What is the intent of the singleton pattern, Basic Computer Science

Assignment Help:

QUESTION

Consider a University system which has several sub systems:

  • Student Registration
  • Module Registration
  • Time Tabling
  • Library System
  • Human Resource Management
  • Payroll
  • Accounting

(a) The library (dll) in the Payroll sub-system must make use of the library (dll) utilised by the Accounting system. However, the interface of the library used by both systems differs and they cannot be amended. You have been assigned the task of developing a small tool to allow the interaction of both libraries.
Identify and elaborate on an appropriate design pattern that is suited for this need. Give justification for your choice.

(b) Identify 2 other design patterns that can be used in the University system. Your answer should explain the use of the pattern in the context of the University system, its justification and structure or sample code for the implementation.

(c) (i) What is the intent of the singleton pattern?

(ii) Identify and illustrate how the singleton pattern can be applied in the University system.


Related Discussions:- What is the intent of the singleton pattern

Discuss the objectives of query processing, Question 1 Differentiate betwe...

Question 1 Differentiate between PL/SQL functions and procedures Question 2 Draw the diagram of logical structure of oracle database and explain it in brief Question 3 D

Pipelining, tellme the types of pipelining

tellme the types of pipelining

Third generation of computers, THE THIRD GENERATION (1966-1975) ...

THE THIRD GENERATION (1966-1975) The introduction of IBM-360 series of computers in 1965 marked the beginning of this generation. The transistors were replaced by solid

Why is the random class in the .net framework not suitable, QUESTION (a...

QUESTION (a) (i) Why is the Random class in the .NET framework not suitable for generating random bytes for cryptography purposes? (ii) Mention two characteristics required

Explain the raster scan display system, Question 1 Explain boundary fill a...

Question 1 Explain boundary fill and flood fill polygon filling algorithm Question 2 Draw and explain the block diagram of typical workstation Question 3 Explain the ras

What are the computational factors, Question 1: (a) Initially, human ...

Question 1: (a) Initially, human information processing was believed to occur in 4 distinct stages. State and describe each of those stages. (b) What are the 3 types of

Nursing care activity module, Nursing Care Activity Module Retrievi...

Nursing Care Activity Module Retrieving of identification data of patient  Assessment of the patient  - Physical - Mental - Personal - Socio-c

Applications software, Applications Software: General aspects on appli...

Applications Software: General aspects on applications software. Applications software is the program that allow the user to get the required work done. In other words, applic

Info Systems Management, Assignment 1: Project Management and Information ...

Assignment 1: Project Management and Information Security 2-3 page paper in which you: 1. Explicate in detail the importance of project management as it relate to an informatio

ASSIGNMENTS, A STAIRCASE LIGHT IS CONTROLLED BY TWO SWITCHES ONE AT THE TOP...

A STAIRCASE LIGHT IS CONTROLLED BY TWO SWITCHES ONE AT THE TOP OF THE STAIRS AND ANOTHER AT THE BOTTOM OF STAIRS

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd