This entry is missingOverview, add relevant content to make the entry more complete, and it can also be upgraded quickly. Hurry upeditCome on!
In the development process of modern software engineering, software components are just a process to assist or support system construction.
Software component development is mainly to develop and maintain the components used in the system construction process.The software component is regarded as a separate process, with the purpose of taking the component as the "component" of the construction software.With the continuous development of software technology and the continuous improvement of software engineering, software components will be regarded as an independentsoftware product In the market, supply developers choose when constructing application systems.
Software components are self-contained, programmable, reusable, language independent software units that can be easily used to assemble applications.
advantage
Announce
edit
Position transparency:
No matter where the component is located, the caller of the component should be able to use the same method to obtain component information (location) and call the component, regardless of the component's location.
Use interface technology:
The interface of the component is separated from the implementation of the component, and even the interface used by the caller is not in the same place as the component. The caller can use the component only by knowing the interface and accessing the interface.The interface is relatively fixed, and changes in component function and implementation should not cause changes in the interface, and the interface isBinary protocol, not related to language.
Self descriptive:
The component should be self describing. The caller should be able to use a unified method to obtain the interface information of the component. The interface information is language independent
Reusability:
Components should be able to be easily reused by reusers in a binary way, independent of language.
Security:
Components should be secure, and no unauthorized, illegal or malicious use should be allowed.