Want to know object oriented analysis and design ebook? we have a huge selection of object oriented analysis and design ebook information on alibabacloud.com
frameworks rather than reusable components when creating an inheritance hierarchy.
(55) If you use multiple inheritance in the design, first assume that you have made a mistake. If you do not make a mistake, try to prove it.
(56) as long as inheritance is used in object-oriented design, I have two questions: (1) i
. If you do not make a mistake, try to prove it.(56) as long as inheritance is used in object-oriented design, I have two questions: (1) is the derived class a special type of the thing it inherits? (2) is the base class part of the derived class?(57) If you find multiple inheritance relationships in an object-
information in another class (that is, non-communication behavior ).Dependency in a stable direction.(11) make sure that the abstract concept you are modeling for is a class, not just the role played by an object.(12) distribution of system functions in the horizontal direction as much as possible, that is, the top-level classes should share work in a unified manner according to the design.(13) do not crea
61 military rules of PHP object-oriented analysis design. (1) all data should be hidden inside the class. (2) a class user must depend on the common interfaces of the class, but the class cannot depend on its users. (3) minimize the elimination in the class protocol (1) all data should be hidden inside the class.
(2) a
A summary of 61 PHP object-oriented analysis designs. (1) all data should be hidden inside the class. (2) a class user must depend on the common interfaces of the class, but the class cannot depend on its users. (3) minimize messages in the class protocol (1) all data should be hidden inside the class.
(2) a class user must depend on the common interfaces of the
Arthur J.riel once said that you do not have to strictly abide by these principles and will not be sentenced to religious punishment for violating them. But you should think of these principles as alarms, and if you violate one of them, the alarm will ring. So, whatever we do, we have to have a principle. Programming is no exception, the following describes
PHPThe principle of object-oriented
Design class---> Design class is the abstraction of one or more objects in a system implementation.---> Design classes have been mapped directly to the implementation code, so the design class relies on the implementation language. On the other hand, the design class origina
Good questions about object-oriented analysis and design. it may take some time for the younger brother to get in touch with object-oriented design. every time you
Three books
The day before yesterday, I went to Shucheng and spent a lot of effort to buy three books :《CodeDaquan (second edition), ASP. Network 2.0 Development Guide and object-oriented system analysis and design ( UML For object-
number of access methods in public interfaces. A large number of access methods mean that related data and behaviors are not stored in a centralized manner.
(15) Be careful with classes that contain too many non-communication behaviors.
Another manifestation of this problem is that many get and set functions are created in the public interfaces of classes in your application.
(16) In an application composed of an object-
frameworks rather than reusable components when creating an inheritance hierarchy.
(55) If you use multiple inheritance in the design, first assume that you have made a mistake. If you do not make a mistake, try to prove it.
(56) as long as inheritance is used in object-oriented design, I have two questions: (1) i
the design.
(13) do not create all-powerful classes/objects in your system. Be especially careful about the classes whose names include driver, Manager, system, and susystem.
Plan an interface instead of implementing an interface.
(14) Be careful with classes that define a large number of access methods in public interfaces. A large number of access methods mean that related data and behaviors are not stored in a centralized manner.
(15) Be c
of access methods in the public interface. A large number of access methods means that the relevant data and behavior are not centrally stored.
(15) Be more careful with classes that contain too much communication behavior.
Another manifestation of this problem is the creation of many get and set functions in the public interface of the classes in your application.
(16) In an application composed of an object-ori
of access methods in the public interface. A large number of access methods means that the relevant data and behavior are not centrally stored.
(15) Be more careful with classes that contain too much communication behavior.
Another manifestation of this problem is the creation of many get and set functions in the public interface of the classes in your application.
(16) In an application composed of an object-ori
not change operations into classes. Question any class whose name is a verb or a derived Automatic Word, especially a class with only one meaningful action. Consider whether the meaningful behavior should be migrated to an existing or undiscovered class.(21) We often introduce a proxy class when creating an analysis model for an application. In the design phase, we often find that many agents are useless a
system domain.(20) Do not turn the operation into a class. Question any class whose name is a verb or a derived automatic word, especially one that has only a meaningful behavior. Consider whether the meaningful behavior should be migrated to a class that already exists or has not yet been discovered.(21) We often introduce proxy classes when creating an application's analysis model. In the design phase, w
access methods defined in the public interface. A large number of access methods means that the relevant data and behavior are not centrally stored.
(15) Be cautious about classes that contain too many non-communicating behaviors.
Another manifestation of this problem is that many get and set functions are created in the public interface of the class in your application.
(16) In an application that is composed of an object-
Reading directory:
1. Background
2. Ask yourself, does UML make sense to you? Does it help you analyze and model the system?
3. We have been separated by a gap for a long time, making OOAD inaccessible.
4. The four-color prototype fills this gap in history, so that we can see the hope of OOAD.
5. Use color Modeling on four-color prototype to enhance visual impact
6. Create a domain-independent model using four-color prototype
7. Conclusion: you can skip the specific implementation during
Labels: UML, modeling, four-color prototype, color Modeling
Reading directory:
1. Background
2. Ask yourself, does UML make sense to you? Does it help you analyze and model the system?
3. We have been separated by a gap for a long time, making OOAD inaccessible.
4. The four-color prototype fills this gap in history, so that we can see the hope of OOAD.
5. Use color Modeling on four-color prototype to enhance visual impact
6. Create a domain-independent model using four-color prototype
7.
: Pinterest, silk Books, Thread, ebook, and so on, you will certainly classify these types as sub-types of books, which is refinement. You need to draw a shape that can be a rectangular, round, messy shape, so you just need to manipulate the shape type, such as adding a behavior to the shape type: painting. The type of refinement: rectangular round-shaped shapes each define their own picture behavior. You just need to get a shape-thinning
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.