Preview

data abstruction

Satisfactory Essays
Open Document
Open Document
916 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
data abstruction
WEEK-3
Data Abstraction

Destructors
• Destructors are functions without any type
• The name of a destructor is the character '~' followed by class name
– For example:
~clockType();

• A class can have only one destructor
– The destructor has no parameters

• Destructor automatically executes when the class object goes out of scope
C++ Programming: Program Design Including Data Structures, Sixth Edition

2

Data Abstract, Classes, and Abstract Data Types
• Abstraction
– i.e., we want to know how to start the car and drive it
• No concern about how the engine works

C++ Programming: Program Design Including Data Structures, Sixth Edition

3

Data Abstract, Classes, and Abstract Data Types
• Abstraction
– Separating design details from usage  Abstraction
– Separating logical properties from the implementation details
• i.e., driving the car is a logical property; the construction of engine constitutes the implementation details

• Abstraction can also be applied to data
• Abstract data type (ADT): A data type that separates the logical properties from the implementation details

C++ Programming: Program Design Including Data Structures, Sixth Edition

4

Abstract Data Type (ADT)
• ADT has three things associated with it
– Type name (name of the ADT)
– Domain (set of values belonging to the ADT)
– Operations (set of operations on the data)

How to implement an ADT
• Classes are a convenient way to implement an ADT
• In fact, in C++, classes were specifically designed to handle ADTs

Example
• A list is defined as a set of values of the same type
• Therefore, we can use an array for implementation

A struct vs. a class
• By default, members of a struct are public
– private specifier can be used in a struct to make a member private
• By default, the members of a class are private
• classes and structs have the same capabilities

C++ Programming: Program Design Including Data Structures, Sixth

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Data Security

    • 335 Words
    • 2 Pages

    7. Each of the following is a variation available in network access control (NAC) implementations except __________.…

    • 335 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Chapter 2: Data Manipulation Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Copyright © 2012 Pearson Education, Inc. Chapter 2: Data Manipulation • • • • • • 2.1 Computer Architecture 2.2 Machine Language 2.3 Program Execution 2.4 Arithmetic/Logic Instructions 2.5 Communicating with Other Devices 2.6 Other Architectures Copyright © 2012 Pearson Education, Inc. 0-2 1 Computer Architecture • Central Processing Unit (CPU) or processor – Arithmetic/Logic unit versus Control unit – Registers • General purpose • Special purpose • B Bus • Motherboard Copyright © 2012 Pearson Education, Inc. 0-3 Figure 2.1 CPU and main memory connected via a bus…

    • 783 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Discuss Data Quality

    • 351 Words
    • 2 Pages

    As a HIM professional data quality is very crucial within the health care industry. The HIM professional must provide accuracy when collecting patient data. Data Quality Management (DQM) is defined as the business processes that ensure the integrity of an organization's data during collection, application (including aggregation), warehousing, and analysis. AHIMA,(2012). While the health care industry still have a long road ahead in reaching their goal pertaining to the national health care data standards, there are necessary steps by providing…

    • 351 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    data protection

    • 2038 Words
    • 9 Pages

    policy these are termed ‘users’), are fully aware of and abide by their duties and…

    • 2038 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Data Pro Act

    • 278 Words
    • 1 Page

    The Data Protection Act (DPA) is a law designed to protect personal data stored on computers or in an organised paper filing system.1 There are eight principles of this Act, and these are:…

    • 278 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Data protection & security What is Data Protection and Security ? This is the protection of data such as database from accidental, unauthorised or malicious access Data Protection Act Data protection Act controls and monitors the way personal and customer information is been used by organisations.…

    • 343 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Data Integrity

    • 500 Words
    • 3 Pages

    This section describes the rules that can be applied to table columns to enforce different types of data integrity.…

    • 500 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Data Encryption

    • 3732 Words
    • 15 Pages

    Often there has been a need to protect information from 'prying eyes'. In the electronic age, information that could otherwise benefit or educate a group or individual can also be used against such groups or individuals. Industrial espionage among highly competitive businesses often requires that extensive security measures be put into place. And, those who wish to exercise their personal freedom, outside of the oppressive nature of governments, may also wish to encrypt certain information to avoid suffering the penalties of going against the wishes of those who attempt to control.…

    • 3732 Words
    • 15 Pages
    Better Essays
  • Good Essays

    Data Security

    • 1962 Words
    • 8 Pages

    Computers and Networking have become inseparable by now. A number of confidential transactions occur every second and today computers are used mostly for transmission rather than processing of data. So Network Security is needed to prevent hacking of data and to provide authenticated data transfer. Network Security can be achieved by Firewall. Conventional firewalls rely on the notions of restricted topology and controlled entry points to function. Restricting the network topology, difficulty in filtering of certain protocols, End-to-End encryption problems and few more problems lead to the evolution of Distributed Firewalls.…

    • 1962 Words
    • 8 Pages
    Good Essays
  • Better Essays

    Data security

    • 893 Words
    • 3 Pages

    Straub, D. W. (2008). Information Security : Policy, Processes and Practices. Armonk, NY, USA: M.E. Sharpe, Inc.…

    • 893 Words
    • 3 Pages
    Better Essays
  • Good Essays

    data protection

    • 651 Words
    • 3 Pages

    There are eight data protection principles that are central to the Act. The Company and all its employees must comply with these principles at all times in its information-handling practices. In brief, the principles say that personal data must be:…

    • 651 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Data Structure Using C++

    • 901 Words
    • 6 Pages

    Page 2 Data Structures in C++ As mentioned earlier, the implementation language used in this book is C++. The reader interested in a data structures book using Java, is encouraged to consider the companion text, Data Structures and Algorithms in Java. C++ and Java are clearly the most widely used languages in the modern computer science curriculum.…

    • 901 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    data security process

    • 352 Words
    • 2 Pages

    It is about keeping data safe. Many individuals, small business and major companies rely heavily on their computer systems. If the data in these computer systems is damaged, lost, or stolen, it can lead to disaster. Key threats to data security. Such process can be done by using Passwords and encryptions.…

    • 352 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Data Managament

    • 2828 Words
    • 12 Pages

    Database Administration – is an important data resource management function responsible for the proper use of database management technology. Database administration has more operational and technical responsibilities than other data resource management functions. These includes responsibilities for developing and maintaining the organizations data dictionary, designing and monitoring the performance of database, and enforcing standards for database use and security. Database administration work with systems analysis, programmers, and end users to provide their expertise to major systems development projects.…

    • 2828 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Data Protection

    • 1092 Words
    • 4 Pages

    4. You must only have the details you need for the job you are doing…

    • 1092 Words
    • 4 Pages
    Good Essays

Related Topics