2.4.3
Programming Paradigms
Test your knowledge with free interactive questions on Seneca — used by over 10 million students.
Programming Paradigms
There are several different types of programming paradigms to help us solve different types of problems.

Programming paradigms
- A programming paradigm is a way of coding to solve a problem.
- We have 4 types of paradigm and each one is geared towards certain types of situations.
- Within each paradigm there are many different programming languages that all offer different things to each other.
- Some programming languages can be used for more than one paradigm.

Procedural programming
- Procedural programming is the most common paradigm of programming language.
- Procedural languages have built in simple data types like string, char, boolean, int and real.
- Procedural languages focus on a set of instructions that are followed through to achieve a desired outcome at the end.
- Python is foremost a procedural language.

Object orientated programming
- Object orientated programming came about as developers needed to model real world items that could be copied over and over again but given different attributes.
- An object “class” is set up and shows the attributes (such as colour of a car) and its behaviours (such as engine_start), this class is a blueprint for creating an object.
- Once a class is defined, it can be reused to create “instances” of the object as many times as the developer needs.
- Java and Python are object orientated languages.

Declarative programming
- Declarative languages use statements to describe a problem to be solved instead of how to solve the problem.
- The statements are given to the programming language engine, it then figures out how to solve the problem and return a result.
- SQL is a declarative language.

Functional programming
- In functional programming, functions (not procedures) are the blocks we build programs out of.
- Functions are different to procedures as they have to follow set rules:
- They must take in valid inputs, return an output, and not have any side effects.
- Haskell and Python are examples of languages that can be functional languages.
1Components of a Computer
1.1Structure & Function of the Processor
1.2Types of Processors
1.3Input, Output & Storage
1.3.1Elements of Computer Systems1.3.2Types of Computer Systems1.3.3How Magnetic Storage Works1.3.4Properties of Magnetic Storage1.3.5Examples of Magnetic Storage1.3.6How Optical Storage Works1.3.7Properties of Optical Storage1.3.8Examples of Optical Storage1.3.9Types of Optical Disc1.3.10Random Access Memory1.3.11Read Only Memory1.3.12Uses of Flash Memory1.3.13Properties of Flash Memory1.3.14What to do When We Run Out of Memory1.3.15How Virtual Memory Works
2Software & Software Development
2.1Systems Software
2.2Applications Generation
2.2.1Applications Software2.2.2Utilities2.2.3Encryption Software2.2.4Defragmentation Software2.2.5Data Compression Software2.2.6Backup Software2.2.7Open Source Software2.2.8Proprietary Software2.2.9Licensing Issues2.2.10Compilers2.2.11Interpreters2.2.12Assemblers2.2.13Compiling a Program2.2.14Lexical Analysis2.2.15Compilation Stages2.2.16Linkers, Loaders & Libraries
2.3Software Development
2.3.1Algorithmic Thinking2.3.2Waterfall Lifecycle2.3.3Waterfall Lifecycle - Strengths & Weaknesses2.3.4Agile Methodology2.3.5Agile Methodology - Strengths & Weaknesses2.3.6Extreme Programming2.3.7Extreme Programming - Strengths & Weaknesses2.3.8Spiral Methodology2.3.9Spiral Methodology - Strengths & Weaknesses2.3.10Rapid Application Development2.3.11RAD - Strengths & Weaknesse
2.4Types of Programming Language
3Exchanging Data
3.1Compression, Encryption & Hashing
3.2Databases
3.3Networks
3.3.1The Benefits of Networks3.3.2Network Performance3.3.3Types of Networks3.3.4Network Protocols3.3.5Transmission Protocols3.3.6What is the Internet?3.3.7Uniform Resource Locators3.3.8Domain Name Service3.3.9Web Hosting3.3.10Layering Concepts3.3.11TCP &. OSI Models3.3.12The Advantages of Layering3.3.13What's in a Packet?3.3.14How do Packets get Routed?3.3.15Did my Data Arrive Safely?3.3.16Network Hardware3.3.17Transmission Media3.3.18Firewalls3.3.19Proxies3.3.20Client-Server Model3.3.21Advantages of the Client Server Model3.3.22Disadvantages of the Client Server Model3.3.23Peer-to-Peer Model3.3.24Advantages of the Peer-to-Peer Model3.3.25Disadvantages of the Peer-to-Peer Model
4Data Types, Data Structures & Algorithms
4.1Data Types
4.1.1Data Types4.1.2Casting4.1.3Arrays4.1.42D Arrays4.1.5Strings4.1.6Binary4.1.7Sign & Magnitude4.1.8Binary Addition4.1.9Binary Shifts4.1.10Hexadecimal4.1.11Using Hexadecimal4.1.12Converting Binary & Hexadecimal4.1.13Converting Denary & Hexadecimal4.1.14Floating Points in Binary4.1.15Normalisation of Floating Points4.1.16Floating Point Addition4.1.17Floating Point Subtraction4.1.18Bitwise Manipulation - Shifts4.1.19Bitwise Manipulation - Masks4.1.20Character Sets4.1.21ASCII4.1.22Unicode
4.2Data Structures
5Legal, Moral, Cultural & Ethical Issues
5.1Computing Related Legislation
5.2Moral & Ethical Issues
5.2.1Online Activity Tracking5.2.2Censorship5.2.3Positive Cultural Impacts5.2.4Negative Cultural Impacts5.2.5E-Waste5.2.6Energy Consumption5.2.7Positive Environmental Impact5.2.8Layout, Colour Paradigms & Character Sets5.2.9Computers in the Workplace5.2.10Automated Decision-Making5.2.11Artificial Intelligence5.2.12Monitoring Behaviour5.2.13Analysing Personal Information5.2.14Piracy & Offensive Communication
6Elements of Computational Thinking
6.1Thinking Abstractly
6.2Thinking Ahead
6.3Thinking Procedurally
6.4Thinking Logically
6.5Thinking Concurrently
7Problem Solving & Programming
7.1Programming Techniques
7.2Programming Construction
Jump to other topics
1Components of a Computer
1.1Structure & Function of the Processor
1.2Types of Processors
1.3Input, Output & Storage
1.3.1Elements of Computer Systems1.3.2Types of Computer Systems1.3.3How Magnetic Storage Works1.3.4Properties of Magnetic Storage1.3.5Examples of Magnetic Storage1.3.6How Optical Storage Works1.3.7Properties of Optical Storage1.3.8Examples of Optical Storage1.3.9Types of Optical Disc1.3.10Random Access Memory1.3.11Read Only Memory1.3.12Uses of Flash Memory1.3.13Properties of Flash Memory1.3.14What to do When We Run Out of Memory1.3.15How Virtual Memory Works
2Software & Software Development
2.1Systems Software
2.2Applications Generation
2.2.1Applications Software2.2.2Utilities2.2.3Encryption Software2.2.4Defragmentation Software2.2.5Data Compression Software2.2.6Backup Software2.2.7Open Source Software2.2.8Proprietary Software2.2.9Licensing Issues2.2.10Compilers2.2.11Interpreters2.2.12Assemblers2.2.13Compiling a Program2.2.14Lexical Analysis2.2.15Compilation Stages2.2.16Linkers, Loaders & Libraries
2.3Software Development
2.3.1Algorithmic Thinking2.3.2Waterfall Lifecycle2.3.3Waterfall Lifecycle - Strengths & Weaknesses2.3.4Agile Methodology2.3.5Agile Methodology - Strengths & Weaknesses2.3.6Extreme Programming2.3.7Extreme Programming - Strengths & Weaknesses2.3.8Spiral Methodology2.3.9Spiral Methodology - Strengths & Weaknesses2.3.10Rapid Application Development2.3.11RAD - Strengths & Weaknesse
2.4Types of Programming Language
3Exchanging Data
3.1Compression, Encryption & Hashing
3.2Databases
3.3Networks
3.3.1The Benefits of Networks3.3.2Network Performance3.3.3Types of Networks3.3.4Network Protocols3.3.5Transmission Protocols3.3.6What is the Internet?3.3.7Uniform Resource Locators3.3.8Domain Name Service3.3.9Web Hosting3.3.10Layering Concepts3.3.11TCP &. OSI Models3.3.12The Advantages of Layering3.3.13What's in a Packet?3.3.14How do Packets get Routed?3.3.15Did my Data Arrive Safely?3.3.16Network Hardware3.3.17Transmission Media3.3.18Firewalls3.3.19Proxies3.3.20Client-Server Model3.3.21Advantages of the Client Server Model3.3.22Disadvantages of the Client Server Model3.3.23Peer-to-Peer Model3.3.24Advantages of the Peer-to-Peer Model3.3.25Disadvantages of the Peer-to-Peer Model
4Data Types, Data Structures & Algorithms
4.1Data Types
4.1.1Data Types4.1.2Casting4.1.3Arrays4.1.42D Arrays4.1.5Strings4.1.6Binary4.1.7Sign & Magnitude4.1.8Binary Addition4.1.9Binary Shifts4.1.10Hexadecimal4.1.11Using Hexadecimal4.1.12Converting Binary & Hexadecimal4.1.13Converting Denary & Hexadecimal4.1.14Floating Points in Binary4.1.15Normalisation of Floating Points4.1.16Floating Point Addition4.1.17Floating Point Subtraction4.1.18Bitwise Manipulation - Shifts4.1.19Bitwise Manipulation - Masks4.1.20Character Sets4.1.21ASCII4.1.22Unicode
4.2Data Structures
5Legal, Moral, Cultural & Ethical Issues
5.1Computing Related Legislation
5.2Moral & Ethical Issues
5.2.1Online Activity Tracking5.2.2Censorship5.2.3Positive Cultural Impacts5.2.4Negative Cultural Impacts5.2.5E-Waste5.2.6Energy Consumption5.2.7Positive Environmental Impact5.2.8Layout, Colour Paradigms & Character Sets5.2.9Computers in the Workplace5.2.10Automated Decision-Making5.2.11Artificial Intelligence5.2.12Monitoring Behaviour5.2.13Analysing Personal Information5.2.14Piracy & Offensive Communication
6Elements of Computational Thinking
6.1Thinking Abstractly
6.2Thinking Ahead
6.3Thinking Procedurally
6.4Thinking Logically
6.5Thinking Concurrently
7Problem Solving & Programming
7.1Programming Techniques
7.2Programming Construction
Practice questions on Programming Paradigms
Can you answer these? Test yourself with free interactive practice on Seneca — used by over 10 million students.
- 1
- 2Examples of functional programming languages:Fill in the list
- 3What are the properties of a function in programming?Fill in the list
Unlock your full potential with Seneca Premium
Unlimited access to 10,000+ open-ended exam questions
Mini-mock exams based on your study history
Unlock 800+ premium courses & e-books