Fog computing is a term for an alternative to cloud computing that puts some kinds of transactions and resources at the edge of a network, rather than establishing channels for cloud storage and utilization. Proponents of fog computing argue that it can reduce the need for bandwidth by not sending every bit of information over cloud channels, and...
Polymorphism, in C#, is the ability of objects of different types to provide a unique interface for different implementations of methods. It is usually used in the context of late binding, where the behavior of an object to respond to a call to its method members is determined based on object type at run time. Polymorphism enables redefining methods in derived classes.
Polymorphism forms one of the fundamental concepts of object-oriented programming, along with encapsulation and inheritance.
Method overloading, constructor overloading and operator overloading are considered compile-time (also called static or ad-hoc) polymorphism, or early binding. Method overriding, which involves inheritance and virtual functions, is called runtime (also called dynamic, inclusion, or subtyping) polymorphism, or late binding. In the case of compile-time polymorphism, identification of the overloaded method to be executed is carried out at compile time. However, in runtime polymorphism, the type of the object from which the overridden method will be called is identified at run time.
In C#, polymorphism is implemented through inheritance and the use of the keyword "virtual". Derived classes inherit the base class members, except constructors, based on their accessibility levels. Hence, the compiler generates the code to check and identify the correct object type (that is pointed to by the reference type) at runtime and the appropriate method to be called.
An example of polymorphism is an employee base class, which includes all the basic details about employees. Classes such as clerk and manager could inherit from the employee base class with specific implementations (by overriding virtual methods) wherever necessary in the derived classes.
Read More »
Join 138,000+ IT pros on our weekly newsletter
Home | Advertising Info | Write for Us | About | Contact Us
2010 - 2014
Janalta Interactive Sites: