choose. Some customers prefer Agile, while others like the Waterfall model. So it's absolutely impressive to be able to do all sorts of different ways.10. Record your views on the technology to the documentation/blogIn our daily work, we may learn new things, new ways of doing things, practical forms and architectural ideas. You can record these ideas in a document or blog and share them with you.Because the way you're going to solve the problem is probably just another corner of the world. Ano
collection overwrite Euqls () and hashcode () to prevent continuous growth
Objects referenced by local method JNI
The constants in the method area refer to the object, thus reducing the call to String.intern () on a long string
ClassLoader loaded class object, so the custom ClassLoader is invalid when null is placed and notice the isolation between the ClassLoader loading objects
References to objects in the GC heap in some static data structures in the JVM
...
First-li
Program | programmer
Java programmer must read: Basic articlesTime: 2001/09/13 13:31 Author: ZSC Pacific Network College
2.4 Instance and class members
2.4.1 Understanding instances and class members
The following is a detailed discussion of examples and class members, involving variables and methods as well as class variables and methods:
You declare a m
A soldier who doesn't want to be a general is not a good soldier, so every Java programmer should make himself better, to increase his core competence, and a non-enterprising Java programmer is easy to be eliminated by society. So how to become a good Java
subclass of an external class or interface with Content anonymous objects. When do you use anonymous internal classes? An anonymous inner class can be passed as a parameter, typically when the usage method is an interface type parameter, and there are no more than three methods in the interface. Because the name of the constructor must be the same as the class name, and the anonymous class does not have a class name, the anonymous class cannot have a constructor and instead passes the construc
parent class functionsSubclass overrides the parent class function, must ensure that the child class permission is greater than or equal to the parent class permission, otherwise the compilation fails;Static can only be overridden by static.3. Final keyword FeaturesWhen an inner class is defined at a local location, it can only access the locally final decorated local variable and cannot access the externally final decorated variable.4, the subclass of the abstract class must rewrite all the ab
netcard ()); M.mainusepci (new Soundcard ());}} Object: is the direct latter indirect parent of all objects. What is defined in this class is definitely the functionality that all objects have. The object class already provides a comparison method for whether the objects are the same. If the custom class also has the same functionality, there is no need to redefine it. Just follow the functions in the parent class and build your own unique comparison, which is the overlay. Involving Knowledge p
methods in the object at the same time. At this point, the synchronized method of the different object instances is not interfering. In other words, other threads can access the Synchronized method in another object instance of the same class at the same time;2, is the scope of a class, synchronized static astaticmethod{} prevents multiple threads from accessing the synchronized static method in this class at the same time. It can work on all object instances of the class.2, in addition to the
different ways.10. Record your views on the technology to the documentation/blogIn our daily work, we may learn new things, new ways of doing things, practical forms and architectural ideas. You can record these ideas in a document or blog and share them with you. Because the way you're going to solve the problem is probably just another corner of the world. Another developer "Searching for a quest", your share will be nothing less than a long drought."Editor: Chenqingxiang TEL: (010) 68476606"
Java Advanced programmer face test
1. What do you think is the most important process in the project?
Try to identify progress priorities in the analysis and design phase
2. If you give a team of 4-6 people, how to assign.
Pick a technically competent person as my substitute. Others distribute tasks evenly, perform a comprehensive task assignment every week, and each person receives a week's work
and repor
#, ASP, and so on, or PHP, C + +, Python, and other programming languages.But did not think, incredibly many do Java to transfer other languages. Hurriedly opened the station on a classic "Java Programming ideas", browse the preface and directory, seemingly Java in all aspects is very powerful!Maybe some do Java lose
conjunction with Nginx and so on, it is very convenient for everyone, will not repeat it.
The completion of the deployment, the next log and monitoring, are very common problems, the log has a corresponding library, and monitoring are dependent on professional monitoring platform, their own information output is good, please allow me to show the spring boot Remoteshell terminal monitoring, In addition to the regular HTTP output JSON information (with the health check, meter data, Dump, request
has bonus.Analysis:1. There must be an employee class2. The manager belongs to the employee, but not exclusively, he has his own special attributes.3. Attributes required by the Employee class: Name/id/gongzi4. Manager attached properties: BonusClass Employee{private string name;private string id;private int gongzi;//Initialize Employee (string name, string id, int gongzi) {this.name = Name;this.id = Id;thi.gongzi = Gongzi;} Public abstract work ();//no method body}class Manage extends employe
Code reuse is implemented through inheritance. All classes in Java are obtained by inheriting the Java.lang.Object class directly or indirectly. Inherited classes are called subclasses, and inherited classes are called parent classes. Subclasses cannot inherit member variables and methods in the parent class that have access rights private.Subclasses can override the parent class's methods and name member variables with the same name as the parent cla
identified by the label (the label only works before the loop statement). For example:outer: for (int i=0; i) { for (int j=0; j) { if (j = =1 )break outer;} }4.3 Using the return End methodReturn is not intended to end a loop, but rather to end a method. As follows: Public class test{ publicstaticvoid main (string[] args) { for int i=0; i) { if(i = =1 )retu
code, and other downloads. If you are not a Java programmer, just want to run Java programs in your own system, you only need a JRE, if you want to use Java to develop your own application, you need to download the JDK, which already contains the JRE, so download the JDK without having to download the JRE separately.2
Remoteshell terminal monitoring, In addition to the regular HTTP output JSON information (with the health check, meter data, Dump, request tracking and a series of rest output), but also brought a similar top tall on the device, ssh -p 2000 user@localhost after the execution dashboard can see this real-time update of the interface.
Summarize
So much to summarize the full text of the view-although go in the language is very good, but also into a lot of best practices, but combined with many con
gold medal, the practice of equipment back to the equipment storage section, the result of the administrator yelled at you: This put this way! Put that over there! You don't know the rules, do you? "Did you see the problem?" The programmer submitted a high-value code (the Olympic gold Medal), and the result was snapped by some of the people who thought git was very familiar (the equipment keeper).A company culture that respects the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.