1.equals method
==Operator
Comparison operator, which can determine both basic types and reference types
If you determine the basic type, determine whether the values are equal
If you determine the reference type, determine whether the addresses are equal, that is, determine whether they are the same object
equals
is a method of the object class, which can only determine the reference type
object - equals source code:
public boolean equals(Object obj) { return (this == obj); }
It can be clearly seen that the equals method in the object class is to determine whether the address of the object is Identical (is it the same object)
However, other data type classes will override the equals method, such as the rewriting of the String class: (determine whether the values of two strings are equal)
public boolean equals(Object anObject) { if (this == anObject) { return true; } return (anObject instanceof String aString) && (!COMPACT_STRINGS || this.coder == aString.coder) && StringLatin1.equals(value, aString.value); }
Example:
String str1 = new String("hello"); String str2 = new String("hello"); System.out.println(str1 == str2); // false System.out.println(str1.equals(str2)); // true
2.hashCode
Improve the efficiency of containers with hash structures
If two references point to the same object, the hash value is certain (no conflict) case) is the same, and vice versa
The hash value is based on the address but not the address
Demo:
// hashCode A a = new A(); A a1 = new A(); A a2 = a; System.out.println(a.hashCode()); System.out.println(a1.hashCode()); System.out.println(a2.hashCode()); ------------------------------
Output:
1324119927
990368553
1324119927
3.toString
Returns the string representation of the object
Source code:
public String toString() { return getClass().getName() + "@" + Integer.toHexString(hashCode()); }
Example:
// toString A a3 = new A("dahe",25,"安全服务工程师"); System.out.println(a3.toString());
Output:
classes.A@41629346
Package name.Class name@Hex hashCode
Now Let’s rewrite the toString method (template) in the class:
@Override public String toString() { return "A{" + "name='" + name + '\'' + ", age=" + age + ", job='" + job + '\'' + '}'; }
Run the above code again, and now the output is as follows:
A{name='dahe', age=25, job='安全服务工程师'}
In addition, when we directly output the object, it will be called directly by default toString method:
System.out.println(a3);
Output:
A{name='dahe', age=25, job='Security Service Engineer'}
4.finalize
When the object is recycled, the system automatically calls the finalize method of the object. Subclasses can override this method and do some operations to release resources
Note: In JDK18. finalize is deprecated. Although it can help us proactively release the underlying resources of the system, to be honest, I have never used it. Java automatically manages memory. Using it will lead to potential system security risks. If it is not helpful, it will be a burden, so it is planned to be removed. .
Example:
// finalize A a4 = new A("dh",33,"架构师"); a4 = null; // 这是a4成为了垃圾,垃圾回收器就会回收对象 // 在销毁对象之前,会调用对象的finalize方法 // 程序员就可以在这个方法中写入自己的业务,释放资源
Override the finalize method:
@Override protected void finalize() throws Throwable { System.out.println("我们销毁对象"); }
In addition, you can also actively run the garbage collector:
System.gc(); // 主动调用垃圾回收器
The above is the detailed content of How to use Java Object class. For more information, please follow other related articles on the PHP Chinese website!

Start Spring using IntelliJIDEAUltimate version...

When using MyBatis-Plus or other ORM frameworks for database operations, it is often necessary to construct query conditions based on the attribute name of the entity class. If you manually every time...

Java...

How does the Redis caching solution realize the requirements of product ranking list? During the development process, we often need to deal with the requirements of rankings, such as displaying a...

Conversion of Java Objects and Arrays: In-depth discussion of the risks and correct methods of cast type conversion Many Java beginners will encounter the conversion of an object into an array...

Solutions to convert names to numbers to implement sorting In many application scenarios, users may need to sort in groups, especially in one...

Detailed explanation of the design of SKU and SPU tables on e-commerce platforms This article will discuss the database design issues of SKU and SPU in e-commerce platforms, especially how to deal with user-defined sales...

How to set the SpringBoot project default run configuration list in Idea using IntelliJ...


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

MantisBT
Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

mPDF
mPDF is a PHP library that can generate PDF files from UTF-8 encoded HTML. The original author, Ian Back, wrote mPDF to output PDF files "on the fly" from his website and handle different languages. It is slower than original scripts like HTML2FPDF and produces larger files when using Unicode fonts, but supports CSS styles etc. and has a lot of enhancements. Supports almost all languages, including RTL (Arabic and Hebrew) and CJK (Chinese, Japanese and Korean). Supports nested block-level elements (such as P, DIV),

Dreamweaver CS6
Visual web development tools

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

ZendStudio 13.5.1 Mac
Powerful PHP integrated development environment