Solved

Realtime Scenario

Posted on 2011-02-27
4
732 Views
Last Modified: 2013-11-11
Can any one give me some real time scenario where those design patterns used .In a Windows based .NET application

Builder
Factory,
Abstract Factory
Singleton,
Visitor
Facade
0
Comment
Question by:mohantyd
  • 2
4 Comments
 
LVL 10

Accepted Solution

by:
Asim Nazir earned 167 total points
ID: 34994976
Singleton:
If you want one and only one instance of an application then this is achieved using singleton pattern. e.g. MSN messenger - remains one messenger even if we click its executable multiple times.
0
 
LVL 10

Assisted Solution

by:Jacco
Jacco earned 333 total points
ID: 34995932
Here is a MSDN article about patterns being used in the framework itself:

http://msdn.microsoft.com/en-us/magazine/cc188707.aspx
0
 
LVL 10

Assisted Solution

by:Jacco
Jacco earned 333 total points
ID: 34995941
0
 

Author Closing Comment

by:mohantyd
ID: 35196763
I was looking for realtime scenarios
0

Featured Post

Free Tool: IP Lookup

Get more info about an IP address or domain name, such as organization, abuse contacts and geolocation.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The CRUD Functions CRUD, meaning "Create, Read, Update, Delete (http://en.wikipedia.org/wiki/Create,_read,_update_and_delete)" is a common term to data base developers.  It describes the essential functions of data base table maintenance.  This art…
Introduction This article explores the design of a cache system that can improve the performance of a web site or web application.  The assumption is that the web site has many more “read” operations than “write” operations (this is commonly the ca…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

792 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question