What is the intent of the singleton pattern, Basic Computer Science

Assignment Help:

QUESTION

Consider a University system which has several sub systems:

  • Student Registration
  • Module Registration
  • Time Tabling
  • Library System
  • Human Resource Management
  • Payroll
  • Accounting

(a) The library (dll) in the Payroll sub-system must make use of the library (dll) utilised by the Accounting system. However, the interface of the library used by both systems differs and they cannot be amended. You have been assigned the task of developing a small tool to allow the interaction of both libraries.
Identify and elaborate on an appropriate design pattern that is suited for this need. Give justification for your choice.

(b) Identify 2 other design patterns that can be used in the University system. Your answer should explain the use of the pattern in the context of the University system, its justification and structure or sample code for the implementation.

(c) (i) What is the intent of the singleton pattern?

(ii) Identify and illustrate how the singleton pattern can be applied in the University system.


Related Discussions:- What is the intent of the singleton pattern

Printers, Printers: Printers: Printers exist in a variety of forms:  ...

Printers: Printers: Printers exist in a variety of forms:  Line Printers: These have been widely used for many years in large computer installations. They are design

Bidirectional search-artificial intelligence, Bidirectional Search-Artifici...

Bidirectional Search-Artificial intelligence: We've concentrated so far on searches where the point of the search is to search a solution, not the path to the solution. In anot

Special-purpose and general-purpose computers, SPECIAL-PURPOSE AND GENERAL-...

SPECIAL-PURPOSE AND GENERAL-PURPOSE COMPUTERS In general, there are two types of digital computers. The first is the special-purpose digital computer, which performs a f

Keystroke logger and data-stealing, Keystroke logger and Data-stealing: ...

Keystroke logger and Data-stealing: Keystroke loggers: This is a program, once installed on the system, which intercepts the keys when entering the password or the Credit Ca

Summery, This is an article and I want great synopsis for the article

This is an article and I want great synopsis for the article

How should an ideal hospital software be? , How Should an Ideal Software be...

How Should an Ideal Software be?  It should be easy to operate, with minimal training of nursing personnel.   Should be reliable, and thoroughly tested in various nur

Assigment, how to measure marginal utility.?

how to measure marginal utility.?

Cppm, sum of first 100 integers

sum of first 100 integers

EM202073PRA65DBMS, HEY, i wanna discuss about DBMS assignment Did you find...

HEY, i wanna discuss about DBMS assignment Did you find a link of mySQL?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd