Why we use delegation to share implementation, Database Management System

Assignment Help:

Use Delegation to Share Implementation

The delegation "Delegation comprises of catching an operation on one object and sending it to other object which is part, or related to first object. In this method, only meaningful operations are delegated to second object, and meaningless operations can be banned from being inherited accidentally".

It is actuality that inheritance is an event for implementing generalization, in which behaviour of super class is shared by all of its subclasses. But, sharing of behaviour is justifiable only when a true generalization relationship come across, that is, only when it can be said which subclass is a form of the super class. 

 


Related Discussions:- Why we use delegation to share implementation

I want simple visual basic script, I want a script that will run, and updat...

I want a script that will run, and update my virtual machine's LAN settings (proxy server and port), and also re-configure the Firefox User Agent. I want a script that will run,

What are the disadvantages of relational approach, What are the disadvantag...

What are the disadvantages of relational approach? Disadvantages of relational approach: • Substantial hardware and system software overhead • May not fit all business models •

Explain saving derived attributes to avoid re-computation, Saving Derived A...

Saving Derived Attributes to Avoid Re-computation   As discussed, "redundancy means duplication of exact data". But, if multiple copies of same data are present in the system,

Explain how the object classes are mapped to tables, Explain how the object...

Explain how the object classes are mapped to tables. Each object class maps to one or more than one tables in the database. The objects in the class may be partitioned horizont

DW, #ques Define a job scheduling strategy that will meet business requirem...

#ques Define a job scheduling strategy that will meet business requirement of reporting availability by 6am CST for the following cubes? Show the job scheduling dependencies in a p

Assignment, Research Value: 7% Due Date: 17-Sep-2018 Return Date: 11-Oct-2...

Research Value: 7% Due Date: 17-Sep-2018 Return Date: 11-Oct-2018 Length: 700 words Submission method options: Alternative submission method Task back to top You are required to

Wound-wait scheme-deadlock prevention, " Wound-wait" scheme : It is based o...

" Wound-wait" scheme : It is based on a preemptive method. It is based on a simple rule:                   If Ti requests a database resource that is held by Tj

Convert encrypted hsql database into csv format, Project Description: We...

Project Description: We have an encrypted HSQL Database which we want to change into csv format. HSQL DB . We have java application (jar file) which reads that database but n

Aggregation, What does Aggregation mean?

What does Aggregation mean?

Define the two phase locking protocol, Define the Two Phase Locking Protoco...

Define the Two Phase Locking Protocol This is a protocol that is used to make sure serializability of transactions. This protocol needs that every transaction issue lock and u

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd