MITS4002 Object-Oriented Software Development Report

Verified

Added on  2025/05/02

|9
|1097
|388
AI Summary
Desklib provides solved assignments and past papers to help students succeed.
Document Page
MITS4002 - OBJECT-ORIENTED
SOFTWARE DEVELOPMENT
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Table of Contents
Introduction....................................................................................................................................................3
Q1...................................................................................................................................................................4
Q2...................................................................................................................................................................4
A.................................................................................................................................................................4
B.................................................................................................................................................................5
C.................................................................................................................................................................5
D.................................................................................................................................................................5
Conclusion.....................................................................................................................................................6
1
Document Page
Introduction
This report consists of complete information related to the design pattern with the description of their
application. This report consists of providing the description of suitable design pattern for the iChipKart
system. This report highlights various benefits of the suitable design pattern. This report also highlights
security patterns for the system.
2
Document Page
Q1
Every system that is being developed requires the implication of objects to perform the task and operation
as per the real-world scenario. These objects are implicated and initialized by following an appropriate
design pattern specified under various group as per the requirement of the program. One of the design
patterns is the Creational Design Pattern. This is one of the most used design patterns to design and create
objects related to the application of real-world. This application is concern\
ed to provide the detailed guidelines and features to create suitable objects pattern for and application.
This pattern focuses on creating an implication of an object while providing the specification of a class
for an application with the help of multiple mechanisms to design an object for an application class. This
reduces the complexity occurred while designing an object for a class in a very oriented environment
(GeeksforGeeks, 2019).
Creational design pattern helps to minimize the flow of issue arise at the time of creation and initialization
of a new object related to the changing in the state of class due to the object in a program due to the
properties of the object being created. This issue impacts a server malfunction to the program being
created, creational design pattern helps to remove this issue using the decoupling of client interaction to
the code by eliminating the interaction to the program code.
This design pattern provides various types and application that can be chosen to create objects for the
system these are:
1. Factory method:
This application of creational design pattern describes the functionality to create an object for a
program within the superclass and that can be accessed using the inherent class of the superclass.
This feature provides the feasibility of changing the properties of the object of the superclass
within the subclass.
2. Singleton pattern:
This application of creational design pattern describes the feature to create only one object in the
complete program. This is one of the easiest modes of creating an object in the java program.
This application uses the general definition of the object to initialize it in the class.
3. Abstract factory method:
This application of creational design pattern describes the feature of creating the same object
multiple time with the same name and properties. This application uses the basic feature of
Factory method to create objects for the application.
4. Builder pattern:
This application of creational design pattern describes the feature of creating an object for a
program in a class using the step by step procedure. This application of design pattern allows to
design and initialize multiple objects in a class at the same time (JournalDev, 2019).
5. Prototype pattern:
This application of design pattern provides the feature to design and initialize the class object at a
minimal cost as compared to the other methods of design pattern.
Q2
A.
The system for iChipKart will provide all the functionality to manage the online shopping business. This
system improvises all its functionality using the objects that help to design and develop the system to
3
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
perform the desired functionality. This system incorporates with designing a suitable object for the
system.
Object creation for the iChipkart system can be done by implementing any of the application of design
pattern. After analyzing the complete problem of iChipKart system it is identified that the factory method
of design pattern will be the best method to deal with the problem. This system helps in to create objects
in the superclass and subclass of the program (Oodesign, 2019).
B.
Class Diagram for checkout class:
Figure 1: Class diagram for checkout class
Class diagram for compute price class:
4
Document Page
Figure 2: compute price class diagram
5
Document Page
C.
The factory method of creational design pattern provides various benefits to the iChipkart system such as:
1. This application of design pattern provides the functionality to set up a controlled environment
that provides the feature to remove the issue of malfunction of the program by providing the ease
of creation of code interface to implement the code directly into the program.
2. This application of design pattern provides the functionality of creating an environment to
remove the client access to the object of the program. This establishes the feature of robust code.
D.
Security design pattern used in the system of iChipKart are:
1. Valid-ability:
This security design pattern provides the functionality of auto validating of the issues and aspects
of the program.
Merit:
a. This removes the complexity of validation in a program of creating validation by writing the
code.
b. This security design pattern provides the implementation of validation in the program with
less cost and in minimal time (Coresecuritypatterns, 2019).
De-merit:
a. This requires the proper attention to the program in order to create regular security updates
that encounter high use of time resources.
b. This does not provide security from any high-level issues and threats to the program.
2. Reusability:
Merit:
a. This security design pattern provides the implication of security in a very cost-effective
method.
b. This security design pattern allows using the certain set of code in various instances to reduce
the time of code creation.
De-merit:
a. This can incur access to various threats to the program.
b. This can reduce the validation of data for threats in the program.
6
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Conclusion
This report had highlighted various design patterns that required to be considered that represents the
complete information related to the design patterns for the online shopping system. This report had
highlighted various security patterns that need to be considered to make the system more reliable and
secure to store the information of the user within it.
7
Document Page
References
GeeksforGeeks. 2019. Design Patterns | Set 1 (Introduction) - GeeksforGeeks. [online] Available at:
https://www.geeksforgeeks.org/design-patterns-set-1-introduction/ [Accessed 9 May 2019].
JournalDev. 2019. Java Design Patterns - Example Tutorial - JournalDev. [online] Available at:
https://www.journaldev.com/1827/java-design-patterns-example-tutorial [Accessed 9 May 2019].
Oodesign. 2019. Creational Patterns | Object Oriented Design. [online] Available at:
https://www.oodesign.com/creational-patterns/ [Accessed 9 May 2019].
Coresecuritypatterns. 2019. Core Security Patterns: Best Practices and Designstrategies for J2EE, Web
Services, Identity Management and ServiceProvisioning - Chris Steel CISSP, Ramesh Nagappan CISSP.
[online] Available at: http://coresecuritypatterns.com/patterns.htm [Accessed 9 May 2019].
8
chevron_up_icon
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]