Packages- Defining a Package, CLASSPATH, Access protection, importing packages. Interfaces- defining an interface, implementing interfaces, Nested interfaces, applying interfaces, variables in interfaces and extending interfaces.
Stream based I/O (java.io) – The Stream classes-Byte streams and Character streams, Reading console Input and Writing Console Output, File class, Reading and writing Files, Random access file operations, The Console class, Serialization, Enumerations, auto boxing, generics.
Packages- Defining a Package, CLASSPATH, Access protection, importing packages. Interfaces- defining an interface, implementing interfaces, Nested interfaces, applying interfaces, variables in interfaces and extending interfaces.
Stream based I/O (java.io) – The Stream classes-Byte streams and Character streams, Reading console Input and Writing Console Output, File class, Reading and writing Files, Random access file operations, The Console class, Serialization, Enumerations, auto boxing, generics.
Object-oriented programming (OOP) refers to a type of computer programming (software design) in which programmers define the data type of a data structure, and also the types of operations (functions) that can be applied to the data structure.
java notes, object oriented programming using java, java tutorial, lecture notes, java programming notes, java example programs, java programs with explanation, java source code with output, java programs, java coding, java codes, java slides, java notes,packages in java, java packages notes, java packages notes,different types of packages in Java,packages with an example, packages in Java
Abstract Class In Java | Java Abstract Class Tutorial | Java Tutorial For Beg...Simplilearn
Abstraction is one of the keys to achieving the Object-Oriented Programming approach to design, develop, and deploy software. This technique is really important and many developed intend to have a strong grip on it. This video will give you an idea about the best practices and suggestions that could help you to use abstract classes in Java.
About Simplilearn Java certification training course:
If you’re looking to master web application development for virtually any computing platform, this Java Certification Training course is for you. This all-in-one Java training will give you a firm foundation in Java, the most commonly used programming language in software development.
This advanced Java Certification Training course is designed to guide you through the concepts of Java from introductory techniques to advanced programming skills. The course will provide you with the knowledge of Core Java 8, operators, arrays, loops, methods, and constructors while giving you hands-on experience in JDBC and JUnit framework.
Java Certification Course Key Features:
1. 70 hours of blended training
2. Hands-on coding and implementation of two web-based projects
3. Includes Hibernate and Spring frameworks
4. 35 coding-related exercises on Core Java 8
5. Lifetime access to self-paced learning
6. Flexibility to choose classes
Eligibility:
Simplilearn’s Java Certification Training course is ideal for software developers, web designers, programming enthusiasts, engineering graduates, and students or professionals who wish to become Java developers.
Pre-requisites:
Prior knowledge of Core Java is a prerequisite to taking this advanced Java Certification training course. Our Core Java online self-paced course is available for free to become familiar with the basics of Java programming.
Learn more at: https://bit.ly/3b6SCvp
This is a presentation I did for the Cedar Rapids .NET User Group (CRineta.org). It was intended to present object oriented concepts and their application in .NET and C#.
Interface in java By Dheeraj Kumar Singhdheeraj_cse
In Java,
An interface is a way through which unrelated objects use to interact with one another.
Using interface, you can specify what a class must do, but not how it does it.
It is not a class but a set of requirements for classes that implement the interface.
defination for object oriented programming,concept for oops,defination for class,object,member variable,member function,inheritance,parentclass and child class defination,polymorphism,overloading,dataabstraction,encapsulation,constructor and destructor,interfaces and rules,abstract class,object cloning
Object-oriented programming (OOP) refers to a type of computer programming (software design) in which programmers define the data type of a data structure, and also the types of operations (functions) that can be applied to the data structure.
java notes, object oriented programming using java, java tutorial, lecture notes, java programming notes, java example programs, java programs with explanation, java source code with output, java programs, java coding, java codes, java slides, java notes,packages in java, java packages notes, java packages notes,different types of packages in Java,packages with an example, packages in Java
Abstract Class In Java | Java Abstract Class Tutorial | Java Tutorial For Beg...Simplilearn
Abstraction is one of the keys to achieving the Object-Oriented Programming approach to design, develop, and deploy software. This technique is really important and many developed intend to have a strong grip on it. This video will give you an idea about the best practices and suggestions that could help you to use abstract classes in Java.
About Simplilearn Java certification training course:
If you’re looking to master web application development for virtually any computing platform, this Java Certification Training course is for you. This all-in-one Java training will give you a firm foundation in Java, the most commonly used programming language in software development.
This advanced Java Certification Training course is designed to guide you through the concepts of Java from introductory techniques to advanced programming skills. The course will provide you with the knowledge of Core Java 8, operators, arrays, loops, methods, and constructors while giving you hands-on experience in JDBC and JUnit framework.
Java Certification Course Key Features:
1. 70 hours of blended training
2. Hands-on coding and implementation of two web-based projects
3. Includes Hibernate and Spring frameworks
4. 35 coding-related exercises on Core Java 8
5. Lifetime access to self-paced learning
6. Flexibility to choose classes
Eligibility:
Simplilearn’s Java Certification Training course is ideal for software developers, web designers, programming enthusiasts, engineering graduates, and students or professionals who wish to become Java developers.
Pre-requisites:
Prior knowledge of Core Java is a prerequisite to taking this advanced Java Certification training course. Our Core Java online self-paced course is available for free to become familiar with the basics of Java programming.
Learn more at: https://bit.ly/3b6SCvp
This is a presentation I did for the Cedar Rapids .NET User Group (CRineta.org). It was intended to present object oriented concepts and their application in .NET and C#.
Interface in java By Dheeraj Kumar Singhdheeraj_cse
In Java,
An interface is a way through which unrelated objects use to interact with one another.
Using interface, you can specify what a class must do, but not how it does it.
It is not a class but a set of requirements for classes that implement the interface.
defination for object oriented programming,concept for oops,defination for class,object,member variable,member function,inheritance,parentclass and child class defination,polymorphism,overloading,dataabstraction,encapsulation,constructor and destructor,interfaces and rules,abstract class,object cloning
OCP Java (OCPJP) 8 Exam Quick Reference CardHari kiran G
If you are preparing to appear for Oracle Certified Professional Java SE 8 Programmer (OCPJP 8) certification exam, this a reference card (sort of long cheat sheet) meant to help you. You may want to print this reference card for your easy and quick reference when you prepare for your exam.
Java Programming Source code is first written in plain text files ending with the .java extension. Source files are then compiled into .class files by the javac compiler. A .class file does not contain code that is native to your processor; it i.
First Steps with Globus Compute Multi-User EndpointsGlobus
In this presentation we will share our experiences around getting started with the Globus Compute multi-user endpoint. Working with the Pharmacology group at the University of Auckland, we have previously written an application using Globus Compute that can offload computationally expensive steps in the researcher's workflows, which they wish to manage from their familiar Windows environments, onto the NeSI (New Zealand eScience Infrastructure) cluster. Some of the challenges we have encountered were that each researcher had to set up and manage their own single-user globus compute endpoint and that the workloads had varying resource requirements (CPUs, memory and wall time) between different runs. We hope that the multi-user endpoint will help to address these challenges and share an update on our progress here.
How Recreation Management Software Can Streamline Your Operations.pptxwottaspaceseo
Recreation management software streamlines operations by automating key tasks such as scheduling, registration, and payment processing, reducing manual workload and errors. It provides centralized management of facilities, classes, and events, ensuring efficient resource allocation and facility usage. The software offers user-friendly online portals for easy access to bookings and program information, enhancing customer experience. Real-time reporting and data analytics deliver insights into attendance and preferences, aiding in strategic decision-making. Additionally, effective communication tools keep participants and staff informed with timely updates. Overall, recreation management software enhances efficiency, improves service delivery, and boosts customer satisfaction.
Developing Distributed High-performance Computing Capabilities of an Open Sci...Globus
COVID-19 had an unprecedented impact on scientific collaboration. The pandemic and its broad response from the scientific community has forged new relationships among public health practitioners, mathematical modelers, and scientific computing specialists, while revealing critical gaps in exploiting advanced computing systems to support urgent decision making. Informed by our team’s work in applying high-performance computing in support of public health decision makers during the COVID-19 pandemic, we present how Globus technologies are enabling the development of an open science platform for robust epidemic analysis, with the goal of collaborative, secure, distributed, on-demand, and fast time-to-solution analyses to support public health.
Large Language Models and the End of ProgrammingMatt Welsh
Talk by Matt Welsh at Craft Conference 2024 on the impact that Large Language Models will have on the future of software development. In this talk, I discuss the ways in which LLMs will impact the software industry, from replacing human software developers with AI, to replacing conventional software with models that perform reasoning, computation, and problem-solving.
Advanced Flow Concepts Every Developer Should KnowPeter Caitens
Tim Combridge from Sensible Giraffe and Salesforce Ben presents some important tips that all developers should know when dealing with Flows in Salesforce.
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Anthony Dahanne
Les Buildpacks existent depuis plus de 10 ans ! D’abord, ils étaient utilisés pour détecter et construire une application avant de la déployer sur certains PaaS. Ensuite, nous avons pu créer des images Docker (OCI) avec leur dernière génération, les Cloud Native Buildpacks (CNCF en incubation). Sont-ils une bonne alternative au Dockerfile ? Que sont les buildpacks Paketo ? Quelles communautés les soutiennent et comment ?
Venez le découvrir lors de cette session ignite
Code reviews are vital for ensuring good code quality. They serve as one of our last lines of defense against bugs and subpar code reaching production.
Yet, they often turn into annoying tasks riddled with frustration, hostility, unclear feedback and lack of standards. How can we improve this crucial process?
In this session we will cover:
- The Art of Effective Code Reviews
- Streamlining the Review Process
- Elevating Reviews with Automated Tools
By the end of this presentation, you'll have the knowledge on how to organize and improve your code review proces
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...Juraj Vysvader
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I didn't get rich from it but it did have 63K downloads (powered possible tens of thousands of websites).
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Globus
The Earth System Grid Federation (ESGF) is a global network of data servers that archives and distributes the planet’s largest collection of Earth system model output for thousands of climate and environmental scientists worldwide. Many of these petabyte-scale data archives are located in proximity to large high-performance computing (HPC) or cloud computing resources, but the primary workflow for data users consists of transferring data, and applying computations on a different system. As a part of the ESGF 2.0 US project (funded by the United States Department of Energy Office of Science), we developed pre-defined data workflows, which can be run on-demand, capable of applying many data reduction and data analysis to the large ESGF data archives, transferring only the resultant analysis (ex. visualizations, smaller data files). In this talk, we will showcase a few of these workflows, highlighting how Globus Flows can be used for petabyte-scale climate analysis.
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?XfilesPro
Worried about document security while sharing them in Salesforce? Fret no more! Here are the top-notch security standards XfilesPro upholds to ensure strong security for your Salesforce documents while sharing with internal or external people.
To learn more, read the blog: https://www.xfilespro.com/how-does-xfilespro-make-document-sharing-secure-and-seamless-in-salesforce/
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Globus
Large Language Models (LLMs) are currently the center of attention in the tech world, particularly for their potential to advance research. In this presentation, we'll explore a straightforward and effective method for quickly initiating inference runs on supercomputers using the vLLM tool with Globus Compute, specifically on the Polaris system at ALCF. We'll begin by briefly discussing the popularity and applications of LLMs in various fields. Following this, we will introduce the vLLM tool, and explain how it integrates with Globus Compute to efficiently manage LLM operations on Polaris. Attendees will learn the practical aspects of setting up and remotely triggering LLMs from local machines, focusing on ease of use and efficiency. This talk is ideal for researchers and practitioners looking to leverage the power of LLMs in their work, offering a clear guide to harnessing supercomputing resources for quick and effective LLM inference.
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Globus
The U.S. Geological Survey (USGS) has made substantial investments in meeting evolving scientific, technical, and policy driven demands on storing, managing, and delivering data. As these demands continue to grow in complexity and scale, the USGS must continue to explore innovative solutions to improve its management, curation, sharing, delivering, and preservation approaches for large-scale research data. Supporting these needs, the USGS has partnered with the University of Chicago-Globus to research and develop advanced repository components and workflows leveraging its current investment in Globus. The primary outcome of this partnership includes the development of a prototype enterprise repository, driven by USGS Data Release requirements, through exploration and implementation of the entire suite of the Globus platform offerings, including Globus Flow, Globus Auth, Globus Transfer, and Globus Search. This presentation will provide insights into this research partnership, introduce the unique requirements and challenges being addressed and provide relevant project progress.
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar
The European Union Agency for Law Enforcement Cooperation (Europol) has suffered an alleged data breach after a notorious threat actor claimed to have exfiltrated data from its systems. Infamous data leaker IntelBroker posted on the even more infamous BreachForums hacking forum, saying that Europol suffered a data breach this month.
The alleged breach affected Europol agencies CCSE, EC3, Europol Platform for Experts, Law Enforcement Forum, and SIRIUS. Infiltration of these entities can disrupt ongoing investigations and compromise sensitive intelligence shared among international law enforcement agencies.
However, this is neither the first nor the last activity of IntekBroker. We have compiled for you what happened in the last few days. To track such hacker activities on dark web sources like hacker forums, private Telegram channels, and other hidden platforms where cyber threats often originate, you can check SOCRadar’s Dark Web News.
Stay Informed on Threat Actors’ Activity on the Dark Web with SOCRadar!
Designing for Privacy in Amazon Web ServicesKrzysztofKkol1
Data privacy is one of the most critical issues that businesses face. This presentation shares insights on the principles and best practices for ensuring the resilience and security of your workload.
Drawing on a real-life project from the HR industry, the various challenges will be demonstrated: data protection, self-healing, business continuity, security, and transparency of data processing. This systematized approach allowed to create a secure AWS cloud infrastructure that not only met strict compliance rules but also exceeded the client's expectations.
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Hivelance Technology
Cryptocurrency trading bots are computer programs designed to automate buying, selling, and managing cryptocurrency transactions. These bots utilize advanced algorithms and machine learning techniques to analyze market data, identify trading opportunities, and execute trades on behalf of their users. By automating the decision-making process, crypto trading bots can react to market changes faster than human traders
Hivelance, a leading provider of cryptocurrency trading bot development services, stands out as the premier choice for crypto traders and developers. Hivelance boasts a team of seasoned cryptocurrency experts and software engineers who deeply understand the crypto market and the latest trends in automated trading, Hivelance leverages the latest technologies and tools in the industry, including advanced AI and machine learning algorithms, to create highly efficient and adaptable crypto trading bots
In software engineering, the right architecture is essential for robust, scalable platforms. Wix has undergone a pivotal shift from event sourcing to a CRUD-based model for its microservices. This talk will chart the course of this pivotal journey.
Event sourcing, which records state changes as immutable events, provided robust auditing and "time travel" debugging for Wix Stores' microservices. Despite its benefits, the complexity it introduced in state management slowed development. Wix responded by adopting a simpler, unified CRUD model. This talk will explore the challenges of event sourcing and the advantages of Wix's new "CRUD on steroids" approach, which streamlines API integration and domain event management while preserving data integrity and system resilience.
Participants will gain valuable insights into Wix's strategies for ensuring atomicity in database updates and event production, as well as caching, materialization, and performance optimization techniques within a distributed system.
Join us to discover how Wix has mastered the art of balancing simplicity and extensibility, and learn how the re-adoption of the modest CRUD has turbocharged their development velocity, resilience, and scalability in a high-growth environment.
Your Digital Assistant.
Making complex approach simple. Straightforward process saves time. No more waiting to connect with people that matter to you. Safety first is not a cliché - Securely protect information in cloud storage to prevent any third party from accessing data.
Would you rather make your visitors feel burdened by making them wait? Or choose VizMan for a stress-free experience? VizMan is an automated visitor management system that works for any industries not limited to factories, societies, government institutes, and warehouses. A new age contactless way of logging information of visitors, employees, packages, and vehicles. VizMan is a digital logbook so it deters unnecessary use of paper or space since there is no requirement of bundles of registers that is left to collect dust in a corner of a room. Visitor’s essential details, helps in scheduling meetings for visitors and employees, and assists in supervising the attendance of the employees. With VizMan, visitors don’t need to wait for hours in long queues. VizMan handles visitors with the value they deserve because we know time is important to you.
Feasible Features
One Subscription, Four Modules – Admin, Employee, Receptionist, and Gatekeeper ensures confidentiality and prevents data from being manipulated
User Friendly – can be easily used on Android, iOS, and Web Interface
Multiple Accessibility – Log in through any device from any place at any time
One app for all industries – a Visitor Management System that works for any organisation.
Stress-free Sign-up
Visitor is registered and checked-in by the Receptionist
Host gets a notification, where they opt to Approve the meeting
Host notifies the Receptionist of the end of the meeting
Visitor is checked-out by the Receptionist
Host enters notes and remarks of the meeting
Customizable Components
Scheduling Meetings – Host can invite visitors for meetings and also approve, reject and reschedule meetings
Single/Bulk invites – Invitations can be sent individually to a visitor or collectively to many visitors
VIP Visitors – Additional security of data for VIP visitors to avoid misuse of information
Courier Management – Keeps a check on deliveries like commodities being delivered in and out of establishments
Alerts & Notifications – Get notified on SMS, email, and application
Parking Management – Manage availability of parking space
Individual log-in – Every user has their own log-in id
Visitor/Meeting Analytics – Evaluate notes and remarks of the meeting stored in the system
Visitor Management System is a secure and user friendly database manager that records, filters, tracks the visitors to your organization.
"Secure Your Premises with VizMan (VMS) – Get It Now"
Why React Native as a Strategic Advantage for Startup Innovation.pdfayushiqss
Do you know that React Native is being increasingly adopted by startups as well as big companies in the mobile app development industry? Big names like Facebook, Instagram, and Pinterest have already integrated this robust open-source framework.
In fact, according to a report by Statista, the number of React Native developers has been steadily increasing over the years, reaching an estimated 1.9 million by the end of 2024. This means that the demand for this framework in the job market has been growing making it a valuable skill.
But what makes React Native so popular for mobile application development? It offers excellent cross-platform capabilities among other benefits. This way, with React Native, developers can write code once and run it on both iOS and Android devices thus saving time and resources leading to shorter development cycles hence faster time-to-market for your app.
Let’s take the example of a startup, which wanted to release their app on both iOS and Android at once. Through the use of React Native they managed to create an app and bring it into the market within a very short period. This helped them gain an advantage over their competitors because they had access to a large user base who were able to generate revenue quickly for them.
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTier1 app
Even though at surface level ‘java.lang.OutOfMemoryError’ appears as one single error; underlyingly there are 9 types of OutOfMemoryError. Each type of OutOfMemoryError has different causes, diagnosis approaches and solutions. This session equips you with the knowledge, tools, and techniques needed to troubleshoot and conquer OutOfMemoryError in all its forms, ensuring smoother, more efficient Java applications.
2. • Introduction to OOPS
• Class and Object
• Encapsulation
• Inheritance
• Polymorphism
• Interfaces
• Delegate
• Access Modifiers
• Namespace
Agenda
3. About OOPS
OOPS is a programming language organized around objects (data) rather than action
and logic.
It is composed of self sufficient modules (“Class”), each instance (“Object”)
contains information to manipulate its data (“Members”)
Four main features of OOPS are
• Abstraction
• Encapsulation
• Polymorphism
• Inheritance
4. Object and Class
• Object is an instance of a class
• Object has state, behavior, and identity
• Object can be created by using the NEW keyword
• Communicates with other objects through message passing
Object
• It is a user defined data type
• In OOP you program a class as a template for a specific object
or groups ob objects that will always have the same features.
• Other types of classes
• Abstract class
• Static class
Class
5. Encapsulation
Encapsulation is the process of binding/wrapping
the data and methods into a single entity
Encapsulation is realized through the classes.
Encapsulation guarantees the integrity of the data
in the object
Three main parts of Object
• Interface
• Implementation or Behavior
• Member or Instance variables
6. Access modifiers
are used to
implement
encapsulation
It reduces system
complexity and
thus increases
robustness, by
limiting the
interdependencies
Abstraction is
achieved through
encapsulation
Object and
Properties are
examples for
encapsulation
7. Inheritance
Inheritance is a way to form new CLASSES using classes that have
already been.
Inheritance is employed to help REUSE existing code with little or no
modification.
The new classes, known as Sub-classes (or derived classes), inherit
attributes and behavior of the pre-existing classes, which are referred to
as Super-classes (or ancestor classes).
The inheritance relationship of SUB and SUPER CLASSES gives rise to a
HIERARCHY.
8. Inheritance
Purpose
• Reuse, extend, and modify the
behavior defined in other
classes
• Allows to build a hierarchy of
related classes
Only single inheritance is allowed
in .NET
Three types of inheritance
• Implementation
• Interface
• Visual
To avoid inheritance, we need to
use ‘sealed’ keyword
9. Polymorphism
Many forms of a single object is
called Polymorphism.
Polymorphism is important not
only to the derived classes, but
to the base classes as well.
It allows you to invoke methods
of derived class through base
class reference during runtime.
It has the ability for classes to
provide different
implementations of methods that
are called through the same
name.
10. Polymorphism Contd…
Polymorphism is of two types:
• Compile time polymorphism/Overloading
• Runtime polymorphism/Overriding
Compile Time Polymorphism
• Compile time polymorphism is method and operators
overloading. It is also called early binding.
• In method overloading method performs the
different task at the different input parameters.
11. Polymorphism Contd…
• Runtime time polymorphism is done
using inheritance and virtual
functions. Method overriding is
called runtime polymorphism. It is
also called late binding.
• When overriding a method, you
change the behavior of the method
for the derived class. Overloading
a method simply involves having
another method with the same
prototype.
When and why to use method
overloading ?
Runtime Time
Polymorphism
12. Function Overloading
Using same
name for
two or more
functions
Functions
should differ
with the
function
signature
Function
signature is
1.Number of
parameters
2.Different
data types of
parameters
3.Sequence of
parameters
Return type
is NOT part
of function
signature
13. Operator overloading
Using
• Static member
functions using the
operator keyword
Syntax
• <access modifier>
<Class Name>
operator <operator
symbol> (parameter
list)
• {
• .Do something
• }
Few types of
operator overloading
• Unary operator
overloading
• Binary operator
overloading
14. Abstract class
Purpose of an abstract class is to provide a common
definition of a base class
An abstract class cannot be instantiated
Abstract classes may also define abstract methods
Use abstract keyword
Abstract methods have no implementation
Use override keyword to implement abstract methods
15. Virtual members
Virtual members enable derived classes to extend a base class
Base class member should use virtual and derived class member should use
override
Fields cannot be virtual
16. Override virtual members in the base class
Inherit base class method without overriding it
Define new non-virtual implementation that hide the base class
implementations
The derived class can choose whether to
17. Interfaces
Interfaces describe a group of related functionalities
Interfaces are defined by using the INTERFACE keyword
Non-abstract type inheriting the interface must implement all its
members
Interfaces contain no implementation of methods
An interface cannot be instantiated directly
18. Interfaces Contd…
Classes can inherit from more
than one interface
An interface can itself inherit
from multiple interfaces
Interfaces members are
automatically public
The member of class
implementing interface member
must be of the following
• Public and non-static
• Same name and signature
19. Difference
Abstract Class Interface
Abstract class may contain concrete
methods
Interface contains methods that must
be abstract
Abstract class may contain non-public
members.
Members in an interface are public by
default
whereas abstract class is used to
"extends".
Interface is used to "implements";
Single inheritance Multiple inheritance
Abstract class can "extends" another
class and "implements" multiple
interfaces.
Interface can "extends" another
interface
One class can only "extends" one
super class
interface is more flexible than
abstract class because it "implements"
multiple interfaces.
Any class can extend an abstract
class.
only an interface can extend another
interface
21. Delegates Contd…
Multi cast delegate
• Refer to multiple methods
of matching signature
• Derived from
System.MulticastDelegate
class
• Example: to call two
methods on a button click
event
Steps to use delegates
• Declare a delegate with a
function signature
• Instantiate the declared
delegate
• Use the delegate to
execute a function
22. Access Modifiers
All types and type members have
an accessibility level
which controls whether they can
be used from other code in your
assembly or other assemblies.
Access modifiers are
determined by the scope of
visibility for variables and
methods.
Used to implement encapsulation
and abstraction
23. Access Modifiers
Types of access
modifiers
• private
• public
• protected
• internal
• internal
protected
Default access
modifier for class
is internal
Default access
modifier for data
member is private
24. Namespace
The namespace keyword is used to declare a scope.
This namespace scope lets you organize code and
gives you a way to create globally unique types.
Within a namespace, you can declare one or more of the following types:
1.another namespace
2.class
3.interface
4.struct
5.enum
6.Delegate
25. namespace Name1
{
class A {}
}
namespace Name2
{
class A {}
}
We can also use nested namespace
namespace csharp_example
{
// Program start class
class NamespaceCE
{
// Main begins program execution.
public static void Main()
{
// Write to console
Console.WriteLine("This is the new C# Example Namespace.");
}
}
}
Namespace Example