (1988).The C Programming Language Second Edition. Prentice Hall. p. 187.ISBN 0-13-110362-8.
  65. ^abcWilson, Leslie B. (2001).Comparative Programming Languages, Third Edition. Addison-Wesley. p. 38.ISBN 0-201-71012-9.
  66. ^Wilson, Leslie B. (2001).Comparative Programming Languages, Third Edition. Addison-Wesley. p. 193.ISBN 0-201-71012-9.
  67. ^Wilson, Leslie B. (2001).Comparative Programming Languages, Third Edition. Addison-Wesley. p. 39.ISBN 0-201-71012-9.
  68. ^Wilson, Leslie B. (2001).Comparative Programming Languages, Third Edition. Addison-Wesley. p. 35.ISBN 0-201-71012-9.
  69. ^Wilson, Leslie B. (2001).Comparative Programming Languages, Third Edition. Addison-Wesley. p. 192.ISBN 0-201-71012-9.
  70. ^Stroustrup, Bjarne (2013).The C++ Programming Language, Fourth Edition. Addison-Wesley. p. 22.ISBN 978-0-321-56384-2.
  71. ^Stroustrup, Bjarne (2013).The C++ Programming Language, Fourth Edition. Addison-Wesley. p. 21.ISBN 978-0-321-56384-2.
  72. ^Stroustrup, Bjarne (2013).The C++ Programming Language, Fourth Edition. Addison-Wesley. p. 49.ISBN 978-0-321-56384-2.
  73. ^abWilson, Leslie B. (2001).Comparative Programming Languages, Third Edition. Addison-Wesley. p. 218.ISBN 0-201-71012-9.
  74. ^Wilson, Leslie B. (2001).Comparative Programming Languages, Third Edition. Addison-Wesley. p. 217.ISBN 0-201-71012-9.
  75. ^Weiss, Mark Allen (1994).Data Structures and Algorithm Analysis in C++. Benjamin/Cummings Publishing Company, Inc. p. 103.ISBN 0-8053-5443-3.When there is a function call, all the important information needs to be saved, such as register values (corresponding to variable names) and the return address (which can be obtained from the program counter)[.] ... When the function wants to return, it ... restores all the registers. It then makes the return jump. Clearly, all of this work can be done using a stack, and that is exactly what happens in virtually every programming language that implements recursion.
  76. ^abcWilson, Leslie B. (2001).Comparative Programming Languages, Third Edition. Addison-Wesley. p. 230.ISBN 0-201-71012-9.
  77. ^Wilson, Leslie B. (2001).Comparative Programming Languages, Third Edition. Addison-Wesley. p. 240.ISBN 0-201-71012-9.
  78. ^abcWilson, Leslie B. (2001).Comparative Programming Languages, Third Edition. Addison-Wesley. p. 241.ISBN 0-201-71012-9.
  79. ^Jones, Robin; Maynard, Clive; Stewart, Ian (December 6, 2012).The Art of Lisp Programming. Springer Science & Business Media. p. 2.ISBN 9781447117193.
  80. ^Wilson, Leslie B. (2001).Comparative Programming Languages, Third Edition. Addison-Wesley. p. 220.ISBN 0-201-71012-9.
  81. ^Wilson, Leslie B. (2001).Comparative Programming Languages, Third Edition. Addison-Wesley. p. 221.ISBN 0-201-71012-9.
  82. ^Wilson, Leslie B. (2001).Comparative Programming Languages, Third Edition. Addison-Wesley. p. 229.ISBN 0-201-71012-9.
  83. ^Wilson, Leslie B. (2001).Comparative Programming Languages, Third Edition. Addison-Wesley. p. 227.ISBN 0-201-71012-9.
  84. ^abWilson, Leslie B. (2001).Comparative Programming Languages, Third Edition. Addison-Wesley. p. 222.ISBN 0-201-71012-9.
  85. ^Gordon, Michael J. C. (1996)."From LCF to HOL: a short history".Archived from the original on 2016-09-05. Retrieved2021-10-30.
  86. ^Wilson, Leslie B. (2001).Comparative Programming Languages, Third Edition. Addison-Wesley. p. 233.ISBN 0-201-71012-9.
  87. ^Wilson, Leslie B. (2001).Comparative Programming Languages, Third Edition. Addison-Wesley. p. 235.ISBN 0-201-71012-9.
  88. ^Wilson, Leslie B. (2001).Comparative Programming Languages, Third Edition. Addison-Wesley. p. 55.ISBN 0-201-71012-9.
  89. ^Colmerauer, A.; Roussel, P. (1992)."The birth of Prolog"(PDF).ACM SIGPLAN Notices.28 (3). Association for Computing Machinery: 5.doi:10.1145/155360.155362.
  90. ^Kowalski, R., Dávila, J., Sartor, G. and Calejo, M., 2023. Logical English for law and education. In Prolog: The Next 50 Years (pp. 287-299). Cham: Springer Nature Switzerland.
  91. ^abWilson, Leslie B. (2001).Comparative Programming Languages, Third Edition. Addison-Wesley. p. 35.ISBN 0-201-71012-9.Simula was based on Algol 60 with one very important addition — the class concept. ... The basic idea was that the data (or data structure) and the operations performed on it belong together[.]
  92. ^Wilson, Leslie B. (2001).Comparative Programming Languages, Third Edition. Addison-Wesley. p. 39.ISBN 0-201-71012-9.Originally, a large number of experimental languages were designed, many of which combined object-oriented and functional programming.
  93. ^Schach, Stephen R. (1990).Software Engineering. Aksen Associates Incorporated Publishers. p. 284.ISBN 0-256-08515-3.While it is true that OOD [(object oriented design)] as such is not supported by the majority of popular languages, a large subset of OOD can be used.
  94. ^Weiss, Mark Allen (1994).Data Structures and Algorithm Analysis in C++. Benjamin/Cummings Publishing Company, Inc. p. 57.ISBN 0-8053-5443-3.
  95. ^Schach, Stephen R. (1990).Software Engineering. Aksen Associates Incorporated Publishers. p. 285.ISBN 0-256-08515-3.
  96. ^Wilson, Leslie B. (2001).Comparative Programming Languages, Third Edition. Addison-Wesley. p. 290.ISBN 0-201-71012-9.The syntax (or grammar) of a programming language describes the correct form in which programs may be written[.]
  97. ^Wilson, Leslie B. (2001).Comparative Programming Languages, Third Edition. Addison-Wesley. p. 78.ISBN 0-201-71012-9.The main components of an imperative language are declarations, expressions, and statements.
  98. ^abWilson, Leslie B. (2001).Comparative Programming Languages, Third Edition. Addison-Wesley. p. 290.ISBN 0-201-71012-9.
  99. ^Wilson, Leslie B. (2001).Comparative Programming Languages, Third Edition. Addison-Wesley. p. 294.ISBN 0-201-71012-9.
  100. ^Rosen, Kenneth H. (1991).Discrete Mathematics and Its Applications. McGraw-Hill, Inc. p. 615.ISBN 978-0-07-053744-6.
  101. ^Wilson, Leslie B. (2001).Comparative Programming Languages, Third Edition. Addison-Wesley. p. 291.ISBN 0-201-71012-9.
  102. ^Rosen, Kenneth H. (1991).Discrete Mathematics and Its Applications. McGraw-Hill, Inc. p. 616.ISBN 978-0-07-053744-6.
  103. ^Rosen, Kenneth H. (1991).Discrete Mathematics and Its Applications. McGraw-Hill, Inc. p. 623.ISBN 978-0-07-053744-6.
  104. ^Rosen, Kenneth H. (1991).Discrete Mathematics and Its Applications. McGraw-Hill, Inc. p. 624.ISBN 978-0-07-053744-6.
  105. ^Wilson, Leslie B. (2001).Comparative Programming Languages, Third Edition. Addison-Wesley. p. 297.ISBN 0-201-71012-9.
  106. ^Schach, Stephen R. (1990).Software Engineering. Aksen Associates Incorporated Publishers. p. Preface.ISBN 0-256-08515-3.
  107. ^abcStair, Ralph M. (2003).Principles of Information Systems, Sixth Edition. Thomson. p. 507.ISBN 0-619-06489-7.
  108. ^abStair, Ralph M. (2003).Principles of Information Systems, Sixth Edition. Thomson. p. 513.ISBN 0-619-06489-7.
  109. ^Stair, Ralph M. (2003).Principles of Information Systems, Sixth Edition. Thomson. p. 514.ISBN 0-619-06489-7.
  110. ^Stair, Ralph M. (2003).Principles of Information Systems, Sixth Edition. Thomson. p. 516.ISBN 0-619-06489-7.
  111. ^Schach, Stephen R. (1990).Software Engineering. Aksen Associates Incorporated Publishers. p. 8.ISBN 0-256-08515-3.
  112. ^Stair, Ralph M. (2003).Principles of Information Systems, Sixth Edition. Thomson. p. 517.ISBN 0-619-06489-7.
  113. ^Schach, Stephen R. (1990).Software Engineering. Aksen Associates Incorporated Publishers. p. 345.ISBN 0-256-08515-3.
  114. ^abcdSchach, Stephen R. (1990).Software Engineering. Aksen Associates Incorporated Publishers. p. 319.ISBN 0-256-08515-3.
  115. ^abSchach, Stephen R. (1990).Software Engineering. Aksen Associates Incorporated Publishers. p. 331.ISBN 0-256-08515-3.
  116. ^Schach, Stephen R. (1990).Software Engineering. Aksen Associates Incorporated Publishers. p. 216.ISBN 0-256-08515-3.
  117. ^abcSchach, Stephen R. (1990).Software Engineering. Aksen Associates Incorporated Publishers. p. 219.ISBN 0-256-08515-3.
  118. ^abSchach, Stephen R. (1990).Software Engineering. Aksen Associates Incorporated Publishers. p. 226.ISBN 0-256-08515-3.
  119. ^abSchach, Stephen R. (1990).Software Engineering. Aksen Associates Incorporated Publishers. p. 220.ISBN 0-256-08515-3.
  120. ^Schach, Stephen R. (1990).Software Engineering. Aksen Associates Incorporated Publishers. p. 258.ISBN 0-256-08515-3.
  121. ^Schach, Stephen R. (1990).Software Engineering. Aksen Associates Incorporated Publishers. p. 259.ISBN 0-256-08515-3.
  122. ^abcSilberschatz, Abraham (1994).Operating System Concepts, Fourth Edition. Addison-Wesley. p. 1.ISBN 978-0-201-50480-4.
  123. ^Stair, Ralph M. (2003).Principles of Information Systems, Sixth Edition. Thomson. p. 147.ISBN 0-619-06489-7.The key to unlocking the potential of any computer system is application software.
  124. ^abcdStair, Ralph M. (2003).Principles of Information Systems, Sixth Edition. Thomson. p. 147.ISBN 0-619-06489-7.
  125. ^Stair, Ralph M. (2003).Principles of Information Systems, Sixth Edition. Thomson. p. 147.ISBN 0-619-06489-7.[A] third-party software firm, often called a value-added software vendor, may develop or modify a software program to meet the needs of a particular industry or company.
  126. ^Stair, Ralph M. (2003).Principles of Information Systems, Sixth Edition. Thomson. p. 148.ISBN 0-619-06489-7.Heading: Proprietary Software; Subheading: Advantages; Quote: You can get exactly what you need in terms of features, reports, and so on.
  127. ^Stair, Ralph M. (2003).Principles of Information Systems, Sixth Edition. Thomson. p. 148.ISBN 0-619-06489-7.Heading: Proprietary Software; Subheading: Advantages; Quote: Being involved in the development offers a further level of control over the results.
  128. ^Stair, Ralph M. (2003).Principles of Information Systems, Sixth Edition. Thomson. p. 147.ISBN 0-619-06489-7.Heading: Proprietary Software; Subheading: Advantages; Quote: There is more flexibility in making modifications that may be required to counteract a new initiative by one of your competitors or to meet new supplier and/or customer requirements.
  129. ^abcdStair, Ralph M. (2003).Principles of Information Systems, Sixth Edition. Thomson. p. 149.ISBN 0-619-06489-7.
  130. ^Tanenbaum, Andrew S. (1990).Structured Computer Organization, Third Edition. Prentice Hall. p. 11.ISBN 978-0-13-854662-5.
  131. ^abKerrisk, Michael (2010).The Linux Programming Interface. No Starch Press. p. 21.ISBN 978-1-59327-220-3.
  132. ^abcdeKerrisk, Michael (2010).The Linux Programming Interface. No Starch Press. p. 22.ISBN 978-1-59327-220-3.
  133. ^abcBach, Maurice J. (1986).The Design of the UNIX Operating System. Prentice-Hall, Inc. p. 152.ISBN 0-13-201799-7.
  134. ^Tanenbaum, Andrew S. (2013).Structured Computer Organization, Sixth Edition. Pearson. p. 443.ISBN 978-0-13-291652-3.
  135. ^Lacamera, Daniele (2018).Embedded Systems Architecture. Packt. p. 8.ISBN 978-1-78883-250-2.
  136. ^Kerrisk, Michael (2010).The Linux Programming Interface. No Starch Press. p. 23.ISBN 978-1-59327-220-3.
  137. ^Kernighan, Brian W. (1984).The Unix Programming Environment. Prentice Hall. p. 201.ISBN 0-13-937699-2.
  138. ^Kerrisk, Michael (2010).The Linux Programming Interface. No Starch Press. p. 187.ISBN 978-1-59327-220-3.
  139. ^Haviland, Keith (1987).Unix System Programming. Addison-Wesley Publishing Company. p. 121.ISBN 0-201-12919-1.
  140. ^abcStair, Ralph M. (2003).Principles of Information Systems, Sixth Edition. Thomson. p. 145.ISBN 0-619-06489-7.
  141. ^abcStair, Ralph M. (2003).Principles of Information Systems, Sixth Edition. Thomson. p. 146.ISBN 0-619-06489-7.
  142. ^abTanenbaum, Andrew S. (2013).Structured Computer Organization, Sixth Edition. Pearson. p. 6.ISBN 978-0-13-291652-3.
  143. ^Tanenbaum, Andrew S. (2013).Structured Computer Organization, Sixth Edition. Pearson. p. 243.ISBN 978-0-13-291652-3.
  144. ^Tanenbaum, Andrew S. (2013).Structured Computer Organization, Sixth Edition. Pearson. p. 147.ISBN 978-0-13-291652-3.
  145. ^Tanenbaum, Andrew S. (2013).Structured Computer Organization, Sixth Edition. Pearson. p. 148.ISBN 978-0-13-291652-3.
  146. ^Tanenbaum, Andrew S. (2013).Structured Computer Organization, Sixth Edition. Pearson. p. 253.ISBN 978-0-13-291652-3.
  147. ^Tanenbaum, Andrew S. (2013).Structured Computer Organization, Sixth Edition. Pearson. p. 255.ISBN 978-0-13-291652-3.
  148. ^Tanenbaum, Andrew S. (2013).Structured Computer Organization, Sixth Edition. Pearson. p. 161.ISBN 978-0-13-291652-3.
  149. ^Tanenbaum, Andrew S. (2013).Structured Computer Organization, Sixth Edition. Pearson. p. 166.ISBN 978-0-13-291652-3.
  150. ^Tanenbaum, Andrew S. (2013).Structured Computer Organization, Sixth Edition. Pearson. p. 249.ISBN 978-0-13-291652-3.
  151. ^Tanenbaum, Andrew S. (2013).Structured Computer Organization, Sixth Edition. Pearson. p. 111.ISBN 978-0-13-291652-3.
Retrieved from "https://en.wikipedia.org/w/index.php?title=Computer_program&oldid=1279419616"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp