Why we use delegation to share implementation, Database Management System

Assignment Help:

Use Delegation to Share Implementation

The delegation "Delegation comprises of catching an operation on one object and sending it to other object which is part, or related to first object. In this method, only meaningful operations are delegated to second object, and meaningless operations can be banned from being inherited accidentally".

It is actuality that inheritance is an event for implementing generalization, in which behaviour of super class is shared by all of its subclasses. But, sharing of behaviour is justifiable only when a true generalization relationship come across, that is, only when it can be said which subclass is a form of the super class. 

 


Related Discussions:- Why we use delegation to share implementation

Database ass1, #quCreate a database design specification (Enhanced Entity R...

#quCreate a database design specification (Enhanced Entity Relationship Diagram (EERD) and Relational Data Model (RDM)) from the given business description. The RDM must be in 3rd

Give an expression within sql for queries, Consider the following relations...

Consider the following relations:  S (S#, SNAME, STATUS, CITY)  SP (S#, P#, QTY)  P (P#, PNAME, COLOR, WEIGHT, CITY) Give an expression within SQL for each of queries b

Object-based models - data models, Object-based Models: Use objects as key ...

Object-based Models: Use objects as key data representation components . Examples:-   Entity-Relationship Model: It is a collection of real world objects known as entitie

Create a database model, Submit the table creation statements (including co...

Submit the table creation statements (including constraints) for the Database Model. Submit them all in a single script file. Also submit a document explaining what test data yo

What is key, What is key ? Key - A single attribute or a combination of...

What is key ? Key - A single attribute or a combination of two or more attributes of an entity set which is used to recognize one or more instances (rows) of the set (table) is

Develop and evaluate partial systems, Part 1: Security Plan Consider th...

Part 1: Security Plan Consider the Case study and identify 3 security requirements. For each of these security requirements: • Discuss the necessity for the feature and how

Functional Dependencies, What exactly is the concept of Functional Dependen...

What exactly is the concept of Functional Dependencies? And how do we associate this concept with the logic of Super-keys, Candidate Keys, etc? Given Relation R(A,B,C,D,E) with de

Data flow diagram of structured analysis and design, From SAD to OOAD (Stru...

From SAD to OOAD (Structured Analysis and Design (SAD) to Object Oriented Analysis and Design (OOAD). We will find here how we can map various models in SAD to different model

What is message switching, What is Message switching Message switching ...

What is Message switching Message switching transmits data units which can be arbitrarily long. Packet switching has a utmost packet size, if any message longer than that, it s

Integrity of a database enforced by integrity rules, Question: This Que...

Question: This Question refers to the database schema given in the Appendix. (a) The integrity of a database is enforced by integrity rules. Discuss what should happen on a

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd