Skip to main content

Some of the terms programmers frequently use. Part one


Classes and Objects
The class represents or defines the common characteristics/attributes of an object of a particular type. For e.g. you might want to define a class of “ Person”. Every person will share some common characteristics/attributes like first name, last name, address etc.. So, a class serves as a blueprint for similar type of object. A class is made up of attributes and behavior. Attributes are defined in terms of member variables and behavior is expressed in terms of function.
An object is an instance of a class. It is a representation of a real world thing. Object can have both attributes/data and behaviors. For e.g. You, me are instance of t he “Person” class. We share some common attributes like we both have a first name, a last name and so on. We have some common behaviors like walking, talking etc.

Abstraction
Abstraction refers to the act of representing essential features without unnecessarily
including the background details or information i.e. representing a complex problem in simple terms. Classes provides a mechanism to abstract the required attributes such as first name, last name in case of “Person” class and functions to operate on these attributes. Classes are also known as “Abstract Data Type or ADT”.

Encapsulation(or Information Hiding)
Encapsulation is a technique where data and its associated behaviors(function) are wrapped in a single unit (Class). The data is hidden fro m the outside word. The purpose is to reveal as little as possible about the inner workings of the class. The only way to access these data is through public interfaces provided by the functions.

Inheritance
Inheritance is a technique with which an object of one class acquires attributes and
behaviors from an object of another class. This is one way to achieve reusability in OOP.
Inheritance models “is -a” relationship . For e.g. a “car” is an automobile. In this case
the “automobile” is called the base class and “car” is called as derived class or inherited class.  This type of reuse is often called  white- box reuse. This term refers to the fact that with inheritance, the parent class implementation is often visible to the subclasses.

Composition
When reuse is achieved by composing another object, the technique is known as
composition.  Composition models “has-a” relationship .  This approach requires that the objects have well - defined interfaces since the internals of the objects are unknown. Because objects are treated only as "black boxes," this type of reuse is often called  black-box  reuse.

Polymorphism
The ability of different objects to respond to the same message in different ways is called polymorphism.  Polymorphism is also the ability of an object to take more than one forms, for e.g. an operation may exhibit different behavior in different instances. The behavior depends upon the types of data used in the operation. There are basically two types of polymorphism
 static and dynamic polymorphism. Method overloading is an example
of static polymorphism whereas overriding would be an example of dynamic
polymorphism.

Comments

Popular posts from this blog

Defination of the essential properties of operating systems

Define the essential properties of the following types of operating sys-tems:  Batch  Interactive  Time sharing  Real time  Network  Parallel  Distributed  Clustered  Handheld ANSWERS: a. Batch processing:-   Jobs with similar needs are batched together and run through the computer as a group by an operator or automatic job sequencer. Performance is increased by attempting to keep CPU and I/O devices busy at all times through buffering, off-line operation, spooling, and multi-programming. Batch is good for executing large jobs that need little interaction; it can be submitted and picked up later. b. Interactive System:-   This system is composed of many short transactions where the results of the next transaction may be unpredictable. Response time needs to be short (seconds) since the user submits and waits for the result. c. Time sharing:-   This systems uses CPU scheduling and multipro-gramming to provide economical interactive use of a system. The CPU switches rapidl

What is a Fair lock in multithreading?

  Photo by  João Jesus  from  Pexels In Java, there is a class ReentrantLock that is used for implementing Fair lock. This class accepts optional parameter fairness.  When fairness is set to true, the RenentrantLock will give access to the longest waiting thread.  The most popular use of Fair lock is in avoiding thread starvation.  Since longest waiting threads are always given priority in case of contention, no thread can starve.  The downside of Fair lock is the low throughput of the program.  Since low priority or slow threads are getting locks multiple times, it leads to slower execution of a program. The only exception to a Fair lock is tryLock() method of ReentrantLock.  This method does not honor the value of the fairness parameter.

How do clustered systems differ from multiprocessor systems? What is required for two machines belonging to a cluster to cooperate to provide a highly available service?

 How do clustered systems differ from multiprocessor systems? What is required for two machines belonging to a cluster to cooperate to provide a highly available service? Answer: Clustered systems are typically constructed by combining multiple computers into a single system to perform a computational task distributed across the cluster. Multiprocessor systems on the other hand could be a single physical entity comprising of multiple CPUs. A clustered system is less tightly coupled than a multiprocessor system. Clustered systems communicate using messages, while processors in a multiprocessor system could communicate using shared memory. In order for two machines to provide a highly available service, the state on the two machines should be replicated and should be consistently updated. When one of the machines fails, the other could then take‐over the functionality of the failed machine. Some computer systems do not provide a privileged mode of operation in hardware. Is it possible t