Thinking logic of computer programs (13), thinking Logic
Class
In the previous section, we introduced the basic principles of function calling. In this section and the next sections, we will explore the world of classes.
Programs mainly involve data and operations on data. To facilitate understanding and operation, advanced languages use the data type concept. Di
control the memory, hard disk, and the like. These commands cannot be directly executed by the program to prevent malicious programs from damaging the system, this is a kind of protection for the CPU, and the loop 3 command can be directly called by anyone, and can be used as a user interface.
Programming:
Computer languages include interpreted and compiled languages.
Interpreted language: the source code
files, pictures, HTML files, compressed files and so on.Finally, for serialization, in addition to introducing the default serialization mechanism for Java, we also introduce XML, JSON, and Messagepack.SummaryThis section describes some of the basic concepts and common sense of files, the basic thinking and class structure of working with files in Java, and finally we summarize the following chapters to arrange the ideas.The file should look very simple, but actually contains a lot of content,
previous introduction is the flow, in addition to the flow, there are other ways of operation, such as random access and memory-mapped files, why do you need these methods? What are their characteristics? For what occasion? Let's move on to the next exploration.----------------To be continued, check out the latest articles, please pay attention to the public number "old Horse Programming" (Scan the QR code below), from the introduction to advanced, in layman's words, Lao Ma and you explore the
together, may write less code, but if the use of improper, will make the understanding much more difficult.Operator PrecedenceA slightly more complex operation may involve multiple variables, and a number of operations, which is the first, which is the calculation? The programming language dictates the precedence of the different operators, some will be counted first, some will be counted later, and in most cases, this priority is consistent with our common sense understanding.But in some compl
Thinking logic of computer programs (66) and thinking 66
We mentioned two problems of multi-thread shared memory in the previous section. One is the race condition and the other is the memory visibility. we mentioned that one solution to these two problems is to use the synchronized keyword, this topic describes this keyword.
Usage
Synchronized can be used to modify the instance method, static method, and c
Thinking logic of computer programs (87) and thinking 87
In the previous section, we discussed dynamic proxies. in the previous sections, we mentioned ClassLoader for many times. This section will discuss in detail the class loading mechanism and ClassLoader in Java.
ClassLoader is the Class for loading other classes. It is responsible for loading bytecode files to the memory and creating Class objects. Lik
Unnecessary programs in Windows How to prohibit the operation, the computer after a period of time will appear some unnecessary procedures, will affect the speed of our computer, if you do not need to prohibit these programs to start on it. But how to forbid it? The following three networks tell you the specific steps.
Thinking logic of computer programs (51) and thinking 51
The previous section describes EnumMap. This section also describes the implementation class EnumSet for the Set interface of the enumeration type. Similar to EnumMap, there is a special implementation class for enumeration types, mainly because it can implement the Set interface very efficiently.
The implementation class HashSet/TreeSet of the Set in
URL, an organization code card, and so on.
Bundle Identifier: The program identifier, which is a flag that differs from other programs, is composed of Organization Identifier + Product Name.
Language: The programming language used in the project, choose c speech here.
4) Click "Next", save the file can enter the future project, as shown:650) this.width=650; "src=" http://c.biancheng.net/cpp/uploads/allimg/160308/1-16030Q45F4V8.jpg "style
1, directly click the "Start" menu, and then select the "Run" option, this time will pop up a dialog box, in which directly enter the "regedit" Word command, and then click Enter;
2. After the Registry Editor opens, locate the following HKEY_CURRENT_USER, Software, Microsoft, Windows, CurrentVersion, Policies, explorer options on the left, Then delete the subkey "Disallowcpl" below the option on the right;
3, resource management Reset, the "taskkill/f/im Explorer.exe Start Explorer.exe" c
Thinking logic of computer programs (90) and thinking 90
Section 88 introduces the regular expression syntax. The previous section describes Java APIs related to regular expressions. This section discusses and analyzes some common regular expressions, including:
Zip code
Phone number, including mobile phone number and fixed phone number
Date and Time
ID card
IP address
URL
Email Address
Chinese cha
Thinking logic of computer programs (94) and thinking 94
The previous two sections discussed functional data processing in Java 8, which is an enhancement to the container class introduced in sections 38 to 55, it can combine multiple operations on the set data in a pipeline. This section continues to discuss the new features of Java 8, mainly a new class CompletableFuture, which is an enhancement to concur
Thinking logic of computer programs (91) and thinking 91
In the previous sections, we have discussed Java 7. From this section, we will discuss some features of Java 8, including:
Passing behavior code-Lambda expressions
Function-based data processing-stream
Combined asynchronous programming-CompletableFuture
New Date and Time API
In this section, we will first discuss Lambda expressions. What is it?
Thinking logic of computer programs (36) and thinking 36
In the previous section, we introduced the basic concepts and principles of generics. In this section, we will continue to discuss generics and the wildcard concepts in generics. Wildcards have confusing and confusing syntaxes, but they are widely used in Java container classes. What is it? In this section, let's analyze it gradually.
More concise par
Thinking logic of computer programs (68) and thinking 68
This section continues with the content of the previous section and discusses how to use wait/notify to implement more collaboration scenarios.
Start at the same time
At the same time, it is similar to an athlete's competition. When we hear the game start with a gun, we start at the same time. Below, we simulate this process. Here there is a main thre
Thinking logic of computer programs (5), thinking Logic
Intuitive fact violations
The reason why a computer is called a "computing" machine is because it was invented mainly for computing. "computing" is of course its specialty. In everyone's impression, computing must be very accurate. But in fact, even in some basic decimal operations, the calculation results a
corresponds to Java.In 32-bit format, 1 bits represent the symbol, 23 bits represent the mantissa, and 8 bits represent the exponent. In 64-bit format, 1 bits represent the symbol, 52 bits represent the mantissa, and 11 bits represent the exponent.In the two formats, in addition to the normal number, the standard also specifies that some special binary forms represent some special values, such as negative infinity, positive infinity, 0,nan (non-numeric, such as 0 times infinity).The IEEE 754 st
file.Continuous read-only code snippets and read-write data segments, which makes it easy for the loader to page and initialize contiguous areas.At load time, the read-only code snippet and the writable data segment corresponding to the page table are initialized to a page that is not cached (involving the operating system and the principle of composition), pointing to somewhere in the destination file on disk. So, during the program loading process, there is no real load of code and data from
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.