1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kirza4 [7]
3 years ago
12

What is the difference between a design pattern and a DLL?

Computers and Technology
1 answer:
jeka57 [31]3 years ago
6 0

Explanation:

Design Pattern

Design Pattern is defined as how the structure is coded across design - functionality , data abstraction , and leaving space for the future inclusions.

The future inclusions are the business logic which are subjected to change .

DLL - is the interface similar named in java language which specifies the contract of what the product or code is going to perform without exposing the underlying complexities of the implementation .

Example :  

Calculator is an example of  DLL class which contains - add , multiply, subtract , divide methods. The implementation class implements the calculator and write the implementation of the add, multiply methods.

There can be another class that implements this calculator contract and implement scientific calculation logic. In this way you have different choices or flavors of the same contract .

You might be interested in
The security administrator for Corp.com. You are explaining to your CIO the value of credentialed scanning over non-credentialed
Zepler [3.9K]

Answer:

b. Customized auditing.

Explanation:

Vulnerability scanning is a process of finding or testing a system for weak or vulnerable spots which can be exploited by outsiders. It helps to boost the computer network in an organisation.

There are two types of vulnerability scanning, they are credentialed and non-credentialed scanning and they are defined as implied. The non credentialed scan requires no authorisation and credentials for scanning to take place while credentialed scan is the reverse.

The credentialed scanning provides baseline and customised auditing features.

3 0
3 years ago
Read 2 more answers
What is an analog computer?<br>​
tigry1 [53]

Answer:

It is a computer that is used to process analog data.

7 0
2 years ago
Read 2 more answers
Match the fallacy with its name. Being a speaker of Spanish, I'm also great at speaking Italian.
tresset_1 [31]
Straw man
eg. "Senator Jones says that we should not fund the attack submarine program. I disagree entirely. I can't understand why he wants to leave us defenseless like that."

Ad hominem
eg. “How can you argue your case for vegetarianism when you are enjoying your steak?”

Over simplication
eg. President Bush wants our country to trade with Fidel Castro's Communist Cuba. I say there should be a trade embargo against Cuba. The issue in our election is Cuban trade, and if you are against it, then you should vote for me for president.

Bandwagon
eg. Everyone is selfish; everyone is doing what he believes will make himself happier. The recognition of that can take most of the sting out of accusations that you're being "selfish." Why should you feel guilty for seeking your own happiness when that's what everyone else is doing, too?

Black or white
eg. Well, it's time for a decision. Will you contribute $20 to our environmental fund, or are you on the side of environmental destruction?
3 0
3 years ago
how can a user open a blank presentation? 1.on the file menu, click new, and then click recent templates 2.on the file menu, cli
4vir4ik [10]

2.  on the file menu, click new, and then click blank presentation.

5 0
3 years ago
What are the two main charaters from maid sama?
Gennadij [26K]

Answer:

Takumi Usui and Misaki Ayuzawa

Explanation:

don't know why this is here

8 0
2 years ago
Read 2 more answers
Other questions:
  • What is Blender's default save directory for movie AVI files?
    9·2 answers
  • You want to enable nap so that all portal computers using wireless connections have an active firewall. which type of enforcemen
    11·1 answer
  • Microsoft ________ is a cloud storage and file sharing service
    12·1 answer
  • True or False?
    8·1 answer
  • Which of the following describe a required
    7·1 answer
  • When evaluating portable CD players, you consider price, the sound quality, and ease of using the controls. These are your _____
    8·2 answers
  • Write a function ngrams(n, tokens) that produces a list of all n-grams of the specified size from the input token list. Each n-g
    6·1 answer
  • Need Help Please
    7·1 answer
  • Kate saves her work on a secondary storage device that is fairly new, and uses flash technology instead of disks.
    10·1 answer
  • Which of these is a neologism created as a result of the information age?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!