Hide some information of the class inside the class and do not allow direct access by external programs. Instead, the operations and access to the hidden information are implemented through the methods provided by the class Advantages: a. Only through regulations Method access number b. Hide the instance details of the class to facilitate modification and implementation
2. Implementation steps: 1) Modify the attribute visibility (set to private) 2) Create a getter/setter method (for attribute reading and writing) 3) Add attribute control statements to the method (to determine the legality of the attribute value) Example: Set the student class: Two attributes 1) name 2) age In the Student class, add age judgment for age. If the age is less than 0 or greater than 150, prompt: Unreasonable dataAdd judgment, the existence that cannot be solved is not Reasonable data;
Use the keyword
private: private ---> cannot be accessed (
Member variables/member methods modified by private can only be accessed in this class, The outside world cannot directly access)
3. Package 1) The role of the package: manage JAVA files and resolve file conflicts with the same name Define package: package package name
Note: It must be placed in the first line of the JAVA source program and can be separated by ., such as: com.westos.Class
2) Packages in the system:
java. (Function). (Class)
java.lang. (Class) contains the basic Java language classes
When used, you can load all files under a certain package (import java.util.*
import java.util.Scanner)
4. Access modifier: used to modify the access scope of properties and methodsps: Usually we modify methods with public and modify attributes with private
5.this keyword
this.Attribute: Manipulate the properties of the current object
This.Method: Call the method of the current object 2) When encapsulating the properties of an object, the this keyword is often usedps: Generate get and set methods
Source--->Generate Getters and Setters
## At this time we found that our attribute names and parameter names were repeated. In order to distinguish them, we added the this keyword, which means assigning the value of the parameter to the current attribute. The value of This keyword can not only be used with attributes, but also can be used if we want to call a method in a set method
Example: Based on the previous example, the output result is
1. Mobile phone class
package example; public class Phone { private String brand; private int price; private String color; public void sendMessage() { System.out.println("you can message to Andrew"); } public String getBrand() { return brand; } public void setBrand(String brand) { this.brand = brand; this.sendMessage(); } public int getPrice() { return price; } public void setPrice(int price) { this.price = price; } public String getColor() { return color; } public void setColor(String color) { this.color = color; } public void show(String name) { System.out.println(name+" use the iphone to call Andrew"); } }
2. Student class
package example; public class Student { //定义两个变量 String name ; String gender; private int age ; //提供方法:输出变量 public void show() { System.out.println(name+" "+age+" "+gender); } public String getName() { return name; } public void setName(String name) { this.name = name; } public int getAge() { return age; } public String getGender() { return gender; } public void setGender(String gender) { this.gender = gender; } //针对age进行判断 public void setAge(int a) { if(a<0||a>150) { System.out.println("该数据不符合实际"); }else { age = a; } } }
3. Call
package example; public class Ex2 { public static void main(String[] args) { Student x = new Student(); Phone i = new Phone(); x.setAge(24); x.setName("Silvia"); x.setGender("Lady"); x.show(); i.setBrand("Apple"); i.setColor("玫瑰金"); i.setPrice(6999); i.show(x.name); } }Results:
JAVA Getting Started System Tutorial (4) Basic Grammar (2)
JAVA Getting Started System Tutorial (5) Basic Syntax (3)
The above is the detailed content of JAVA introductory system tutorial (6) Object-oriented (encapsulation). For more information, please follow other related articles on the PHP Chinese website!

JVM'sperformanceiscompetitivewithotherruntimes,offeringabalanceofspeed,safety,andproductivity.1)JVMusesJITcompilationfordynamicoptimizations.2)C offersnativeperformancebutlacksJVM'ssafetyfeatures.3)Pythonisslowerbuteasiertouse.4)JavaScript'sJITisles

JavaachievesplatformindependencethroughtheJavaVirtualMachine(JVM),allowingcodetorunonanyplatformwithaJVM.1)Codeiscompiledintobytecode,notmachine-specificcode.2)BytecodeisinterpretedbytheJVM,enablingcross-platformexecution.3)Developersshouldtestacross

TheJVMisanabstractcomputingmachinecrucialforrunningJavaprogramsduetoitsplatform-independentarchitecture.Itincludes:1)ClassLoaderforloadingclasses,2)RuntimeDataAreafordatastorage,3)ExecutionEnginewithInterpreter,JITCompiler,andGarbageCollectorforbytec

JVMhasacloserelationshipwiththeOSasittranslatesJavabytecodeintomachine-specificinstructions,managesmemory,andhandlesgarbagecollection.ThisrelationshipallowsJavatorunonvariousOSenvironments,butitalsopresentschallengeslikedifferentJVMbehaviorsandOS-spe

Java implementation "write once, run everywhere" is compiled into bytecode and run on a Java virtual machine (JVM). 1) Write Java code and compile it into bytecode. 2) Bytecode runs on any platform with JVM installed. 3) Use Java native interface (JNI) to handle platform-specific functions. Despite challenges such as JVM consistency and the use of platform-specific libraries, WORA greatly improves development efficiency and deployment flexibility.

JavaachievesplatformindependencethroughtheJavaVirtualMachine(JVM),allowingcodetorunondifferentoperatingsystemswithoutmodification.TheJVMcompilesJavacodeintoplatform-independentbytecode,whichittheninterpretsandexecutesonthespecificOS,abstractingawayOS

Javaispowerfulduetoitsplatformindependence,object-orientednature,richstandardlibrary,performancecapabilities,andstrongsecurityfeatures.1)PlatformindependenceallowsapplicationstorunonanydevicesupportingJava.2)Object-orientedprogrammingpromotesmodulara

The top Java functions include: 1) object-oriented programming, supporting polymorphism, improving code flexibility and maintainability; 2) exception handling mechanism, improving code robustness through try-catch-finally blocks; 3) garbage collection, simplifying memory management; 4) generics, enhancing type safety; 5) ambda expressions and functional programming to make the code more concise and expressive; 6) rich standard libraries, providing optimized data structures and algorithms.


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Safe Exam Browser
Safe Exam Browser is a secure browser environment for taking online exams securely. This software turns any computer into a secure workstation. It controls access to any utility and prevents students from using unauthorized resources.

VSCode Windows 64-bit Download
A free and powerful IDE editor launched by Microsoft

MantisBT
Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

SAP NetWeaver Server Adapter for Eclipse
Integrate Eclipse with SAP NetWeaver application server.

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.
