Skip to main content

Simple Program to implement Multilevel inheritance in Java

 

Multilevel Inheritance:

In the below example their are total three classes each have their own methods and are giving different output . We all know that in some or the other way properties if our parents came in their child taking the same concept the program is taking the properties of their parent class and and also have their own unique properties . We can inherit the parent class in child class my using "extends" keyword . 

Example:

class GrandParents

{

     public static void Age(int age) 

     {

         System.out.println("Age of GrandParents is:"+" "+age);

     }   

}

 class Parents extends GrandParents

 {

     public static void Nationality(String citizenShip) 

     {

         System.out.println("Parents are from:"+" "+citizenShip);

     }    

}

class Child extends Parents

{

     public static void Gender(String gender) 

     {

         System.out.println("Child is a"+" "+gender);

     }  

}

public class Main

{

public static void main(String[] args) 

{

Child. Age(52);

Child. Nationality("India");

Child. Gender("Male");

}

}





In the above code the  Parent class is first inheriting the "Grandparent" class and then further the "Parent" class is inherited by "Child" class  The properties are inherited in the form of different levels that's why it is called as Multi-Level Inheritance. 

In the last inside main method we are calling all the methods of all the other classes by using the Child class that is possible only because we have extended the parents class in child classes.

                                                         




Comments

Popular posts from this blog

Java program to print "Fibonacci Series" using function

Java program to print  "Fibonacci Series" using function up to a particular number. The Fibonacci series is  a type series where each number is the sum of the two that precede it means the addition of the two numbers which came before the new number  . It starts from 0 and 1 usually. The Fibonacci sequence is given by 0, 1, 1, 2, 3, 5, 8, 13, 21, 34, 55, 89, 144, and so on. The numbers in the Fibonacci sequence are also called Fibonacci numbers. OUTPUT:  

Sql keys and their types

 Sql Keys and their types Introduction : Sql keys is the key to your success in analytics!  Data is growing at an exponential rate and so is the demand for professionals who are well verse3d with the databases.  Organizations all over the world are looking for data scientists and analysts who can draw meaningful insights from the vast amounts of data. And one of the most important languages for handling databases is SQL. That is why those professionals with a background in SQL have an edge over their peers when it comes to working with databases.  Table of Contents : 1.What are keys in DBMS  2. Super key  3.Candidate key  4. Primary key   5 Alternate or Secondary key  6.Foreign key  7.Composite key   What are keys in DBMS  Database are used to store massive amounts of information which is stored across multiple tables. Each table might be running into thousands of rows. Needless to say, there will be many duplicate ro...

What is a Hackers? | Different types of Hackers || हैकर्स कौन हैं? विभिन्न प्रकार के हैकर्स

  What is a Hackers?   Hackers are individuals who use their technical skills to gain unauthorized access to computer systems, networks, or data. They can be motivated by a variety of reasons, including financial gain, political activism, personal amusement, or the desire to test the limits of computer security systems. The term "hacker" has been adopted by the media to refer to those who engage in illegal or malicious activities, but the term is also used to describe individuals who use their skills for ethical purposes, such as finding and reporting security vulnerabilities. Ultimately, the label of "hacker" can have positive or negative connotations depending on the individual's actions and intentions. Types of Hackers: White Hat Hackers: These are ethical hackers who use their skills for good, often working with organizations to identify and remediate security vulnerabilities. Black Hat Hackers: These are malicious individuals who use their skills for perso...