


allowoverride Introduction to overload and override in PHP and JAVA
Overloading: In the same class, functions with the same name but different return values or parameter types are called overloading.
Override: Functions with the same name, the same return value type, and the same parameters are called overrides. It refers to the overriding of methods in the parent class by the subclass.
PHP does not support method and operator overloading. JAVA does not support operator overloading (but "+" is actually an operator overloading).
Copy code The code is as follows:
Class Father {
public function fmeth1() {
echo "fmeth1()...
";
}
//public function fmeth1($str1) {
// echo "fmeth1() with $str1...
";
//}
}
Class Son extends Father {
public function fmeth1() {
echo "fmeth1 () in son...
";
}
}
$s=new Son();
$s->fmeth1();
?>
The fmeth1 method in the parent class It cannot be overloaded.
Explanation of overload and override cases in Java
In the Java language specification, the characteristics of a method only include the name of the method, the number and type of parameters, but not the return type of the method, the parameters of the parameters The name and exception thrown. When the Java compiler checks method overloading, it will determine whether two methods are overloaded methods based on these conditions. But when the Java compiler checks the substitution of the method, it will further check whether the return type and exception thrown by the two methods (supertype and subtype) are the same.
QUESTION NO: 3
Copy code The code is as follows:
class A {
protected int method1(int a, int b) { return 0; }
}
Which two are valid in a class that extends class A? (Choose two)
A. public int method1(int a, int b) { return 0; }
B. private int method1(int a, int b) { return 0; }
C. private int method1(int a, long b) { return 0; }
D. public short method1(int a, int b) { return 0; }
E. static protected int method1(int a, int b) { return 0; }
For the question in 310-035, the standard answers are A and C
A is override, and access has been broadened from protected--->public, so it is correct.
B and D are also overrides. B has become narrower from protected--->private, and the return type of D has changed, so they are all wrong.
C is overload, the width and return type of access don’t matter, so it is correct.
E is override, but static is added because static method cannot hide the instance method from super class. Therefore, it is wrong.
So choose AC.
A subclass that inherits a parent class and overrides a method of the parent class is called override - override, overwrite, override.
A subclass that has multiple methods with the same name but different parameters is called overload - heavy (zhong) load, overload
overload It is:
Occurs when multiple methods have the same name but contain different parameters
Then calls with different parameters actually call different methods
It can also be understood that there are actually two methods with the same name and different parameters!
Overwrite (OVERWRITE) Note
cannot reduce the visibility of the original method
Different return types cannot constitute a method override
Overload (OVERLOAD) Note
Only different parameters can constitute an overload
The above is an introduction to allowoverride overload and override in PHP and JAVA, including the content of allowoverride. I hope it will be helpful to friends who are interested in PHP tutorials.

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



Alipay PHP...

JWT is an open standard based on JSON, used to securely transmit information between parties, mainly for identity authentication and information exchange. 1. JWT consists of three parts: Header, Payload and Signature. 2. The working principle of JWT includes three steps: generating JWT, verifying JWT and parsing Payload. 3. When using JWT for authentication in PHP, JWT can be generated and verified, and user role and permission information can be included in advanced usage. 4. Common errors include signature verification failure, token expiration, and payload oversized. Debugging skills include using debugging tools and logging. 5. Performance optimization and best practices include using appropriate signature algorithms, setting validity periods reasonably,

The application of SOLID principle in PHP development includes: 1. Single responsibility principle (SRP): Each class is responsible for only one function. 2. Open and close principle (OCP): Changes are achieved through extension rather than modification. 3. Lisch's Substitution Principle (LSP): Subclasses can replace base classes without affecting program accuracy. 4. Interface isolation principle (ISP): Use fine-grained interfaces to avoid dependencies and unused methods. 5. Dependency inversion principle (DIP): High and low-level modules rely on abstraction and are implemented through dependency injection.

How to automatically set the permissions of unixsocket after the system restarts. Every time the system restarts, we need to execute the following command to modify the permissions of unixsocket: sudo...

Article discusses late static binding (LSB) in PHP, introduced in PHP 5.3, allowing runtime resolution of static method calls for more flexible inheritance.Main issue: LSB vs. traditional polymorphism; LSB's practical applications and potential perfo

Sending JSON data using PHP's cURL library In PHP development, it is often necessary to interact with external APIs. One of the common ways is to use cURL library to send POST�...

Article discusses essential security features in frameworks to protect against vulnerabilities, including input validation, authentication, and regular updates.

How to debug CLI mode in PHPStorm? When developing with PHPStorm, sometimes we need to debug PHP in command line interface (CLI) mode...
