Solved

Terminology: Opposite of dependancies

Posted on 2014-01-01
3
343 Views
Last Modified: 2014-01-02
Let's say you have module A, B, and C

Module C depends on module B and module B depends on module A.

When describing module B, I state that it's dependancy is module A. How do I describe module B's relationship to C? (the opposite of a dependancy)

Thank you for your help!

Drew
0
Comment
Question by:drew17
3 Comments
 
LVL 9

Assisted Solution

by:richdiesal
richdiesal earned 250 total points
ID: 39750533
It depends on the specific nature of the dependency.  One common way: if C depends on B, B is C's parent.
0
 
LVL 84

Accepted Solution

by:
ozo earned 250 total points
ID: 39750546
is a prerequisite of
is used by
0
 

Author Closing Comment

by:drew17
ID: 39753120
Thank you
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Software development teams often use in-memory caches to improve performance. They want to speed up access to, or reduce load on, a backing store (database, file system, etc.) by keeping some or all of the data in memory.   You should implement a …
Introduction A frequently used term in Object-Oriented design is "SOLID" which is a mnemonic acronym that covers five principles of OO design.  These principles do not stand alone; there is interplay among them.  And they are not laws, merely princ…
A company’s greatest vulnerability is their email. CEO fraud, ransomware and spear phishing attacks are the no1 threat to a company’s security. Cybercrime is responsible for the largest loss of money to companies today with losses projected to r…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

948 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now