Mike Prestwood
Mike Prestwood's Definitions Library
90 Definitions (terms, vocabulary, acronyms, etc.).
These Definitions are organized by our community groups then by our knowledge base sub-topics.
|
Group: C++
Topic: Classic C Language
#1. C Family Unary Operators |
- |
An operation with only one operand (a single input) such as ++X and --Y.
|
Group: Pascal and Delphi Coding
Topic: Language Basics
#2. Delphi Module |
- |
A unit. A unit is defined in its own source file (a .PAS file) that contains types (including classes), constants, variables, and routines (functions and procedures). Each unit begins with unit UnitName; where UnitName must match the filename (minus the .PAS extension). The .PAS unit files are compiled into Delphi Compiled Units with a .DCU extension. A Delphi program is constructed from units. Specifically, the .DCU files are linked into your application. The Delphi compiler is very fast because it only recompiles units that have changed. You can force Delphi to recompile all units with a build all.
|
Topic: OOP
#3. Strict Visibility |
- |
The Strict specifier tightens up the scope for private and protected. With Strict Private, members within a class are visible ONLY within the class declared and Strict Protected are visible only within the class declared and descendent classes. Without strict, private and protected members can also be seen by all classes declared in the same unit (friendly classes). The Strict specifier was introduced with Delphi for .Net preview in Delphi 7 in an update to the .Net compiler preview and with Win32 in Delphi 2005 to fully comply with the .NET CLS. Delphi's traditional private specifier maps to the CLR's assembly visibility and the protected specifier maps to the CLR's assembly or family visibility.
|
Group: Corel Paradox / ObjectPAL Coding
Topic: Paradox Tables
#4. Paradox Net Dir |
- |
The directory location of the Paradox network control file PDOXUSRS.NET. The active NET DIR parameter is stored in the Paradox section of the BDE configuration file and has precedence over any other NET DIR parameters that may be stored in older 16-bit configuration files, or in the System Init section of the current configuration file, or in the Registry. These other NET DIR entries will have no effect. To access a Paradox table on a network drive, the active NET DIR parameter in the Paradox section of the BDE configuration file must point to a network drive and folder in common to all users.
|
Topic: OPAL: Language Basics
#5. Camel Casing |
- |
Camel Casing capitalizes the first character of each word except the first word, so it frequently looks like a one or two hump camel. Used by many languages including Paradox's ObjectPAL.
You can contrast Camel Casing with Pascal Casing which capitalizes the first character of each word (including acronyms over two letters in length) and was popularized by Pascal.
|
#6. ObjectPAL |
- |
ObjectPAL stands for Object Paradox Application Language.
|
Topic: Interactive Paradox: Getting Going
#7. Data Model |
- |
A data model is a diagram of the tables used in a form or report. It identifies the tables, defines the relationships between them (links), and has features including the ability to filter each table and mark any table as read-only. You can save a data model (.dm) and reuse it with another form or report.
|
Topic: Interactive Paradox: Using Data
#8. Paradox Database |
- |
A Paradox Database is a set of related Paradox tables (usually in the same directory).
|
#9. Project Alias |
- |
A project alias, like public aliases, point to a folder. Project aliases are stored in the PDOXWORK.CFG file, which is loaded whenever you change working directories.
|
Group: Website Design & Hosting
Topic: Website Scripting
#10. CMS |
- |
Short for Content Management Sytem (CMS) and is used to manage content on a website such as web page content, knowledge base, online store, message boards, etc. A popular .Net CMS' right now is DotNetNuke. Prestwood's own ASPSuite is a customized CMS we use for our website and our clients.
|
Group: JavaScript and AJAX
Topic: JavaScript and AJAX
#11. JavaScript |
- |
JavaScript is a platform-independent, event-driven, interpreted programming language developed by Netscape Communications Corp. and Sun Microsystems. Originally called LiveScript (and still called LiveWireTM by Netscape in its compiled, server-side incarnation), JavaScript is affiliated with Sun's object-oriented programming language JavaTM primarily as a marketing convenience. They interoperate well but are technically, functionally and behaviorally very different.
|
Group: PHP & Delphi for PHP
Topic: PHP
#12. PHP |
- |
A recursive acronym that stands for:
PHP: Hypertext Preprocessor
|
Group: Coding & OO
Topic: Borland Database Engine
#13. BDE Alias |
- |
A BDE Alias or alias refers to a database location. For Paradox, dBASE, and other local tables, the location of the database is the location of the data files. You manage your aliases using the Borland Database Engine (BDE) located in your Control Panel.
|
Topic: General Coding Concepts
#14. API |
- |
API is an acronym for application programming interface. The Windows API is the set of DLLs that makes up Windows. It comprises all the functions, messages, data structures, data types, statements, and files that a programmer needs for developing Windows applications.
|
#15. Array |
- |
A data type that is a collection of variables (much like a table is a collection of fields). There are two types: fixed and resizable. A fixed array has a predetermined--by the programmer--number of elements. A resizable does not; therefore you need to set its size before using it.
|
#16. Associative Array |
- |
A set of unique keys linked to a set of values. Each unique key is associated with a value. Think of it as a two column table.
MyArray['CA'] = 'California'
MyArray['AR'] = 'Arizona'
|
#17. Black Box |
- |
The term black box refers to not being able to see what is within the box. For example, in coding, you do not need to concern yourself with the details of what happens when you call a method, you simply use the method, the black box, to do the thing you wanted it to do. This is also called encapsulation.
|
#18. Computer Language Constants |
- |
A constant is just like a variable (it holds a value) but, unlike a variable, you cannot change the value of a constant.
|
#19. Computer Language Operator |
- |
A language symbol used for assignment, comparison, computational, or as a logical.
|
#20. Computer Language Statement |
- |
An elementary instruction or other elementary component in a high-level programming language. When documenting a programming language, tech writers usually separate statements from operators, functions, procedures, and objects.
|
#21. Event Handler |
- |
In computer programming, an event handler is part of event driven programming where the events are created by the framework based on interpreting inputs. Each event allows you to add code to an application-level event generated by the underlying framework, typically GUI triggers such as a key press, mouse movement, action selection, and an expired timer. In addition, events can represent data changes, new data, etc. Specifically, an event handler is an asynchronous callback subroutine that handles inputs received in a program.
A custom event is a programmer created event. For example, you can contrast an event handler with a member event, an OOP concept where you add an event to a class.
|
#22. Inline Routines |
- |
Instead of calling a routine, you move the code from the routine itself and expand it in place of the call. In addition to manual inlining, some languages support automatic inlining where the compiler or some other pre-compiler decides when to inline a code routine. Also, some languages allow for developer defined inlining where the developer can suggest and/or force the inlining of a code routine. Inlining can optimize your code for speed by saving a call and return, and parameter management.
|
#23. Overloading |
- |
Types of overloading include method overloading and operator overloading.
Method Overloading is where different functions with the same name are invoked based on the data types of the parameters passed or the number of parameters. Method overloading is a type of polymorphism and is also known as Parametric Polymorphism.
Operater Overloading allows an operator to behave differently based on the types of values used. For example, in some languages the + operator is used both to add numbers and to concatenate strings. Custom operator overloading is sometimes referred to as ad-hoc polymorphism.
|
#24. Pointers / References |
- |
A pointer is a variable type that allows you to refer indirectly to another object. Instead of holding data, a pointer holds the address to data -- the address of another variable or object. You can change the address value a pointer points to thus changing the variable or object the pointer is pointing to.
A reference is a type of pointer that cannot change and it must always point to a valid storage (no nulls).
|
#25. Programming Literals |
- |
A value directly written into the source code of a computer program (as opposed to an identifier like a variable or constant). Literals cannot be changed. Common types of literals include string literals, floating point literals, integer literals, and hexidemal literals. Literal strings are usually either quoted (") or use an apostrophe (') which is often referred to as a single quote. Sometimes quotes are inaccurately referred to as double quotes.
|
#26. Unary Operator |
- |
An operation with only one operand (a single input). Common unary operators include + plus, - minus, and bitwise not. Some operators can function as both unary and binary operators. For example, + and - operators can serve as either.
|
Topic: Object Orientation (OO)
#27. Abstract Class / Abstract Member |
- |
An abstract class member is a member that is specified in a class but not implemented. Classes that inherit from the class will have to implement the abstract member. Abstract members are a technique for ensuring a common interface with descendant classes. An abstract class is a class you cannot instantiate. A pure abstract class is a class with only abstract members.
|
#28. Aggregation |
- |
Aggregations indicate a whole-part relationship, and are known as "has-a" or "is part of" relationships. An Aggregation relationship is indicated by a line with a hollow diamond.
|
#29. Class Constructor |
- |
Constructors are called when you instantiate an object from a class. This is where you can initialize variables and put code you wish executed each time the class is created. When you initially set the member fields and properties of an object, you are initializing the state of the object. The state of an object is the values of all it's member fields and properties at a given time.
|
#30. Class Destructor |
- |
A special class method called when an object instance of a class is destroyed. With some languages they are called when the object instance goes out of scope, with some languages you specifically have to call the destructor in code to destroy the object, and others use a garbage collector to dispose of object instances at specific times.
Desctructors are commonly used to free the object instance but with languages that have a garbage collector object instances are disposed of when appropriate. Either way, destructors or their equivalent are commonly used to free up resources allocated in the class constructor.
|
#31. Class Helper |
- |
A. In Dephi, class helpers allow you to extend a class without using inheritance. With a class helper, you do not have to create and use a new class descending from a class but instead you enhance the class directly and continue using it as you always have (even just with the DCU).
B. In general terms, developers sometimes use the term to refer to any class that helps out another class.
|
#32. Class Visibility Specifiers |
- |
In OOP languages, members of a class have a specific scope that indicates visibility. Standard visibility includes private, protected, and public. Private members are usable by the defining class only (fully encapsulated). They are invisible outside of the class except by friendly classes.
Protected members are usable by the defining class and descendant classes only (plus friendly classes). Public members are usable wherever its class can be referenced.
|
#33. Code Contract |
- |
A.k.a. Class Contract and Design by Contracts.
A contract with a method that must be true upon calling (pre) or exiting (post). A pre-condition contract must be true when the method is called. A post-condition contract must be true when exiting. If either are not true, an error is raised. For example, you can use code contracts to check for the validity of input parameters, and results
An invariant is also a code contract which validates the state of the object required by the method.
|
#34. Composition |
- |
A composite relationship means that a class cannot exist by itself. It must exist as a member of another class. A composite relationship is indicated by a solid line with a solid diamond head pointing to the part class. Alternatively, you can show this relationship graphically with the part class nested in the whole class.
|
#35. Encapsulation |
- |
Hidden data and methods. Encapsulation is the hiding of data and code and is often called the "black box" approach, since users of a class can't see inside the class (they can only see the class' public interface).
|
#36. Inheritance |
- |
The concept of a class makes it possible to define subclasses that share some or all of the main class characteristics. This is called inheritance. Inheritance also allows you to reuse code more efficiently. In a class tree, inheritance is used to design classes vertically. (You can use Interfaces to design classes horizontally within a class tree.) With inheritance, you are defining an "is-a" relationship (i.e. a chow is-a dog). Analysts using UML call this generalization where you generalize specific classes into general parent classes.
|
#37. Interface |
- |
An element of coding where you define a common set of properties and methods for use with the design of two or more classes.
Both interfaces and abstract classes are types of abstraction. With interfaces, like abstract classes, you cannot provide any implementation. However, unlike abstract classes, interfaces are not based on inheritance. You can apply an Interface to any class in your class tree. In a real sense, interfaces are a technique for designing horizontally in a class hierarchy (as opposed to inheritance where you design vertically). Using interfaces in your class design allows your system to evolve without breaking existing code.
|
#38. Member Event |
- |
A custom event added by a programmer to a class. Custom created events need to be processed, usually by an event dispatcher within a framework.
|
#39. Member Field |
- |
Also known as a Class Field.
A class variable defined with a specific class visibility, usually private visibility. A member property is different than a member field. A member property uses a member field to store values through accessor methods (getters and setters). For example, it is common to use a private member field to store the current value of a property. The current values of all the class member fields is the current state of the object.
|
#40. Member Method |
- |
Also known as a Class Method.
A code routine that belongs to the class or an object instance (an instance of the class). Methods that belong to the class are called class methods or static methods. Methods that belong to an object instance are called instance methods, or simply methods.
When a method returns a value, it is a function method. When no value is returned (or void), it is a procedure method.
Methods frequently use method parameters to transfer data. When one object instance calls another object instance using a method with parameters, you call that messaging.
|
#41. Method Overriding |
- |
Where you define or implement a virtual method in a parent class and then replace it in a descendant class.
When you decide to declare a method as virtual, you are giving permission to derived classes to extend and override the method with their own implementation. You can have the extended method call the parent method's code too.
In most OO languages you can also choose to hide a parent method. When you introduce a new implementation of the same named method with the same signature without overriding, you are hiding the parent method.
|
#42. Partial Class |
- |
A partial class, or partial type, is a class that can be split into two or more source code files and/or two or more locations within the same source file. Each partial class is known as a class part or just a part. Logically, partial classes do not make any difference to the compiler. The compiler puts the class together at compile time and treats the final class or type as a single entity exactly the same as if all the source code was in a single location.
|
#43. Polymorphism |
- |
A coding technique where the same named function, operator, or object behaves differently depending on outside input or influences. Usually implemented as parameter overloading where the same named function is overloaded with other versions that are called either with a different type or number of parameters. Polymorphism is a general coding technique and other specific implementations are common such as inheritance, operator overloading, and interfaces.
|
#44. Static Class / Static Member |
- |
A static member is a member you can have access to without instantiating the class into an object. For example, you can read and write static properties and call static methods without ever creating the class. Static members are also called class members (class methods, class properties, etc.) since they belong to the class and not to a specific object. A static class is a class that contains only static members. In the UML, these classes are described as utility classes.
|
Group: DBA, Databases, & Data
Topic: DBA & Data
#45. ANSI |
- |
ANSI is an acronym for American National Standards Institute.
|
#46. ASCII |
- |
ASCII is an acronym for American Standard Code for Information Interchange. The ASCII set consists of 7-bit codes that represent 128 standard characters, including letters, numbers, and symbols. The first 128 characters in the ASCII set, the extended ASCII set, and the ANSI set are the same.
|
#47. BDE |
- |
BDE is an acronym for Borland Database Engine (previously referred to as IDAPI and before that it was ODAPI).
|
#48. Master Table |
- |
A master table in a multitable relationship is the primary table. For every record in the master table, there can be many records in the detail table. If you are only dealing with one table, then it is the master table. A detail table in a multitable relationship is the table whose records are subordinate to those of the master table. A detail table is also called a slave table, a child table, or a many table.
|
#49. Optimistic Locking |
- |
A locking mechanism that allows other users to edit a record that is currently being edited. Essentially, last in wins or edits are discarded usually with an error.
|
#50. Pessimistic Locking |
- |
A locking mechanism that prevents other users from entering edit mode on a record that is currently locked.
|
#51. Standard Delimited Format (SDF) |
- |
SDF is an acronym for standard delimited format. An SDF is a text file formatted in a particular style. Each field is enclosed in quotation marks and separated by a comma. Each line ends with a carriage return and a linefeed.
|
Group: Windows Users
Topic: Windows Vista
#52. Application Virtualization |
- |
Introduced with Vista, creates application-specific copies of all shared resources. It separates the application configuration layer from the OS making deployment easier in some cases.
|
#53. ReadyBoost |
- |
Windows Vista introduced Windows ReadyBoost, a new way to add memory to your system. You can use non-volatile flash memory, such as a ReadyBoost compliant USB flash drive, to improve performance without having to add additional system memory.
Superfetch, Vista's new caching scheme, takes full advantage of all system memory and ReadyBoost expands the available cache memory. This speeds up your computer because accessing a flash drive is significantly faster than accessing a hard drive.
|
#54. SuperFetch |
- |
Memory caching scheme introduced with Windows Vista that tracks what kind of applications you use and loads them into RAM so they can be launched faster. SuperFecth can use ReadyBoost to add to the available cache using a ReadyBoost compliant USB 2.0 flash drive. SuperFetch and ReadyBoost speed up virtual memory transactions.
|
#55. Windows Virtualization |
- |
The act of isolating or unbinding one computing resource from another. Windows virtualization adds virtualization services to the core Windows operating system at a fundamental level.
|
Group: Computer Tech
Topic: Computer Tech
#56. NAT |
- |
Network Address Translation (NAT). The process of modifying network address information in a data packet header while in transit across a router for the purpose of remapping a given address space into another. Allows you to hide your local IP addresses from the Internet.
|
Topic: Hardware
#57. MbPS |
- |
Megabits (mb) per second. A bit is either a 0 or 1 (a digit) and a byte is a string of 8 bits. 8 mbps (megabits per second) equals 1 MB/sec (megabytes per second). Therefore 54 mbps is equal to a max of 6.75 MB/second.
|
Topic: Removable Storage Technology
#58. ISO Image |
- |
A disk image of an ISO 9660 file system usually with a .ISO extension. ISO stands for International Organization for Standardization (ISO) and standard 9660 describes a standard for storing data on a CD or DVD.
An ISO image (or .ISO file) is a single computer file that is a copy of an existing file system (all files including all the filesystem metadata (boot code, structures, attributes, etc.). An ISO image can contain the entire contents of a CD or DVD.
|
Topic: WINS
#59. Windows Internet Name Service (WINS) |
- |
Microsoft's implementation of NetBIOS Name Service (NBNS), a name server and service for NetBIOS computer names. Just as DNS serves up domain names, WINS serves up NetBios names and is particularly useful within a Microsoft-based network when or without the NetBIOS protocol installed. Use of WINS will decrease broadcast traffic.
|
Group: Testing, QA, QC
Topic: Beginner's Corner
#60. Alpha Test |
- |
The preliminary testing of a new product in which research and development are still in progress. In PSDP, alpha builds are delivered during the initial coding phase in order to validate functionality.
|
#61. CRUD Matrix |
- |
CRUD is an acronym that stands for create, read, update, and delete. A CRUD matrix documents what objects (forms, reports, libraries, and scripts) access what data elements in a database. It can help you test your software on large projects and is critical for maintaining a large application. If you make changes in one form or script, a CRUD matrix can tell you what other forms, libraries, scripts, and reports will need to be tested.
|
#62. Regression Testing |
- |
Retesting previously fixed defects or rerunning test scripts that previously passed.
|
#63. Works As Designed (WAD) |
- |
Term used by the software designer to let a tester know that the defect they reported isn't a defect, the reported behavior is working as the designer wants it to.
|
Topic: Testing, QA, QC
#64. Quality Assurance |
- |
The process of comparing the features of the delivered software product with the documented requirements with the goal of verifying the product meets the original requirements.
|
#65. Quality Control |
- |
A process employed to ensure a certain level of quality in each deliverable such as a requirements specification, a design specification, the final delivered software, etc.
|
Group: PM, Process, and PSDP
Topic: PSDP & Process
#66. PSDP Items |
- |
A task, requirement item, design item, test script, or defect. Generically you could refer to items in PSDP as software artifacts (especially requirement items, design items, and test scripts). A PSDP Artifact is a feature that links to together a task, requirement item, design item, and test script.
|
#67. Waterfall Process |
- |
With the waterfall approach to developing software, one phase of the development cycle follows the other and the user is involved only at the beginning during the requirements gathering phase and at the end during the acceptance phase. The requirements gathering in the waterfall approach is critical and unless it is 100 percent perfect, the project will fall short. Other processes, including PSDP, involve the end user throughout the process ensuring a better outcome.
|
Topic: PSDP Analysis
#68. Actor (PSDP Online) |
- |
In PSDP Online, an actor is a UML Actor, role, or person that interfaces with the system you are building.
When establishing actors of your system, do not think in terms of a specific person, think in terms of their role. Do not name an actor the name of the person filling the role. If Bob is our Sales Clerk, name your actor Sales Clerk (not Bob).
|
#69. PSDP Requirement Item |
- |
A software artifact that documents what the software must do. In PSDP, we collect general requirements and requirement items. Together the general requirements and requirement items make up the Requirements Specification. Also, requrement items are one of the four items that make up a PSDP Artifact.
|
Topic: PSDP Artifacts
#70. PSDP Artifact |
- |
In PSDP Online, a PSDP Artifact links together a task, requirement item, design item, and test script all with the same name and associated with the same project category (if used). You can edit a PSDP artifact as a whole or expand any of the four linked items to include more details.
A PSDP artifact simplifies some of the complexities of working with linked items. For example, you get workflow with the linked task, and actors and status of the other items at the artifact level. When you change the artifact name or category, all four items are updated. When you link an actor to an artifact, the requirement item, design item, and test script are updated. The same is true when you change the project/app status.
|
Topic: PSDP Categories
#71. PSDP Category |
- |
A PSDP Category is a PSDP Online feature that allows you to group and organize Tasks, Requirement Items, Design Items, Test Scripts, Builds, and Defects. The PM can turn this optional feature on or off for each feature supported. You can use them any way you wish. A typical use is to organize a project by high level requirements that the client can understand. Under this usage, categories become a intermediate requirement between General Requirements and Requirement Items.
|
Topic: PSDP Checkpoints
#72. PSDP Checkpoints |
- |
A checkpoint is NOT a task, but rather a milestone. A point in the project that marks significant progress. Although PSDP contains many standard checkpoints, the executive sponsor and project manager must agree on the checkpoints they wish to track. Once established, tasks can be associated with a checkpoint and you can easily view what tasks are completed per checkpoint and what checkpoints do NOT have tasks established yet.
|
Topic: PSDP Design
#73. PSDP Design Item |
- |
A software artifact that documents how the software will accomplish what is documented in the requirements. In PSDP, we collect general design and specific detail items. Together the general design and design items make up the Design Specification.
Also, design items are one of the four items that make up a PSDP Artifact.
|
Group: PrestwoodBoards
Topic: Message Board Help
#74. MB Post or Post (message board) |
- |
A piece of information you wish to share with the rest of the community. A new post can be the start of a new thread (the thread starter), or it can be a reply to an existing thread that someone else created. You have the chance to edit and/or delete your message within a certain period of time, if you make a mistake.
|
#75. Moderator (message board) |
- |
This is the name for the person or people who run a specific topic, responsible for keeping the conversation (thread) on-topic, offering assistance to new members, and sparking conversation. The moderator can also post special rules for his/her topic or make announcements.
|
#76. Thread (message board) |
- |
A conversation on a subject with 1 or more posts. The first post is called the starter post. Each additional post is called a reply. Its polite to make sure your new thread is appropriate for the topic's subject area. If not, our policy is to politely move the thread to the correct topic without drawing attention to the fact that it fit better in another topic.
|
#77. Topic (message board) |
- |
An area created by the board administrator in which members can start conversations on various subjects (threads). Each community group has one and only one message board. Each group board contains one or more topics. You start new threads (subjects) in the appropriate topic.
|
Topic: PrestwoodBoards
#78. Category (online community) |
- |
A number of groups and topics that have been associated and given a name. Categories are the organizers of the Prestwood community's top-level structure. Currently our categories are IT-Water Cooler, Tech Talk, Windows Coding, and Website Coding.
|
#79. Private Message (online community) |
- |
You can send and receive messages that do not appear on our website except to you and the receiving party. A private message is accessible strictly to the person sending and the person receiving it.
|
Group: Analysis & UML
Topic: Analysis & UML
#80. Software Artifact |
- |
Any nugget discovered and developed and used during software development and maintenance. Examples are requirement items, design items, diagrams, test script, and even code itself.
In PSDP, a PSDP Artifact is a specific implementation of the generic software artifact.
A PSDP Artifact is used to work with a software feature from inception through testing. It links together a task, requirement item, design item, and test script. You can edit a PSDP artifact as a whole or expand any of the four linked items to include more details.
|
Topic: Data Flow Diagrams (DFD)
#81. Data Flow Diagram (DFD) |
- |
DFDs document a process by documenting the flow of data throughout the process. They depict how data interacts with a system. They can be used to engineer a new process, document an existing process, or re-engineer an existing process. Traditional Data Flow Diagrams use four (4) symbols, a square, an arrow, a circle, and parallel lines.
|
Topic: Unified Modeling Language (UML)
#82. Actor (UML) |
- |
An actor is a person or system that fills a role and interacts with another system. An actor supplies a stimulus to the system.
When establishing actors of your system, do not think in terms of a specific person, think in terms of their role. Do not name an actor the name of the person filling the role. If Bob is our Sales Clerk, name your actor Sales Clerk (not Bob).
|
#83. Association |
- |
An Association is a generic relationship between two classes and is represented a line connecting the two classes. This line can be qualified with the type of relationship, and can also feature multiplicity rules such as one-to-one, one-to-many, many-to-many, 0 or 1 to many, etc.
|
#84. Dependency |
- |
A "uses-a" relationship. For example, when a class uses another class as a member variable or a parameter. A "uses-a" relationship forms a dependency on a class. A Dependency relationship is indicated by a dotted line with an arrow.
|
#85. Generalization |
- |
Where you generalize specific classes into general parent classes or take general parent classes and specialize them as needed in child classes. A Generalization relationship is the equivalent of inheritance in object oriented programming (OOP). A Generalization relationship is an "is-a" relationship and is indicated by an arrow with a hollow arrowhead pointing to the parent class. For example, a Honda Accord "is-a" Car.
|
#86. UML Artifacts |
- |
In UML 1.x, many UML users referred to the UML diagrams as UML Artifacts. Starting with UML 2.0, a UML Artifact is defined as a physical unit, such as an application executable, database, file, script, etc. Only artifacts live on physical nodes; classes and components do not have "location."
|
Group: American I.T. Workforce
Topic: Foreign Worker Visas: H-1B, L-1
#87. H-1B |
- |
The H-1B is a non-immigrant visa category in the United States under the Immigration & Nationality Act, section 101(a)(15)(H). It allows U.S. employers to seek temporary help from skilled foreigners.
|
#88. Non-Immigrant Visa (NIV) |
- |
A type of visa usually used for tourist, business, student, or specialty worker. It is valid for the purpose of visiting, studying, or working a specialty job. Under U.S. law, a non-immigrant is a visitor traveling to the U.S. that does NOT intend to stay permentantly.
|
#89. Specialty Occupation |
- |
Requires the theoretical and practical application of a body of specialized knowledge and a bachelor's degree or the equivalent in the specific specialty (e.g., sciences, medicine and health care, education, biotechnology, and business specialties, etc). Current laws limit the number of foreign workers who may be issued a visa or otherwise be provided H-1B status to 65,000.
|
Group: Delphi Prism
Topic: Language Details
#90. Delphi Prism Self Keyword (Self) |
- |
Delphi Prism Self KeywordWithin the implementation of a method, the identifier Self references the object in which the method is called. The Self variable is an implicit parameter for each object method. A method can use this variable to refer to its owning class.
To refer to the current instance of a class or structure, use the Self keyword. It provides a way to refer to the specific instance in which the code is currently executing. It is particularly useful for passing information about the currently executing instance.
You cannot use it with static method functions because static methods do not belong to an object instance. If you try, you'll get an error.
|
|
|