We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 11efae3 commit ebcc857Copy full SHA for ebcc857
proxy/README.md
@@ -20,7 +20,7 @@ Provide a surrogate or placeholder for another object to control access to it.
20
21
## Explanation
22
23
-Real world example
+Real-world example
24
25
> Imagine a tower where the local wizards go to study their spells. The ivory tower can only be
26
> accessed through a proxy which ensures that only the first three wizards can enter. Here the proxy
@@ -142,7 +142,7 @@ applicable.
142
* Protection proxy controls access to the original object. Protection proxies are useful when
143
objects should have different access rights.
144
145
-## Typical Use Case
+Typically, the proxy pattern is used to
146
147
* Control access to another object
148
* Lazy initialization
0 commit comments