Describe the four levels of access protection, JAVA Programming

Assignment Help:

Describe the Four Levels of Access Protection ?

Any two various Java objects have one of four relations to each other. The four relations are:
• The objects are in the similar class.
• One object is a subclass of the other object's class.
• The objects are in the similar package.
• None of the above. (Both objects are members of the general public.)

These relationships are not mutually exclusive. One object could be a subclass of another object in the similar package, for example.
You can describe that of your class's members that is its fields and its methods, are accessible to other objects in each of these four groups, associative to the current class.

If you need any object at all to be able to call a techniques or change a field, declare it public.
If you want only objects in the similar class to be able to get or set the value of a field or invoke a method, declare it private.
If you need access restricted to subclasses and members of the similar package, declare it protected.
At last, to restrict access only to objects in the similar package, use no access declaration at all. This is known as "package" or "default" access, but it has no keyword. The default keyword means something else whole.
Can anyone remember what?

By default, all classes you write are in the similar package. Therefore, they are in different packages from the Java classes like System or Applet.

The public fields and techniques of an object can be accessed from anywhere the object itself can be seen. Anyone can touch an object's public members. They should be kept to a minimum. Public fields should associate very closely to the core functionality of the class. They should not show intimate details of the inner workings of the class. Except in very simple instances fields should probably not be public.

The private fields and methods of an object can only be accessed by the object itself and by other objects of the same class (siblings). An object may touch its sibling's private parts. A sibling is an object in the same class but which is not the same object.


Related Discussions:- Describe the four levels of access protection

Java collection framework., #question.Write a program that computes the edi...

#question.Write a program that computes the edit distance (also called the Levenshtein distance, for its creator Vladimir Levenshtein) between two words. The edit distance between

Program to read a keyboard value and exit from the code, Using the above t...

Using the above thread program, now create 20 threads in your program and run them. No need to wait for the keyboard in each thread, just print "Hello" and its thread id in each t

Define object lock and which kinds of object have locks, What do you think ...

What do you think about an object's lock and which kinds of object's have locks?

What is the set interface, What is the Set interface? A Set interface i...

What is the Set interface? A Set interface is collection of element that can't be duplicated. Set interface comprise methods inherited from collection. It provides method

Rmi-iiop support dynamic downloading of classes, Does RMI-IIOP support dyna...

Does RMI-IIOP support dynamic downloading of classes? Ans) No, RMI-IIOP doesn't support dynamic downloading of the classes as it is complete with CORBA in DII (Dynamic Interface

Why we avoiding short circuits, Why we Avoiding Short Circuits ? If you...

Why we Avoiding Short Circuits ? If you need all of your boolean expressions evaluated regardless of the truth value of each, then you can use & and | instead of && and ||. The

What is asynchronous messaging, What is asynchronous messaging? Queue An...

What is asynchronous messaging? Queue Ans) Asynchronous messaging includes a client that does not wait for a message from the server. An event is used to trigger a message from

Write a java console application, You are to write a Java console applicati...

You are to write a Java console application, following the Software Life Cycle model, which will read personnel records from a text file and store them in a data structure.  One li

program to brute force search, Introduction As an alternative to the B...

Introduction As an alternative to the Binary Search algorithm, also it could be done by the brute-force method given below. public static int rank(int key, int[] a) {     f

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd