1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wolverine [178]
3 years ago
7

You review a design written by somebody else for an application and you find these: - an interface Shape with a method draw() -

a class Circle that implements Shape - a class Rectangle that implements Shape - a class CompoundShape that: o implements interface Shape o aggregates 0 or more Shape objects, o has an extra method called add(Shape sh) o for implementing method draw() calls the draw() method for all aggregated Shape objects. You assume that a CompoundShape object is made of multiple shapes. What design pattern is at work in this application? Explain your answer.

Computers and Technology
1 answer:
laila [671]3 years ago
6 0

This is the Composite pattern, one of the "Gang-of-Four" design patterns (check out their book!).

You might be interested in
Using a pin or password in addition to tpm is an example of what type of authentication?
anzhelika [568]
Considering it is private i would say security?
3 0
3 years ago
How many points do I need to be able to message people
hammer [34]

That is a good question

8 0
3 years ago
Read 2 more answers
What is a cyber crime?<br><br>help
algol [13]

Answer:

cyber crime, also called computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child p0®n0graphy and intellectual property, stealing identities, or violating privacy. Cyber crime, especially through the Internet, has grown in importance as the computer has become central to commerce, entertainment, and government.

3 0
3 years ago
Read 2 more answers
Um?<br><br> i went to check my questions and i found this-
asambeis [7]

Answer:

just go ahead and refresh the page

Explanation:

5 0
3 years ago
Explain why regular system cleanup is vital to ensuring the operating system runs efficiently.
Oksanka [162]
Cleaning up a system helps clear up the space on the drives. It may also clear up processor usage, ram usage if you uninstall programs that automatically started when the system booted. You may also delete some unwanted programs in the process.
5 0
3 years ago
Other questions:
  • A ____________ variable is available throughout a program.
    7·1 answer
  • Marcus just created a new folder specifically for his buisness records so he would like to move last months business transaction
    13·2 answers
  • Print either "Fruit", "Drink", or "Unknown" (followed by a newline) depending on the value of userItem. Print "Unknown" (followe
    13·1 answer
  • Blank are back and forth movement of matter that create sound​
    15·1 answer
  • The algorithm ____ is used to find the elements in one range of elements that do not appear in another range of elements.
    5·1 answer
  • Mobile computing is growing in importance each and every day, and the IT manager must take that into account. Do some web resear
    14·1 answer
  • You are interested in buying a laptop computer. Your list of considerations include the computer's speed in processing data, its
    11·1 answer
  • Political parties to address the interest of civil society<br>​
    7·1 answer
  • Math and science are the foundation from which drafters work<br><br> True<br> False
    8·1 answer
  • How can I call moderator in braily app ???
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!