1. PO: (persistant object), persistent object
can be regarded as a java object that maps to a table in the database. Using Hibernate to generate PO is a good choice.
2. VO: (value object), value object
is usually used for data transfer between business layers. Like PO, it only contains data. But it should be an abstracted business object, which may or may not correspond to a table, depending on the needs of the business.
PO can only be used in the data layer, and VO is used in the business logic layer and presentation layer. Each layer operates its own data objects, which reduces the coupling between layers and facilitates future system maintenance and expansion.
3. DAO: (Data Access Objects), data access Object interface
DAO is the Data Access Object data access interface, data access: as the name suggests, it is to deal with the database. Sandwiched between business logic and database resources.
J2EE developers use Data Access Objects (DAO)Design PatternSeparate the underlying data access logic and high-level business logic. Implementing the DAO pattern can focus more on writing data access code.
The DAO pattern is one of the standard J2EE design patterns. Developers use this pattern to separate the underlying data access operations from the upper-level business logic. A typical DAO implementation has the following components:
1. A DAO factory class;
2. A DAO interface;
3. A concrete class that implements the DAO interface;
4. Data transfer object (sometimes called a value object).
Specific DAO class Contains the logic for accessing data from a specific data source.
4. BO: (Business Object), the business object layer
represents all entity classes of "things" in the application domain. These entity classes reside on the server and utilize service classes to assist in their responsibilities.
5. POJO: (Plain Old Java Objects), simple Java objects
are actually ordinary JavaBeans. The POJO name is used to avoid confusion with EJB, and the abbreviation is more direct.
Among them are Some classes with attributes and their getter and setter methods can sometimes be used as value objects or dto (Data Transform Object). Of course, if you have a simple operation attribute, it is also possible, but business methods are not allowed and cannot be carried. There are methods like connection.
【Related Recommendations】
1. Details of the ways to create objects in Java
2. Detailed examples of java object copy
3. Detailed explanation of examples of copying java objects
The above is the detailed content of Briefly introduce several java objects. For more information, please follow other related articles on the PHP Chinese website!

Javaispopularforcross-platformdesktopapplicationsduetoits"WriteOnce,RunAnywhere"philosophy.1)ItusesbytecodethatrunsonanyJVM-equippedplatform.2)LibrarieslikeSwingandJavaFXhelpcreatenative-lookingUIs.3)Itsextensivestandardlibrarysupportscompr

Reasons for writing platform-specific code in Java include access to specific operating system features, interacting with specific hardware, and optimizing performance. 1) Use JNA or JNI to access the Windows registry; 2) Interact with Linux-specific hardware drivers through JNI; 3) Use Metal to optimize gaming performance on macOS through JNI. Nevertheless, writing platform-specific code can affect the portability of the code, increase complexity, and potentially pose performance overhead and security risks.

Java will further enhance platform independence through cloud-native applications, multi-platform deployment and cross-language interoperability. 1) Cloud native applications will use GraalVM and Quarkus to increase startup speed. 2) Java will be extended to embedded devices, mobile devices and quantum computers. 3) Through GraalVM, Java will seamlessly integrate with languages such as Python and JavaScript to enhance cross-language interoperability.

Java's strong typed system ensures platform independence through type safety, unified type conversion and polymorphism. 1) Type safety performs type checking at compile time to avoid runtime errors; 2) Unified type conversion rules are consistent across all platforms; 3) Polymorphism and interface mechanisms make the code behave consistently on different platforms.

JNI will destroy Java's platform independence. 1) JNI requires local libraries for a specific platform, 2) local code needs to be compiled and linked on the target platform, 3) Different versions of the operating system or JVM may require different local library versions, 4) local code may introduce security vulnerabilities or cause program crashes.

Emerging technologies pose both threats and enhancements to Java's platform independence. 1) Cloud computing and containerization technologies such as Docker enhance Java's platform independence, but need to be optimized to adapt to different cloud environments. 2) WebAssembly compiles Java code through GraalVM, extending its platform independence, but it needs to compete with other languages for performance.

Different JVM implementations can provide platform independence, but their performance is slightly different. 1. OracleHotSpot and OpenJDKJVM perform similarly in platform independence, but OpenJDK may require additional configuration. 2. IBMJ9JVM performs optimization on specific operating systems. 3. GraalVM supports multiple languages and requires additional configuration. 4. AzulZingJVM requires specific platform adjustments.

Platform independence reduces development costs and shortens development time by running the same set of code on multiple operating systems. Specifically, it is manifested as: 1. Reduce development time, only one set of code is required; 2. Reduce maintenance costs and unify the testing process; 3. Quick iteration and team collaboration to simplify the deployment process.


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

Dreamweaver CS6
Visual web development tools

SAP NetWeaver Server Adapter for Eclipse
Integrate Eclipse with SAP NetWeaver application server.

SublimeText3 Linux new version
SublimeText3 Linux latest version

SublimeText3 Mac version
God-level code editing software (SublimeText3)
