Preview

PRogram 1

Satisfactory Essays
Open Document
Open Document
313 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
PRogram 1
Designing and coding a procedure, module, or object can be complex and time consuming. Once these elements of a computer program are working correctly, it makes sense to use the code as often as practical. Code reusability has become a valuable part of adding efficiency to computer programming.
Reusability: This is a very good tool. It is faster and more simple. However, to create automation can be difficult and advanced, but very useful if beneficial. This also means that you are creating many copies, and framework in multiple places to access risking the possibility to slow down. These reasons make programmers consider it is not worth the effort.

Security in terms of hiding code: Data hiding is a method used in object-oriented programming to hide information within computer code. Objects within a code are not privy to information considered hidden. It presents several advantages for programmers, because objects are unable to connect to irrelevant data and hackers are less likely to be able to access this hidden data. On the other hand; If an object does access hidden data, it will return an error. This can lead to possible destructive results if exposed to the user. Improper use of this data will prove detrimental.
Passing of data versus data encapsulation: Encapsulation is more secure but limited to users. Passing data is much faster. How object-oriented methods are similar to procedural modules. Procedure modules maintenance is time consuming due to the difficulty. OOP allow you to create classes that modeled from real world objects.
Code reuse: In more than one program, a Programmer could reuse the wrong code, bugs could get replicated; this reused code could create more maintenance than needed. On the positive side this is not just limited to code; this also include reuse of pattern, framework, module, template and code. This creates high optimization when working on projects or single applications.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    What is procedural or algorithmic programming? What is object-oriented programming? What is the role of code reuse in object-oriented programming? Under what circumstances is object-oriented programming best suited? Under what circumstances is procedural or algorithmic programming best suited?…

    • 503 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    6. What is the difference between passing an argument by value and passing it by reference?…

    • 765 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    PT1420week5exdkinney

    • 404 Words
    • 2 Pages

    Built in functions are valuable and convenient because they can cut down the time and energy it takes into writing the entire program repeatedly. The built-in functions work like mini programs that perform simple tasks so that you can concentrate your efforts elsewhere. As with all functions, the built-in functions return values and, optionally, accept arguments that you pass to the functions when you call the functions. This essay will list different Visual Basic’s built in functions.…

    • 404 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Mat 540 Week 4 Paper

    • 1775 Words
    • 8 Pages

    Although the details can be quite complex, these details are the basic principles of object-oriented programming.…

    • 1775 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    This paper will describe the variable naming rules of three different programming languages. These three languages are Visual Basic, Python, and Java. Each of these languages has different rules that apply to them and some similarities. I will describe the rules and the similarities and differences in the next few paragraphs.…

    • 878 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 7

    • 2452 Words
    • 10 Pages

    Encapsulation is an attribute of object design. It means that all of the object's data is contained and hidden in the object and access to it restricted to members of that class. A procedure is a type of encapsulation because it combines a series of computer instructions. Likewise, a complex data type, such as a record or class, relies on encapsulation.…

    • 2452 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Programing Problems

    • 721 Words
    • 3 Pages

    IT 210 13 Programming Problems Pseudocode for chapter 2 checkpoint Frank T. Hartman IT 210 13 Programming Problems Pseudocode for chapter 2 checkpoint Frank T. Hartman Programming Problem 1 Main Module Declare SalesAmount As Real Declare CommissionRate As Real Declare CommissionEarned…

    • 721 Words
    • 3 Pages
    Good Essays
  • Good Essays

    There are many ways and methods by which a programmer can hide his code that is developed for commercial or personal use. .NET applications have a high cost and are susceptible to attacks by on unethical traders integrate market as stakes run high in hacking these codes. Thus, .NET Obfuscators play a vital role in protecting these programs. The Merriam-Webster dictionary defines Obfuscation as: to make obscure <obfuscate the issue>: confuse <obfuscate the reader>: To be evasive, unclear, or confusing. It also means to confuse or bewilder.…

    • 793 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Psy300 Week 8

    • 760 Words
    • 4 Pages

    • Describe the architectural differences between the object-oriented and structured designs. Which of the designs makes more sense to you? Why?…

    • 760 Words
    • 4 Pages
    Good Essays
  • Good Essays

    6. Data hiding, which means that critical data stored inside the object is protected from code outside the object is accomplished in Java by _____.…

    • 1518 Words
    • 7 Pages
    Good Essays
  • Better Essays

    1) You can call the module several times instead of writing it out each time.…

    • 1580 Words
    • 11 Pages
    Better Essays
  • Satisfactory Essays

    6 8c Chapter Excercises

    • 515 Words
    • 2 Pages

    Polymorphism is the concept that a message gives different meanings to different objects. For example GOOD NIGHT message might produce different results depending if it is received by a child or the family dog. When received by the parent object the message causes the parent object to read a bedtime story. When received by the dog object it causes the dog to go to sleep and when received by the child object it causes the child to get ready for bed.…

    • 515 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    concepts of classes, objects, constructors, methods, access control, this keyword, overloading methods and constructors, parameter…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The Kentucky Suicide Prevention Group (KSPG) has established them as a program that helps with suicide prevention. According to KSPG the program began as a planning group and has developed into in a group program (2008). During the planning process a needs assessment was performed at the beginning phase and was included in the evaluation plan. Information was collected throughout the beginning phase to answer why, who, how, what, and when during the needs analysis. Also Kentucky Suicide Prevention Group used evaluation design to conduct beginning phase of program planning.…

    • 1206 Words
    • 4 Pages
    Powerful Essays
  • Best Essays

    Program Summary

    • 2232 Words
    • 9 Pages

    Retrieved January 8, 2009, from Axia College, Week 1 Reading, aXcess, HSM 270 ' '…

    • 2232 Words
    • 9 Pages
    Best Essays