G06

G06

University

5 Qs

quiz-placeholder

Similar activities

DesignPatterns

DesignPatterns

University

9 Qs

BCA V sem

BCA V sem

University

10 Qs

7) 208.4 Implementing Nginx as a web server and a reverse proxy

7) 208.4 Implementing Nginx as a web server and a reverse proxy

University

9 Qs

GoF Patterns

GoF Patterns

University

7 Qs

Network Hardware Quiz

Network Hardware Quiz

University

10 Qs

Assignment No.5

Assignment No.5

University

10 Qs

Chapter 27

Chapter 27

University

10 Qs

G06 Recap

G06 Recap

University

5 Qs

G06

G06

Assessment

Quiz

Computers

University

Hard

Created by

Anastasiya Damaratskaya

Used 1+ times

FREE Resource

5 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Reuse:

The goal of inheritance is only to achieve interface specification

White box reuse could be achieved using inheritance

Delegation reuses implemented functionality in the superclass

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Generalization vs. Specialization:

Generalization usually leads to model transformation

Refactoring means restructuring the UML model to fill in the gap between object design and system design

In specialization Inheritance we first discover the subclass then the superclass

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Composite Pattern:

Composite pattern is used when we need to choose between multiple strategies during runtime

Composite pattern is a Creational pattern

The composite pattern lets a Client treat an individual class called Leaf and Compositions of Leaf classes uniformly

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Bridge Pattern:

The bridge pattern provides a bridge between the concrete implementation and the solution domain

The degenerated bridge pattern has no application domain taxonomy

The bridge pattern allows to bind the interface and its subclass before startup time of the system

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Proxy Pattern:

The proxy pattern allows to defer object creation and object initialization to the time the object is needed

During access control the proxy object acts as a stand-in for an object which is expensive to creat

The implementation of request() in Proxy uses inheritance to access request() in RealSubject