Describe advantages of having a componentized system

Assignment Help Computer Networking
Reference no: EM1358538

Understanding object-oriented methodologies is often difficult. You already understand that object-oriented analysis and design emulates the way human beings tend to think and conceptualize problems in the everyday world. With a little practice, object-oriented programming will become second nature to you.

As an example, consider a typical house in which there are several bedrooms, a kitchen, and a laundry room-each with a distinct function. You sleep in the bedroom, you wash clothes in the laundry room, and you cook in the kitchen. Each room encapsulates all the items needed to complete the necessary tasks.

You do not have an oven in the laundry room or a washing machine in the kitchen. However, when you do the laundry, you do not just add clothes to the washer and wait in the laundry room; once the machine has started, you may go into the kitchen and start cooking dinner. But how do you know when to go back to check the laundry? When the washer buzzer sounds, a message is sent to alert you to go back into the laundry room to put in a new load. While you are folding clothes in the laundry room, the oven timer may ring to inform you that the meat loaf is done.

What you have is a set of well-defined components: Each provides a single service to communicate with the other components using simple messages when something needs to be done. If you consider a kitchen, you see it is also composed of several, smaller components, including the oven, refrigerator, and microwave. Top-level objects are composed of smaller components that do the actual work. This perspective is a very natural way of looking at our world, and one with which we are all familiar. We do the same thing in object-oriented programming:

Identify components that perform a distinct service
Encapsulate all the items in the component necessary to get the job done
Identify the messages that need to be provided to the other components

Although the details can be quite complex, these details are the basic principles of object-oriented programming.

Consider the microwave oven in your kitchen, using the object-oriented thinking described above.

Create a table with the following four column headings: Top-Level Objects, Communicates With, Incoming Messages, and Outgoing Messages.

Identify the top-level objects of the microwave.
Explain some of the graphical user interfaces (GUIs) and communications messages that occur during the operation of a microwave.

Describe some of the advantages of having a componentized system. For example, what happens if the microwave breaks?

Reference no: EM1358538

Questions Cloud

Explain the following scenario addresses potential : Explain The following scenario addresses potential contractual disputes involving a contract for a nonprofit organization
Determine accounts how much receivables decline : McNally Corporation has sales of $1,000,000 million per year, all on credit terms calling for payment within thirty days, and its accounts receivable are $200,000.
Diagnosing a child with adhd : What factors and symptoms need to be considered before diagnosing a child with ADHD?
Illustrate what policies do governments adopt : Illustrate what policies do governments adopt to redistribute income and how do those policies help the country's economic growth.
Describe advantages of having a componentized system : Describe some of the advantages of having a componentized system. For example, what happens if the microwave breaks?
Diagnosis of adhd : Is there a biological test that can diagnose Attention Deficit Hyperactivity Disorder (ADHD) in a child?
Illustrate what required return does the project : BP Oil is in the process of replacing sections od its Prudhoe Bay, Alaska oil transit pipeline. Illustrate what required return does the project become financially unacceptable.
Determine the value of firm stock : Calamity Mining Corporation's iron ore reserves are being depleted, and its expenses of recovering a declining quantity of ore are rising each year. As a result, the corporation's earnings are declining at a rate of 10% per year.
Analyzing the leadership style of a non-fictional character : Evaluate your chosen leader and yourself, based on the leadership theories and summarize the discussion with your mentor

Reviews

Write a Review

Computer Networking Questions & Answers

  Explaining multiple mono-alphabetic substitution ciphers

Consider improved version of Vigenere cipher, where instead of using multiple shift ciphers, multiple mono-alphabetic substitution ciphers are used.

  Explaining social networking in knowledge management

Social Networking is one of the hottest topics in knowledge management. Is it knowledge management?

  Reasons to prevent outsider obtaining free network acces

List three reasons you might still want to prevent an outsider obtaining free network access by intruding into your wireless network.

  Explain analogy to sending a physical package

Identify each of the blocks commonly employed and utilize an analogy to sending a physical package to explain what each block does.

  Show sum of products if mobile user transmits-code division

Mobile user A transmits a 1, while Mobile user B transmits a 0. Show sum of the products that results and your calculations.

  Implementing filter in the firewall

Consider yourself as the network security technician. Your internetwork connects six buildings through fiber links. You have experienced the numerous attacks on your corporate Web server.

  Information security and disaster recovery

Explain which concepts are the most significant to consider when designing information security policies and procedures.

  Explaining bgpv4 router receives update

Suppose a BGPv4 router receives update for prefix P which indicates AS1 is next hop.

  Explain private ip addressing used in conjunction with nat

Explain if private IP addressing should be used in conjunction with NAT (Network Address Translation)? Describe what IP class you would consider using.

  Analyze network security threats and vulnerabilities

Given the need for secure, online business communications, analyze network security threats and vulnerabilities and design network security solutions

  Selecting the network

She has bids from several companies in order to install (1) Wi-Fi, or (2) a switched Ethernet 100 Base T network. She wishes you to provide her some sense of relative performance of the alternatives so that it may be related to the costs of each o..

  Benefits and drawbacks of using social networking

What are some benefits and drawbacks of using social networking?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd