
Java: An Introduction to Problem Solving and Programming plus MyProgrammingLab with Pearson eText -- Access Card Package (7th Edition)
7th Edition
ISBN: 9780133862119
Author: Walter Savitch
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Concept explainers
Textbook Question
Chapter 1, Problem 1E
How does a computer’s main memory differ from its auxiliary memory?
Expert Solution & Answer

Explanation of Solution
Difference between main memory and auxiliary memory:
Main memory | Auxiliary memory |
It is directly accessible by the CPU. | It is not directly accessible by CPU |
It contains the data to be processed by the computer and holds the result of the calculations. | Data which needs to be stored permanently is kept in the secondary memory |
It is volatile in nature. | Auxiliary memory is non-volatile. |
It could be accessed by the data bus. | It could be accessed by the input-output channels. |
Data could be accessed in a faster rate. | Data accessed by the secondary memory is slower. |
It is made up of semiconductors | It is made of magnetic and optical material. |
Want to see more full solutions like this?
Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
(团)
(四)
The Dog class has a constructor that takes two parameters. The first parameter is a String
representing a dog's name and the second parameter is an int representing the dog's age, in months.
9
Mark for Review
ARC
The following code segment appears in a class other than Dog.
Which of the following best describes the contents of dog1 and dog2 as a result of executing this code
segment?
Dog dogl new Dog ("Rex", 4);
Dog dog2
dogl
dog1;
new Dog("Fido", 60);
dog1 and dog2 are Dog variables that each contain the same Dog object, which
represents a dog named "Fido' that is 60 months old.
dogl is a Dog variable that contains a Dog object representing a dog named
"Fido" that is 60 months old, and dog2 is a Dog variable that contains
a Dog object representing a dog named "Rex" that is 4 months old.
dogl and dog2 are Dog reference variables that each contain a reference to the
same memory address that contains the Dog object representing a dog named
"Fido' that is 60 months old.
dogl is a…
The following code segment is intended to assign to newword the result created by removing the first
occurrence of "a" from word. Assume that the String variable word has been properly declared
and initialized. This code segment works for some, but not all, values of word.
int aLoc
word.indexOf("a");
String newword word.substring(0, aLoc) + word.substring(aLoc + 1);
18
Mark for Review
Which of the following conditions best describes the condition in which this code segment will not work a
intended and will result in a runtime error?
is the first character in word.
is the last character in word.
word does not contain the character "a".
word contains only a sequence of multiple "a" characters.
Consider the following code segment, which is intended to create a String that consists of the last
character in word and assign it to the variable lastChar
String word / initialization not shown */;
// line 1
int len word.length();
// line 2
String lastChar word.substring(len);
// line 3
17
Mark for Review
Which of the following best describes why this code segment will not work as intended?
substring needs to be called with two parameters, so the method call in line
3 should be changed to word.substring(len, len + 1).
len is not the correct index of the last character in word, so the method call in
line 3 should be changed to word.substring(len - 1).
len is not the correct index of the last character in word, so the method call in
line 3 should be changed to word.substring(len + 1).
substring cannot be called with a variable as the parameter, so the method
call in line 3 should be changed to word.substring (word.length()).
ABC
Chapter 1 Solutions
Java: An Introduction to Problem Solving and Programming plus MyProgrammingLab with Pearson eText -- Access Card Package (7th Edition)
Ch. 1.1 - What are the two kinds of memory in a computer?Ch. 1.1 - What is software?Ch. 1.1 - What data would you give to a program that...Ch. 1.1 - What data would you give to a program that...Ch. 1.1 - What is the difference between a program written...Ch. 1.1 - Is Java a high-level language or a low-level...Ch. 1.1 - Is Java bytecode a high-level language or a...Ch. 1.1 - What is a compiler?Ch. 1.1 - What is a source program?Ch. 1.1 - What do you call a program that translates Java...
Ch. 1.2 - What would the following statement, when used in a...Ch. 1.2 - Write a statement or statements that can be used...Ch. 1.2 - Prob. 13STQCh. 1.2 - What is the meaning of the following line in the...Ch. 1.2 - Write a complete Java program that uses system....Ch. 1.2 - Suppose you define a class named YourClass in a...Ch. 1.2 - Prob. 17STQCh. 1.3 - What is a method?Ch. 1.3 - Prob. 19STQCh. 1.3 - Do all objects of the same class have the same...Ch. 1.3 - Prob. 21STQCh. 1.3 - Prob. 22STQCh. 1.3 - Prob. 23STQCh. 1.3 - Prob. 24STQCh. 1.3 - What is an algorithm?Ch. 1.3 - What is pseudocode?Ch. 1.3 - Prob. 27STQCh. 1.3 - Prob. 28STQCh. 1.3 - Prob. 29STQCh. 1.3 - Prob. 30STQCh. 1.3 - Prob. 31STQCh. 1.3 - Suppose you write a program that is supposed to...Ch. 1.4 - Prob. 33STQCh. 1.4 - Prob. 34STQCh. 1 - How does a computers main memory differ from its...Ch. 1 - Prob. 2ECh. 1 - Prob. 3ECh. 1 - How does machine language differ from Java?Ch. 1 - What would the following statements, when used in...Ch. 1 - Write a statement or statements that can be used...Ch. 1 - Write statements that can be used in a Java...Ch. 1 - Given a persons year of birth, the Birthday Wizard...Ch. 1 - Write statements that can be used in a Java...Ch. 1 - Prob. 11ECh. 1 - Prob. 12ECh. 1 - Prob. 13ECh. 1 - Prob. 14ECh. 1 - What attributes and behaviors would an object...Ch. 1 - Suppose that you have a numberxthat is greater...Ch. 1 - Prob. 17ECh. 1 - Prob. 18ECh. 1 - Prob. 19ECh. 1 - Prob. 20ECh. 1 - Obtain a copy of the Java program shown in Listing...Ch. 1 - Modify the Java program described in Practice...Ch. 1 - Prob. 3PCh. 1 - The following program will compile but it has...Ch. 1 - Programming Projects require more problem-solving...Ch. 1 - Write a complete program for the problem described...Ch. 1 - Prob. 3PPCh. 1 - Prob. 4PPCh. 1 - Write an applet program for the problem described...Ch. 1 - Prob. 6PP
Additional Engineering Textbook Solutions
Find more solutions based on key concepts
This optional Google account security feature sends you a message with a code that you must enter, in addition ...
SURVEY OF OPERATING SYSTEMS
Write an SQL query to list each customer who bought at least one product that belongs to product line Basic in ...
Modern Database Management
T F A stub is a dummy function that is called instead of the actual function it represents.
Starting Out with C++ from Control Structures to Objects (9th Edition)
What is an object? What is a control?
Starting Out With Visual Basic (8th Edition)
3.1 Discuss the differences between an error and a residual.
Elementary Surveying: An Introduction To Geomatics (15th Edition)
A biomechanical model of the lumbar region of the human trunk is shown. The forces acting in the four muscle gr...
INTERNATIONAL EDITION---Engineering Mechanics: Statics, 14th edition (SI unit)
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- Consider the following code segment. String one String two "computer"; "science"; String concat / missing code */; System.out.println(concat); 2 16 Mark for Review ARC Which of the following expressions can be used to replace/missing code / so that the code segment prints the string "pun"? one.substring(3, 4) + two.substring(4, 4) one.substring(3, 5) + two.substring(4, 5) one.substring(4, 5) + two.substring(5, 5) one.substring(4, 6) + two.substring(5, 6)arrow_forwardPlease R show code and output for the following questions.arrow_forwardGo through Chapters 2-4 of the 9th edition of Foundations of Information Systems: What do you like or not like about the student registration process? Do you believe that a university should be allowed to monitor emails sent and received on the university computers? Why or why not? Support your answer. Is security a technical issue? A business issue? Both? Support your answer.arrow_forward
- Thank You Computer SciencePlease provide source code in C and also the state diagram in drawing form not text Design a state diagram to recognize one form of the comments of the C- based programming languages, those that begin with /* and end with */. Submission: a state transition diagram (no source code required) specifying all necessary components.arrow_forwardHello, Mistakely submitted blurr image please skip otherwise unhelpful. Computer science.arrow_forwardMistakely submitted blurr image please skip otherwise unhelpful. Computer science.arrow_forward
- Subject = Computer Science i mistakely submitted blurr image please skip it.arrow_forwardOR AND Neg-AND D A Output D A Output B D Output AB Output AB Output AB Output AB 00 01 10 00 00 01 10 10 11 NOR 11 10 |1|1 NAND Neg-OR B A Do A Output B Do A Output Output B AB Output AB Output AB Output 00 00 00 01 01 01 10 10 10 11 |11 XOR XNOR NOT A Output Output Output B B AB Output AB Output A Output 00 00 01 01 0 1 10 10 11 |1|1arrow_forwardData Representation Part 3 HW3 1. Convert each decimal number to its 9's complement (use as many digits as shown): a) 73 b) 40512 c) 980034 d) Perform subtraction using 9's complement: 5042-671 2. Convert the following decimal numbers to the 10's complement: a) 128 b) 4097 c) 56020 d) Perform subtraction using 10's complement: 3205-4879 3. Perform the following multiplications. Assume that all values are unsigned numbers. (No problem with unsigned (always positive) numbers, just use the same standard techniques as in base 10.) a) 10112 × 01012 b) 011012 × 001112 c) 1100102 × 10112 d) 10110102 x 111012 4. Perform the following multiplications. Assume that all values are signed 2's complement numbers. a) 11002 01112 b) 00102 x 10102 - first multiply without sign-extending (show the wrong result), then redo with proper sign-extension. c) 111002 × 000112 5. Perform the following divisions. Assume that all values are unsigned numbers. a) 1011012 ÷ 1102 b) 1000112 ÷ 1012arrow_forward
- From MATLAB Calculate the following scalars, matrices and vectors, using the matrices from problem 5. Outputs of the commands are required. (mean, sum, det, find, transpose (aka the apostrophe operator)arrow_forwardModify the car purchase algorithm presented in class (on Chapter 1's slide set) so that the gasprice is no longer a constant, but instead it is subjected to an inflation of 5% yearly. Run thealgorithm and tabulate the costs year by year. (No need to program in C++ for this problemunless you really want to. You can use a spreadsheet or hand calculations.) Which car is abetter deal and by how much? Explain your algorithm welll.arrow_forwardProblem 12. Consider the following grammar: <S> → a <S> c <B> | <A> | b <A> → c <A> | c <B> → d | <A> Which of the following sentences are in the language generated by this grammar? a. abcd b. acccbd c. acccbcc d. acd e. acccarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningSystems ArchitectureComputer ScienceISBN:9781305080195Author:Stephen D. BurdPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
- Enhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781305082168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning

Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning

Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning

Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning

Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning

Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning

Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Computer Fundamentals - Basics for Beginners; Author: Geek's Lesson;https://www.youtube.com/watch?v=eEo_aacpwCw;License: Standard YouTube License, CC-BY