SlideShare uma empresa Scribd logo
1 de 7
Baixar para ler offline
Java Modifiers Matrix

                               The most complete Java Modifiers Matrix on the web


                                                                   brought to you by:



                                                          http://www.JavaChamp.com




                                                            Authors: N. , Y. Ibrahim



                                                            Copyright (c) 2009-2010




JavaChamp.com Java Modifiers Matrix - Copyright 2009-2010 all rights reserved
Copyright 2009 JavaChamp.com

Online version published by JavaChamp.com Germany.

DISCLAIMER

All services and content of JavaChamp.com are provided under JavaChamp.com terms of use on an "as is" basis, without warranty of any kind, either expressed or
implied, including, without limitation, warranties that the provided services and content are free of defects, merchantable, fit for a particular purpose or non-
infringing. The entire risk as to the quality and performance of the provided services and content is with you. In no event shall JavaChamp.com be liable for any
damages whatsoever arising out of or in connection with the use or performance of the services. Should any provided services and content prove defective in any
respect, you (not the initial developer, author or any other contributor) assume the cost of any necessary servicing, repair or correction. This disclaimer of warranty
constitutes an essential part of these "terms of use". No use of any services and content of JavaChamp.com is authorized hereunder except under this disclaimer.

The detailed "terms of use" of JavaChamp.com can be found under:

http://www.javachamp.com/public/termsOfUse.xhtml



This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 license.

The full license legal code can be found under:
http://creativecommons.org/licenses/by-nc-nd/3.0/legalcode

And a human-readable summary of the this license can be found under:
http://creativecommons.org/licenses/by-nc-nd/3.0/

According to the Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 license You agree to the following:

You are free to share, copy, distribute and transmit the work under the following conditions:

• You must attribute the work to JavaChamp.com with a link to http://www.javachamp.com.
• You may not use this work for commercial purposes.
• You may not alter, transform, or build upon this work.



JavaChamp.com Java Modifiers Matrix - Copyright 2009-2010 all rights reserved
JavaChamp.com is an Open Certification Platform.


What does this mean?

JavaChamp is the best place to learn, share, and certify your professional skills.
We help you develop yourself in the field of computer science and programming

Here are the most significant features offered by JavaChamp:

Online Exams

Top quality mock exams for SCJP, SCEA, EJB, JMS, JPA.
Start Express or topic-wise customized exam.

    •   We offer you unlimited free mock exams
    •   Exams cover subjects like SCJP, SCEA, EJB, JMS, JPA,..
    •   You can take as many exams as you want and at any time and for no charges
    •   Each exam contains 20 multiple choice questions
    •   You can save the exams taken in your exams history
    •   Your exams history saves the exams you took, the scores you got, time took you to finish the exam,
        date of examination and also saves your answers to the questions for later revision
    •   You can re-take the same exam to monitor your progress
    •   Your exams history helps the system to offer you variant new questions every time you take a new exam,
        therefore we encourage you to register and maintain an exams history

Network

Find guidance through the maze, meet Study-Mates, Coaches or Trainees...
Studying together is fun, productive and helps you in building your professional network and collecting leads

Bookshelf

JavaChamp Bookshelf full of PDF eBooks...
Download PDF books with a selected sample of the JavaChamp question bank in SCJP, SCEA, EJB, JMS and more or read it online

JavaChamp Profile

You may publish your profile and connect to your colleagues and friends.



JavaChamp.com Java Modifiers Matrix - Copyright 2009-2010 all rights reserved
Content Channel

Be an Author and get recognition, leads, and more...
Contributing to the JavaChamp question bank will earn your recognition of your professional skills, expands your network, introduce you to potential leads

Join Us

Join the fast growing JavaChamp Community now.
JavaChamp Community is young and very dynamic, we would be thrilled to welcome you on board :o)




JavaChamp.com Java Modifiers Matrix - Copyright 2009-2010 all rights reserved
Java Modifiers Matrix:

The matrix is split into 3 categories:

    •   Access Modifiers
           •   public
           •   implicit package
           •   protected
           •   private

    •   Structural Modifiers
            •   final
            •   abstract
            •   static
            •   native

    •   Behavioral Modifiers
           •   strictfp
           •   transient / volatile
           •   synchronized

    Matrix symbols legend:

       Possible modifier choice
       Default modifier (java choice if not explicitly defined)
       Single choice (other modifiers are not allowed)




JavaChamp.com Java Modifiers Matrix - Copyright 2009-2010 all rights reserved
Access Modifiers                         Structural Modifiers                     Behavioral Modifiers

                                                            public    implicit   protected   private   final    abstract   static   native   strictfp     transient /   synchronized
                                                                     package                                                                                volatile
                                   Top level Class                                                                                         
                                   Class inside class                                                                                   
                      Class        Class inside Interface                                                                                  

                                   Class inside method /                                                                                     
                                   code block


                     Interface     Top level Interface                                                                                      

                                   Interface inside Class                                                                                

                                   Interface inside                                                                         
                                   method / code block

                     Code Block    Inside Class                                                                              

                                   Inside method                                                                                                                             


                                   Top level Enumeration               
                     enum
                                   Enum inside Class                                                                     

                                   Enum inside Interface                                                                    


                                   Class                                                                                                                            
                     Method
                                   Interface                                                                                                                               


                     Constructor   Class                                                    


                                   Class                                                                                                                
                     Data field    Interface                                                                               
                     (variable /
                                   Method argument /                                                    
                     constant)
                                   local or code block
                                   local




JavaChamp.com Java Modifiers Matrix - Copyright 2009-2010 all rights reserved
Java modifiers and access rules:

     •     If class A can't access class B, then class A can't access any member (method or variable) in class B.
     •     For a subclass outside the package, the protected member can be accessed only through inheritance.
     •     It is illegal to have even a single abstract method in a class that is not explicitly declared abstract!
     •     You can have an abstract class with no abstract methods.
     •     The first concrete subclass of an abstract class must implement all abstract methods of the super class.
     •     Initialization code block are not allowed in interfaces
     •     Inner classes in interfaces must be public static
     •     A member/(inner) interface can only be defined inside a top-level class or interface not inside methods
     •     Static data fields can only be declared in static or top level types



Method illegal modifiers combinations:

     •     abstract and final             @Compiler Error: The abstract method can only set a visibility modifier, one of public or protected
     •     abstract and private           @Compiler Error: The abstract method can only set a visibility modifier, one of public or protected
     •     abstract and static            @Compiler Error: illegal combination of modifiers: abstract and static
     •     transient and final / static   @Compiler Error: A transient variable may not be declared as final or static



Java member visibility rules across packages:

                                     Member Visibility Rules
                 Access from                                    Access to
     Package        Class/ Interface?        public     package       protected      private
 1                        same                                                      
 2                        inner                                                     
         same
 3                      subclass                                        
 4                        other                                         
 5                      subclass                                    inheritance
         other
 6                        other                




JavaChamp.com Java Modifiers Matrix - Copyright 2009-2010 all rights reserved

Mais conteúdo relacionado

Destaque

Java se 8 fundamentals
Java se 8 fundamentalsJava se 8 fundamentals
Java se 8 fundamentalsmegharajk
 
Java non access modifiers
Java non access modifiersJava non access modifiers
Java non access modifiersSrinivas Reddy
 
Visibility control in java
Visibility control in javaVisibility control in java
Visibility control in javaTech_MX
 
Object Oriented Programming with Java
Object Oriented Programming with JavaObject Oriented Programming with Java
Object Oriented Programming with Javabackdoor
 
Object Oriented Programming with Java
Object Oriented Programming with JavaObject Oriented Programming with Java
Object Oriented Programming with JavaJussi Pohjolainen
 
Markaların Logo Değişimleri
Markaların Logo  DeğişimleriMarkaların Logo  Değişimleri
Markaların Logo DeğişimleriYunus Emre
 
ShareCafé: Office365 - Efficiënt samenwerken met minimum aan kosten en comple...
ShareCafé: Office365 - Efficiënt samenwerken met minimum aan kosten en comple...ShareCafé: Office365 - Efficiënt samenwerken met minimum aan kosten en comple...
ShareCafé: Office365 - Efficiënt samenwerken met minimum aan kosten en comple...Orbit One - We create coherence
 
Krishna Printernational Corporate Presentation
Krishna Printernational Corporate PresentationKrishna Printernational Corporate Presentation
Krishna Printernational Corporate PresentationKrishna Printernational
 
Make It Your Own: Design A Makerspace for ALL WMS 2014 GaETC presentation
Make It Your Own: Design A Makerspace for ALL WMS 2014 GaETC presentationMake It Your Own: Design A Makerspace for ALL WMS 2014 GaETC presentation
Make It Your Own: Design A Makerspace for ALL WMS 2014 GaETC presentationWendy Cope
 
Innopolis ux course
Innopolis ux courseInnopolis ux course
Innopolis ux course404fest
 
I 70near Hays Ks
I 70near Hays KsI 70near Hays Ks
I 70near Hays KsPaul Melton
 
Home Projects (1)
Home Projects (1)Home Projects (1)
Home Projects (1)Paul Melton
 
Anglès
AnglèsAnglès
AnglèsCRRIIS
 

Destaque (20)

Lecture 8 Library classes
Lecture 8 Library classesLecture 8 Library classes
Lecture 8 Library classes
 
Java se 8 fundamentals
Java se 8 fundamentalsJava se 8 fundamentals
Java se 8 fundamentals
 
Java non access modifiers
Java non access modifiersJava non access modifiers
Java non access modifiers
 
Visibility control in java
Visibility control in javaVisibility control in java
Visibility control in java
 
Access modifiers in java
Access modifiers in javaAccess modifiers in java
Access modifiers in java
 
Inheritance and Polymorphism
Inheritance and PolymorphismInheritance and Polymorphism
Inheritance and Polymorphism
 
Object Oriented Programming with Java
Object Oriented Programming with JavaObject Oriented Programming with Java
Object Oriented Programming with Java
 
Object Oriented Programming with Java
Object Oriented Programming with JavaObject Oriented Programming with Java
Object Oriented Programming with Java
 
Java basic
Java basicJava basic
Java basic
 
Sopas de letras varias
Sopas de letras variasSopas de letras varias
Sopas de letras varias
 
Workflow NPW2010
Workflow NPW2010Workflow NPW2010
Workflow NPW2010
 
Markaların Logo Değişimleri
Markaların Logo  DeğişimleriMarkaların Logo  Değişimleri
Markaların Logo Değişimleri
 
ShareCafé: Office365 - Efficiënt samenwerken met minimum aan kosten en comple...
ShareCafé: Office365 - Efficiënt samenwerken met minimum aan kosten en comple...ShareCafé: Office365 - Efficiënt samenwerken met minimum aan kosten en comple...
ShareCafé: Office365 - Efficiënt samenwerken met minimum aan kosten en comple...
 
Wordle
WordleWordle
Wordle
 
Krishna Printernational Corporate Presentation
Krishna Printernational Corporate PresentationKrishna Printernational Corporate Presentation
Krishna Printernational Corporate Presentation
 
Make It Your Own: Design A Makerspace for ALL WMS 2014 GaETC presentation
Make It Your Own: Design A Makerspace for ALL WMS 2014 GaETC presentationMake It Your Own: Design A Makerspace for ALL WMS 2014 GaETC presentation
Make It Your Own: Design A Makerspace for ALL WMS 2014 GaETC presentation
 
Innopolis ux course
Innopolis ux courseInnopolis ux course
Innopolis ux course
 
I 70near Hays Ks
I 70near Hays KsI 70near Hays Ks
I 70near Hays Ks
 
Home Projects (1)
Home Projects (1)Home Projects (1)
Home Projects (1)
 
Anglès
AnglèsAnglès
Anglès
 

Semelhante a Java Modifiers Matrix

What is Interface in Java | How to implement Multiple Inheritance Using Inter...
What is Interface in Java | How to implement Multiple Inheritance Using Inter...What is Interface in Java | How to implement Multiple Inheritance Using Inter...
What is Interface in Java | How to implement Multiple Inheritance Using Inter...Edureka!
 
Complete java&j2ee
Complete java&j2eeComplete java&j2ee
Complete java&j2eeShiva Cse
 
Profiler Instrumentation Using Metaprogramming Techniques
Profiler Instrumentation Using Metaprogramming TechniquesProfiler Instrumentation Using Metaprogramming Techniques
Profiler Instrumentation Using Metaprogramming TechniquesRitu Arora
 
Java OOP s concepts and buzzwords
Java OOP s concepts and buzzwordsJava OOP s concepts and buzzwords
Java OOP s concepts and buzzwordsRaja Sekhar
 
Reverse Engineering Object-Oriented Distributed Systems
Reverse Engineering Object-Oriented Distributed SystemsReverse Engineering Object-Oriented Distributed Systems
Reverse Engineering Object-Oriented Distributed SystemsICSM 2010
 
Reverse Engineering Object-Oriented Distributed Systems
Reverse Engineering Object-Oriented Distributed SystemsReverse Engineering Object-Oriented Distributed Systems
Reverse Engineering Object-Oriented Distributed SystemsDan Cosma
 
Multiple inheritance in java3 (1).pptx
Multiple inheritance in java3 (1).pptxMultiple inheritance in java3 (1).pptx
Multiple inheritance in java3 (1).pptxRkGupta83
 
OCP Java (OCPJP) 8 Exam Quick Reference Card
OCP Java (OCPJP) 8 Exam Quick Reference CardOCP Java (OCPJP) 8 Exam Quick Reference Card
OCP Java (OCPJP) 8 Exam Quick Reference CardHari kiran G
 
116824015 java-j2 ee
116824015 java-j2 ee116824015 java-j2 ee
116824015 java-j2 eehomeworkping9
 
Java/J2EE interview Qestions
Java/J2EE interview QestionsJava/J2EE interview Qestions
Java/J2EE interview QestionsArun Vasanth
 
Class Members Access/Visibility Guide (Checklist)
Class Members Access/Visibility Guide (Checklist)Class Members Access/Visibility Guide (Checklist)
Class Members Access/Visibility Guide (Checklist)Jayasree Perilakkalam
 
Object Oriented Principles
Object Oriented PrinciplesObject Oriented Principles
Object Oriented PrinciplesSujit Majety
 
Unit3 packages & interfaces
Unit3 packages & interfacesUnit3 packages & interfaces
Unit3 packages & interfacesKalai Selvi
 
JAVA Object Oriented Programming (OOP)
JAVA Object Oriented Programming (OOP)JAVA Object Oriented Programming (OOP)
JAVA Object Oriented Programming (OOP)Prof. Erwin Globio
 
Java J2EE by Fairline
Java J2EE by FairlineJava J2EE by Fairline
Java J2EE by FairlinePranjalisoni1
 

Semelhante a Java Modifiers Matrix (20)

JAVA PROGRAMMING – Packages - Stream based I/O
JAVA PROGRAMMING – Packages - Stream based I/O JAVA PROGRAMMING – Packages - Stream based I/O
JAVA PROGRAMMING – Packages - Stream based I/O
 
What is Interface in Java | How to implement Multiple Inheritance Using Inter...
What is Interface in Java | How to implement Multiple Inheritance Using Inter...What is Interface in Java | How to implement Multiple Inheritance Using Inter...
What is Interface in Java | How to implement Multiple Inheritance Using Inter...
 
Packages and interfaces
Packages and interfacesPackages and interfaces
Packages and interfaces
 
Complete java&j2ee
Complete java&j2eeComplete java&j2ee
Complete java&j2ee
 
Profiler Instrumentation Using Metaprogramming Techniques
Profiler Instrumentation Using Metaprogramming TechniquesProfiler Instrumentation Using Metaprogramming Techniques
Profiler Instrumentation Using Metaprogramming Techniques
 
Java OOP s concepts and buzzwords
Java OOP s concepts and buzzwordsJava OOP s concepts and buzzwords
Java OOP s concepts and buzzwords
 
Reverse Engineering Object-Oriented Distributed Systems
Reverse Engineering Object-Oriented Distributed SystemsReverse Engineering Object-Oriented Distributed Systems
Reverse Engineering Object-Oriented Distributed Systems
 
Reverse Engineering Object-Oriented Distributed Systems
Reverse Engineering Object-Oriented Distributed SystemsReverse Engineering Object-Oriented Distributed Systems
Reverse Engineering Object-Oriented Distributed Systems
 
Multiple inheritance in java3 (1).pptx
Multiple inheritance in java3 (1).pptxMultiple inheritance in java3 (1).pptx
Multiple inheritance in java3 (1).pptx
 
OCP Java (OCPJP) 8 Exam Quick Reference Card
OCP Java (OCPJP) 8 Exam Quick Reference CardOCP Java (OCPJP) 8 Exam Quick Reference Card
OCP Java (OCPJP) 8 Exam Quick Reference Card
 
The smartpath information systems java
The smartpath information systems javaThe smartpath information systems java
The smartpath information systems java
 
116824015 java-j2 ee
116824015 java-j2 ee116824015 java-j2 ee
116824015 java-j2 ee
 
Java/J2EE interview Qestions
Java/J2EE interview QestionsJava/J2EE interview Qestions
Java/J2EE interview Qestions
 
Class Members Access/Visibility Guide (Checklist)
Class Members Access/Visibility Guide (Checklist)Class Members Access/Visibility Guide (Checklist)
Class Members Access/Visibility Guide (Checklist)
 
Java 6.pptx
Java 6.pptxJava 6.pptx
Java 6.pptx
 
Object Oriented Principles
Object Oriented PrinciplesObject Oriented Principles
Object Oriented Principles
 
Core_Java_Interview.pdf
Core_Java_Interview.pdfCore_Java_Interview.pdf
Core_Java_Interview.pdf
 
Unit3 packages & interfaces
Unit3 packages & interfacesUnit3 packages & interfaces
Unit3 packages & interfaces
 
JAVA Object Oriented Programming (OOP)
JAVA Object Oriented Programming (OOP)JAVA Object Oriented Programming (OOP)
JAVA Object Oriented Programming (OOP)
 
Java J2EE by Fairline
Java J2EE by FairlineJava J2EE by Fairline
Java J2EE by Fairline
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 

Último (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Java Modifiers Matrix

  • 1. Java Modifiers Matrix The most complete Java Modifiers Matrix on the web brought to you by: http://www.JavaChamp.com Authors: N. , Y. Ibrahim Copyright (c) 2009-2010 JavaChamp.com Java Modifiers Matrix - Copyright 2009-2010 all rights reserved
  • 2. Copyright 2009 JavaChamp.com Online version published by JavaChamp.com Germany. DISCLAIMER All services and content of JavaChamp.com are provided under JavaChamp.com terms of use on an "as is" basis, without warranty of any kind, either expressed or implied, including, without limitation, warranties that the provided services and content are free of defects, merchantable, fit for a particular purpose or non- infringing. The entire risk as to the quality and performance of the provided services and content is with you. In no event shall JavaChamp.com be liable for any damages whatsoever arising out of or in connection with the use or performance of the services. Should any provided services and content prove defective in any respect, you (not the initial developer, author or any other contributor) assume the cost of any necessary servicing, repair or correction. This disclaimer of warranty constitutes an essential part of these "terms of use". No use of any services and content of JavaChamp.com is authorized hereunder except under this disclaimer. The detailed "terms of use" of JavaChamp.com can be found under: http://www.javachamp.com/public/termsOfUse.xhtml This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 license. The full license legal code can be found under: http://creativecommons.org/licenses/by-nc-nd/3.0/legalcode And a human-readable summary of the this license can be found under: http://creativecommons.org/licenses/by-nc-nd/3.0/ According to the Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 license You agree to the following: You are free to share, copy, distribute and transmit the work under the following conditions: • You must attribute the work to JavaChamp.com with a link to http://www.javachamp.com. • You may not use this work for commercial purposes. • You may not alter, transform, or build upon this work. JavaChamp.com Java Modifiers Matrix - Copyright 2009-2010 all rights reserved
  • 3. JavaChamp.com is an Open Certification Platform. What does this mean? JavaChamp is the best place to learn, share, and certify your professional skills. We help you develop yourself in the field of computer science and programming Here are the most significant features offered by JavaChamp: Online Exams Top quality mock exams for SCJP, SCEA, EJB, JMS, JPA. Start Express or topic-wise customized exam. • We offer you unlimited free mock exams • Exams cover subjects like SCJP, SCEA, EJB, JMS, JPA,.. • You can take as many exams as you want and at any time and for no charges • Each exam contains 20 multiple choice questions • You can save the exams taken in your exams history • Your exams history saves the exams you took, the scores you got, time took you to finish the exam, date of examination and also saves your answers to the questions for later revision • You can re-take the same exam to monitor your progress • Your exams history helps the system to offer you variant new questions every time you take a new exam, therefore we encourage you to register and maintain an exams history Network Find guidance through the maze, meet Study-Mates, Coaches or Trainees... Studying together is fun, productive and helps you in building your professional network and collecting leads Bookshelf JavaChamp Bookshelf full of PDF eBooks... Download PDF books with a selected sample of the JavaChamp question bank in SCJP, SCEA, EJB, JMS and more or read it online JavaChamp Profile You may publish your profile and connect to your colleagues and friends. JavaChamp.com Java Modifiers Matrix - Copyright 2009-2010 all rights reserved
  • 4. Content Channel Be an Author and get recognition, leads, and more... Contributing to the JavaChamp question bank will earn your recognition of your professional skills, expands your network, introduce you to potential leads Join Us Join the fast growing JavaChamp Community now. JavaChamp Community is young and very dynamic, we would be thrilled to welcome you on board :o) JavaChamp.com Java Modifiers Matrix - Copyright 2009-2010 all rights reserved
  • 5. Java Modifiers Matrix: The matrix is split into 3 categories: • Access Modifiers • public • implicit package • protected • private • Structural Modifiers • final • abstract • static • native • Behavioral Modifiers • strictfp • transient / volatile • synchronized Matrix symbols legend:  Possible modifier choice  Default modifier (java choice if not explicitly defined)  Single choice (other modifiers are not allowed) JavaChamp.com Java Modifiers Matrix - Copyright 2009-2010 all rights reserved
  • 6. Access Modifiers Structural Modifiers Behavioral Modifiers public implicit protected private final abstract static native strictfp transient / synchronized package volatile Top level Class      Class inside class         Class Class inside Interface      Class inside method /    code block Interface Top level Interface     Interface inside Class        Interface inside   method / code block Code Block Inside Class  Inside method  Top level Enumeration   enum Enum inside Class      Enum inside Interface   Class           Method Interface    Constructor Class     Class        Data field Interface    (variable / Method argument /  constant) local or code block local JavaChamp.com Java Modifiers Matrix - Copyright 2009-2010 all rights reserved
  • 7. Java modifiers and access rules: • If class A can't access class B, then class A can't access any member (method or variable) in class B. • For a subclass outside the package, the protected member can be accessed only through inheritance. • It is illegal to have even a single abstract method in a class that is not explicitly declared abstract! • You can have an abstract class with no abstract methods. • The first concrete subclass of an abstract class must implement all abstract methods of the super class. • Initialization code block are not allowed in interfaces • Inner classes in interfaces must be public static • A member/(inner) interface can only be defined inside a top-level class or interface not inside methods • Static data fields can only be declared in static or top level types Method illegal modifiers combinations: • abstract and final @Compiler Error: The abstract method can only set a visibility modifier, one of public or protected • abstract and private @Compiler Error: The abstract method can only set a visibility modifier, one of public or protected • abstract and static @Compiler Error: illegal combination of modifiers: abstract and static • transient and final / static @Compiler Error: A transient variable may not be declared as final or static Java member visibility rules across packages: Member Visibility Rules Access from Access to Package Class/ Interface? public package protected private 1 same     2 inner     same 3 subclass    4 other    5 subclass  inheritance other 6 other  JavaChamp.com Java Modifiers Matrix - Copyright 2009-2010 all rights reserved