SlideShare a Scribd company logo
Object Oriented Programming:
Prof Neeraj Bhargava
Vaibhav Khanna
Department of Computer Science
School of Engineering and Systems Sciences
Maharshi Dayanand Saraswati University Ajmer
Form Binary to Object Oriented
Programming Issues
• • How to represent real-life entities of problems
in system design?
• • How to design system with open interfaces?
• • How to ensure reusability and extensibility of
modules?
• • How to develop modules that are tolerant of
any changes in future?
• • How to improve software productivity and
decrease software cost?
• • How to improve the quality of software?
What are objects?
• Objects model the elements of the problem
context
• Each object has:
• �characteristics
• �responsibilities (or required behaviors)
Development of Object-oriented
paradigm
• “As complexity increases, architecture
dominates the basic materials”. To build
today’s complex software it is just not enough
to put together a sequence of programming
statements and sets of procedures and
modules; we need to incorporate sound
construction techniques and program
structures that are easy to comprehend
implement and modify. Alan Kay….
Object Oriented Programming (OOP)
• Object Oriented Programming (OOP) is an
approach to program organization and
development that attempts to eliminate some
of the pitfalls of conventional programming
methods by incorporating the best of
structured programming features with several
powerful new concepts.
Procedure-Oriented Programming
• In the procedure oriented approach, the
problem is viewed as the sequence of things
to be done such as reading, calculating and
printing such as cobol, fortran and c.
• The primary focus is on functions.
• The technique of hierarchical decomposition
has been used to specify the tasks to be
completed for solving a problem.
General Structure of a program in
Procedure-Oriented Programming
Procedure-Oriented Programming
• Procedure oriented programming basically
consists of writing a list of instructions for the
computer to follow, and organizing these
instructions into groups known as functions.
• We normally use flowcharts to organize these
actions and represent the flow of control from
one action to another.
• In a large program it is very difficult to identify
what data is used by which function. …. And this
can result in programming errors
Procedure-Oriented Programming
• Characteristics exhibited by procedure-oriented
programming are:
• • Emphasis is on doing things (algorithms).
• • Large programs are divided into smaller programs
known as functions.
• • Most of the functions share global data.
• • Data move openly around the system from function
to function.
• • Functions transform data from one form to another.
• • Employs top-down approach in program design.
Object Oriented Paradigm
• The major motivating factor in the invention of object-
oriented approach is to remove some of the flaws
encountered in the procedural approach.
• OOP treats data as a critical element in the program
development and does not allow it to flow freely
around the system.
• It ties data more closely to the function that operate on
it, and protects it from accidental modification from
outside function.
• OOP allows decomposition of a problem into a number
of entities called objects and then builds data and
function around these objects.
Organization of data and function in
OOP
Features of object oriented
programming
• • Emphasis is on data rather than procedure.
• • Programs are divided into what are known as objects.
• • Data structures are designed to characterize the objects.
• • Functions that operate on the data of an object are ties
together in the data structure.
• • Data is hidden and cannot be accessed by external function.
• • Objects communicate with each other through function.
• • New data and functions can be easily added whenever
necessary.
• • Follows bottom up approach in program design.
Assigmment
• Explain the concept of Procedure-Oriented
Programming
• Explain the concept of object oriented
programming
Ad

Recommended

Academic structure checker system
Academic structure checker system
tuannurnaqiah
 
Apache mahout and R-mining complex dataobject
Apache mahout and R-mining complex dataobject
sakthibalabalamuruga
 
Software Design Concepts
Software Design Concepts
Mohammed Fazuluddin
 
Different approaches to software design
Different approaches to software design
Sandeep Kumar Nayak
 
Machine learning for software engineering
Machine learning for software engineering
Md. Mehedi Hasan
 
Design process and concepts
Design process and concepts
Slideshare
 
07 software design
07 software design
kebsterz
 
Bai giang-uml-14jan14
Bai giang-uml-14jan14
TRAN Khanh Dung, Khoa CNTT, Đại Học Xây Dựng
 
Slides chapter 9
Slides chapter 9
Priyanka Shetty
 
Slides chapter 11
Slides chapter 11
Priyanka Shetty
 
Architectural design
Architectural design
SHREEHARI WADAWADAGI
 
Coupling coheshion tps
Coupling coheshion tps
Preeti Mishra
 
Presentation on software construction
Presentation on software construction
BanduChalise
 
Lecture 19 design concepts
Lecture 19 design concepts
IIUI
 
Design Model & User Interface Design in Software Engineering
Design Model & User Interface Design in Software Engineering
Meghaj Mallick
 
Structured Design
Structured Design
Ajeng Savitri
 
Software project plannings
Software project plannings
Aman Adhikari
 
TEA Presentation
TEA Presentation
Terry Startzel, MS, PMP, SCPM, CSM
 
Estimation in Project Management
Estimation in Project Management
Ansar Gill
 
Unit 5 design engineering ssad
Unit 5 design engineering ssad
Preeti Mishra
 
Software Project management
Software Project management
TRAN Khanh Dung, Khoa CNTT, Đại Học Xây Dựng
 
Unified process model
Unified process model
RyndaMaala
 
Modeling software with UML
Modeling software with UML
6020 peaks
 
Bai giang-spm-13feb14
Bai giang-spm-13feb14
TRAN Khanh Dung, Khoa CNTT, Đại Học Xây Dựng
 
Modeling and analysis
Modeling and analysis
Shwetabh Jaiswal
 
Slides chapter 10
Slides chapter 10
Priyanka Shetty
 
Automation in software engineering
Automation in software engineering
Mphasis
 
Software Design Methodologies and Testing
Software Design Methodologies and Testing
International Institute of Information Technology (I²IT)
 
C++ notes.pdf
C++ notes.pdf
RajanBagale3
 
Lecture No.1.pptx
Lecture No.1.pptx
anzazubair91
 

More Related Content

What's hot (20)

Slides chapter 9
Slides chapter 9
Priyanka Shetty
 
Slides chapter 11
Slides chapter 11
Priyanka Shetty
 
Architectural design
Architectural design
SHREEHARI WADAWADAGI
 
Coupling coheshion tps
Coupling coheshion tps
Preeti Mishra
 
Presentation on software construction
Presentation on software construction
BanduChalise
 
Lecture 19 design concepts
Lecture 19 design concepts
IIUI
 
Design Model & User Interface Design in Software Engineering
Design Model & User Interface Design in Software Engineering
Meghaj Mallick
 
Structured Design
Structured Design
Ajeng Savitri
 
Software project plannings
Software project plannings
Aman Adhikari
 
TEA Presentation
TEA Presentation
Terry Startzel, MS, PMP, SCPM, CSM
 
Estimation in Project Management
Estimation in Project Management
Ansar Gill
 
Unit 5 design engineering ssad
Unit 5 design engineering ssad
Preeti Mishra
 
Software Project management
Software Project management
TRAN Khanh Dung, Khoa CNTT, Đại Học Xây Dựng
 
Unified process model
Unified process model
RyndaMaala
 
Modeling software with UML
Modeling software with UML
6020 peaks
 
Bai giang-spm-13feb14
Bai giang-spm-13feb14
TRAN Khanh Dung, Khoa CNTT, Đại Học Xây Dựng
 
Modeling and analysis
Modeling and analysis
Shwetabh Jaiswal
 
Slides chapter 10
Slides chapter 10
Priyanka Shetty
 
Automation in software engineering
Automation in software engineering
Mphasis
 
Software Design Methodologies and Testing
Software Design Methodologies and Testing
International Institute of Information Technology (I²IT)
 

Similar to Object oriented programming 1 introduction to oop (20)

C++ notes.pdf
C++ notes.pdf
RajanBagale3
 
Lecture No.1.pptx
Lecture No.1.pptx
anzazubair91
 
Programming In C++
Programming In C++
shammi mehra
 
IET307 OOP - object oriented programming concepts.pptx
IET307 OOP - object oriented programming concepts.pptx
BasithAb2
 
1.2 Procedural Vs Object Oriented Programming.pptx
1.2 Procedural Vs Object Oriented Programming.pptx
YogitaTiwari6
 
OOP-1.pptx
OOP-1.pptx
iansebuabeh
 
Oop basic overview
Oop basic overview
Deborah Akuoko
 
Chapter 1
Chapter 1
Jasleen Kaur (Chandigarh University)
 
Chapter17 oop
Chapter17 oop
Deepak Singh
 
Different paradigms for problem solving.pptx
Different paradigms for problem solving.pptx
iitjeesooraj
 
SE-IT JAVA LAB OOP CONCEPT
SE-IT JAVA LAB OOP CONCEPT
nikshaikh786
 
2nd PUC computer science chapter 6 oop concept
2nd PUC computer science chapter 6 oop concept
Aahwini Esware gowda
 
Unit v(dsc++)
Unit v(dsc++)
Durga Devi
 
Chapter1
Chapter1
jammiashok123
 
Object model
Object model
Hoang Nguyen
 
Object model
Object model
Tony Nguyen
 
Object model
Object model
Luis Goldster
 
Object model
Object model
Harry Potter
 
Object model
Object model
Fraboni Ec
 
Object model
Object model
James Wong
 
Programming In C++
Programming In C++
shammi mehra
 
IET307 OOP - object oriented programming concepts.pptx
IET307 OOP - object oriented programming concepts.pptx
BasithAb2
 
1.2 Procedural Vs Object Oriented Programming.pptx
1.2 Procedural Vs Object Oriented Programming.pptx
YogitaTiwari6
 
Different paradigms for problem solving.pptx
Different paradigms for problem solving.pptx
iitjeesooraj
 
SE-IT JAVA LAB OOP CONCEPT
SE-IT JAVA LAB OOP CONCEPT
nikshaikh786
 
2nd PUC computer science chapter 6 oop concept
2nd PUC computer science chapter 6 oop concept
Aahwini Esware gowda
 
Ad

More from Vaibhav Khanna (20)

Information and network security 47 authentication applications
Information and network security 47 authentication applications
Vaibhav Khanna
 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithm
Vaibhav Khanna
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standard
Vaibhav Khanna
 
Information and network security 44 direct digital signatures
Information and network security 44 direct digital signatures
Vaibhav Khanna
 
Information and network security 43 digital signatures
Information and network security 43 digital signatures
Vaibhav Khanna
 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication code
Vaibhav Khanna
 
Information and network security 41 message authentication code
Information and network security 41 message authentication code
Vaibhav Khanna
 
Information and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithm
Vaibhav Khanna
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithm
Vaibhav Khanna
 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...
Vaibhav Khanna
 
Information and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authentication
Vaibhav Khanna
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theorem
Vaibhav Khanna
 
Information and network security 34 primality
Information and network security 34 primality
Vaibhav Khanna
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
Vaibhav Khanna
 
Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystems
Vaibhav Khanna
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptography
Vaibhav Khanna
 
Information and network security 30 random numbers
Information and network security 30 random numbers
Vaibhav Khanna
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithm
Vaibhav Khanna
 
Information and network security 28 blowfish
Information and network security 28 blowfish
Vaibhav Khanna
 
Information and network security 27 triple des
Information and network security 27 triple des
Vaibhav Khanna
 
Information and network security 47 authentication applications
Information and network security 47 authentication applications
Vaibhav Khanna
 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithm
Vaibhav Khanna
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standard
Vaibhav Khanna
 
Information and network security 44 direct digital signatures
Information and network security 44 direct digital signatures
Vaibhav Khanna
 
Information and network security 43 digital signatures
Information and network security 43 digital signatures
Vaibhav Khanna
 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication code
Vaibhav Khanna
 
Information and network security 41 message authentication code
Information and network security 41 message authentication code
Vaibhav Khanna
 
Information and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithm
Vaibhav Khanna
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithm
Vaibhav Khanna
 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...
Vaibhav Khanna
 
Information and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authentication
Vaibhav Khanna
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theorem
Vaibhav Khanna
 
Information and network security 34 primality
Information and network security 34 primality
Vaibhav Khanna
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
Vaibhav Khanna
 
Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystems
Vaibhav Khanna
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptography
Vaibhav Khanna
 
Information and network security 30 random numbers
Information and network security 30 random numbers
Vaibhav Khanna
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithm
Vaibhav Khanna
 
Information and network security 28 blowfish
Information and network security 28 blowfish
Vaibhav Khanna
 
Information and network security 27 triple des
Information and network security 27 triple des
Vaibhav Khanna
 
Ad

Recently uploaded (20)

Migrating to Azure Cosmos DB the Right Way
Migrating to Azure Cosmos DB the Right Way
Alexander (Alex) Komyagin
 
Decipher SEO Solutions for your startup needs.
Decipher SEO Solutions for your startup needs.
mathai2
 
Artificial Intelligence Workloads and Data Center Management
Artificial Intelligence Workloads and Data Center Management
SandeepKS52
 
Smadav Pro 2025 Rev 15.4 Crack Full Version With Registration Key
Smadav Pro 2025 Rev 15.4 Crack Full Version With Registration Key
joybepari360
 
How Insurance Policy Management Software Streamlines Operations
How Insurance Policy Management Software Streamlines Operations
Insurance Tech Services
 
About Certivo | Intelligent Compliance Solutions for Global Regulatory Needs
About Certivo | Intelligent Compliance Solutions for Global Regulatory Needs
certivoai
 
DevOps for AI: running LLMs in production with Kubernetes and KubeFlow
DevOps for AI: running LLMs in production with Kubernetes and KubeFlow
Aarno Aukia
 
Application Modernization with Choreo - The AI-Native Internal Developer Plat...
Application Modernization with Choreo - The AI-Native Internal Developer Plat...
WSO2
 
Emvigo Capability Deck 2025: Accelerating Innovation Through Intelligent Soft...
Emvigo Capability Deck 2025: Accelerating Innovation Through Intelligent Soft...
Emvigo Technologies
 
dp-700 exam questions sample docume .pdf
dp-700 exam questions sample docume .pdf
pravkumarbiz
 
OpenTelemetry 101 Cloud Native Barcelona
OpenTelemetry 101 Cloud Native Barcelona
Imma Valls Bernaus
 
Porting Qt 5 QML Modules to Qt 6 Webinar
Porting Qt 5 QML Modules to Qt 6 Webinar
ICS
 
GDG Douglas - Google AI Agents: Your Next Intern?
GDG Douglas - Google AI Agents: Your Next Intern?
felipeceotto
 
Making significant Software Architecture decisions
Making significant Software Architecture decisions
Bert Jan Schrijver
 
How the US Navy Approaches DevSecOps with Raise 2.0
How the US Navy Approaches DevSecOps with Raise 2.0
Anchore
 
Wondershare PDFelement Pro 11.4.20.3548 Crack Free Download
Wondershare PDFelement Pro 11.4.20.3548 Crack Free Download
Puppy jhon
 
Open Source Software Development Methods
Open Source Software Development Methods
VICTOR MAESTRE RAMIREZ
 
How to Choose the Right Web Development Agency.pdf
How to Choose the Right Web Development Agency.pdf
Creative Fosters
 
Enable Your Cloud Journey With Microsoft Trusted Partner | IFI Tech
Enable Your Cloud Journey With Microsoft Trusted Partner | IFI Tech
IFI Techsolutions
 
Zoneranker’s Digital marketing solutions
Zoneranker’s Digital marketing solutions
reenashriee
 
Decipher SEO Solutions for your startup needs.
Decipher SEO Solutions for your startup needs.
mathai2
 
Artificial Intelligence Workloads and Data Center Management
Artificial Intelligence Workloads and Data Center Management
SandeepKS52
 
Smadav Pro 2025 Rev 15.4 Crack Full Version With Registration Key
Smadav Pro 2025 Rev 15.4 Crack Full Version With Registration Key
joybepari360
 
How Insurance Policy Management Software Streamlines Operations
How Insurance Policy Management Software Streamlines Operations
Insurance Tech Services
 
About Certivo | Intelligent Compliance Solutions for Global Regulatory Needs
About Certivo | Intelligent Compliance Solutions for Global Regulatory Needs
certivoai
 
DevOps for AI: running LLMs in production with Kubernetes and KubeFlow
DevOps for AI: running LLMs in production with Kubernetes and KubeFlow
Aarno Aukia
 
Application Modernization with Choreo - The AI-Native Internal Developer Plat...
Application Modernization with Choreo - The AI-Native Internal Developer Plat...
WSO2
 
Emvigo Capability Deck 2025: Accelerating Innovation Through Intelligent Soft...
Emvigo Capability Deck 2025: Accelerating Innovation Through Intelligent Soft...
Emvigo Technologies
 
dp-700 exam questions sample docume .pdf
dp-700 exam questions sample docume .pdf
pravkumarbiz
 
OpenTelemetry 101 Cloud Native Barcelona
OpenTelemetry 101 Cloud Native Barcelona
Imma Valls Bernaus
 
Porting Qt 5 QML Modules to Qt 6 Webinar
Porting Qt 5 QML Modules to Qt 6 Webinar
ICS
 
GDG Douglas - Google AI Agents: Your Next Intern?
GDG Douglas - Google AI Agents: Your Next Intern?
felipeceotto
 
Making significant Software Architecture decisions
Making significant Software Architecture decisions
Bert Jan Schrijver
 
How the US Navy Approaches DevSecOps with Raise 2.0
How the US Navy Approaches DevSecOps with Raise 2.0
Anchore
 
Wondershare PDFelement Pro 11.4.20.3548 Crack Free Download
Wondershare PDFelement Pro 11.4.20.3548 Crack Free Download
Puppy jhon
 
Open Source Software Development Methods
Open Source Software Development Methods
VICTOR MAESTRE RAMIREZ
 
How to Choose the Right Web Development Agency.pdf
How to Choose the Right Web Development Agency.pdf
Creative Fosters
 
Enable Your Cloud Journey With Microsoft Trusted Partner | IFI Tech
Enable Your Cloud Journey With Microsoft Trusted Partner | IFI Tech
IFI Techsolutions
 
Zoneranker’s Digital marketing solutions
Zoneranker’s Digital marketing solutions
reenashriee
 

Object oriented programming 1 introduction to oop

  • 1. Object Oriented Programming: Prof Neeraj Bhargava Vaibhav Khanna Department of Computer Science School of Engineering and Systems Sciences Maharshi Dayanand Saraswati University Ajmer
  • 2. Form Binary to Object Oriented
  • 3. Programming Issues • • How to represent real-life entities of problems in system design? • • How to design system with open interfaces? • • How to ensure reusability and extensibility of modules? • • How to develop modules that are tolerant of any changes in future? • • How to improve software productivity and decrease software cost? • • How to improve the quality of software?
  • 4. What are objects? • Objects model the elements of the problem context • Each object has: • �characteristics • �responsibilities (or required behaviors)
  • 5. Development of Object-oriented paradigm • “As complexity increases, architecture dominates the basic materials”. To build today’s complex software it is just not enough to put together a sequence of programming statements and sets of procedures and modules; we need to incorporate sound construction techniques and program structures that are easy to comprehend implement and modify. Alan Kay….
  • 6. Object Oriented Programming (OOP) • Object Oriented Programming (OOP) is an approach to program organization and development that attempts to eliminate some of the pitfalls of conventional programming methods by incorporating the best of structured programming features with several powerful new concepts.
  • 7. Procedure-Oriented Programming • In the procedure oriented approach, the problem is viewed as the sequence of things to be done such as reading, calculating and printing such as cobol, fortran and c. • The primary focus is on functions. • The technique of hierarchical decomposition has been used to specify the tasks to be completed for solving a problem.
  • 8. General Structure of a program in Procedure-Oriented Programming
  • 9. Procedure-Oriented Programming • Procedure oriented programming basically consists of writing a list of instructions for the computer to follow, and organizing these instructions into groups known as functions. • We normally use flowcharts to organize these actions and represent the flow of control from one action to another. • In a large program it is very difficult to identify what data is used by which function. …. And this can result in programming errors
  • 10. Procedure-Oriented Programming • Characteristics exhibited by procedure-oriented programming are: • • Emphasis is on doing things (algorithms). • • Large programs are divided into smaller programs known as functions. • • Most of the functions share global data. • • Data move openly around the system from function to function. • • Functions transform data from one form to another. • • Employs top-down approach in program design.
  • 11. Object Oriented Paradigm • The major motivating factor in the invention of object- oriented approach is to remove some of the flaws encountered in the procedural approach. • OOP treats data as a critical element in the program development and does not allow it to flow freely around the system. • It ties data more closely to the function that operate on it, and protects it from accidental modification from outside function. • OOP allows decomposition of a problem into a number of entities called objects and then builds data and function around these objects.
  • 12. Organization of data and function in OOP
  • 13. Features of object oriented programming • • Emphasis is on data rather than procedure. • • Programs are divided into what are known as objects. • • Data structures are designed to characterize the objects. • • Functions that operate on the data of an object are ties together in the data structure. • • Data is hidden and cannot be accessed by external function. • • Objects communicate with each other through function. • • New data and functions can be easily added whenever necessary. • • Follows bottom up approach in program design.
  • 14. Assigmment • Explain the concept of Procedure-Oriented Programming • Explain the concept of object oriented programming