Category: Uncategorized
-
Javascript scope
Scope determines the accessibility (visibility) of variables. JavaScript has 3 types of scope: Block Scope Before ES6 (2015), JavaScript had only Global Scope and Function Scope. ES6 introduced two important new JavaScript keywords: let and const. These two keywords provide Block Scope in JavaScript. Variables declared inside a { } block cannot be accessed from…
-
Exception Handling
Exception Handling in Java is one of the effective means to handle the runtime errors so that the regular flow of the application can be preserved. Java Exception Handling is a mechanism to handle runtime errors such as ClassNotFoundException, IOException, SQLException, RemoteException, etc. Exception is an unwanted or unexpected event, which occurs during the execution…
-
Covariant return type
Shall we write both class type in overridden method of child class It’s possible but why we change return type in child class–[TBD]
-
Method overloading
The Java programming language supports overloading methods, and Java can distinguish between methods with different method signatures. This means that methods within a class can have the same name if they have different parameter lists Suppose that you have a class that can use calligraphy to draw various types of data (strings, integers, and so…
-
Primitive data types
Primitive data types – includes byte, short, int, long, float, double, boolean and char A primitive data type specifies the size and type of variable values, and it has no additional methods. There are eight primitive data types in Java: Data Type Size Description byte 1 byte Stores whole numbers from -128 to 127 short…
-
why should i hire you??
Every where i go for an interview this one question commonly asked to me from an interviewer my answer is….?? In my childhood i want to work in computer related job and i want to work in air conditioned environment but i don’t know what to do for it After completing my 10th standard i…
-
apt in linux
Introduction Linux As always very easy and confortable to use. With the efforts of developers we’ve GUI applications for our daily use. But for the linuxers moving toward an advanced stage they are more likely to use CLI than GUI. The following article is for such linuxers who are now seeking the way of doing…
-
Trojan horse
The trojan horse is a malicious code or software it’s designed to damage,disrupt steal, or in general inflict some other harmful action on your data or network. Working of trojan: For example if we received mail from someone unfortunately we opened it. It’s may a trap to steal our data or do damages to our laptop,desktop,tab…