Programming Fundamentals

Submitted by: Submitted by

Views: 132

Words: 361

Pages: 2

Category: Other Topics

Date Submitted: 03/29/2014 09:29 PM

Report This Essay

Programming Fundamentals: Reusability of Code

In the computer programming world, there are two different types of programming. These programming methods, procedural and object-oriented, are similar in a few ways. The most obvious similarity between them is that they are both programming languages. Programs are made up of modules, so both of these programming languages involve the use of modules. These two languages both end up in the same place, the only difference is how each method gets there.

Programs play a very important role in the ever changing world of information technology. Designing and coding a program can be complex and time consuming for programmers, so it makes sense to reuse the code as often as possible one the original program works correctly. The reusability of code has added efficiency to the programing world. In order to be able to reuse code in a program or in multiple programs, the code has to be written based on proper framework. As long as the code is written in a generic way and it properly works, it can be reused in various other areas of programming.

Data encapsulation is the process of combining and assembling elements in order to place data into a class. Encapsulation of data provides the ability to take code and move it to other programs. Essentially the data and methods are grouped together and can then be manipulated in whatever way is needed by the programmer. Encapsulation makes it easy for programmers to locate and move only the data that pertains to a certain area of the code.

Hiding code is the process of hiding details of an object or function so that data cannot be accidentally accessed. The process of data hiding creates greater data security and less complexity. This process can keep misuse and unauthorized access to a minimum and hides the data from suspicious users like hackers. Data hiding is normally used on sensitive data so that it is kept as protected as possible.

References

Gaddis, T....