Thanks to visit codestin.com Credit goes to github.com
We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 11efae3 commit ebcc857Copy full SHA for ebcc857
proxy/README.md
@@ -20,7 +20,7 @@ Provide a surrogate or placeholder for another object to control access to it.
20
21
## Explanation
22
23
-Real world example
+Real-world example
24
25
> Imagine a tower where the local wizards go to study their spells. The ivory tower can only be
26
> accessed through a proxy which ensures that only the first three wizards can enter. Here the proxy
@@ -142,7 +142,7 @@ applicable.
142
* Protection proxy controls access to the original object. Protection proxies are useful when
143
objects should have different access rights.
144
145
-## Typical Use Case
+Typically, the proxy pattern is used to
146
147
* Control access to another object
148
* Lazy initialization
0 commit comments