Skip to main content

Characteristics of Object-Oriented Programming( OOP ) and Procedure Oriented Programming ( POP )




Procedure Oriented Programming
Object-Oriented Programming
Divided Into
In POP, the program is divided into small parts called functions.
In OOP, the program is divided into parts called objects.
Importance
In POP, Importance is not given to data but to functions as well
 the sequence of actions to be done.
In OOP, Importance is given to the data rather than procedures or functions because it works in the real world.
Importance
In POP, Importance is not given to functions.
In OOP, Importance is given to the data.
Approach
POP follows a Top-Down approach.
OOP follows the Bottom-Up approach.
Access Specifiers
POP does not have any access specifier.
OOP has access specifiers named Public, Private, Protected, etc.
Data Moving
In POP, Data can move freely from function to function in the system.
In OOP, objects can communicate with each other and pass data through member functions.
Expansion
 Adding new data and functions in POP is not so easy.
OOP provides an easy way to add new data and functions.
Data Access
In POP, the Most function uses Global data for sharing that can be accessed freely from function to function in the system.
In OOP, data can not move easily from function to function, it can be kept public or private so we can control the access of data.
Data Hiding
POP does not have any proper way for hiding data so it is less secure.
OOP provides Data Hiding so provides more security.
Examples
Examples of POP are C, VB, FORTRAN, Pascal.
Examples of OOP are C++, JAVA, VB.NET, C#.NET.

Comments

Popular posts from this blog

Pointers in C

Pointers are an extremely powerful programming tool. They can make some things much easier, help improve your program's efficiency, and even allow you to handle unlimited amounts of data. For example, using pointers is one way to have a function modify a variable passed to it. It is also possible to use pointers to dynamically allocate memory, which means that you can write programs that can handle nearly unlimited amounts of data on the fly--you don't need to know, when you write the program, how much memory you need. Wow, that's kind of cool. Actually, it's very cool, as we'll see in some of the next tutorials. For now, let's just get a basic handle on what pointers are and how you use them. What are pointers? Why should you care? Pointers are aptly name: they "point" to locations in memory. Think of a row of safety deposit boxes of various sizes at a local bank. Each safety deposit box will have a number associated with it so that you ca...

Types of Computer Networks(LAN,MAN,WAN)

Types of Computer Networks Computer networks are categorized according to: How they are organized physically. The way they are used. The distance over which they operate. Three main types of computer networks are as follows: LAN   (Local Area Network) WAN (Wide Area Network) MAN ( Metropolitan-Area Network) LAN (Local Area Network) LAN is the most common type of network . LAN stands for Local area Network . It covers a small area. Most LANs are used to connect computers in a single building or group of buildings. Hundreds or thousands of computer maybe connected through LAN. Typical LANs can be found in industrial plants, office buildings, and college or university campuses. LANs are capable of transmitting data at very fast rate. Data transmission speeds of LAN are 1 to 100 megabits per second. It is much faster than data transmission over a telephone line. LAN can transmit data in a limited distance. There is also a limit on the number of...

Ring topologies

Ring topologies are similar to bus topologies, except they transmit in one direction only from station to station. Typically, a ring architecture will use separate physical ports and wires for transmit and receive. Token Ring is one example of a network technology that uses a ring topology.