Dale - Computer Science Illuminated 293

Dale - Computer Science Illuminated 293 - Recursion pg 255...

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
266 Chapter 8 High-Level Programming Languages ambiguity of ownership in cyberspace. As hacking becomes more prominent, society finds itself questioning the fine line between the free access to information and the rights of individual or corporate privacy. Key Terms Arguments pg. 252 Assignment statement pg. 238 Asynchronous pg. 257 Boolean expression pg. 233 Bytecode pg. 228 Case sensitive pg. 237 Class pg. 261 Compiler pg. 226 Control structure pg. 240 Data type pg. 234 Declaration pg. 236 Encapsulation pg. 261 Instantiate pg. 261 Interpreter pg. 227 Named constant pg. 238 Object (implementation phase) pg. 261 Object (problem-solving phase) pg. 261 Object class or Class pg. 261 Parameter list pg. 250 Parameters pg. 251 Polymorphism pg. 262
Background image of page 1
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Recursion pg. 255 Reference parameter pg. 253 Reserved word pg. 237 Strong typing pg. 234 Value parameter pg. 253 Variable pg. 233 Exercises 1. What is the hallmark of an assembly language? 2. Distinguish between an assembler and a compiler. 3. Distinguish between a compiler and an interpreter. 4. Compare and contrast an assembler, a compiler, and an interpreter. 5. Describe the portability provided by a compiler. 6. Describe the portability provided by the use of Bytecode. 7. Describe the process of compiling and running a Java program. 8. Discuss the word paradigm as it relates to computing. 9. Name four programming language paradigms and give an example language in each....
View Full Document

This note was uploaded on 01/13/2011 for the course CSE 1550 taught by Professor Marianakant during the Fall '10 term at York University.

Ask a homework question - tutors are online