Why we use delegation to share implementation, Database Management System

Assignment Help:

Use Delegation to Share Implementation

The delegation "Delegation comprises of catching an operation on one object and sending it to other object which is part, or related to first object. In this method, only meaningful operations are delegated to second object, and meaningless operations can be banned from being inherited accidentally".

It is actuality that inheritance is an event for implementing generalization, in which behaviour of super class is shared by all of its subclasses. But, sharing of behaviour is justifiable only when a true generalization relationship come across, that is, only when it can be said which subclass is a form of the super class. 

 


Related Discussions:- Why we use delegation to share implementation

Types of attributes, Attributes attached to an entity can be of various typ...

Attributes attached to an entity can be of various types. Simple The attribute that cannot be further separated into smaller parts and shows the basic meaning is known as a

Database project, A database to track your progress in your college program...

A database to track your progress in your college program will track your progress towards graduation! A database that has information containing the classes that you have taken, c

Describe object relational model, Describe Object Relational model ? O...

Describe Object Relational model ? Object Relational Model - This model combines the characteristics of both relational model and object oriented model. It extends the tradit

Why were functional methods fashionable in early days, Why were functional ...

Why were functional methods fashionable in early days? These are inspired directly by computer architecture and thus popular among computer scientist in early days. The divisio

In e-r diagram how derived attribute are represented, In E-R Diagram how de...

In E-R Diagram how derived attribute are represented ? In E-R Diagram By Dashed ellipse derived attribute are represented.

Describe analysis of access paths, Describe analysis of access paths To...

Describe analysis of access paths To describe analysis of access paths, consider an example of the design of a company's employee skills database. A part of the object model fr

What is first normal form, What is first normal form? The domain of att...

What is first normal form? The domain of attribute must contain only atomic (simple, indivisible) values.

What are data models, What are data models? Explain it detail? Entity ...

What are data models? Explain it detail? Entity relationship model Rectangles Ellipse Diamonds Lines Relational model Relational model use a collection

Explain deadlock detection and recovery, Explain Deadlock detection and rec...

Explain Deadlock detection and recovery Deadlock Detection - A deadlock is said to take place when there is a circular chain of transaction, every waiting for the release of a

Explain the dynamic hashing techniques, Explain the Dynamic Hashing Techniq...

Explain the Dynamic Hashing Techniques There are two methods in it: extendible hashing - stores an access structure in addition to the file, and therefore is somewhat identica

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd