Information Technology Reference
In-Depth Information
would be relatively complex, because cooking would require multiple burn
ers—perhaps multiple stoves. To get all of this done in a timely way, you
might employ several chefs. Similar troubles arise with the preparation of
lemonade and the distribution of cookies. Serving of the food might involve
several waiters or waitresses. Altogether, the preparation of this menu re
quires considerable negotiation for a hall; coordination of multiple people, nu
merous bowls, and serving stations; and orchestration of the serving and
cleanup of dishes.
As we review the requirements for serving dinner to 1, 4, and 200 guests, we note
that each stage added noticeable complexity. The simple process used for one
hadto be adjusted somewhat for four, and coordination of activities required
more attention. Similarly, the approach that worked for 4 did not extend well to
200. More people were involved; the workers had the potential to get in each
others' way, making coordination particularly important; and new approaches
were required for preparation and serving. In short, the logical complexity of din
ner preparation may increase considerably with the size of the problem (i.e., the
number of dinner guests).
Although this example focused on food preparation, complexity
issues arise in the processing of data as well. As problems become
more complex, simple solutions may no longer apply; special algo
rithms and programs may be needed to accomplish various required
tasks, and coordination of activities takes on added significance.
Also, as with food preparation, when problems and their solutions
become more complex, there are more opportunities for mistakes,
oversights, and other problems to arise.
What are some difficulties logical complexity causes
in computers?
The following list suggests some of the difficulties of logical
complexity for computing on an individual computer:
If only one person will be using the computer, then there may
be no need for a password or security system; the operating
system need not be cluttered with mechanisms to verify that a
particular user has authority to access specific files.
 
Search WWH ::




Custom Search