The proliferation of object-oriented methods, Database Management System

Assignment Help:

The Proliferation of Object-Oriented Methods

The first few years of the 1990s saw blossoming of around fifty various object oriented methods. This proliferation is a sign of great importance of object oriented technology, but it is also fruit of a multitude of interpretations of accurately what an object is. The drawback of this plenty of methodologies is that it causes confusion, which leads users to adopt a 'wait and see' attitude that limits progress made by methods. The best way of testing something is still to deploy it, methods are not cast in stone - methods evolve in response to comments from their users.

Fortunately, a close look at dominant methods allows extraction of a consensus around common concepts. The main feature of objects, shared by numerous methods are articulated around concepts of class, association (explained by James Rumbaugh), partition into subsystems (by Grady Booch) and around expression of requirements based on studying interaction between users and systems (Ivar Jacobson's use cases).

At last, well-deployed methods, for example Booch and OMT (Object Modelling Technique), were imposed by experience and adopted methodology elements which were most appreciated by the users.

 


Related Discussions:- The proliferation of object-oriented methods

Why dml is used for, Why DML is used for? DML is used to Manipulation and...

Why DML is used for? DML is used to Manipulation and processing of database. DML is provided for manipulation & processing of database. (Data stored in the database is processed

Explain hierarchical model, Explain Hierarchical Model ? Hierarchical ...

Explain Hierarchical Model ? Hierarchical Model - It was established to model several kinds of hierarchical organizations which exist in the real world. It uses tree structur

Single valued normalisation, Single Valued Normalisation  Codd in the y...

Single Valued Normalisation  Codd in the year 1972 formed three normal forms (1NF, 2NF, and 3NF). These were based on functional dependencies between the attributes of a relati

Create table and insert data manufacturer-dbms, Create a table according to...

Create a table according to given data:  AmbulanceDriver(Driver_Number#, Name, Address, Birth_Date) AmbulanceDriverTeam(Team_Number#, Driver_Number#, Join_Date, Lea

EER models, Ask question #MinimThe Georgia Tech Library (GTL) has approxima...

Ask question #MinimThe Georgia Tech Library (GTL) has approximately 16,000 members, 100,000 titles, and 250,000 volumes (an average of 2.5 copies per book). About 10 percent of the

What are the physical characteristics of magnetic disks, What are the physi...

What are the physical characteristics of magnetic disks?   Ans: A magnetic disk is a circular plate or platter of plastic or metal that is coated with magnetizable material lik

Explain the recoverable schedule, Explain the Recoverable Schedule A r...

Explain the Recoverable Schedule A recoverable schedule is one in which for each pair of transactions Ti and Tj such that Tj reads a data item formerly written by Ti, the comm

What is the full form of odbc, What is the full form of ODBC ? ODBC stand...

What is the full form of ODBC ? ODBC stands for Open Database Connectivity.

Weak entity, Entity types that do not have any key attribute, and therefore...

Entity types that do not have any key attribute, and therefore cannot be identified independently, are known as weak entity types. A weak entity can be recognized uniquely only by

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd