Study of Java Access Control Mechanism
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 15, Issue 1
Abstract
a class as "a collection of data and methods." One of the important object-oriented techniques is hiding the data within the class and making it available only through the methods. This technique is known as encapsulation because it seals the data (and internal methods) safely inside the "capsule" of the class, where it can be accessed only by trusted users. Another reason for encapsulation is to protect your class against accidental or willful stupidity. A class often contains a number of interdependent fields that must be in a consistent state. If you allow a users to manipulate those fields directly, he may change one field without changing important related fields, thus leaving the class in an inconsistent state. If, instead, he has to call a method to change the field, that method can be sure to do everything necessary to keep the state consistent. Similarly, if a class defines certain methods for internal use only, hiding these methods prevents users of the class from calling them. The goal is : All the fields and methods of a class can always be used within the body of the class itself. Java defines access control rules that restrict members of a class from being used outside the class that is done through keeping the data (and internal methods) safely inside the "capsule" of the class, where it can be accessed only by trusted users.
Authors and Affiliations
Manhal Mohammad Basher
An Extended Approach for Online Testing of Reversible Circuits
Reversible computing has tremendous benefits in terms of power consumption, less heat dissipation and packaging density. Because its applications are found in diverse fields including quantum computing, nanotech...
Role of Women in Information and Communication Technologies in India
Towards a new ontology of the Moroccan Post-baccalaureatelearner profile for the E-orientation system “MMSyOrientation”
Abstract: Today E-orientation systems are interested in helping learners to choose a suitable branch to theirskills and preferences. In this context the research center within the University Hassan II Mohammedia AinChock...
Performance Issues on the Interoperability between IEEE 802.3 & IEEE 802.11 in Heterogeneous Network Environment
Abstract: This paper addresses network computing that seeks to utilize the aggregate resources of many networked computers that can be installed in heterogeneous environment to solve problems of resource allocation, and...
A Critical Conceptual Analysis of Definitions of Artificial Intelligence as Applicable to Computer Engineering
The purpose of artificial intelligence is to acquire knowledge of required subject. Knowledge acquisition involves knowledge of dark energy (74% of universe), knowledge of dark matter (22%) and knowledge of visible matte...