Flashcards for topic Methods
What is the proper way to document thread-safety and serializability in APIs?
Example thread-safety documentation:
/** * This class is thread-safe. All public methods use internal synchronization * to ensure consistent state when accessed concurrently. */ public class ThreadSafeCounter { // Implementation... }
When is it appropriate not to make defensive copies of mutable parameters in Java methods?
Defensive copying can be omitted in these specific circumstances:
When there's an explicit trust relationship:
When the method/constructor indicates an explicit "handoff" of the object referenced by a parameter
When there are significant performance concerns and the overhead of defensive copying is problematic
When using immutable parameters (preferred solution where possible)
Note: Even when omitting defensive copies, document the expectations clearly to prevent invariant violations.
When returning internal array fields from a method, what are the complete options for maintaining encapsulation and what are the tradeoffs of each approach?
Options for returning internal arrays while maintaining encapsulation:
Defensive Copy (Clone):
private final Element[] elements; public Element[] getElements() { return elements.clone(); // Returns a copy }
Immutable View (Collections.unmodifiableList):
private final Element[] elements; public List<Element> getElements() { return Collections.unmodifiableList(Arrays.asList(elements)); }
Deep Copy (for mutable elements):
private final MutableElement[] elements; public MutableElement[] getElements() { MutableElement[] copy = new MutableElement[elements.length]; for (int i = 0; i < elements.length; i++) { copy[i] = elements[i].copy(); // Deep copy each element } return copy; }
Immutable Elements + Shallow Copy:
private final ImmutableElement[] elements; public ImmutableElement[] getElements() { return elements.clone(); // Safe because elements can't be modified }
Tradeoffs primarily involve balancing:
What critical defensive copying principle must be followed when accepting mutable objects from clients, and what vulnerability results if ignored?
Core Principle: When a class gets mutable components from clients, it must defensively copy these components before storing them.
Vulnerability if Ignored: Time-of-check/time-of-use (TOCTOU) attack
Implementation Approach:
Example:
public final class Period { private final Date start; private final Date end; public Period(Date start, Date end) { // Defensive copies first this.start = new Date(start.getTime()); this.end = new Date(end.getTime()); // Validation second (on the copies) if (this.start.compareTo(this.end) > 0) throw new IllegalArgumentException("Start after end"); } // Also need defensive copies when returning public Date getStart() { return new Date(start.getTime()); } }
What is the recommended safe, conservative policy for method overloading to avoid potential confusion?
Core Conservative Policy: Never export two overloadings with the same number of parameters
For Varargs Methods: Do not overload varargs methods at all (with few exceptions)
Rationale: Ensures programmers are never in doubt about which overloading applies to any set of parameters
Alternative Approach: Use different method names instead of overloading
write(int)
, write(long)
, etc.writeInt(int)
, writeLong(long)
, etc.Special Case for Constructors:
Lambda Method Reference Issues:
// This works: new Thread(System.out::println).start(); // This doesn't compile: exec.submit(System.out::println); // Ambiguous between Runnable and Callable
What technique should you use to ensure that overloaded methods with similar functionality behave identically when passed the same parameters?
To ensure consistent behavior across overloaded methods:
Use forwarding - have the more specific method forward to the more general method:
// Ensuring identical behavior by forwarding public boolean contentEquals(StringBuffer sb) { // Forward from specific to general implementation return contentEquals((CharSequence) sb); } public boolean contentEquals(CharSequence cs) { // Primary implementation here // ...implementation logic... }
This technique:
A common use case is when retrofitting existing classes to implement new interfaces or when evolving an API while maintaining backwards compatibility.
What are the key differences between orElse()
and orElseGet()
methods in Java's Optional API, and when should you choose one over the other?
// Expensive computation only happens when needed String result = optional.orElseGet(() -> expensiveOperation()); // vs. expensiveOperation() runs regardless if optional has value String result = optional.orElse(expensiveOperation());
Key consideration: Choose orElseGet()
when the default value requires significant computation that should be avoided if possible.
When is it appropriate to use Optional as an instance field in a class, and when should it be avoided?
Appropriate use cases:
Example:
public class NutritionFacts { private final int servingSize; // required private final OptionalInt calories; // optional private final OptionalInt sodium; // optional // Better to store as OptionalInt fields than use null or -1 as sentinel values public OptionalInt getCalories() { return calories; } }
When to avoid:
Warning signs (code smells):
How should HTML be used in Javadoc comments and what special considerations apply?
HTML in Javadoc comments:
<
, >
, &
, etc.) must be escaped when used literally<p>
for paragraph breaks<ul>
, <ol>
, <li>
for lists<code>
, <pre>
for code formatting<em>
, <strong>
for emphasis<a href="...">
for linksExample:
/** * Returns the element at the specified position. * <p> * This method may throw an {@link IndexOutOfBoundsException} if the * index is out of range (index < 0 || index >= size()). * * @param index the index of the element to return * @return the element at the specified position * @throws IndexOutOfBoundsException if the index is out of range */ public E get(int index) { // Implementation }
How should you document module-level elements when using the Java module system?
When using the Java module system (introduced in Java 9):
module-info.java
fileExample:
/** * A module providing core utility classes for the application. * <p> * This module exports various utility packages and provides * implementations of the logging service. */ module com.example.utilities { exports com.example.utilities.collections; exports com.example.utilities.concurrency; provides java.util.logging.LoggingProvider with com.example.utilities.logging.LogProvider; }
Showing 10 of 56 cards. Add this deck to your collection to see all cards.