Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Patterns in Software Engineering- Exam Paper 06-Computer Engineering-Raman Ramsin, Exams of Software Engineering

Event Logging, Protected Variations, Law of Demeter, From Mud to Structure, Mediator, Command Processor, Master-Slave, Patterns in Software Engineering, Exam Paper, Department of Computer Engineering, Raman Ramsin, Sharif University of Technology, Iran.

Typology: Exams

2011/2012

Uploaded on 02/19/2012

hester
hester 🇮🇷

4.5

(13)

85 documents

1 / 1

Toggle sidebar

Related documents


Partial preview of the text

Download Patterns in Software Engineering- Exam Paper 06-Computer Engineering-Raman Ramsin and more Exams Software Engineering in PDF only on Docsity!

۱۳۹۰ﺧﺮﺩﺍﺩ ﻬﻨﺪﺳی ﻧﺮﻡ ﺍﻓﺰﺍﺭ

(ﻧﻤﺮﻩ۲۵ )

(ﻧﻤﺮﻩ۴۰ )

ﺿﻤﻨﺎً ﺗﻮﺿﻴﺢ ﺩﻫﻴﺪ.ﺿﻴﺢ ﺩﻫﻴﺪ ﻣﻔﻴﺪ ﺧﻮﺍﻫﺪ ﺑﻮﺩ؟ ﺗﻮ

(ﻧﻤﺮﻩ۴۵). ﻣﺘﻨﺎﻇﺮ ﺍﺳﺖ

ﺻﻮﺭﺕ ﻫﻤﺰﻣﺎﻥﺑﻪﻫﺎﺍﺩﻩﺍﻳﻦ ﺩﺍﺯی ﺩﻳﺪﻫﺎی ﻣﺨﺘﻠﻔ

ﻫﺎیﺩﻫﻨﺪﻩﺑﺮ ﺭﻭی ﺳﺮﻭﻳﺲﺷﺪﻩ ﺑﻪ ﺻﻮﺭﺕ ﺗﻮﺯﻳﻊ

ﺗﻮﺍﻧﺪ ﺑﻪ ﺻﻮﺭﺕ پﻮﻳﺎﻫﺎ ﻣیﺑﻪ ﺩﺍﺩﻩ ﺩﺳﺘﺮﺳی

ﺍﻳﻦ ﺗﻐﻴﻴﺮﺍﺕ؛ﻳﺎﺑﺪﻫﺎ ﺍﻧﻌکﺎﺱ ﻣﺮﺑﻮﻁ ﺑﻪ ﺁﻥ ﺩﺍﺩﻩ

ﺿﻤﻦ ﺗﺄﻣﻴﻦﻮﺭی ﻃﺮﺍﺣی ﺷﻮﺩ کﻪ ﺧﻮﺍﻫﻴﻢ ﺳﻴﺴﺘﻢ ﻃ

ﺁﻥ ﺭﺍﻧﻤﺎﻳﺸی-ِﺩﺍﺯﺷیپﺮﻫﺎیﺳﺮﻭﻳﺲ ﺳﻴﺴﺘﻢ ﻭ

ﺑﺮﺍیﺯﻳﺎﺩی ﺩﺍﺭﺩ، ﻭﺍﻫﻤﻴﺖﻫﺎ ﻴﺴﺘﻢ ﻭ ﺯﻳﺮﺳﻴﺴﺘﻢ

ﺕ ﺑﻴﻦﺗﻌﺎﻣﻼﺑﺮﺳﺖ کﻪﺿﺮﻭﺭی ﺍﺿﻤﻨﺎ .ً ﺪ

کﻨﺪ کﺮﺩﻥ ﺳﻴﺴﺘﻢ، ﻫﻤﻴﺸﻪ ﺑﻪ ﺻﻮﺭﺕ ﻳکﺴﺎﻥ

ﺳﻄﺢﺑﻪ(ﻫﺎﺩﺭ ﺗﻌﺎﻣﻞ ﺑﻴﻦ ﺯﻳﺮﺳﻴﺴﺘﻢﻭﻫﺎ، ﺯﻳﺮﺳﻴﺴﺘﻢ

ﺿﻤﻦ ﺭﻋﺎﻳﺖ ﺻﺮﻓﻪ ﺟﻮﻳی ﺩﺭ ﺧﻮﺍﻫﻴﻢ ﺳﻴﺴﺘﻢ ﻃﻮﺭی ﻃﺮﺍﺣی ﺷﻮﺩ کﻪ

ﻣﻮﻓﻖ ﺑﺎﺷﻴﺪ

ﻬﻨﺪﺳی ﻧﺮﻡ ﺍﻓﺰﺍﺭﻣﺍﻟگﻮﻫﺎ ﺩﺭﺩﺭﺱﺗﺮﻡﻣﻴﺎﻥ ﺍﻣﺘﺤﺎﻥ

:ﻫﻴﻢ ﺯﻳﺮ ﺗﻮﺿﻴﺤﺎﺕ کﺎﻓی ﺍﺭﺍﺋﻪ ﺩﻫﻴﺪ ﺩﺭ ﻣﻮﺭﺩ ﺍﺻﻄﻼﺣﺎﺕ ﻭ ﻣﻔﺎ

Event Logging Protected Variations Law of Demeter “Descendants should not expect more or provide less” From Mud to Structure ﻫﺎﻳی ﺑﺎ ﻳکﺪﻳگﺮ ﺩﺍﺭﻧﺪ؟ﺕﻫﺎ ﻭ ﺗﻔﺎﻭﻫﺖﺎ ﺒ State Mediator Broker Command Processor ﻭ ﻣﻔﻴﺪ ﺧﻮﺍﻫﺪ ﺑﻮﺩ؟ ﺗﻮ(ﻃﺮﺍﺣی ﻳﺎ ﻣﻌﻤﺎﺭی) ﻫﺮﻳک ﺍﺯ ﻣﻮﻗﻌﻴﺘﻬﺎی ﺯﻳﺮ، ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ چﻪ ﺍﻟگﻮ ﻳﺎ ﺍﻟگﻮﻫﺎﻳی ﻣﺘﻨﺎﻇﺮ ﺍﺳﺖ GRASP کﻪ ﺩﺭ ﻫﺮ ﻣﻮﻗﻌﻴﺖ، ﺭﺍﻩ ﺣﻞ پﻴﺸﻨﻬﺎﺩی ﺩﺭ چﻪ ﻣﻮﺍﺭﺩی ﻭ چگﻮﻧﻪ ﺑﺎ ﺍﻟگﻮﻫﺎی ﺩﻳﺪﻫﺎی ﻣﺨﺘﻠﻔﺎ ﺩﺭ ﻳک ﺍﻧﺒﺎﺭﻩ ﻣﺮکﺰی ﻗﺮﺍﺭ ﺩﺍﺭﻧﺪ ﻭﻫﺩﺍﺩﻩ،ﺷﺪﻩ ﺗﻌﺎﻣﻠی ﺗﻮﺯﻳﻊ ﺑﻪ ﺻﻮﺭﺕ ﺗﻮﺯﻳﻊﻫﺎﺩﺍﺩﻩﻭ ﻧﻤﺎﻳﺶپﺮﺩﺍﺯﺵپﻴچﻴﺪﻩﻫﺎیﺳﺮﻭﻳﺲ.ﺷﻮﺩﺍﺭﺍﺋﻪ ﻣی ﻣﺨﺘﻠﻒ ﺩﺳﺘﺮﺳی.گﻴﺮﻧﺪﺩﺭ ﺍﺧﺘﻴﺎﺭ کﺎﺭﺑﺮﺍﻥ ﻗﺮﺍﺭ ﻣیﺎ ﺗﺄﻣﻴﻦ ﺷﻔﺎﻓﻴﺖ ﻣکﺎﻧی ﻣﺘﻌﺪﺩ ﻗﺮﺍﺭ گﺮﻓﺘﻪ ﻭ ﺑ ﻣﺮﺑﻮﻁ ﺑﻪ ﺁﻥ ﺩﺍﺩﻩﺩﻳﺪﻫﺎیﺭﺩﻠﻪﺑﻼﻓﺎﺻﺑﺎﻳﺪﺩ ﺷﻮﺩ، ﻭ ﺍﻳﻦ ﻣﺤﺪﻭﺩﻳﺖﻣﺤﺪﻭ ﺗﻮﺳﻂ ﻣﺪﻳﺮﺍﻥ ﺳﻴﺴﺘﻢ ﺧﻮﺍﻫﻴﻢ ﺳﻴﺴﺘﻢ ﻃﻣی.گﺮﺩﺩ(پﻨﺠﺮﻩ ﻧﻤﺎﻳﺶ)ﺩﻳﺪ ﺗﻮﺍﻧﺪ ﺣﺘی ﻣﻨﺠﺮ ﺑﻪ ﺑﺴﺘﻪ ﺷﺪﻥ ﻳک ﺳﻴﺴﺘﻢ ﻭﺑﻪ ﺭﺍﺣﺘیﺑﺘﻮﺍﻥﺩ ﺑﻪ ﻃﻮﺭی کﻪکﻢ ﺷﻮﺍﺟﺰﺍﺀﺑﻴﻦ ﻭﺍﺑﺴﺘگی ﻴﺴﺘﻢ ﻭ ﺯﻳﺮﺳﻴﺴﺘﻢﺳﻣﻨﻴﺖﺍ.ﻫﻢ ﺩﺭ ﺗﻌﺎﻣﻞ ﻫﺴﺘﻨﺪﺑﺎﺯﻳﺮﺳﻴﺴﺘﻢﺗﻌﺪﺍﺩی ﺩﺭ ﻳک ﺳﻴﺴﺘﻢ ﺑﺤﺮﺍﻧی، ﺪﻧﻗﺮﺍﺭ گﻴﺮﺣﻔﺎﻇﺖﻣﻮﺭﺩﺑﺎﻳﺪﻫﺎﺳﻴﺴﺘﻢ کﻞ ﺳﻴﺴﺘﻢ ﻭ ﻫﺮﻳک ﺍﺯ ﺯﻳﺮ کﻨﺪ کﺮﺩﻥ ﺳﻴﺴﺘﻢ، ﻫﻤﻴﺸﻪ ﺑﻪ ﺻﻮﺭﺕ ﻳکﺴﺎﻥﺻﺮﻑ ﻣﻨﺎﺑﻊ ﻭﺑﻪ ﺩﻟﻴﻞﺭﻭﺷﻬﺎی ﺗﺄﻣﻴﻦ ﺍﻣﻨﻴﺖ.ﺷﻮﺩ ﻧﻈﺎﺭﺕ ﺯﻳﺮﺳﻴﺴﺘﻢﺍﺯﻳکﻫﺮﺩﺭ،ﻢﺳﻴﺴﺘکﻞﺳﻄﺢﺩﺭ)ﺍﻳﻦ ﺭﻭﺷﻬﺎ ِﻋﻤﺎﻝﺍ ﺧﻮﺍﻫﻴﻢ ﺳﻴﺴﺘﻢ ﻃﻮﺭی ﻃﺮﺍﺣی ﺷﻮﺩ کﻪﻣی.ﺑﺴﺘگی ﺩﺍﺭﺩﻓﻌﻠی ﻣﺨﺎﻃﺮﻩ ﻭﺿﻌﻴﺖ .گﺮﺩﺩﺗﺄﻣﻴﻦﻣﻮﺭﺩ ﻧﻈﺮ ﺍﻣﻨﻴﺖ

۸۹-۹۰ﺩﻭﻡ ﻧﻴﻤﺴﺎﻝ

ﺩﺭ ﻣﻮﺭﺩ ﺍﺻﻄﻼﺣﺎﺕ ﻭ ﻣﻔﺎ - ۱

Event Logging. a Protected Variations. b Law of Demeter. c should not expect more or provide less”. d From Mud to Structure. e ﺒﺷچﻪﺍﻟگﻮﻫﺎی ﺯﻳﺮﺯﻭﺝ - ۲ StateBridge. a MediatorPAC. b BrokerLayers. c Master-Slave. d ﻫﺮﻳک ﺍﺯ ﻣﻮﻗﻌﻴﺘﻬﺎی ﺯﻳﺮ، ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ چﻪ ﺍﻟگﻮ ﻳﺎ ﺍﻟگﻮﻫﺎﻳیﺩﺭ - ۳ کﻪ ﺩﺭ ﻫﺮ ﻣﻮﻗﻌﻴﺖ، ﺭﺍﻩ ﺣﻞ پﻴﺸﻨﻬﺎﺩی ﺩﺭ چﻪ ﻣﻮﺍﺭﺩی ﻭ چگﻮﻧﻪ ﺑﺎ ﺍﻟگﻮﻫﺎی ﺗﻌﺎﻣﻠی ﺗﻮﺯﻳﻊک ﺳﻴﺴﺘﻢﻳﺩﺭ. a ﻣﺨﺘﻠﻒکﺎﺭﺑﺮﺍﻥ ﺑﻪ ﻣﺘﻌﺪﺩ ﻗﺮﺍﺭ گﺮﻓﺘﻪ ﻭ ﺑ ﺗﻮﺳﻂ ﻣﺪﻳﺮﺍﻥ ﺳﻴﺴﺘﻢ ﺗﻮﺍﻧﺪ ﺣﺘی ﻣﻨﺠﺮ ﺑﻪ ﺑﺴﺘﻪ ﺷﺪﻥ ﻳک ﻣی ﻭﺍﺑﺴﺘگی ﻧﻴﺎﺯﻫﺎی ﻓﻮﻕ، .ﺴﺘﺮﺵ ﺩﺍﺩ گ ﺩﺭ ﻳک ﺳﻴﺴﺘﻢ ﺑﺤﺮﺍﻧی،. b کﻞ ﺳﻴﺴﺘﻢ ﻭ ﻫﺮﻳک ﺍﺯ ﺯﻳﺮ، ﺗﺄﻣﻴﻦ ﺁﻥ ﻫﺎ ﻧﻴﺰ ﺯﻳﺮﺳﻴﺴﺘﻢ ِﻋﻤﺎﻝﺍ:ﺷﻮﻧﺪ ِﻋﻤﺎﻝ ﻧﻤیﺍ ﻭﺿﻌﻴﺖﻭﻄﻠﻮﺏ ﺍﻣﻨﻴﺘی ﻣ ﺍﻣﻨﻴﺖ ﻣﻨﺎﺑﻊ ﺳﻴﺴﺘﻢ،