This chapter has describes and applied the following patterns:

a. Iterator
b. Container-Iterator
c. Adapter
d. Model-View-Controller
e. Divide and Conquer Sort


The text treats all these algorithms.

Computer Science & Information Technology

You might also like to view...

The ____ character is used to display a decimal integer.

A. d B. f C. o D. x

Computer Science & Information Technology

Using an example of a component that implements an abstract data type such as a stack or a list, show why it is usually necessary to extend and adapt components for reuse.

What will be an ideal response?

Computer Science & Information Technology

A peer-peer (or peer-to-peer) network is called a __________ in Windows terminology.

a. LAN b. workgroup c. container d. domain

Computer Science & Information Technology

Which of the following logical functions will return a value if false if one of the arguments is false?

A) OR B) AND C) IF D) NOT

Computer Science & Information Technology