Explain the object-oriented decomposition, Database Management System

Assignment Help:

Explain the Object-oriented decomposition

Object-oriented decomposition targets at identifying individual sovereign objects that encapsulate both a state and certain behaviour. Each main components of the system is known as subsystem. Then communication between these objects leads to the required solutions. Decomposition of the system in function-data model (SAD) and the object oriented decomposition are given below. Although solutions help deal with complexity, you have reasons to believe that an object-oriented decomposition is favourable since, the object-oriented approach provides for a semantically richer framework which leads to decompositions which are more closely related to entities from real world. Moreover, the recognition of abstractions supports heaving  solutions to be reused and object-oriented approach supports evolution of systems better, as those ideas that are more likely to change can be hidden within objects.

 


Related Discussions:- Explain the object-oriented decomposition

Differance between ddl and sdl, Differance between DDL and SDL? DDL and...

Differance between DDL and SDL? DDL and SDL - The data definition language (DDL) is used through DBA and database designers to describe internal schema, conceptual schema, and

Mixed fragmentation, Mixed fragmentation: Sometimes, horizontal fragmentati...

Mixed fragmentation: Sometimes, horizontal fragmentation or vertical fragmentation of a database schema by itself is insufficient to sufficiently distribute the data for some appli

What is the difference between where and having clauses, What is the differ...

What is the difference between WHERE and HAVING clauses?. Predicates in the WHERE clause applies to every tuple while the predicate in the HAVING clause applies to groups.

Authorisation, Authorisation Authorisation is the culmination of the ad...

Authorisation Authorisation is the culmination of the administrative policies of the organisation.  As the name shows, authorisation is a set of rules that can be used to verif

Assigning responsibility for operation, Assigning Responsibility for Operat...

Assigning Responsibility for Operation Many operations might have obvious target objects, but some of these operations could be used at numerous places in an algorithm, by one

Differentiate between static hashing and dynamic hashing, Differentiate bet...

Differentiate between static hashing and dynamic hashing.  Ans: Static Hashing comprises the number of primary pages in the directory fixed. So, while a bucket is full, we requ

Bid Cunt, How do I use strap on?#

How do I use strap on?#

What is the disadvantage of a call by reference, What is the disadvantage o...

What is the disadvantage of a call by reference? During a call by reference damage or loss of data is not restricted to the subroutine, but will instantly lead to alters to th

Difference between clustered and a non-clustered index, What are the differ...

What are the difference between clustered and a non-clustered index? A clustered index is a special type of index that reorders the way records in the table are physically stor

Ans the following, discuss the array implementation of a stack.

discuss the array implementation of a stack.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd