


What is an anonymous callback? What is the difference between it and callback function? (with detailed explanation)
The previous article introduced you to "What is a closure function?" What is the role of closure function? (Attached code) ", this article continues to introduce to you what is an anonymous callback? What is the difference between it and callback function? (Detailed explanation attached), come on, let’s work hard together!
Anonymous callback format:
Call function (pass in your specified function)
The difference between callback functions:
1. The callback function passed in as a string
2.The callback function passed in as an anonymous function
3. The callback passed in the character-rich method is still counted. This function can be used multiple times and called arbitrarily, because this is a pre-loaded ordinary function. The callback function passed in the fixed-name function
Can only be used in the current callback function and cannot be used elsewhere.
4. The effect of returning an anonymous function to a function is high, because after the callback function is run, the anonymous function is recycled, and the function passed in as a string is a pre-loaded ordinary function
number, so when the page has not been executed, it will never be sold.
Take the code display as an example:
<?php /*********匿名回调*********/ function js($jia){ $no1 = 6; $no2 = 10; //变量函数的出现 echo $jia($no1 , $no2); } function jia($no1, $no2){ return $no1 + $no2; } js('jia'); ?>
First, we still define a function function js(), and then output the variable function we defined, Before we made the callback function, we also first defined a function function jia(), then (return) returned the value of no1 no2, then called introduction(), and then passed the string to js. When we perform code operations, we will get The result we just entered; the above is the callback function we made before;
When we directly use $jia to define function() and return (return $no1 $no2), we are defining an anonymous function at this time , we directly assign the function to the $jia variable, and then, we pass the $jia variable through js, which is an anonymous callback.
The specific code is as follows:
<?php /*********匿名回调*********/ function js($jia){ $no1 = 6; $no2 = 10; //变量函数的出现 echo $jia($no1 , $no2); } function jia($no1, $no2){ return $no1 + $no2; } js('jia');//普通函数 echo '<hr>'; $jia = function ($no1, $no2){ return $no1 + $no2; }; //匿名回调 js($jia); ?>
Recommended learning: "PHP Video Tutorial"
The above is the detailed content of What is an anonymous callback? What is the difference between it and callback function? (with detailed explanation). For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



The article discusses OWASP Top 10 vulnerabilities in PHP and mitigation strategies. Key issues include injection, broken authentication, and XSS, with recommended tools for monitoring and securing PHP applications.

PHP 8's JIT compilation enhances performance by compiling frequently executed code into machine code, benefiting applications with heavy computations and reducing execution times.

The article discusses securing PHP file uploads to prevent vulnerabilities like code injection. It focuses on file type validation, secure storage, and error handling to enhance application security.

The article discusses symmetric and asymmetric encryption in PHP, comparing their suitability, performance, and security differences. Symmetric encryption is faster and suited for bulk data, while asymmetric is used for secure key exchange.

The article discusses implementing robust authentication and authorization in PHP to prevent unauthorized access, detailing best practices and recommending security-enhancing tools.

The article discusses strategies for implementing API rate limiting in PHP, including algorithms like Token Bucket and Leaky Bucket, and using libraries like symfony/rate-limiter. It also covers monitoring, dynamically adjusting rate limits, and hand

The article discusses strategies to prevent CSRF attacks in PHP, including using CSRF tokens, Same-Site cookies, and proper session management.

Article discusses best practices for PHP input validation to enhance security, focusing on techniques like using built-in functions, whitelist approach, and server-side validation.
