Principle: Control the modification of data as much as possible. If it can be predicted that a certain data will not or should not be changed, it must be controlled, and do not expect that the caller using this data will not change its value. .
If the parameters are accidentally modified during use, unpredictable results will occur, and this error is difficult to detect, so we must fully consider it when designing method parameters. Possible consequences of passing reference type parameters or passing reference type parameters by reference.
If a piece of data cannot be changed during the transfer process, the value (field or attribute) must not be changed when constructing the object.
1. Control of simple parameters
1. Passing value type parameters
In this case, because of the passed It is a copy of the parameter, does not affect the original value, and does not require control.
2. Passing reference type parameters
a. Data structure composed of value types
Need to set the fields to Read-only, attributes only get. Assignment can only be done through the constructor.
b. Data structure containing reference type fields
This situation is recursive. You need to ensure that the fields are readonly and the attributes are get. At the same time, the reference type fields are Usage types also meet this requirement.
public class SuperClass { private readonly int _no; private readonly SubClass _tag; public int NO { get{ return _no;} } public SubClass Tag { get{ retirn _tag;} } public SuperClass(int no,SubClass tag) { _no=no; _tag=tag; } } public class SubClass { private readonly int _field; public int Field { get{ return _field;} } public SubClass(int field) { _field=field; } }
2. Control of passing complex reference type parameters
The so-called complexity means that the parameter is an array or collection type, or The parameters contain these types of data. In this case, the above method cannot guarantee that the parameter data will not be modified, because even if the object is read-only, the array or collection fields (properties) in the object can still be modified.
1. Collection parameters (the same applies to reference parameters containing collection fields)
.net versions prior to 4.5 can use interfaces that do not contain methods to modify collection elements instead of specific Collection type. For example, use the IEnumerable
2. Array parameters
There is no good way to protect array type parameters from being modified, so try to avoid using array types as method parameters unless optional parameters are used. when.
3. To understand the above things, you need to distinguish the difference between concepts
1. The difference between value type and reference type
2. The difference between passing by value and passing by reference (ref and out)
3. The difference between passing reference type parameters and passing by reference (ref and out) reference type parameters [This is the most confusing]
The difference is that when a new object is created for the reference during the use of this parameter, the former does not affect the original value, while the latter affects the original value. Example:
##
void FunA(MyClass a) { a=new MyClass("A"); } void FunB(ref MyClass a) { a=new MyClass("B"); } void Test() { MyClass a=new MyClass("A"); FunA(a); Print(a); //a还是原始的对象 TEST FunB(ref a); Print(a); //a变为新对象 B}
Remember one principle:
The value type transfers a copy of the value, and the reference type transfers the object reference, so the modification of the value parameter does not affect the original value, but the modification of the reference type does. Original value; parameter construction passed by value does not affect the original value, and reference passing (ref and out) affects the original value.The above is the detailed content of Solve the problem of passing C# array as parameter. For more information, please follow other related articles on the PHP Chinese website!

The core concepts of .NET asynchronous programming, LINQ and EFCore are: 1. Asynchronous programming improves application responsiveness through async and await; 2. LINQ simplifies data query through unified syntax; 3. EFCore simplifies database operations through ORM.

The usage methods of symbols in C language cover arithmetic, assignment, conditions, logic, bit operators, etc. Arithmetic operators are used for basic mathematical operations, assignment operators are used for assignment and addition, subtraction, multiplication and division assignment, condition operators are used for different operations according to conditions, logical operators are used for logical operations, bit operators are used for bit-level operations, and special constants are used to represent null pointers, end-of-file markers, and non-numeric values.

In C, the char type is used in strings: 1. Store a single character; 2. Use an array to represent a string and end with a null terminator; 3. Operate through a string operation function; 4. Read or output a string from the keyboard.

In C language, special characters are processed through escape sequences, such as: \n represents line breaks. \t means tab character. Use escape sequences or character constants to represent special characters, such as char c = '\n'. Note that the backslash needs to be escaped twice. Different platforms and compilers may have different escape sequences, please consult the documentation.

The char array stores character sequences in C language and is declared as char array_name[size]. The access element is passed through the subscript operator, and the element ends with the null terminator '\0', which represents the end point of the string. The C language provides a variety of string manipulation functions, such as strlen(), strcpy(), strcat() and strcmp().

C#.NET provides powerful tools for concurrent, parallel and multithreaded programming. 1) Use the Thread class to create and manage threads, 2) The Task class provides more advanced abstraction, using thread pools to improve resource utilization, 3) implement parallel computing through Parallel.ForEach, 4) async/await and Task.WhenAll are used to obtain and process data in parallel, 5) avoid deadlocks, race conditions and thread leakage, 6) use thread pools and asynchronous programming to optimize performance.

In C language, char type conversion can be directly converted to another type by: casting: using casting characters. Automatic type conversion: When one type of data can accommodate another type of value, the compiler automatically converts it.

A strategy to avoid errors caused by default in C switch statements: use enums instead of constants, limiting the value of the case statement to a valid member of the enum. Use fallthrough in the last case statement to let the program continue to execute the following code. For switch statements without fallthrough, always add a default statement for error handling or provide default behavior.


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

SAP NetWeaver Server Adapter for Eclipse
Integrate Eclipse with SAP NetWeaver application server.

Atom editor mac version download
The most popular open source editor

mPDF
mPDF is a PHP library that can generate PDF files from UTF-8 encoded HTML. The original author, Ian Back, wrote mPDF to output PDF files "on the fly" from his website and handle different languages. It is slower than original scripts like HTML2FPDF and produces larger files when using Unicode fonts, but supports CSS styles etc. and has a lot of enhancements. Supports almost all languages, including RTL (Arabic and Hebrew) and CJK (Chinese, Japanese and Korean). Supports nested block-level elements (such as P, DIV),

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.
