java basic learning 9(final, Abstract class, interface)

final A class cannot be inherited when the final keyword modifies it A function cannot be overridden when the final keyword modifies it A basic data member variable cannot be modified when the final keyword modifies it A reference type variable cann ...

Posted on Mon, 19 Aug 2019 19:32:32 -0700 by xander85

Spring Security Resolution - Authorization Process

Spring Security Resolution (1) - Authorization Process _When learning Spring Cloud, when you encounter the content related to the authorized service oauth, you always have a half-knowledge, so you decide to first learn and collate the content, principles and design related to Spring Security, Spring Security Oauth2 and other privileges, certif ...

Posted on Mon, 19 Aug 2019 19:21:08 -0700 by pixelgirl

Java Socket: Network Socket for Pigeon Biography

In ancient times, due to the inconvenience of communication, some smart people made use of the advantages of pigeons flying faster and recognizing directions to domesticate them for the transmission of messages - also known as "pigeon biography".In Java, a network Socket plays the same role. A Socket is an abstraction layer through ...

Posted on Mon, 19 Aug 2019 18:42:11 -0700 by CrazeD

Spring Boot Unified Exceptions are handled and parsed like this, isn't it?

Abnormal Speech "To cross the glacier of the Yellow River, we will travel all over the world with snow." No matter in life or in the computer world, there will inevitably be an exception. Last article RESTful API returns uniform JSON data format Explains the handling of uniform returns, which is a normal situation for requests; this a ...

Posted on Mon, 19 Aug 2019 17:50:09 -0700 by thewitt

Some Basic Programming Problems of PHP

Preface Some basic programming questions of PHP have been sorted out. Often doing such questions can consolidate their own foundation, exercise their logical thinking ability, and may also be used in written interviews. Among these questions, the author has met in the written examination. I think the main purpose of this paper is to examine you ...

Posted on Mon, 19 Aug 2019 05:03:23 -0700 by gazever

nginx cross-domain, anti-theft chain, compression and other small functions in detail

Links to the original text: http://www.studyshare.cn/software/details/1173/0 I. Cross-border Cross-domain originates from the browser security specification formulated by the W3C organization, which does not allow websites within a domain name to acc ...

Posted on Sun, 18 Aug 2019 23:53:55 -0700 by 182x

Java Self-Learning - Operator Bit Operator

Java bit operators Bit operators are not commonly used in practice. It is recommended to skip this section. Real work is used, let's see again. Example 1: Binary representation of an integer Bit operations are for binary systems, but we usually use decimal systems such as 5. The binary of 5 is 101. So before you start learning, you need to know ...

Posted on Sun, 18 Aug 2019 23:44:54 -0700 by cyrenity

[Java Container] List Container Usage and Source Code Analysis

List container ArrayList: Use dynamic arrays to save elements and support random access. Vector: Similar to ArrayList, but thread-safe. LinkedList: Use a two-way linked list to save elements, which can only be accessed sequentially, and can be used as stacks, queues, and two-way queues. 1 ArrayList 1.1 Brief Introduction List interface is imp ...

Posted on Sun, 18 Aug 2019 23:06:49 -0700 by angelcool

Data Structure and Algorithms-Binary Sorting (Finding) Tree

Catalog Preface tree Binary Tree Binary Sort (Search) Tree concept structure Main methods findmax(),findmin() isContains(int x) insert(int x) delete(int x) Complete code epilogue Preface Most of the previous introductions are related ...

Posted on Sun, 18 Aug 2019 22:33:46 -0700 by AudiS2

Baidu Star Preliminary 2--Degree Bear and Arrangement--Binary Match

Degree Bear and Arrangement Accepts: 1100 Submissions: 3486 Time Limit: 2000/1000 MS (Java/Others) Memory Limit: 32768/32768 K (Java/Others) Problem Description Duxiong has a machine that has a 1_M1 \sim M1_M queue p[1..M]p[1..M]p[1..M] as ...

Posted on Sun, 18 Aug 2019 20:04:33 -0700 by Edd