Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from OpenLibrary

From computing to computational thinking / Paul S. Wang, Kent State University, Ohio, USA.

By: Material type: TextTextPublication details: Boca Raton CRC Press 2016Description: xxii, 266 pages : illustrations, mapsISBN:
  • 1482217651 (paperback)
  • 9781482217650 (paperback)
Subject(s): DDC classification:
  • 004 WAN
Contents:
Machine generated contents note: 1.Why Did the Chicken Cross the Road? -- 1.1.The Computer -- 1.2.Turing Machine -- CT: Abstract Away -- 1.3.A Brief History of Computers -- 1.4.Software -- 1.5.Programming -- 1.6.Syntax and Semantics -- CT: Beware of Semantics -- 1.7.Flowcharts -- CT: Ready for All Contingencies -- CT: First Things First -- CT: Check before Proceeding -- 1.8.Algorithms -- CT: Make It an Algorithm -- CT: Consider Extreme Cases -- 1.9.Pseudo Code -- CT: Step by Step -- 1.10.The Euclidean GCD Algorithm -- CT: Apply Domain Knowledge -- 1.11.Goals and How to Get There -- CT: Break It Down -- 1.12.Road Crossing -- Exercises -- 2.Bits, Bytes, and Words -- 2.1.Digital Computers -- 2.2.Binary Numbers -- CT: Meaning of Symbols -- 2.2.1.Numbers in Other Bases -- CT: Evaluate Different Options -- 2.3.Positive and Negative Integers -- 2.4.Modular Arithmetic -- CT: Mind Resource Limitations -- CT: Symbols Can Be Deceiving -- 2.5.Base Conversion -- CT: Start from the End --
Note continued: 2.6.Characters -- 2.6.1.US-ASCII -- 2.6.2.Unicode -- CT: Data Context -- 2.7.Editing Text -- 2.8.Data Output -- CT: Deliver the Message -- Exercises -- 3.True or False -- 3.1.Digital Electronic Circuits -- CT: Notice the Logic -- CT: Bottom Up -- CT: Create a Virtuous Cycle -- 3.2.Boolean Algebra -- 3.2.1.Expressions and Laws -- 3.2.2.Universal Gates -- 3.3.Decision Making -- CT: Logic Checks -- 3.3.1.Conditions and Implications -- CT: Follow the Logic -- 3.4.Logic Applied to Bits -- CT: Combine Basic Components -- 3.5.Logic and Iteration -- 3.5.1.The while Loop -- 3.5.2.The for Loop -- CT: Perform Everyday Programming -- Exercises -- 4.Who Is the Master? -- 4.1.What Is an Operating System? -- 4.2.Operating System Kernel -- 4.2.1.System Programs -- 4.3.Open Source Software -- CT: Promote Free and Open -- 4.4.Graphical User Interface -- 4.5.Desktop Overview -- 4.5.1.Desktop Components -- CT: Know Your Arena -- 4.6.Are You Talking to Me? --
Note continued: 4.6.1.Input Focus -- CT: Pay Attention to Details -- 4.6.2.Event Handling -- 4.7.Command-Line Interface -- CT: Mind the Trade-Off -- 4.8.Files -- 4.8.1.File Content Types -- 4.8.2.File Tree -- CT: Learn from Trees -- 4.8.3.File Management and Access Control -- 4.9.Processes -- CT: Keep It in Context -- CT: Capture the State -- 4.9.1.Process Lifecycle -- 4.9.2.Process Address Space -- 4.9.3.Virtual Address Space Layout -- 4.9.4.Address Mapping -- CT: Timesharing -- 4.10.Managing Tasks -- 4.11.Up and Running -- CT: Better Control Better System -- Exercises -- 5.Hello There! -- 5.1.What Is a Network? -- 5.2.The Internet -- 5.3.Local and Wide Area Networks -- 5.4.Internet Architecture -- CT: Redundancy for Safety -- CT: One and All -- 5.5.Wireless Networking -- 5.6.Networking Protocols -- CT: Follow Protocol -- 5.7.IP Addresses -- 5.8.Domain Names -- 5.9.Client and Server -- CT: Interoperate -- 5.10.Peer to Peer -- 5.11.DNS Service --
Note continued: CT: Indirection Adds Flexibility -- 5.12.DNS Servers and Resolvers -- CT: Decentralize -- 5.13.Domain Registration -- 5.13.1.Accessing Domain Registration Data -- 5.14.Packet Switching -- 5.15.Cloud Computing -- CT: Backup in the Cloud -- Exercises -- 6.Home Sweet Homepage :-) -- 6.1.What Is a Web Server? -- 6.2.Web Browsers -- 6.3.A Brief History of the Web -- 6.4.URLs -- CT: Be Aware of the Implicit Context -- 6.4.1.URL Encoding -- CT: Wear Different Hats -- 6.5.HTML and HTML5 -- CT: Mark It Up -- 6.6.Webpage Styling -- 6.7.Web Hosting -- CT: Really Use Your Website -- CT: Be Careful with Online Information -- 6.8.Dynamic Generation of Webpages -- 6.8.1.Active Server Pages -- 6.8.2.Database Access -- 6.9.Client-Side Scripting -- 6.10.Hypertext Transfer Protocol -- 6.10.1.HTTP Caching -- CT: Cache for Speed -- 6.11.Website Development -- CT: Develop for Users -- 6.12.Web Search Engines -- CT: Google It -- CT: Believe It or Not -- 6.13.Web Services --
Note continued: 6.14.Standard Web Technologies -- Exercises -- 7.Keeping It Safe -- 7.1.Login -- 7.1.1.Website Login -- CT: Safeguard Security Realms -- CT: Prevent Illicit Login -- 7.2.HTTPS and SSL/TLS -- 7.3.What Is a Digital Certificate? -- 7.4.Cryptography -- 7.4.1.Symmetric Cryptosystems -- CT: Secure Sensitive Files -- CT: Add Security Layers -- 7.5.Public-Key Cryptography -- CT: Breakthrough -- CT: Beware of Bugs -- 7.6.RSA Public-Key Algorithm -- 7.7.Digital Signature -- CT: Sign Digitally -- 7.8.Message Digests -- 7.9.Secure Email -- 7.9.1.Secure Email with Thunderbird -- CT: Free from Surveillance -- 7.10.Security Attacks and Defenses -- CT: All for One and One for All -- Exercises -- 8.Solve That Problem -- 8.1.Solving Puzzles -- 8.1.1.Egg Frying -- 8.1.2.Liquid Measuring -- 8.1.3.A Magic Tray -- 8.2.Sorting -- 8.2.1.Bubble Sort -- 8.2.2.Improved Bubble Sort -- CT: Cut It Down -- CT: Build It Up -- CT: Stepwise Refinement -- CT: Version 2.0 --
Note continued: 8.3.Recursion -- CT: Remember Recursion -- 8.3.1.Quicksort -- 8.4.Recursive Solution Formula -- CT: Apply the Recursion Magic -- 8.5.Tower of Hanoi -- 8.6.Eight Queens -- 8.7.General Backtracking -- 8.8.Tree Traversals -- CT: Form Tree Structures -- 8.9.Complexity -- CT: Weigh Speed vs. Complexity -- 8.10.Heuristics -- CT: Devise Heuristics -- Exercises -- 9.Data Everywhere -- CT: Garbage in, Garbage Out -- 9.1.Digital Images -- 9.1.1.Representing Color -- 9.2.Raster Image Encoding -- 9.2.1.Raster Image Formats -- CT: Small Is Beautiful -- 9.2.2.Vector Graphics -- 9.2.3.Scalable Vector Graphics -- 9.3.Audio and Video -- 9.3.1.Digital Audio -- 9.3.2.Audio Encoding Formats -- 9.4.Digital Video -- 9.4.1.Video Containers -- 9.4.2.Video Codecs -- 9.5.Format of Data and Files -- CT: Interpreting Data -- CT: Data Is Application Dependent -- CT: Save Trees with PDF -- 9.6.Data Sharing -- 9.7.Document Markup -- 9.7.1.What Is XML? -- 9.7.2.XML Document Format --
Note continued: 9.7.3.XML for News Syndication -- CT: Markup for Interoperability -- 9.8.Data Compression -- CT: Compression Is Not Encryption -- 9.8.1.LZ Deflation -- 9.8.2.Huffman Code -- CT: Customize for Efficiency -- 9.9.Data Structures -- CT: Synthesize and Simplify -- 9.10.What Is a Database? -- 9.10.1.Relational Databases -- 9.10.2.SQL: Structured Query Language -- CT: Combine Web and Database -- 9.10.3.Big Data -- CT: Data to Insight -- 9.11.Protecting Personal Data -- CT: Guard Personal Data -- Exercises -- 10.Get That App -- 10.1.Key Programs -- CT: Remind Yourself -- CT: Install That App -- 10.2.Knowing Your Apps -- CT: Learn That App -- CT: No App, No Way -- 10.3.Program Configuration and Customization -- CT: Configure and Enjoy -- 10.4.Process Cooperation -- CT: Coordinate or Else -- 10.5.Machine Language Programs -- 10.6.Assembly Language Programs -- 10.7.High-Level Programs -- 10.8.Compilers -- CT: Bootstrapping -- 10.9.Software Development --
Note continued: 10.10.Object-Oriented Programming -- CT: Compartmentalize -- 10.10.1.OOP Advantages -- 10.10.2.OOP Concepts -- CT: Expose Only the Interface -- 10.11.Object-Oriented Design -- Exercises -- Epilogue -- CT: Reprogram Your Brain.
Summary: Computational Thinking (CT) involves fundamental concepts and reasoning, distilled from computer science and other computational sciences, which became powerful general mental tools for solving problems, increasing efficiency, reducing complexity, designing procedures, or interacting with humans and machines. An easy-to-understand guidebook From Computing to Computational Thinking gives you the tools for understanding and using CT. It does not assume experience or knowledge of programming or of a programming language, but explains concepts and methods for CT with clarity and depth. Successful applications in diverse disciplines have shown the power of CT in problem solving. The book uses puzzles, games, and everyday examples as starting points for discussion and for connecting abstract thinking patterns to real-life situations. It provides an interesting and thought-provoking way to gain general knowledge about modern computing and the concepts and thinking processes underlying modern digital technologies"--Back cover.
Tags from this library: No tags from this library for this title. Log in to add tags.

Includes bibliographical references (page 253) and index.

Machine generated contents note: 1.Why Did the Chicken Cross the Road? -- 1.1.The Computer -- 1.2.Turing Machine -- CT: Abstract Away -- 1.3.A Brief History of Computers -- 1.4.Software -- 1.5.Programming -- 1.6.Syntax and Semantics -- CT: Beware of Semantics -- 1.7.Flowcharts -- CT: Ready for All Contingencies -- CT: First Things First -- CT: Check before Proceeding -- 1.8.Algorithms -- CT: Make It an Algorithm -- CT: Consider Extreme Cases -- 1.9.Pseudo Code -- CT: Step by Step -- 1.10.The Euclidean GCD Algorithm -- CT: Apply Domain Knowledge -- 1.11.Goals and How to Get There -- CT: Break It Down -- 1.12.Road Crossing -- Exercises -- 2.Bits, Bytes, and Words -- 2.1.Digital Computers -- 2.2.Binary Numbers -- CT: Meaning of Symbols -- 2.2.1.Numbers in Other Bases -- CT: Evaluate Different Options -- 2.3.Positive and Negative Integers -- 2.4.Modular Arithmetic -- CT: Mind Resource Limitations -- CT: Symbols Can Be Deceiving -- 2.5.Base Conversion -- CT: Start from the End --

Note continued: 2.6.Characters -- 2.6.1.US-ASCII -- 2.6.2.Unicode -- CT: Data Context -- 2.7.Editing Text -- 2.8.Data Output -- CT: Deliver the Message -- Exercises -- 3.True or False -- 3.1.Digital Electronic Circuits -- CT: Notice the Logic -- CT: Bottom Up -- CT: Create a Virtuous Cycle -- 3.2.Boolean Algebra -- 3.2.1.Expressions and Laws -- 3.2.2.Universal Gates -- 3.3.Decision Making -- CT: Logic Checks -- 3.3.1.Conditions and Implications -- CT: Follow the Logic -- 3.4.Logic Applied to Bits -- CT: Combine Basic Components -- 3.5.Logic and Iteration -- 3.5.1.The while Loop -- 3.5.2.The for Loop -- CT: Perform Everyday Programming -- Exercises -- 4.Who Is the Master? -- 4.1.What Is an Operating System? -- 4.2.Operating System Kernel -- 4.2.1.System Programs -- 4.3.Open Source Software -- CT: Promote Free and Open -- 4.4.Graphical User Interface -- 4.5.Desktop Overview -- 4.5.1.Desktop Components -- CT: Know Your Arena -- 4.6.Are You Talking to Me? --

Note continued: 4.6.1.Input Focus -- CT: Pay Attention to Details -- 4.6.2.Event Handling -- 4.7.Command-Line Interface -- CT: Mind the Trade-Off -- 4.8.Files -- 4.8.1.File Content Types -- 4.8.2.File Tree -- CT: Learn from Trees -- 4.8.3.File Management and Access Control -- 4.9.Processes -- CT: Keep It in Context -- CT: Capture the State -- 4.9.1.Process Lifecycle -- 4.9.2.Process Address Space -- 4.9.3.Virtual Address Space Layout -- 4.9.4.Address Mapping -- CT: Timesharing -- 4.10.Managing Tasks -- 4.11.Up and Running -- CT: Better Control Better System -- Exercises -- 5.Hello There! -- 5.1.What Is a Network? -- 5.2.The Internet -- 5.3.Local and Wide Area Networks -- 5.4.Internet Architecture -- CT: Redundancy for Safety -- CT: One and All -- 5.5.Wireless Networking -- 5.6.Networking Protocols -- CT: Follow Protocol -- 5.7.IP Addresses -- 5.8.Domain Names -- 5.9.Client and Server -- CT: Interoperate -- 5.10.Peer to Peer -- 5.11.DNS Service --

Note continued: CT: Indirection Adds Flexibility -- 5.12.DNS Servers and Resolvers -- CT: Decentralize -- 5.13.Domain Registration -- 5.13.1.Accessing Domain Registration Data -- 5.14.Packet Switching -- 5.15.Cloud Computing -- CT: Backup in the Cloud -- Exercises -- 6.Home Sweet Homepage :-) -- 6.1.What Is a Web Server? -- 6.2.Web Browsers -- 6.3.A Brief History of the Web -- 6.4.URLs -- CT: Be Aware of the Implicit Context -- 6.4.1.URL Encoding -- CT: Wear Different Hats -- 6.5.HTML and HTML5 -- CT: Mark It Up -- 6.6.Webpage Styling -- 6.7.Web Hosting -- CT: Really Use Your Website -- CT: Be Careful with Online Information -- 6.8.Dynamic Generation of Webpages -- 6.8.1.Active Server Pages -- 6.8.2.Database Access -- 6.9.Client-Side Scripting -- 6.10.Hypertext Transfer Protocol -- 6.10.1.HTTP Caching -- CT: Cache for Speed -- 6.11.Website Development -- CT: Develop for Users -- 6.12.Web Search Engines -- CT: Google It -- CT: Believe It or Not -- 6.13.Web Services --

Note continued: 6.14.Standard Web Technologies -- Exercises -- 7.Keeping It Safe -- 7.1.Login -- 7.1.1.Website Login -- CT: Safeguard Security Realms -- CT: Prevent Illicit Login -- 7.2.HTTPS and SSL/TLS -- 7.3.What Is a Digital Certificate? -- 7.4.Cryptography -- 7.4.1.Symmetric Cryptosystems -- CT: Secure Sensitive Files -- CT: Add Security Layers -- 7.5.Public-Key Cryptography -- CT: Breakthrough -- CT: Beware of Bugs -- 7.6.RSA Public-Key Algorithm -- 7.7.Digital Signature -- CT: Sign Digitally -- 7.8.Message Digests -- 7.9.Secure Email -- 7.9.1.Secure Email with Thunderbird -- CT: Free from Surveillance -- 7.10.Security Attacks and Defenses -- CT: All for One and One for All -- Exercises -- 8.Solve That Problem -- 8.1.Solving Puzzles -- 8.1.1.Egg Frying -- 8.1.2.Liquid Measuring -- 8.1.3.A Magic Tray -- 8.2.Sorting -- 8.2.1.Bubble Sort -- 8.2.2.Improved Bubble Sort -- CT: Cut It Down -- CT: Build It Up -- CT: Stepwise Refinement -- CT: Version 2.0 --

Note continued: 8.3.Recursion -- CT: Remember Recursion -- 8.3.1.Quicksort -- 8.4.Recursive Solution Formula -- CT: Apply the Recursion Magic -- 8.5.Tower of Hanoi -- 8.6.Eight Queens -- 8.7.General Backtracking -- 8.8.Tree Traversals -- CT: Form Tree Structures -- 8.9.Complexity -- CT: Weigh Speed vs. Complexity -- 8.10.Heuristics -- CT: Devise Heuristics -- Exercises -- 9.Data Everywhere -- CT: Garbage in, Garbage Out -- 9.1.Digital Images -- 9.1.1.Representing Color -- 9.2.Raster Image Encoding -- 9.2.1.Raster Image Formats -- CT: Small Is Beautiful -- 9.2.2.Vector Graphics -- 9.2.3.Scalable Vector Graphics -- 9.3.Audio and Video -- 9.3.1.Digital Audio -- 9.3.2.Audio Encoding Formats -- 9.4.Digital Video -- 9.4.1.Video Containers -- 9.4.2.Video Codecs -- 9.5.Format of Data and Files -- CT: Interpreting Data -- CT: Data Is Application Dependent -- CT: Save Trees with PDF -- 9.6.Data Sharing -- 9.7.Document Markup -- 9.7.1.What Is XML? -- 9.7.2.XML Document Format --

Note continued: 9.7.3.XML for News Syndication -- CT: Markup for Interoperability -- 9.8.Data Compression -- CT: Compression Is Not Encryption -- 9.8.1.LZ Deflation -- 9.8.2.Huffman Code -- CT: Customize for Efficiency -- 9.9.Data Structures -- CT: Synthesize and Simplify -- 9.10.What Is a Database? -- 9.10.1.Relational Databases -- 9.10.2.SQL: Structured Query Language -- CT: Combine Web and Database -- 9.10.3.Big Data -- CT: Data to Insight -- 9.11.Protecting Personal Data -- CT: Guard Personal Data -- Exercises -- 10.Get That App -- 10.1.Key Programs -- CT: Remind Yourself -- CT: Install That App -- 10.2.Knowing Your Apps -- CT: Learn That App -- CT: No App, No Way -- 10.3.Program Configuration and Customization -- CT: Configure and Enjoy -- 10.4.Process Cooperation -- CT: Coordinate or Else -- 10.5.Machine Language Programs -- 10.6.Assembly Language Programs -- 10.7.High-Level Programs -- 10.8.Compilers -- CT: Bootstrapping -- 10.9.Software Development --

Note continued: 10.10.Object-Oriented Programming -- CT: Compartmentalize -- 10.10.1.OOP Advantages -- 10.10.2.OOP Concepts -- CT: Expose Only the Interface -- 10.11.Object-Oriented Design -- Exercises -- Epilogue -- CT: Reprogram Your Brain.

Computational Thinking (CT) involves fundamental concepts and reasoning, distilled from computer science and other computational sciences, which became powerful general mental tools for solving problems, increasing efficiency, reducing complexity, designing procedures, or interacting with humans and machines. An easy-to-understand guidebook From Computing to Computational Thinking gives you the tools for understanding and using CT. It does not assume experience or knowledge of programming or of a programming language, but explains concepts and methods for CT with clarity and depth. Successful applications in diverse disciplines have shown the power of CT in problem solving. The book uses puzzles, games, and everyday examples as starting points for discussion and for connecting abstract thinking patterns to real-life situations. It provides an interesting and thought-provoking way to gain general knowledge about modern computing and the concepts and thinking processes underlying modern digital technologies"--Back cover.

There are no comments on this title.

to post a comment.