expand for answer

Applet

A small Java program embedded in an HTML document. Code objects sent from a server to a client to perform some action. Applets are self- contained miniature programs that execute independently of the server that sent them.


Similar items:
Microsoft’s component object model (COM) technology used in web applications. ActiveX is implemented using any one of a variety of languages, including Visual Basic, C, C++, and Java. Microsoft’s Windowsspecific nonJava technique for writing applets. ActiveX applets take considerably longer to download than the equivalent Java applets; however, they more fully exploit the features of Windows.
[view]
A platform-independent programming language developed by Sun Microsystems. Objectoriented programming language developed at Sun Microsystems to solve a number of problems in modern programming practice. The Java language is used extensively on the World Wide Web, particularly for applets.
[view]
Microsoft’s Object Linking and Embedding technology designed to let applications share functionality through live data exchange and embedded data. Embedded objects are packaged statically within the source application, called the “client;” linked objects launch the “server” applications when instructed by the client application. Linking is the capability to call a program; embedding places data in a foreign program.
[view]
An object is highly cohesive if it can perform a task with little or no help from other objects. Highly cohesive objects are not as dependent on other objects as objects with lower cohesion. Objects with higher cohesion are often better. Highly cohesive objects perform tasks alone and have low coupling.
[view]
MAC is a means of restricting access to data based on varying degrees of security requirements for information contained in the objects. A policybased means of restricting access to objects based on the sensitivity (as represented by a label) of the information contained in the objects and the formal authorization (access control privileges) of subjects to access information of such sensitivity. Means of restricting access to objects based on the sensitivity of the information contained in the objects and the formal authorization (i. e. , clearance, formal access approvals, and needtoknow) of subjects to access information of such sensitivity. (. See discretionary access control. )
[view]


There are no comments yet.

Authentication required

You must log in to post a comment.

Log in