1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kirza4 [7]
3 years ago
12

What is the difference between a design pattern and a DLL?

Computers and Technology
1 answer:
jeka57 [31]3 years ago
6 0

Explanation:

Design Pattern

Design Pattern is defined as how the structure is coded across design - functionality , data abstraction , and leaving space for the future inclusions.

The future inclusions are the business logic which are subjected to change .

DLL - is the interface similar named in java language which specifies the contract of what the product or code is going to perform without exposing the underlying complexities of the implementation .

Example :  

Calculator is an example of  DLL class which contains - add , multiply, subtract , divide methods. The implementation class implements the calculator and write the implementation of the add, multiply methods.

There can be another class that implements this calculator contract and implement scientific calculation logic. In this way you have different choices or flavors of the same contract .

You might be interested in
The Texas Department of Education has offices throughout the state covering more than 268,000 square miles. State documents are
notka56 [123]

Answer: WAN

Explanation:

3 0
2 years ago
If you were infiltrating a network (10.16.0.0/16), and searching for vulnerabilities (while trying to remain undetected), why wo
Juliette [100K]

Answer:

Yes, if you want to be undetected.

Explanation:

It is vital to always use a command that will ensure that one's activity is undetected. This is one of the important rules of corporate organizations to keep their data and activities safe and secure. The commend provided is a useful tool for detective works especially the activities of criminals and hackers. Therefore, if the admin wants to be undetected, the command should not be used.

8 0
2 years ago
Read 2 more answers
Which of the following is generally true about 401(k) and 403(b) retirement plans
Tanzania [10]
<span>- They're offered by the employers to the employees.
- They bring various tax benefit to you.
- They restrict you about when you can withdraw your money.</span>
3 0
3 years ago
If we assume the modern view of existential import, why is the following syllogism invalid? No computer is made of clay. All com
Papessa [141]

Answer:

<u>because the conclusion is not in agreement with the two premises.</u>

Explanation:

<em>Remember</em>, the term<u> syllogism</u> refers to the form of reasoning that draws its conclusion based on the stated premises. In other words, a conclusion is reached if it satisfies <em>all or part </em>of the premises.

In this case, the statement "No computer is made of clay" and  "All computers are electronic devices" should be inferred to mean, <em><u>No </u></em><em>electronic devices are made of clay" </em>not<em> </em><em>"Some electronic devices are not made of clay," </em>since the two premises neither suggest that electronic devices are made from clay.

5 0
3 years ago
Which formula is used to measure accuracy?
shepuryov [24]
<span>Gross WPM – Net WPM x 100
So B</span>
7 0
3 years ago
Other questions:
  • A viral video is one that can infect your computer with malware. <br> a. True <br> b. False
    6·1 answer
  • How often are computer and user policies applied after a user has logged into a computer?
    15·1 answer
  • Which computer device is used to capture or copy a photograph to place in a report?
    14·1 answer
  • (15 POINTS) When an error is made in HTML code, the browser does what?
    11·1 answer
  • What steps should a user take to create a secondary address book?
    8·2 answers
  • If Laura wanted to solve a problem using recursion where the last statement executed is the call to the same method, what type o
    8·1 answer
  • An electronics company develops a line of augmented reality headsets for use in interactive 3d media applications using 5g mmwav
    7·1 answer
  • Which of the following could be part of an algorithm?
    11·1 answer
  • What are the value and data type (float, int, bool, or str) of this expression:<br> 5 // 2
    9·1 answer
  • If userNum1 is less than 0, put "userNum1 is negative.\n" to output. If userNum2 is greater than 10, assign userNum2 with 0. Els
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!