The following example demonstrates adding different types of elements to the collection class:
/* author by w3cschool.cc Main.java */ import java.util.Map; import java.util.Set; import java.util.SortedMap; import java.util.SortedSet; import java.util.TreeMap; import java.util.TreeSet; import java.util.ArrayList; import java.util.Collection; import java.util.HashMap; import java.util.HashSet; import java.util.Iterator; import java.util.LinkedHashMap; import java.util.LinkedHashSet; import java.util.LinkedList; import java.util.List; public class Main { public static void main(String[] args) { List lnkLst = new LinkedList(); lnkLst.add("element1"); lnkLst.add("element2"); lnkLst.add("element3"); lnkLst.add("element4"); displayAll(lnkLst); List aryLst = new ArrayList(); aryLst.add("x"); aryLst.add("y"); aryLst.add("z"); aryLst.add("w"); displayAll(aryLst); Set hashSet = new HashSet(); hashSet.add("set1"); hashSet.add("set2"); hashSet.add("set3"); hashSet.add("set4"); displayAll(hashSet); SortedSet treeSet = new TreeSet(); treeSet.add("1"); treeSet.add("2"); treeSet.add("3"); treeSet.add("4"); displayAll(treeSet); LinkedHashSet lnkHashset = new LinkedHashSet(); lnkHashset.add("one"); lnkHashset.add("two"); lnkHashset.add("three"); lnkHashset.add("four"); displayAll(lnkHashset); Map map1 = new HashMap(); map1.put("key1", "J"); map1.put("key2", "K"); map1.put("key3", "L"); map1.put("key4", "M"); displayAll(map1.keySet()); displayAll(map1.values()); SortedMap map2 = new TreeMap(); map2.put("key1", "JJ"); map2.put("key2", "KK"); map2.put("key3", "LL"); map2.put("key4", "MM"); displayAll(map2.keySet()); displayAll(map2.values()); LinkedHashMap map3 = new LinkedHashMap(); map3.put("key1", "JJJ"); map3.put("key2", "KKK"); map3.put("key3", "LLL"); map3.put("key4", "MMM"); displayAll(map3.keySet()); displayAll(map3.values()); } static void displayAll(Collection col) { Iterator itr = col.iterator(); while (itr.hasNext()) { String str = (String) itr.next(); System.out.print(str + " "); } System.out.println(); } }
The output result of running the above code is:
element1 element2 element3 element4 x y z w set3 set2 set4 set1 1 2 3 4 one two three four key1 key2 key3 key4 J K L M key1 key2 key3 key4 JJ KK LL MM key1 key2 key3 key4 JJJ KKK LLL MMM
The above is the Java example-adding different types of elements to the collection The content of type elements, please pay attention to the PHP Chinese website (www.php.cn) for more related content!

The article discusses using Maven and Gradle for Java project management, build automation, and dependency resolution, comparing their approaches and optimization strategies.

The article discusses creating and using custom Java libraries (JAR files) with proper versioning and dependency management, using tools like Maven and Gradle.

The article discusses implementing multi-level caching in Java using Caffeine and Guava Cache to enhance application performance. It covers setup, integration, and performance benefits, along with configuration and eviction policy management best pra

The article discusses using JPA for object-relational mapping with advanced features like caching and lazy loading. It covers setup, entity mapping, and best practices for optimizing performance while highlighting potential pitfalls.[159 characters]

Java's classloading involves loading, linking, and initializing classes using a hierarchical system with Bootstrap, Extension, and Application classloaders. The parent delegation model ensures core classes are loaded first, affecting custom class loa


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

VSCode Windows 64-bit Download
A free and powerful IDE editor launched by Microsoft

SublimeText3 Linux new version
SublimeText3 Linux latest version

Atom editor mac version download
The most popular open source editor

SublimeText3 Chinese version
Chinese version, very easy to use