ooad in software design, why is it important and its drawbacks

Answers

Answer 1

Object-oriented analysis and design (OOAD) is important in software design because it provides a structured approach to designing software systems that are modular, flexible, and easy to maintain. However, OOAD also has some drawbacks, such as the potential for over-design and increased complexity.

Explanation:

OOAD is a methodology for designing software systems based on the principles of object-oriented programming. It involves analyzing the problem domain, identifying objects and their relationships, and designing a software system that models the problem domain in an efficient and effective way. This approach provides several benefits, such as better modularity, increased flexibility, and easier maintenance.

However, there are also some potential drawbacks to using OOAD. One of the most significant is the potential for over-design. OOAD can lead to complex and overly abstract designs that may be difficult to implement and maintain. This can result in longer development times, higher costs, and increased risk of project failure.

Another potential drawback of OOAD is increased complexity. Object-oriented systems can be more complex than traditional procedural systems, which can make them more difficult to understand and maintain. This complexity can also increase the risk of errors and bugs, which can impact system performance and reliability.

To know more about object-oriented programming click here:

https://brainly.com/question/31741790

#SPJ11


Related Questions

A well-structured relation contains minimal redundancy and allows users to manipulate the relation without errors or inconsistencies. True O False

Answers

The statement "A well-structured relation contains minimal redundancy and allows users to manipulate the relation without errors or inconsistencies" is TRUE.

Let's take a look at what this statement means.A relation is an essential aspect of the database, and its structure must be carefully designed to minimize data redundancy and maintain data integrity. In a well-structured relation, each attribute holds atomic values, meaning that it cannot be further subdivided or broken down into smaller parts.Redundancy in data can lead to anomalies, including insertion, deletion, and update anomalies. These anomalies can result in inconsistent and erroneous data when changes are made to the database structure or content.A well-structured relation must also adhere to the normalization rules, which help to eliminate redundant data. Normalization is a technique used to organize data in a database to minimize redundancy and dependency. A normalized relation is more flexible and allows users to manipulate the data without inconsistencies and errors. Hence, the given statement is true, and a well-structured relation contains minimal redundancy and allows users to manipulate the relation without errors or inconsistencies.

Learn more about data :

https://brainly.com/question/31680501

#SPJ11

You're the network administrator for a company that has just expanded from one floor to two floors of a large building, and the number of workstations you need has doubled from 50 to 100. You're concerned that network performance will suffer if you add computers to the existing LAN. In addition, new users will be working in a separate business unit, and there are reasons to logically separate the two groups of computers. What type of network should you configure?

Answers

Answer:

Internetwork

Explanation:

Internetwork refers to the interconnection between the multiple networks of the computer through which the message could be exchanged with one another and in this,  no hardware network is required. The other word of the internetwork is internet

Therefore in the question it is mentioned that you want to double the workstations i.e 50 to 100. Also, new peoples would be work in a distinct unit of business

So this situation represents the internetwork

to use appropriate personal protective equipment we should​

Answers

Answer:

We should use a computer or mobile phone with a strong password...

isn't it?....how many of you will agree with this

Explanation:

as part of a dbms, a(n) _________ documents information about a database.

Answers

As part of a DBMS, a data dictionary (also known as a system catalog) documents information about a database in detail.

The data dictionary serves as a reference for developers and administrators to understand the structure and contents of the database. It includes metadata such as the names and data types of tables and columns, relationships between tables, and constraints on data.
                                        As part of a DBMS (Database Management System), a "data dictionary" or "metadata" documents information about a database. The data dictionary stores details about the structure, organization, and relationships among the data elements within the database, making it easier to manage and understand the database's design and contents.

Learn more about data dictionary

brainly.com/question/8897251

#SPJ11

The binary number represented by the voltage graph below is

Answers

Answer:

The binary number represented by the voltage graph is bits

Explanation:

Answer:

Heres both answers and how to read them

Explanation:

100% on the quiz

The binary number represented by the voltage graph below is
The binary number represented by the voltage graph below is

you are configuring a new 2960 switch. you issue the following commands:

Answers

When configuring a new 2960 switch, you would typically issue commands to customize its settings and ensure optimal performance.

These commands may include setting the hostname, configuring interfaces, assigning IP addresses, and enabling necessary protocols. It's essential to carefully input each command and review the configuration to ensure the switch functions as intended. Always save the changes made to the configuration to avoid losing them in case of a power loss or system reboot. The 2960 switch offers flexibility and ease of use for various networking scenarios, making it a popular choice for many organizations.

learn more about 2960 switch here:

https://brainly.com/question/32372845

#SPJ11

The system tray contains

Answers

Answer

-antivirus settings

-battery status

-volume

Explanation:

Answer:

the operating system

Explanation:

hope this helps

30 POINTS FOR THE CORRECT ANSWER
For this discussion, choose two different binding techniques, two different papers, and two different finishing techniques for a 24-page brochure. Describe the pros and cons of your choices and how it may impact your design and the setup of the document.

Answers

The chosen type of binding techniques are:

Saddle stitch binding. Hardcover or case binding.

The papers type are:

Uncoated paper coated cover stock

The finishing techniques are:

Lamination Spot UV varnish.

What are the pros and cons of my choices?

Case binding is best because  it is used in a lot of  books were all the inside pages are known to be sewn together.

The Cons of case Binding is that it does not give room for one to lay books  flat.

Saddle stitching is good because it can be used in small books that has fewer pages. Its limitations is that it only takes about 100 pages.

Learn more about binding techniques from

https://brainly.com/question/26052822

#SPJ1

How do you multiply using distributive property?

Answers

Answer:

Not sure if this is what you meant but I hope this helps :)

Explanation:

Depending on what you mean, there are two ways to multiply using the distributive property:

First way:

Using 5(4+2) as an example

5(4+2)

(5*4)+(5*2)

20+10

30

Second way:

Using 36*12 as an example

36*12

(30+6)*(10+2)

(30*10)+(30*2)+(6*10)+(6*2)

300+60+60+12

300+120+12

420+12

432

the fundamental difference between a switch and a router is that a switch connects devices and a router connects networks. true false

Answers

The statement that the fundamental difference between a switch and a router is that a switch connects devices and a router connects networks is true. Switches are used to connect devices within a network, while routers are used to connect different networks together.

Switches operate at the data link layer of the OSI model and are responsible for forwarding data packets to their intended destination within a local area network (LAN). On the other hand, routers operate at the network layer of the OSI model and are responsible for forwarding data packets between different networks, such as LANs or WANs. Routers use routing tables to determine the best path for a packet to take to reach its destination, while switches use MAC addresses to identify and forward packets to their intended destination within a LAN. In summary, while both switches and routers are important networking devices, they serve different purposes and operate at different layers of the OSI model.


The fundamental difference between a switch and a router is that a switch connects devices, while a router connects networks. A switch operates at the Data Link layer (Layer 2) of the OSI model and primarily facilitates communication within a local area network (LAN) by forwarding data packets based on their MAC addresses. This ensures that data is sent to the correct device within the network.

To know more about router visit:-

https://brainly.com/question/29869351

#SPJ11

What would be the best solution for the customer to share the monitor, mouse, and keyboard between the two computers quzlet

Answers

Answer:

A KVM switch.

Explanation:

A KVM switch would be the best solution for a customer to share the monitor, mouse, and keyboard between the two computers assuming he or she has one computer specifically for web services and another for a different purpose.

A KVM is an acronym for keyboard, video and mouse.

Basically, it is a hardware device which enables computer users to connect a keyboard, mouse and monitor (video display device) to several other computers and as such facilitates the sharing of these devices between multiple computers.

algorithm workbench 1. write an if statement that assigns 100 to x when y is equal to 0. 2. write an if-else statement that assigns 0 to x when y is equal to 10. otherwise, it should assign 1 to x.

Answers

Used the equal operator == in the if statement, which returns true if the value to its right is equal to the value to its left and false otherwise.

What is the  if statement ?I used the equal operator == in the if statement, which returns true if the value to its right is equal to the value to its left and false otherwise.By using this operator, you can determine the value of y and, if it is 10, you can assign 0 to x and 1, if it is false, 1, to x.== is used for passwords, for instance, to make a number or string equal to a variable. It is accurate if mypasswords == passwordentered. It is used to verify if the left input is accurate before moving on to the right one.

Program:

if(y==10)

{

    x=0;   // assigning 0 to x if y equals 10.

}

else

{

  x=1;   // assigning 100 to x otherwise.

}

To learn more about if statement refer to:

https://brainly.com/question/13266130

#SPJ4

Given the code above, which item identifies the method's return type?
A.public
B.println
C.static
D.

Answers

The method's return type in the given code is identified by the term "void".

The return type of a Java method is specified just before the name of the method. In this case, we have a method called main, and its return type is indicated by the keyword void, which means that the method does not return any value.

So, the correct answer to your question is option d: void. Options a, b, and c do not specify the return type of the method.

Additionally, there is a syntax error in the given code. The correct syntax for defining a class and its main method in Java is as follows:

public class First {

   public static void main(String[] args) {

       System.out.println("First Java application");

   }

}

Note the use of curly braces to define the body of the class and the method, and the use of uppercase S and System for the out object's reference.

Learn more about void here:https://brainly.com/question/25644365

#SPJ11

Your question is incomplete but probably the full question was:

public class First

(

public static void main(String[] args)

(

system.out.println("First Java application");

)

)

given the above code, which item identifies the method's return type?

a. public

b. println

c. static

d. void

Given the code above, which item identifies the method's return type?A.publicB.printlnC.staticD.

Write a program in c that exemplifies the Bounded Producer-Consumer problem using shared memory.

Answers

The Bounded Producer-Consumer problem can be demonstrated using shared memory in C. Shared memory is a technique used to allow multiple processes to share a common memory space for communication and synchronization.



To exemplify the Bounded Producer-Consumer problem using shared memory in C, we will create a shared memory space that will be used as a buffer. This buffer will be of a fixed size and can hold a maximum number of items. The producer process will generate items and put them into the buffer, while the consumer process will take items out of the buffer.

We then create two processes using `fork()`, one for the producer and one for the consumer. In the producer process, we generate 10 items and put them into the buffer, checking if the buffer is full before producing each item. In the consumer process, we consume 10 items from the buffer, checking if the buffer is empty before consuming each item.
Overall, this program demonstrates the Bounded Producer-Consumer problem using shared memory in C, and shows how synchronization can be achieved between multiple processes using a shared memory space.

To know more about memory visit:

https://brainly.com/question/14829385

#SPJ11

in postproduction, a filmmaker uses software to alter the appearance of brightness and shadow depth. this activity is

Answers

Color Grading is the activity in which a filmmaker uses software to alter the appearance of brightness and shadow depth in postproduction.

Color grading involves adjusting the brightness, contrast, and color tones of the footage to achieve a desired look, mood, or visual style, ultimately enhancing the storytelling and overall quality of the film.

It is typically done using specialized software in the postproduction, such as DaVinci Resolve or Adobe Premiere Pro, and can be done manually or using preset filters and effects. The goal of color grading is to create a cohesive and visually appealing look that enhances the storytelling and emotional impact of the footage.

Learn more about filmmaking: https://brainly.com/question/29631714

#SPJ11

Authoring, maintaining or adding an article to an existing blog is called ___________

Answers

Answer:

"post"

I am not sure so, sorry about that

QUESTION:

\(\rm \tiny \color{red}Authoring \: maintaining \: or \: adding \: an \: article \: to \: an \: existing \: blog \: is \: called\)

ANSWER:

Authoring, maintaining or adding an article to an existing blog is called Post

\( \tt \small \color{green}by \: : \: denfor \\ \tt \: brainlyeveryday :)\)

:

again suppose tcp tahoe is used (instead of tcp reno), how many packets have been sent out from 17th round till 21st round, inclusive?

Answers

In TCP Tahoe, the number of packets sent out from the 17th round till the 21st round (inclusive) can be calculated using the additive increase algorithm of TCP Tahoe. Each round in TCP Tahoe consists of a slow start phase and a congestion avoidance phase.

What is the slow phase about?

During the slow start phase, the congestion window (CWND ) is increased exponentially by one for each received acknowledgment. In each round, the cwnd is doubled until a congestion event occurs.

During the congestion avoidance phase, the CWND is increased linearly by one for every round trip time (RTT).

Learn more about TCP at:

https://brainly.com/question/14280351

#SPJ4

HELP ASAP, AND YES I KNOW, WRONG CATEGORY. SORRY!
A rock band is a type of

ensemble
metronome
time signature
treble clef

Answers

Answer:

A. ensemble.

Explanation:

A musical ensemble can be defined as a group of people who play instrumental and vocal music. It is also known as a music group and carries a distinct name. The word ensemble is derived from the Middle French ensemblée, meaning together at the same time.

A rock band will come under the category of a musical ensemble as it is also a group of people performing instrumental music or vocal music.

Therefore, option A is correct.

Write a constructor with parameters self, num_mins and num_messages. Num_mins and num_messages should have a default value of 0.

Answers

Write a constructor with parameter

class Messaging:

txt = ""

first = 0

second = 0

 def __init__(self, num_mins=0, num_messages=0):

self.txt = input("Who's plan is this? ")

self.first = num_mins

 self.second = num_messages

 def print_Something(self):

       print(f"{self.txt} Mins: {self.first} Messages: {self.second}")

obj = Messaging(100, 100)

obj.print_Something()

If you want to change what's printed to the console, just manipulate the values in Messaging(). Leave them blank for 0.

To learn more about constructor refer to:

https://brainly.com/question/27727622

#SPJ4

A constructor is referred to as a parameterized constructor if it accepts a predetermined amount of parameters. to initialize class data members with unique values. An integer and a string are passed to the object in the example above.

How to constructor with parameter?

A constructor is referred to as a parameterized constructor if it accepts a predetermined amount of parameters. to initialize class data members with unique values. An integer and a string are passed to the object in the example above.

List of constructor parameters When creating an object, the constructor is employed. The majority of the effort involved in creating an object is completed automatically by Java.

class Messaging:

txt = ""

first = 0

second = 0

def __init__(self, num_mins=0, num_messages=0):

self.txt = input("Who's plan is this? ")

self.first = num_mins

self.second = num_messages

def print_Something(self):

print(f"{self.txt} Mins: {self.first} Messages: {self.second}")

obj = Messaging(100, 100)

obj.print_Something()

If you want to change what's printed to the console, just manipulate the values in Messaging(). Leave them blank for 0.

To learn more about constructor refer to:

brainly.com/question/27727622

#SPJ4

Name two sensors which would be used in a burglar alarm system

Answers

kind of sensors used in a burglar alarm system:-Passive Infrared SensorsTomographic Motion Detector.Microwave Detectors.Ultrasonic Detectors.Photoelectric Beams.Glass Break Detectors.

1. Passive Infrared Sensor

This sensors type is passive in a way that it doesn't radiate its own energy. Instead, it detects the infrared light radiating from objects. This way, it can detect whenever there's a human or another living being in its field of view.

2. Photoelectric Beams

This is also another type of motion detector, but it doesn't work similarly to the others. For one, it doesn't have a coverage area. It only forms a fence, which triggers the alarm if broken.

It consists of two separate parts that form a sort of a fence made of IR beams. When someone steps into the beams, between the two parts, they trigger the alarm.

On the basic of size, in how many groups do we classify the computers? Name them.
.​

Answers

Answer:

Computer can be classified into four categories based on size namely Micro, Mini, Mainframe and Super computer

Explanation:

PC Shopping Network may upgrade its modem pool. It last upgraded 2 years ago, when it spent $115 million on equipment with an assumed life of 5 years and an assumed salvage value of $15 million for tax purposes. The firm uses straight-line depreciation. The old equipment can be sold today for $80 million. A new modem pool can be installed today for $150 million. This will have a 3 -year life, and will be depreciated to zero using straight-line depreciation. The new equipment will enable the firm to increase sales by $25 million per year and decrease operating costs by $10 million per year. At the end of 3 years, the new equipment will be worthless. Assume the firm's tax rate is 35 percent and the discount rate for projects of this sort is 12 percent. What are the Free Cash Flows, the NPV and IRR of the replacement project? Note: There is double jeopardy on this problem. If you miss a free cash flow, you will miss the NPV and the IRR. (6 points) FCF 0

= FCF 1

= FCF 2

= FCF 3

= NPV= IRR=

Answers

The replacement project involves upgrading the modem pool of PC Shopping Network. The old equipment was purchased 2 years ago for $115 million, has a 5-year assumed life, and a salvage value of $15 million.

The old equipment can be sold today for $80 million. The new equipment can be installed for $150 million and has a 3-year life. The new equipment is expected to increase sales by $25 million per year and decrease operating costs by $10 million per year. The tax rate is 35% and the discount rate is 12%. We need to calculate the Free Cash Flows (FCFs), the Net Present Value (NPV), and the Internal Rate of Return (IRR) of the replacement project.

To calculate the FCFs, we need to determine the cash inflows and outflows associated with the project. In this case, the cash inflows are the increase in sales ($25 million) and the decrease in operating costs ($10 million) each year. The cash outflows include the initial investment in the new equipment ($150 million) and the tax savings resulting from depreciation expense. By subtracting the cash outflows from the cash inflows for each year, we can calculate the FCFs.
The NPV of the project is the present value of the FCFs, discounted at the given rate of 12%. By summing up the present values of the FCFs, we can calculate the NPV. If the NPV is positive, the project is considered financially viable.
The IRR is the discount rate at which the NPV of the project becomes zero. It represents the project's internal rate of return or the rate of return that the project is expected to generate. The IRR is calculated iteratively until the NPV reaches zero.
To obtain the specific values of FCF0, FCF1, FCF2, FCF3, NPV, and IRR, the calculations need to be performed based on the given information and formulas for each year.

learn more about salvage value here

https://brainly.com/question/28387066



#SPJ11

Computer hardware refers to: Group of answer choices the mechanism through which users interact with a computer. handheld computing devices meant largely for mobile use outside an office setting. a precise set of instructions that orchestrate the functioning of the computer. a program that fulfills the requests of a client. the physical components of information technology.

Answers

Computer hardware is referred to as: E. the physical components of information technology.

A computer refers to a programmable-electronic device that is designed and developed to receive data in raw form as an input and then processes these data into an output (information) that could be used by the end user.

Generally, the components of a computer is broadly classified into two (2) main categories and these include:

Software: such as operating system (OS).Hardware: it include speaker, keyboard, CPU, monitor, etc.

In conclusion, a computer hardware is simply the physical components of an information technology (IT) because they can be seen and touched.

Read more on computer hardware here: https://brainly.com/question/959479

name any two web browsers?​

Answers

Explanation:

Chrome

Opera

That's all i can get for u

Answer:

Microsoft Edge and Internet Explorer

Explanation:

what is a good wall adapter for your house?​

Answers

Answer:

RAVPower Dual-Port*

Explanation:

as a client, i have submitted a get request to a restful api server. what might i expect as a response?

Answers

As a client who submitted a GET request to a RESTful API server, you can expect a response containing the requested data, typically in formats like JSON or XML. The response will also include an HTTP status code, such as 200 OK (success) or 404 Not Found (resource not available).

As a client who has submitted a GET request to a RESTful API server, you can expect to receive a response that contains the requested data in a format specified by the server, such as JSON or XML. The response may also include a status code that indicates whether the request was successful or not, along with any relevant metadata or headers. Additionally, the response may be cached by the client or server for future use.

Learn more about metadata about

https://brainly.com/question/14699161

#SPJ11

What does clicking and dragging the fill handle in excel

Answers

Answer:

The fill handle copies the same values, formulas, or fills a series of dates, texts, numbers, and other data to a desired number of cells. ... Click and hold the handle, then you can drag up, down, across over other cells. When you release your mouse button, it auto-fills the content to the cells you dragged over.

what is non verbal communication ?​

Answers

Answer:

Nonverbal communication is the transfer of information through body language, facial expressions, gestures, created space and more.

Explanation:

For example, smiling when you meet someone conveys friendliness, acceptance and openness. Everyone uses nonverbal communication all the time whether they know it or not.

Answer:

Non verbal communication is any communication that doesn't involve words. Instead, it involves body language, such as eye contact, nodding, etc.

Brainliest, please :)

Which html attribute specifies an alternate text for an image, if the image cannot be displayed?.

Answers

The html attribute "<img> alt attribute" is used to specify the alternate text for an image if the image can not displayed.

What are alternate text?

An alternate text acronyms is (Alt text) which is a text description that can be added to an image's HTML tag on a Web page.

In conclusion, the html attribute "<img> alt attribute" is used to specify the alternate text for an image if the image can not displayed

Read more about alternate text

brainly.com/question/12809344

As an IS apprentice, what instances can you present that the legality of the policies or the protocols becomes unethical?

Answers

Instances, where the legality of policies or protocols becomes unethical, may include situations where they infringe upon individuals' rights, promote discrimination or harm, or enable unethical practices such as privacy invasion or data manipulation.

While policies and protocols are designed to establish rules and guidelines for an organization's operations, there are instances where their legality can conflict with ethical considerations. For example, if a policy discriminates against certain individuals based on their gender, race, or other protected characteristics, it becomes unethical as it violates the principles of equality and fairness. Similarly, if protocols enable practices that invade individuals' privacy or manipulate data for deceptive purposes, they can be considered unethical. It is essential to carefully evaluate the ethical implications of policies and protocols to ensure they align with moral principles and respect individuals' rights and well-being.

learn more about data manipulation here:

https://brainly.com/question/31451906

#SPJ11

Other Questions
You notice that PepsiCo (PEP) has a stock price of $74.02 and EPS of $3.82. Its competitor, the Coca-Cola Company (KO), has EPS of $2.36. With only this data, what is your estimation of the value of a share of Coca-Cola stock? O $30.45 O $119.81 O $64.07 O $45.73 O $74.02 _____ session mode connects the host to a guest vm using rdp and allows cutting and pasting between the machines. Which equations are equivalent although originally developed for use by the united states military, many believe the innovation that will surpass the telephone and television in global importance is the The single-most effective fraud prevention tactic is making employees know that ________. Select one: a. fraudsters will be fired b. fraudsters will be forced to repay what they stole plus interest c. fraud could destroy the company and jobs d. fraud will be detected by IT monitoring systems and punished by the legal system How long is a bus route across a small town The standard deviation is generally more useful than the variance because Multiple Choice it is easier to calculate. variance is a measure of risk, and standard deviation is a measure of return. standard deviation is calculated in the same units as payoffs and variance isn't. it can measure unquantifiable risk. Is the phrase They were born and reared an objective pronou The diagram shows an equilateral triangle, a square, and one diagonal of the square. what is the value of x Points that lie on the same plane are...collinearO parallelO coplanarO perpendicular Write any two similarities between The French Revolution and theFreedom Movement of India?( Revolt of 1857 ) what is the term for a group of project activities that are assigned to a single organizational unit? Does an if statement only work with true false python. Sequential and direct access are two methods to locate data in memory. Discuss why major devices now a days use direct access? How can we convert data that is written on a device that supports only sequential access to a device that only support direct access method? Which of the following demonstrates the application of justice and good stewardship? A) Only countries with water shortages should develop policies of water management. B) Restrictions on the use of fossil fuels should be proportional to the carbon footprint. C) Wealthy countries have an obligation to provide fuel and food to developing countries. D) Countries that mine coal in other countries should pay the citizens for the environmental damage they cause. Read the excerpt from Thomas Paines work The Crisis No. 1.Britain, with an army to enforce her tyranny, has declared that she has a right (not only to TAX) but to BIND us in ALL CASES WHATSOEVER, and if being bound in that manner, is not slavery, then is there not such a thing as slavery upon earth. . . .. . . Neither have I so much of the infidel in me, as to suppose that He has relinquished the government of the world, and given us up to the care of devils; and as I do not, I cannot see on what grounds the king of Britain can look up to heaven for help against us: a common murderer, a highwayman, or a house-breaker, has as good a pretence as he.The words slavery, devils, and murderer evoke a sense ofanger and injustice.fear and anxiety.confusion and chaos.guilt and shame.Mark this and return Which of the following helped Adolf Hitler gain power in Germany?The Great DepressionBig Business & LaborSupport For The American GovernmentThe Industrial Revolution PLS HELPAt the end of the season, 4 basketball teams in a league are having a pizza party at a restaurant.Team Number of PeopleSharks 17Wolves 21Tigers 20Hawks 17Coaches 9The restaurant manager suggests that they order one pizza for every 6 people. How many pizzasshould they order? Discuss how this speech would spur Westward Expansion of the former enslaved African Americans into the rest of America. Write 2-4 paragraphs. Need help ASAP and pls hurry bc if you do i will give ten pts+brainliestExplain in three or more sentences how you use the following items and explain what life will be like if we no longer had access to these items:1. 12-month calendar2. The number system (the ability to use 60 seconds and 60 minutes to tell time)3. Wheels (for transportation)