Application Development and Programming Languages

Information Technology
Pages 2 (502 words)
Download 0
Programmability of programming language refers to the ability of that language to modify itself as per the programmer’s requirements. Object oriented programming language, like java, provides an easy programmability procedure. Codes developed in one module can be reused in another module. …


Maintainability is the ease with which a programming language can be maintained so as to find out bugs or their cause, correct the bugs or their cause. It is easier to maintain a well design and implemented object-oriented system than well designed imperative system. This is due to the facts that object oriented language is more complicated than imperative language because of the use of polymorphism and inheritance; these make it difficult to identify errors and their causes as it cause indirection in the program.
All system implementation requires both good interactive performance and good run time performance. It is difficult to satisfy these needs using a pure object oriented language since it requires a lot of optimization such that interactive performance suffers; the performance can be improved by adopting adaptive recompilation which helps improve the system’s responsiveness to programming changes. Lack of dynamically dispatched calls in an imperative language like C improve performance since they do not encourage factoring codes into small, reusable units, thereby reducing the frequency of the expensive operations. Frequent calls not only hinder optimization and slow down execution with dispatch overhead per second.
Download paper
Not exactly what you need?

Related papers

Comparative Discourse: Three Scripting Languages
From among the list of most sensible definitions, the following exact meanings were cited in PerlMonks (2004) as cited below: “A scripting language differentiates itself from other typical languages in that they are usually simpler to learn and use as well as not needing to be compiled. The language is interpreted at run-time so you can execute instructions immediately. A programming language,…
5 pages (1255 words)
Programming Language Ada 95
However, more than 450 programming languages were utilized to manage numerous working projects of Department of Defense but none of them was standardized. The main reason could be the absence of reusability. For these reasons, the Navy, Army and Air Force planned to build a high-level programming language especially for embedded systems (The Language Guide, 1997; Kempe, 1995). Thus, the Ada…
8 pages (2008 words)
Multi-Paradigm Programming Languages
Each programming paradigm allows certain techniques and functions and forbids certain others. One example of this is that functional programming does not allow the use of side-effects and structured programming has forbidden the use of go to statement. Due to these feature programmers who are versed in one programming paradigm find it difficult to work in another. However for programmers working…
3 pages (753 words)
The Nature of Computing. Why Programming Paradigms and Languages?
This paper presents a detailed overview of computer programming languages. This paper will discuss the evolution of computer programming languages, change in a diversity of languages and explore how languages such as Python, Perl, Ruby and C# emerged as a convergence of previous languages. Introduction to Programming and Programming Languages The computer programming is the process of writing the…
4 pages (1004 words)
Programming Languages
Whereas, the other authors have categorized the computer languages keeping in view the different aspects of the computer language including programming paradigm. The categories include: the procedural programming languages, structured programming languages, object oriented programming languages, functional programming languages, event driven programming, compiled and interpreted computer…
7 pages (1757 words)
API ( Application Programming Interface) Theory part exam as a coursework.
The protocol achieves this by granting third-party application access to protected content without providing the application with credentials. Oath protocol differs with the Open ID which is a federated authentication protocol (A How-to Guide to OAuth & API Security n.d). The traditional approach in client-server authentication model required a request to access protected resource on the server by…
8 pages (2008 words)