Information Hiding and ADTs

Steven Zeil

Old Dominion University, Dept. of Computer Science

Table of Contents

1. Abstraction
1.1. Procedural Abstraction
1.2. Data Abstraction
2. Abstract Data Types
2.1. ADT Members
2.2. Example: Time
2.3. Example: Ordered Collection
2.4. The ADT as Contract
2.5. ADT Implementations
3. Where Do ADTs Come From?
3.1. Real-World Objects make Good ADTs
3.2. The OO Philosophy
3.3. Example: Library Holdings

Large programs are built in layers.