|
|
|
Figures
Full-size and full-color figures from the textbook.
Go to:
Chapter One Figures
- A Barebones Computer, (p. 2)
- The Turing Machine, (p. 4)
- A Chinese Abacus (算盤), (p. 5)
- Charles Babbage Difference Engine No. 2, (p. 5)
- 1024-bit Core Memory Plane, (p. 6)
- A Magnetic Drum, (p. 7)
- Operating System, (p. 8)
- High-Level Languages, (p. 9)
- A Simple Flow Chart, (p. 11)
- Lamp Fixing, (p. 12)
- Reverse Echo, (p. 13)
- Binary Search Algorithm, (p. 15)
- Why, (p. 20)
Chapter Two Figures
- Sampling A Continuous Wave, (p. 23)
- Bit, Byte, and Word, (p. 24)
- Memory Array of Bytes, (p. 24)
- Roman and Egyptian Numerals, (p. 26)
- Ancient Chinese Numerals, (p. 27)
- Larger Chinese Numerals, (p. 27)
- Popular T-Shirt Design, (p. 28)
- I-Ching Trigrams (八卦), (p. 29)
- Obtaining Negative 98, (p. 32)
- Watch Face, (p. 34)
- Input Methods, (p. 41)
- Keyboard Layout for Chinese Phonetic Symbols, (p. 42)
- Chinese Phonetic Input on Android Phone, (p. 42)
- A Punch Card, (p. 43)
- A Courier Font, (p. 43)
- Chinese Fonts, (p. 44)
Chapter Three Figures
Chapter Four Figures
- A Monochrome CRT Monitor, (p. 73)
- GUI Components, (p. 76)
- Windows PowerShell, (p. 77)
- Shell Command Interpretation Cycle, (p. 78)
- SSH, (p. 79)
- A File Tree, (p. 82)
- Process Life Cycle, (p. 86)
- Virtual Memory Layout of a Process, (p. 88)
- Virtual Memory Mapping, (p. 89)
- Windows Task Manager, (p. 91)
Chapter Five Figures
- A Network Graph, (p. 95)
- Network Topology, (p. 96)
- Early Telephone Modem, (p. 97)
- ARPANET MAP 1969, (p. 97)
- Modern Internet Usage Map, (p. 98)
- A Home Ethernet, (p. 99)
- Internet Architecture, (p. 100)
- WiFi Network Modes, (p. 102)
- Networking Layers, (p. 104)
- IPv4 Address, (p. 105)
- The Domain Name Tree, (p. 106)
- Client and Server, (p. 107)
- P2P File Sharing, (p. 108)
- Domain to IP, (p. 109)
- IPv4 Packet, (p. 114)
- Cloud Computing Layers, (p. 116)
Chapter Six Figures
- Web Server Overview, (p. 120)
- Top Five Web Browsers, (p. 121)
- Mosaic and Netscape, (p. 122)
- A Sample Webpage, (p. 127)
- Common Gateway Interface, (p. 130)
- An Active Page, (p. 131)
- Database Function, (p. 131)
- An HTTP Transaction, (p. 133)
- Search Engine Market Shares (05/2015), (p. 137)
- Web Service Overview, (p. 140)
Chapter Seven Figures
- Login Logic Flow, (p. 147)
- CT Website Login, (p. 148)
- Sample Web Certificate Display, (p. 149)
- HTTP and HTTPS, (p. 150)
- HTTPS Protocol Layers, (p. 150)
- Basic TLS Handshake, (p. 151)
- Sample Web Server Certificate Details, (p. 152)
- A Rot13 Wheel, (p. 153)
- Enigma Machine at NSA, (p. 154)
- Bombe Machine in England, (p. 154)
- Symmetric Cryptosystems, (p. 155)
- Sample AES Encryption, (p. 156)
- Public-Key Cryptography, (p. 158)
- Digital Signature, (p. 162)
- SHA256 Message Digest, (p. 162)
- Secure Software Download, (p. 163)
- Attached Digital Signature, (p. 164)
- Thunderbird with Enigmail Added, (p. 166)
- Sending Public Key, (p. 166)
Chapter Eight Figures
- Egg Frying, (p. 174)
- Two Cups, (p. 175)
- Magic Tray Puzzle, (p. 175)
- Bubble Sort, (p. 177)
- Recursive Calls and Returns, (p. 181)
- Partition in Quicksort, (p. 183)
- Tower of Hanoi Puzzle, (p. 185)
- Tower of Hanoi (Five Disks), (p. 187)
- Eight Queens, (p. 188)
- Four Queens Backtracking, (p. 189)
- A Solution Tree, (p. 189)
- Windows File Search, (p. 192)
- Tree Traversals, (p. 192)
- Traveling Salesman Problem, (p. 194)
- Neighborhood Tour Heuristic, (p. 196)
Chapter Nine Figures
- A Program, (p. 200)
- Sample SVG Graphic, (p. 204)
- Sampling and Quantization, (p. 205)
- News Syndication Icons, (p. 211)
- An XML Document, (p. 212)
- Data Compression, (p. 214)
- An Example Huffman Code Tree, (p. 217)
- A Stack, (p. 219)
- A Simple Database Table, (p. 220)
- Web Access to Databases, (p. 222)
Chapter Ten Figures
| |