What is the intent of the singleton pattern, Basic Computer Science

Assignment Help:

QUESTION

Consider a University system which has several sub systems:

  • Student Registration
  • Module Registration
  • Time Tabling
  • Library System
  • Human Resource Management
  • Payroll
  • Accounting

(a) The library (dll) in the Payroll sub-system must make use of the library (dll) utilised by the Accounting system. However, the interface of the library used by both systems differs and they cannot be amended. You have been assigned the task of developing a small tool to allow the interaction of both libraries.
Identify and elaborate on an appropriate design pattern that is suited for this need. Give justification for your choice.

(b) Identify 2 other design patterns that can be used in the University system. Your answer should explain the use of the pattern in the context of the University system, its justification and structure or sample code for the implementation.

(c) (i) What is the intent of the singleton pattern?

(ii) Identify and illustrate how the singleton pattern can be applied in the University system.


Related Discussions:- What is the intent of the singleton pattern

Cp, I NEED FLOW CHART ANT DRAWINGS OF BASIC OPERATIONS OF COMPUTER

I NEED FLOW CHART ANT DRAWINGS OF BASIC OPERATIONS OF COMPUTER

Goals of autonomous rational agents, Goals of Autonomous Rational Agents: A...

Goals of Autonomous Rational Agents: Artificial intelligence One possible way to improve an agent's performance is to enable it to have some kind of details about what it is tr

Pep8, Write an Assembly program that reads an integer (-32,768 through 32,7...

Write an Assembly program that reads an integer (-32,768 through 32,767) in decimal and prints its equivalent in binary. The output must show all 16 bits. And you must use a loop

Differentiate the client–server and peer-to-peer models of d, The client-se...

The client-server model firmly differentiates the roles of the client and server. According to this model, the client requests services that are provided by the server. The peer-to

Cache memory, Cache memory: To reduce the idle time of the CPU and inc...

Cache memory: To reduce the idle time of the CPU and increase the speed of processing, a fast memory can be used. This can be done by using a large size of main memory. But th

Where data could be hidden, QUESTION (a) Being just employed as junior ...

QUESTION (a) Being just employed as junior forensic examiner at SAI computer forensic Ltd, your supervisor told you, ‘hey Moona Tambi, we have received a hard disk for examinat

Wireless networks, Stable wireless networks and mobile devices online tutor...

Stable wireless networks and mobile devices online tutoring In Bluetooth it is a basically a proprietary open super wireless technology standard for exchanging data over the sh

Classification of computers, Classify computer systems according to capacit...

Classify computer systems according to capacity. How they are different from computers according to the classification of technology. Provide comparative

Explain the universal nand and nor gates, Question 1 Describe the followin...

Question 1 Describe the following- Binary Number System b. Octal Number System Hexadecimal Number System   Question 2 Describe the Canonical Logical Forms-

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd