The text states that information hiding is a system structuring technique that contributes to the development of more reliable software systems. Why, do you suppose, is this so?

What will be an ideal response?


Hidden information may not be modified by the user, so the assumption is that when this information is modified it will be modified only by the system and properly, so if information to which the user does not need access is not hidden from the user, then the user may modify that information accidentally. Information hiding prevents this accidental modification of information to which the user does not need access. This reduces the realm of possible problems the system may encounter; any system structuring technique that has this effect should reasonably be employed.

Computer Science & Information Technology

You might also like to view...

For most people, ________ queues are more intuitive and easier to understand than ________ queues.

A) Static, dynamic B) Dynamic, static C) Deque-like, stack-like D) Stack-like, deque-like E) None of the above

Computer Science & Information Technology

The __________ programming language is now used to develop large-scale enterprise ap- plications, to enhance the functionality of web servers, to provide applications for con- sumer devices and for many other purposes.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Write a program that reads a value of k from the keyboard and displays the value of M(k), which is computed by a recursive method.

Suppose we have a satellite in orbit. To communicate to the satellite, we can send messages composed of two signals: dot and dash. Dot takes 2 microseconds to send, and dash takes 3 microseconds to send. Imagine that we want to know the number of different messages, M(k), that can be sent in k microseconds. • If k is 0 or 1, we can send 1 message (the empty message). • If k is 2 or 3, we can send 1 message (dot or dash, respectively). • If k is larger than 3, we know that the message can start with either dot or dash. If the message starts with dot, the number of possible messages is M(k - 2). If the message starts with dash, the number of possible messages is M(k - 3). Therefore the number of messages that can be sent in k microseconds is M(k - 2) + M(k - 3).

Computer Science & Information Technology

Macros are edited using the ________ editor

A) Run-Time B) Visual Studio C) Visual Basic D) Macro

Computer Science & Information Technology