We are independent & ad-supported. We may earn a commission for purchases made through our links.
Advertiser Disclosure
Our website is an independent, advertising-supported platform. We provide our content free of charge to our readers, and to keep it that way, we rely on revenue generated through advertisements and affiliate partnerships. This means that when you click on certain links on our site and make a purchase, we may earn a commission. Learn more.
How We Make Money
We sustain our operations through affiliate commissions and advertising. If you click on an affiliate link and make a purchase, we may receive a commission from the merchant at no additional cost to you. We also display advertisements on our website, which help generate revenue to support our work and keep our content free for readers. Our editorial team operates independently of our advertising and affiliate partnerships to ensure that our content remains unbiased and focused on providing you with the best information and recommendations based on thorough research and honest evaluations. To remain transparent, we’ve provided a list of our current affiliate partners here.
Security

Our Promise to you

Founded in 2002, our company has been a trusted resource for readers seeking informative and engaging content. Our dedication to quality remains unwavering—and will never change. We follow a strict editorial policy, ensuring that our content is authored by highly qualified professionals and edited by subject matter experts. This guarantees that everything we publish is objective, accurate, and trustworthy.

Over the years, we've refined our approach to cover a wide range of topics, providing readers with reliable and practical advice to enhance their knowledge and skills. That's why millions of readers turn to us each year. Join us in celebrating the joy of learning, guided by standards you can trust.

What is Information Hiding?

M. McGee
By
Updated: May 16, 2024
Views: 7,337
Share

Information hiding, as it pertains to computers, is about keeping parts of a program separate from other parts. There are many reasons to do this, one of the most common being ease of upgrading. If a program keeps its core separate from its interface, then one or the other can easily be changed without affecting its partner. This allows small changes to the program’s core features or the potential for a scalable interface, all while providing a simple upgrade process for the program. The key part of information hiding is encapsulation, keeping each segment of the program separate from all others.

There are many different ways to write computer programs. Early languages required the programmer to write the program in a continuous sequence; the first line of the program was at the top and the last line was at the bottom. As the program functioned, it basically moved downward through the code.

Modern programming languages rarely work in so strict a manner. Many rely on individual “objects” that will each perform a specific task. This not only simplifies writing the program, but it allows a specific piece of code to operate over and over without needing to be rewritten. For example, if the program requires a result from a specific math function five times, rather than writing that process out five times, the programmers will make that function into an object and have the program call it up five times.

The processes used in information hiding rely on the object nature of programming. When writing a program that utilizes these concepts, the objects are designated for individual portions of the program. In this case, a specific object may have multiple versions, each called on by a different segment of the program. In the example above, the same call is made five times in the program. If two of those calls were made by the interface and the core program made three, then the programmers would write two objects that were practically identical.

The main reason why programs use information hiding is to simplify modifications. If a portion of the program uses only its own objects, it is easier to modify that portion of the program. If objects are shared across the program, one small change could cause a failure in a seemingly unrelated part of the system.

The secondary reason for information hiding is security. If every part of a program operates as independently as possible, it is more difficult for a harmful process to cascade through the system. For instance, if a malicious program gains access to a certain part of the encapsulated system, it can only access the portion that it initially encounters. The other parts of the program remain, at least temporarily, untouched.

Share
EasyTechJunkie is dedicated to providing accurate and trustworthy information. We carefully select reputable sources and employ a rigorous fact-checking process to maintain the highest standards. To learn more about our commitment to accuracy, read our editorial process.
M. McGee
By M. McGee
Mark McGee is a skilled writer and communicator who excels in crafting content that resonates with diverse audiences. With a background in communication-related fields, he brings strong organizational and interpersonal skills to his writing, ensuring that his work is both informative and engaging.
Discussion Comments
M. McGee
M. McGee
Mark McGee is a skilled writer and communicator who excels in crafting content that resonates with diverse audiences....
Learn more
Share
https://www.easytechjunkie.com/what-is-information-hiding.htm
Copy this link
EasyTechJunkie, in your inbox

Our latest articles, guides, and more, delivered daily.

EasyTechJunkie, in your inbox

Our latest articles, guides, and more, delivered daily.