Академический Документы
Профессиональный Документы
Культура Документы
Lecture – 11
1. Participant that construct an object using builder interface in builder design pattern is
2. Design pattern that provides a fine control over the construction process and provides clear
separation between the construction and representation of an object.
3. __________ builds the product’s internal representation and defines the process by which its
assembled in builder design pattern.
Lecture – 12
4. Motivation of which design pattern can be applied to reduce the load on memory by sharing
objects.
6. Which of the following design pattern is use sharing to support large number of fine-grained
objects efficiently?
Lecture – 13
7. Suppose we have a pen can exist with/without refill. A refill can be of any color thus a pen is
used to create drawing having N of colors. Here pen can be ______ object with refill as extrinsic
attribute
Lecture – 14
10. When we want to represent a full or partial hierarchy of objects, _________ pattern is used.
11. Which design pattern lets client treat individual objects and combination of objects uniformly.
12. Which participant in composite pattern defines behavior for primitive objects in the composition.
Lecture – 15
13. The constructor in the composite design pattern should be private.
a. True b. False
Lecture – 16
16. When we want to decouple a request’s sender and receiver, we use which design pattern.
17. Chain of responsibility is used to issue a request to one of several objects without specifying the
___________ explicitly.
18. Which design pattern provides the advantage of avoid coupling degree, simplified object and
allow dynamic adding or deleting responsibility.
Lecture – 17
19. Avoid coupling of sender request in the characteristics of
21. The object does not need to know the chain structure is the advantage of composite pattern
a. Ture b. False
Lecture – 18
22. Proxy design pattern is also known as
e. Surrogate f. Handle g. Wrappers h. All of these
23. Provides a surrogate or placeholder for another object to control access to it.
24. This proxy may cache additional information about the real subject so that they can postpone
accessing it.
Lecture – 19
25. The following diagram is the problem statement of which design pattern
Lecture – 20
28. Object that asks the command to carry out request is
29. The functionality of UNDO/REDO operation is provided by which design pattern so we can
possibly reverse the operation.
a. Builder b. Command c. Iterator d. Composite