This chapter has describes and applied the following patterns:
a. Iterator
b. Container-Iterator
c. Adapter
d. Model-View-Controller
e. Divide and Conquer Sort
The text treats all these algorithms.
Computer Science & Information Technology
You might also like to view...
The ____ character is used to display a decimal integer.
A. d B. f C. o D. x
Computer Science & Information Technology
Using an example of a component that implements an abstract data type such as a stack or a list, show why it is usually necessary to extend and adapt components for reuse.
What will be an ideal response?
Computer Science & Information Technology
A peer-peer (or peer-to-peer) network is called a __________ in Windows terminology.
a. LAN b. workgroup c. container d. domain
Computer Science & Information Technology
Which of the following logical functions will return a value if false if one of the arguments is false?
A) OR B) AND C) IF D) NOT
Computer Science & Information Technology