You are responsible for the integration testing of a system that encrypts network traffic. This system includes a key generator subsystem that uses random numbers. During integration testing, you use a stub implementation of the key generator that produces a predictable result. However, for the release version of the system, you want to substitute the stub implementation with the random implementation, so that the generated keys are not predictable to an outsider. Implement a test infrastructure using one of the design patterns described in Chapter 8, Object Design: Reusing Pattern Solutions to enable the exchange of these two key generator implementations at run time. Justify your choice.
What will be an ideal response?
We use a bridge pattern to substitute different implementations of the random number generator at run time.
Computer Science & Information Technology
You might also like to view...
To enable applications written for older versions of Windows to run properly on Windows Vista and later versions, you can use the __________Wizard built into Windows
a. Executable b. Program Compatibility c. AppInstall d. None of the above
Computer Science & Information Technology
When a form's submit button is pressed, each field on the form is sent to the Web server as a name/value pair.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
A meeting is an event that you invite other people to attend.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
What file formats preserve vector data?
What will be an ideal response?
Computer Science & Information Technology