Explain the object-oriented decomposition, Database Management System

Assignment Help:

Explain the Object-oriented decomposition

Object-oriented decomposition targets at identifying individual sovereign objects that encapsulate both a state and certain behaviour. Each main components of the system is known as subsystem. Then communication between these objects leads to the required solutions. Decomposition of the system in function-data model (SAD) and the object oriented decomposition are given below. Although solutions help deal with complexity, you have reasons to believe that an object-oriented decomposition is favourable since, the object-oriented approach provides for a semantically richer framework which leads to decompositions which are more closely related to entities from real world. Moreover, the recognition of abstractions supports heaving  solutions to be reused and object-oriented approach supports evolution of systems better, as those ideas that are more likely to change can be hidden within objects.

 


Related Discussions:- Explain the object-oriented decomposition

Develop c# schoolproject asap, Develop C# schoolproject ASAP Helping me ...

Develop C# schoolproject ASAP Helping me with schoolproject. The project is prepared in C# and haves a database connection. We have some small issues asking up data from t

CMIS 420 Homework Assignment 2, describe all the tables you have created. ...

describe all the tables you have created. ?get table_name, status, num_rows, user_stats in user_tables system view ?get table_name, constraint_name, constraint_type in user_constr

State in brief about object design, Give the Introduction of OBJECT DESIGN ...

Give the Introduction of OBJECT DESIGN Strategies which are selected during system design are carried out in object-oriented design. In this procedure, objects which are identi

Example of grant create session to mca12, Example -GRANT CREATE SESSION TO ...

Example -GRANT CREATE SESSION TO MCA12; (This command gives system level permission on creating a session - not portable) GRANT SELECT ON EMP TO MCA12; (Object level permi

What is oom, What is OOM? Object oriented modeling is an approach by wh...

What is OOM? Object oriented modeling is an approach by which modeling of systems is done by visualizing the system based on real world concepts. Object oriented modeling does

Explain the disadvantages of file oriented approach, Explain the disadvanta...

Explain the disadvantages of file oriented approach? In the oriented approach Applications are designed in isolation. Design of application is optimized for one application. In

Mis, explain three types of internet risks to the consummers whent he busin...

explain three types of internet risks to the consummers whent he business system is data dependent. how can we minimise these risks

Define redo logs, Redo Logs: Any database must have minimum two redo logs....

Redo Logs: Any database must have minimum two redo logs. These are the rules for the database; the redo logs record all modifies to the system objects or user objects. If any type

Differentiate between strict and rigorous two phase locking, Differentiate ...

Differentiate between strict two-phase and rigorous two-phase with conversion protocol Ans:  Strict two-phase locking holds all its exclusive that is write locks until commit t

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd