EIST 06

EIST 06

University

5 Qs

quiz-placeholder

Similar activities

Week 3 - [KU 1102] - Decomposition

Week 3 - [KU 1102] - Decomposition

University

10 Qs

CASE TOOL 5/8/2020

CASE TOOL 5/8/2020

University

10 Qs

TOPIC 1 COMPUTER NETWORK

TOPIC 1 COMPUTER NETWORK

University

10 Qs

HTML Quizz 2

HTML Quizz 2

University

8 Qs

AmphiCICD

AmphiCICD

University

8 Qs

Design Patterns - Estruturais

Design Patterns - Estruturais

University

10 Qs

PreTest TKJ BLPT

PreTest TKJ BLPT

11th Grade - Professional Development

10 Qs

Firewall & IDS

Firewall & IDS

University

10 Qs

EIST 06

EIST 06

Assessment

Quiz

Computers

University

Medium

Created by

Berkay Ürün

Used 2+ times

FREE Resource

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Reuse:

The goal of inheritance is only to achieve interface specification

White box reuse could be achieved using inheritance

Delegation reuses implemented functionality in the superclass

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Generalization vs. Specialization:

Generalization usually leads to model transformation

Refactoring means restructuring the UML model to fill in the gap between object design and system design

In specialization Inheritance we first discover the subclass then the superclass

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Composite Pattern:

Composite pattern is used when we need to choose between multiple strategies during runtime

Composite pattern is a Creational pattern

The composite pattern lets a Client treat an individual class called Leaf and Compositions of Leaf classes uniformly

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Bridge Pattern:

The bridge pattern provides a bridge between the concrete implementation and the solution domain

The degenerated bridge pattern has no application domain taxonomy

The bridge pattern allows to bind the interface and its subclass before startup time of the system

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Proxy Pattern:

The proxy pattern allows to defer object creation and object initialization to the time the object is needed

During access control the proxy object acts as a stand-in for an object which is expensive to create

The implementation of request() in Proxy uses inheritance to access request() in RealSubject