Why we use delegation to share implementation, Database Management System

Assignment Help:

Use Delegation to Share Implementation

The delegation "Delegation comprises of catching an operation on one object and sending it to other object which is part, or related to first object. In this method, only meaningful operations are delegated to second object, and meaningless operations can be banned from being inherited accidentally".

It is actuality that inheritance is an event for implementing generalization, in which behaviour of super class is shared by all of its subclasses. But, sharing of behaviour is justifiable only when a true generalization relationship come across, that is, only when it can be said which subclass is a form of the super class. 

 


Related Discussions:- Why we use delegation to share implementation

Determine the language that needs a user to specify the data, Determine the...

Determine the language that needs a user to specify the data to be retrieved with no specifying exactly how to get it is Ans: Non-Procedural DML

ER diagram, #question. acompani datdbase needs to store information about e...

#question. acompani datdbase needs to store information about employees (identified by a social security number,with salary and phone as attributes) and departments (identified by

What are the features of embedded sql explain, What are the features of emb...

What are the features of embedded SQL? Explain. Embedded SQL - SQL could be implemented within two ways. It can be used interactively or embedded in a host language or throu

What is a name, What is a Name? A user-supplied name is used for identi...

What is a Name? A user-supplied name is used for identity. This form of identity is used for files in file systems. The user gives every file a name that uniquely identifies it

What is the full form of ddl, What is the full form of DDL? DDL is stan...

What is the full form of DDL? DDL is stand for Data Definition Language.

Which method of access uses key transformation, Which method of access uses...

Which method of access uses key transformation? A Hash method of access uses key transformation.

Explain the two constraints check and foreign key in sql, Explain the two c...

Explain the two constraints, check and foreign key in SQL along with an example for each. Give the syntax. CHECK constraint - CHECK constraint specifies an expression which

What is waterfall model, Waterfall model is the linear model. The process i...

Waterfall model is the linear model. The process is completed by step by step. We couldn't stop in between of the process. Prototype model: after get the model by low cost budget o

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd