This document provides an overview of object-oriented programming concepts in Java, including naming conventions, data types, variables, data hiding, abstraction, encapsulation, inheritance relationships, method signatures, polymorphism, constructors, and wrapper classes. It defines each concept and provides examples. For instance, it explains that naming conventions establish readability rules for identifiers, abstraction hides unnecessary details while exposing essential features, encapsulation allows objects to contain related properties and methods, and inheritance allows objects to acquire properties of other objects.
oops concept in java | object oriented programming in javaCPD INDIA
object oriented programming is a key concept for the development of application in windows as well as web based application environment. oops concept maps real world through its concept of classes, objects, inheritance, polymorphism which help in making a robust application.
Interface in java By Dheeraj Kumar Singhdheeraj_cse
In Java,
An interface is a way through which unrelated objects use to interact with one another.
Using interface, you can specify what a class must do, but not how it does it.
It is not a class but a set of requirements for classes that implement the interface.
oops concept in java | object oriented programming in javaCPD INDIA
object oriented programming is a key concept for the development of application in windows as well as web based application environment. oops concept maps real world through its concept of classes, objects, inheritance, polymorphism which help in making a robust application.
Interface in java By Dheeraj Kumar Singhdheeraj_cse
In Java,
An interface is a way through which unrelated objects use to interact with one another.
Using interface, you can specify what a class must do, but not how it does it.
It is not a class but a set of requirements for classes that implement the interface.
Object-Oriented Thinking- A way of viewing world – Agents and Communities, messages and methods, Responsibilities, Classes and Instances, Class Hierarchies- Inheritance, Method binding, Overriding and Exceptions, Summary of Object-Oriented concepts. Java buzzwords, An Overview of Java, Data types, Variables and Arrays, operators, expressions, control statements, Introducing classes, Methods and Classes, String handling.
Inheritance– Inheritance concept, Inheritance basics, Member access, Constructors, Creating Multilevel hierarchy, super uses, using final with inheritance, Polymorphism-ad hoc polymorphism, pure polymorphism, method overriding, abstract classes, Object class, forms of inheritance specialization, specification, construction, extension, limitation, combination, benefits of inheritance, costs of inheritance
Chapter 01 Introduction to Java by Tushar B KuteTushar B Kute
The lecture was condcuted by Tushar B Kute at YCMOU, Nashik through VLC orgnanized by MSBTE. The contents can be found in book "Core Java Programming - A Practical Approach' by Laxmi Publications.
Object-Oriented Thinking- A way of viewing world – Agents and Communities, messages and methods, Responsibilities, Classes and Instances, Class Hierarchies- Inheritance, Method binding, Overriding and Exceptions, Summary of Object-Oriented concepts. Java buzzwords, An Overview of Java, Data types, Variables and Arrays, operators, expressions, control statements, Introducing classes, Methods and Classes, String handling.
Inheritance– Inheritance concept, Inheritance basics, Member access, Constructors, Creating Multilevel hierarchy, super uses, using final with inheritance, Polymorphism-ad hoc polymorphism, pure polymorphism, method overriding, abstract classes, Object class, forms of inheritance specialization, specification, construction, extension, limitation, combination, benefits of inheritance, costs of inheritance
Chapter 01 Introduction to Java by Tushar B KuteTushar B Kute
The lecture was condcuted by Tushar B Kute at YCMOU, Nashik through VLC orgnanized by MSBTE. The contents can be found in book "Core Java Programming - A Practical Approach' by Laxmi Publications.
Apresentação sobre Arquitetura de Informação feita por Flávia Scudeler, Designer na agência Princi Web.
Informações baseadas no workshop de Arquitetura de Informação de Vinícius Krause, em Campinas.
Intervento inserito nella sezione "Operare con gli Open Data", sul tema "Educare alla cittadinanza digitale: portare a scuola il tema dell'open data" Roma 2013
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
3. Naming Conventions
It is a rule to follow while naming an identifier (e.g. class, package, variable, method, etc.).
By using them readability increases.
Class name: should begin with uppercase and should be a noun.
Interface name: should begin with uppercase and should be an adjective.
Method name: should begin with lowercase and should be a proverb, second word first
character should be capital.
Variable name: should begin with lowercase, second word first character should be a
capital.
Package name: should be completely in lowercase.
Constants name: should be completely in uppercase.
4. Data Types
Java supports UNICODE character set. Hence, each character is represented in two bytes.
In java every variable has a type, every expression has a type and all assignments should be
checked by the compiler for type compatibility. Hence, java is treated as strongly typed
language.
We are having 8 primitive data types.
These data types fall under 3 categories.
Numeric Data types
Character Data types
Boolean Data types
5. Data Types (cont.)
Numeric Data types
Integer Data types
Byte – 1 byte
Short – 2 bytes
Int – 4 bytes
Long – 8 bytes
Floating point Data types
Float – 4 bytes
Double – 8 bytes
Character Data types
char – 2 bytes
Boolean Data Types
Boolean – 1 bit
6. Variables
Variable is name of a memory location.
Types of variables
There are three types of variables
Local variables
Variables that are declared inside a method
Instance variables
Variables declared in class outside the methods.
Static variables
Variables declared in class outside the methods with static keyword.
7. Data Hiding
Providing security to the data. ie., No outsider can access the data.
By using the private modifier, we can implement the data hiding mechanism.
class User
{
private String password = “password”;
}
8. Abstraction
Is the process of hiding the unnecessary details and exposing only the essential
features of a particular object.
Hiding internal implementation details & just highlight the set of services what
we are offering, is called “Abstraction”.
E.g. Car.
Logic of car is abstract to you.
You just know how to use it.
In the same way java methods
internal details need not be
known to you, still you can use it.
9. Encapsulation
Encapsulation is the ability of an object to be a container for related properties and methods.
E.g. Cars and their owners
All the functions of cars are encapsulated with owners
No one else can access it.
class Student{
private name;
public String getName(){
return name;
}
Public void setName(String name){
this.name=name;
}
}
10. IS-A Relationship
Is nothing but inheritance
By using extends keyword we can implement IS-A relationship.
The main advantage of the IS-A relationship is re-usability.
class A{
public void m1(){
…….
}
class B extends A{
public void m2(){
……...
}
11. HAS-A Relationship
HAS-A relation ship is also known as composition or aggregation.
There is no specific keyword to implement HAS-A relationship. We are using the new
keyword.
The main advantage of Has-A relationship is Re-usability.
And one disadvantage of HAS-A relationship is it increases dependency between the
classes and creates maintenance problems.
class car{
Engine e =new Engine();
}
class Engine{
// Engine specific functionality
}
12. Method Signature
Method signature consists of name of the method & argument-list.
The first line written in the method definition is said to be the method signature.
public void m1 (int i, float p)
m1(int ,float)
The return type is not part of the method signature.
Compiler will always use method signature while resolving method calls.
With in the same class two methods with the same signature not allowed other wise we will get
compile time error.
13. Method Signature (cont..)
class A{
public void m1(int i){
}
public int m1(int i){
}
}
class Test{
public static void main(String[] args){
A a=new A();
}
Compile Error : method m1(int)
is already defined in class Test
14. Inheritance
An object of a class acquiring the properties of an object of another class is called
inheritance.
Uses :
Method Overloading
Code Reusability
Types
Single
Multi Level
Hierarchical
Multiple
16. Polymorphism
Polymorphism is brought up from a greek word which means having more forms.
There are two types of polymorphism.
Static Polymorphism
Dynamic Polymorphism.
Static polymorphism is achieved with the help of method overloading.
Dynamic polymorphism is achieved with the help of method over riding.
17. Static Polymorphism
Two methods are said to be overloaded iff method names are same but arguments
are different.
This concept in java simplifies the programming.
E.g. : System.out.println();
18. Dynamic Polymorphism
Method overriding takes place between two IS-A relation dependant classes
having methods with the same signature and same name.
Method over riding is also known as “runtime polymorphism or dynamic
polymorphism or late binding.
Over riding method resolution is also known as “Dynamic method dispatch@.
Rules :
Method signatures must be matched.
Parent class final method cannot be over ridden.
Private methods are not visible in the child classes. Hence over riding concept is not applicable
for private methods.
19. Differences
Property Overloading Overriding
Arguments Must be different Must be same
Method Signature Must be different Must be same
Return type No restrictions Must be same until 1.4
Private, static & final
methods
Can be overloaded Cannot be overloaded
Access Modifiers No restrictions We can’t decrease scope
Throws Clause No restrictions We can decrease the size and
level for checked exceptions
Method Resolutions Always taken care by
compiler based on reference
type.
Always takes care by jvm
based on runtime object.
20. Constructors
A special method in a class, having the same name as class without any return type.
Constructor is executed when a class is instantiated, i.e. an object is created.
Constructors cannot be called explicitly.
Used to initialize an object i.e. initialize instance variables as well as class variables.
Compiler provides default constructor if the programmer doesn’t provide a constructor.
If a constructor is specified by the programmer, then compiler doesn’t provide the default
constructor.
More than one constructor can be specified in a class, this concept is known as constructor
overloading.
The default constructor initializes the instance variables and class variables with default values.
To calculate dynamically how much memory is needed by the object, constructor is used.
21. Wrapper Classes
Java uses primitive types, such as int, char, double to hold the basic data types
supported by the language.
Sometimes it is required to create an object representation of these primitive types.
These classes need to wrap the primitive types in a class.
To satisfy this need, java provides classes that correspond to each of the primitive
types.
Basically, these classes encapsulate, or wrap, the primitive types within a class.
Thus, they are commonly referred to as type wrapper. Type wrapper are classes
that encapsulate a primitive type within an object.
The wrapper types are Byte, Short, Integer, Long, Character, Boolean, Double,
Float.
22. Important Interview Questions
What is hash code?
How can you find the hash code of an object
Can you declare class as private? Why?
When is constructor called? Before or after creating the object?
What is constructor overloading?
Difference between float and double?
Why do we need wrapper classes?
What is boxing and unboxing?