yesudas
BAN USERWe will have to use Observer pattern. Each cell is an Observable and will have a list of Observers.
Whenever the Observable object value is changed, the Observers will be notified and their value get changed and so on.
"The observer pattern is a software design pattern in which an object, called the subject, maintains a list of its dependents, called observers, and notifies them automatically of any state changes, usually by calling one of their methods. It is mainly used to implement distributed event handling systems. "
In computing, virtual memory is a memory management technique developed for multitasking kernels. This technique virtualizes a computer architecture's various forms of computer data storage (such as random-access memory and disk storage), allowing a program to be designed as though there is only one kind of memory, "virtual" memory, which behaves like directly and contiguous addressable read/write memory.
- yesudas March 27, 20131) Aggregations and Compositions are both associations - For example, Student has brain. This is a composition - because life cycle of brain is only up-to the life of the student. Brain is created when the student is created but brain is destroyed when the student is destroyed.
But school has a list of students. This is a aggregation in the sense that when the student is destroyed , the school not going to be destroyed. When the school is destroyed, the student is not necessarily destroyed.
2 ) Enum is the special type in Java where the Objects are defined within the Enum. They are pre-defined. Whenever we have a pre-defined list of singleton objects or constants , we can make use of enums.
3) I use builder method a lot because it avoids painful large constructors. The builder method pattern where the director builds part of the objects one by one and finally the builder builds the entire object. For example , Employee builder , first builds personalInfo and then the JobInfo and then the EducationalInfo, finally they all together build the employee object.
4) Binary search code using Recursion:
BSTnode find ( BSTnode node, Object value )
{ BSTnode found = node;
// Node exists, but it is not the correct one. NOTE: it is critical that
// the base class "equals" of Object be overridden as appropriate.
if ( node != null && !value.equals(node.data) )
{
found = find ( node.left, value ); // Search left first
if ( found == null ) // Failed to find on left
found = find( node.right, value );// so search right
}
5) Man in the middle attack is for the security attack where a process in the middle hides and mediates a private commuication between two parties.
6) We create a svn branch by forking a master or another child branch.
Repcarlawbartlett, Accountant at ASU
Managed a small team managing toy elephants for the underprivileged. A real dynamo when it comes to managing vashikaran mantra ...
This is a bare minimum logic:
- yesudas March 27, 2013There are users.
User has a list of Posts.
User has a list of friends.
There is a news feed for each user.
News feed has a list of Posts collected from your friends list Using Observer pattern.