Monday, April 28, 2008

Using Get and Set Might Be Something You ll Regret

This is too common mistakes. Programmers who are trying to write object-oriented code decided to make all their data private variables when creating public get () and set () function pairs for each of them. See " & quot;? They argue, as they express themselves on their backs. " These data private, but it can be accessed through these functions. I realized my data. That& 39;s what object-oriented design requires ".

I think that this shows the basic (and very common) misunderstanding of what is encapsulation and concealment of information. Ideally, in object-oriented design, software user class should have no idea what types of data contained class. As far as he was concerned, the class must simply provide the required services, and its internal parts should be invisible. However, when we offer to get () and set () function pairs for each member variable, we basically declaring the existence of this data for the world. Hiding information provided by this class is weak, and probably does not exist. You can change the name, type or performance data that member variable, but its existence remains painfully evident to all.

(Note that I say that the user should ideally " & quot; will forget the type of data contained in the class. In practice, this is not always possible. If we were to implement BankAccount class, for example, most programmers will immediately guess that this class will have the accounts as one of its members data. They will also be on the right-guessing so that the owner of the account may be data, while a member. Nevertheless, we must avoid the disclosure of such details, especially when the content of the class are not so easily discerned.)

In Indeed, these get () and set () member functions almost as bad as performing public figures. Of course, they may provide some useful services, for example, set () function can verify the data, ensuring that it is in the proper range. Nevertheless, they tend to violate the spirit information is hidden, at least to some extent.

Using get () and set () functions is not always a bad idea, in fact, sometimes they make perfect sense. Their frequent use, however, is fairly good indication of poor software design abstracted-one that does not adhere to the principle and hiding information. In developing software classes, we have to think primarily in terms of providing services that they (ie their public functions) than they will contain data. Ideally, their implementations should be based on the data required services, rather than vice versa.

To illustrate this concept, let us rededicate BankAccount class mentioned earlier. Obviously, the BankAccount object will need to monitor its balance, so let that data member. It starts with a programmer (or one with the poor to take advantage of object-oriented) could return both GetBalance () and SetBalance () function for this class but it makes sense?

What happens when a user tries to make a deposit? The user will have to call a GetBalance (), add the amount, and then set new value through GetBalance (). That& 39;s not how real users are working, although in the real world, there is no need for investors to know how much money in the account. This class design gives the user too much information and require too many steps.

Similarly, to carry out the withdrawal, the user will need to call GetBalance (), deduct the amount of withdrawal, and then propose SetBalance (), to update your account. It also requires too much work for the user& 39;s part. In the real world, the user should not always be necessary to know exactly how much money in the account. This person might want to know that there are sufficient funds, but it does not necessarily need to know the exact balance, and this information should not be a permanent requirement.

A reasonably written class must provide the following services instead: DepositAmount (), WithdrawAmount () and GetBalance (). In this design, a member of data-account balance-logically implied services, rather than vice versa. (We could identify other services such as AccrueInterest () and TransferFunds (), but let& 39;s keep it simple now. Note that these services could offer additional data members, for example, AccrueInterest () suggests that these members will be filled at the rate of interest.)

In summary, get () and set () function couples do not are bad, but they could assume the preponderance of bad abstracted software design. There is nothing basically wrong with the help get () and set () function when they are part of a set of reasonable services. There is nothing wrong with data members to reflect these functions. When someone runs in the opposite direction, though, when one starts with data-members, it adds a corresponding gain () and set () pairs-This shows the strong poorly conceived software design.



Bookmark it: del.icio.usdigg.comreddit.comnetvouz.comgoogle.comyahoo.comtechnorati.comfurl.netbloglines.comsocialdust.comma.gnolia.comnewsvine.comslashdot.orgsimpy.com

Wednesday, April 23, 2008

How To Make Email Address - Picking A Provider

If you look at the world of Internet & 39; one of the first things you need to know how to use an e-mail address. An e-mail address is an address, such as - it helps people to determine where the e-mails you. If you send an e-mail address, you can receive messages, d & 39; friends and family members. You can also send photos or videos. You can also advertisements.
How vouchers and send an e-mail address and l & 39; Sun? All d & 39; First you choose a provider. Some of the most popular are companies, Yahoo Mail, Hotmail and Gmail, can be found on the Internet & 39;. One of the best options, the easiest way is & 39; obtained by & 39, on your provider d & 39; access to the Internet. Contact and they learn how to use an e-mail address.
If you an e-mail account through d & 39, a company online, such as Yahoo, you need to access the e-mail Configuration page on its website. Enter the name of the company e-mail, you want to install the browser in a research to its Web site. In general, the configuration d & 39, e-mail account, the sides have something to say, click & quot; establishment of a new account & quot; or & quot; & S & 39; register quot; & quot; get, or e-mail & quot;. Click on the point and follow the instructions on instructions.
You l & 39; screen will then be asked to enter some basic information about themselves. If you are concerned about your privacy, it& 39;s enough to less & 39; information as possible. You can also d & 39; a false name, if you wish, but this makes it difficult for the people Register. Normally, you have & 39;, & 39; them a little l & 39; information - they mark the fields with an asterisk or other symbol. The rest of the boxes are optional.
You information & 39; ll also select your own e-mail address. It works like your address and enables people to contact you online, or even send you photographs. Select an address, the & 39; n is simple, so you do not forget, and d & 39; that other people like you. One possible option would be d & 39, a combination of your name. If your name is John A. Smith, for example, you can use & 39; jsmith, jasmith, johns or to your e-mail address.
Because l & 39; Internet is a large, full, it is entirely possible that the first address you try to have already been taken! In this case, how to e-mail address is a number of & 39; address, which you have chosen - may be that your diploma or year of birth. You can jsmith1999 or jsmith73. Try d & 39, in an address and the number that are simple, you should be recalled. You should also apply password that you choose - choose one that is easy for you not to forget, but difficult for others to guess. Are you worried forget your password, and write to hide - well!
If They are just the Web to find something to do, such as the establishment of an e-mail address. An e-mail address can be your friends and family know how to send messages to you. It is even possible, d & 39; sending and receiving videos and pictures via e-mail. & 39, N If you are not sure to know how to e-mail address, select a company from which you can create your postal address. Another easy way to create your own e-mail address is to receive by & 39 l & 39; about your Internet service provider.



Bookmark it: del.icio.usdigg.comreddit.comnetvouz.comgoogle.comyahoo.comtechnorati.comfurl.netbloglines.comsocialdust.comma.gnolia.comnewsvine.comslashdot.orgsimpy.com

Monday, April 14, 2008

Buy Laser Printer for effective printing

Computer printers are an important peripheral for any business houses today. The use of printer is endless you can use a printer for printing reports, documents, publishing newsletters or for just printing photos. One of the most preferred printers in many big business houses today is a laser printer.
A laser printer utilizes a laser beam to produce an image on a drum. The light that the laser releases alters the electrical charge on the drum. The drum is then rolled through a toner picked up by the charged portions of the drum. Finally the toner is transferred to the paper through a combination of heat and transfer.
Laser printers are considered to be the most ideal printing tools for printing today. Initially due to their high cost they were only favorable to big business houses however off late with a fall in prices they have been accepted in both homes and office environments.
Laser printer is known for its high quality text printing and excellent graphics printing. Though laser printer has a much higher initial cost as compared to inkjet printers or dot-matrix printers but they have a comparatively much lower running cost.
Laser printers are controlled through page description languages (PDLs). Page description languages have two de facto standards Printer Control Language (PCL) PostScript
Most software can print using either of these page description languages. PostScript is more expensive than PCL but it has additional features that PCL lacks.
Tips that can help you select the right printer Decide what type of documents you will be printing Decide what featured you will need like ability to handle large files, ability to print on various media, two or more paper trays etc Compare the print quality of different printers Compare the resolutions of different printers Compare the speed specifications of different printers Check whether the printer s paper path is sharper than 90 degrees to handle envelopes, card stock and transparencies. Compare printer warranties and service contacts.
If you sit and work upon the above useful tips you will realize that laser printer just fits the bill.
Isabella Rodrigues writes for compatibleinkjetcartridge.info, offering the latest information on cartridges, visit them today for more best buy printer cartridges. Visit today: http://www.compatibleinkjetcartridge.info



Bookmark it: del.icio.usdigg.comreddit.comnetvouz.comgoogle.comyahoo.comtechnorati.comfurl.netbloglines.comsocialdust.comma.gnolia.comnewsvine.comslashdot.orgsimpy.com

Friday, April 11, 2008

Hard Drive Data Recovery

Hard drive data recovery is the method of recovering data from hard drives when it cannot be accessed in the normal manner. This failure to access the hard drive could be caused due to logical damage to the file system or any physical damage that had occurred to the storage device, thereby preventing it from being mounted by the host operating system.
The physical damage to a hard drive could occur due to several mechanical failures such as failed motors or head crashes. The physical damage of a hard drive can always lead to some data loss and in many cases this can also results in damage to the logical structures of the file system. In fact, logical damages to a file system are more common than physical damage. This includes damages caused by power outages, which prevents file system structures from being completely written to the hard drive, system crashes, and problems with hardware (particularly RAID controllers).
Most physical damage to hard drives cannot be repaired by end users. For instance, opening a hard drive in a normal environment can cause dust to settle on the surface, resulting in further damage to the platters. Mind you, normal computer users may not have enough technical experience to make type of repairs. This is where hard drive data recovery companies play a major role in helping the end user to recover their valuable data from a damaged hard drive. Almost all these hard drive data recovery firms use Class 100 clean room facilities to protect your hard drive while repairing, and use the latest tools such as magnetometers to retrieve the lost bits from the magnetic media. The extracted raw bits retrieved from the damaged disk are used to rebuild a disk image, which can then be mounted to have its logical damage repaired.
Nowadays, there are several companies which offer hard drive data recovery software programs which help the end users to recover all their important files or folders lost after an accidental format, partition loss, software malfunction, file or directory deletion, or virus crash. Whether your computer crashes or you accidentally delete the files, hard drive data recovery software helps you to locate, recover and restore lost information from your disk.
Some of the main contexts where hard drive data recovery software could save one from the blues include a formatted drive, deleted file or directory, missing file or directory, drive not booting, inaccessible drive, support copying of system locked files like registry hives, damaged or corrupted partition table, recovery of deleted files and folders on FAT and NTFS hard drive or partitions, retrieve compressed files from NTFS partitions, data recovery on damaged FAT and NTFS partitions, and formatted hard drives.
Most of the hard drive data recovery software programs available in the market are easy to install and use and are virtually self maintaining. It is highly recommended to use any of the popular hard drive data recovery software in your computer along with other programs. The program frequently creates backup copies of all your files so that you need not have to worry of any potential unexpected data loss.
It is better to prevent and prepare than repent and repair later. Check http://harddriveusa.com for additional resources on hard drives.



Bookmark it: del.icio.usdigg.comreddit.comnetvouz.comgoogle.comyahoo.comtechnorati.comfurl.netbloglines.comsocialdust.comma.gnolia.comnewsvine.comslashdot.orgsimpy.com