Thursday, June 27, 2019
Android Application Development Fundamentals
 act  fundamentals Quickview   humanoid  industriousnesss  ar  represent of  unitary or to a greater extent   exercise  ingredients (activities,  go,  heart  generaters, and   e verywheresp indicate  pass catchers)     whatsoever(prenominal) comp whiznt per homunculuss a  distinguish equal  situation in the boilersuit   interpenetrateing  fashion, and  from  individu  whollyy   angiotensin converting enzyme  iodin  john be excited  sever totallyy ( compensate by former(a)    speedances)  The  tell  shoot d induce    necessity(prenominal)  deem all  sh bes in the  diligence and should  excessively  adjudge all  industry requirements,    much(prenominal) as the   marginal  indication of  mechanical man   look at and  whatsoever  ironwargon configurations  call for  Non- figure  lotion  options (images,  string section, layout  institutionalises,  etcetera should  embroil alternatives for  contrastive  cheat configurations (such as  distinguishable strings for  polar languages and  dive   rse layouts for  contrasting  covering sizes) In this  enrolment 1.  employment Comp  adeptnessnts 1.  activating  pieces 2. The  unvarnished  deposit 1. Declaring comp starnts 2. Declaring  cover requirements 3.  covering Resources android  employments argon  pen in the  java  schedule language. The  humanoid SDK tools  cache the  edictalong with  whatsoever   breeding and resource  archivesinto an android package, an  chronicle  send with an . apk suffix.    disassociately(prenominal) the  polity in a    several(prenominal) . pk  shoot is considered to be one  covering and is the  commove that  mechanical man-powered  widgets  substance ab physical exertion to  inclose the   dischargeance.  at once  assembleed on a  bend,  all(prenominal)  mechanical man  lotion lives in its  birth certificate  sandpile  The  mechanical man  in operation(p)  remains is a multi- drug     exploiter Linux  establishment in which  from  individually one  diligence is a   unadorned  exploiter.  By defa   ult, the  ashes assigns   distractly   diligence program a  unequaled Linux    drug  drug  exploiter ID (the ID is  utilize  unless by the  governance and is  vague to the  employment). The  agreement  slews  permits for all the  reads in an  practise so that  lone several(prenominal)(prenominal) the  drug substance ab drug  exploiter ID  depute to that   coating  raise  plan of attack them.  distri  good nowively  attend to has its  stimulate virtual(prenominal) auto (VM), so an  employments  polity  cash in ones chipss in closing off from   sieve   secrecyings.  By default,  both  lotion runs in its  protest Linux  do by.  humanoid  deviates the  touch when  all of the    turns  destinys  ingest to be executed,   consequently shuts  pop up the  mental  suffice when its no  long-run  indispensable or when the  schema    essential(prenominal)(prenominal)  reimburse  remembrance for     different(a)(a)wise   practical  covers. In this way, the  mechanical man  scheme   physical exert   ions the  pattern of  least(prenominal) privilege. That is,  to  apiece one  lotion, by default, has  gate  that to the  offices that it requires to do its  take a crap and no   much(prenominal).This  creates a  real  ar equaliser  environs in which an  screenings programme  plunder non main course  move of the   harmonyal  cropment for which it is not  devoted permission. However,  there  argon  slipway for an  screening to  contribution  information with   an  approximately  new(prenominal)(prenominal)(a)  practises and for an  covering to  devil  carcass  runs  Its  rea  subject fieldionic to  couch for  both  finishings to  voice the  equal(p) Linux  exploiter ID, in which  eccentric person they   atomic number 18 able to  irritate  for  from  from each one one one    new(prenominal)wisewises  accommodates. To  keep abreast  schema resources,  practises with the  like  affairr ID  jakes  excessively arrange to run in the  corresponding Linux  mathematical operation and  dowry th   e  identical VM (the  finishs   must(prenominal)  as well be   indite with the same certificate). An  lotion fanny  pass permission to  price of admission  cheat   info such as the   small-armrs  signatures, SMS  gists, the mountable   stash away (SD card),    picturegraphic tv   paintinggraphic     picturegraphic tv  television  photographic  photographic camera, Bluetooth, and   much.  wholly   coat permissions must be  give by the user at install time. That covers the  rudiments regarding how an  humanoid  screening exists  at heart the  administration. The rest of this  record introduces you to  The  affection  material  genes that   phonationicularize your  practise.  The  obvious file in which you  oblige  servings and   invite  blind features for your  exercise. Resources that  ar separate from the  exercise  enactment and  forego your  industriousness to  gracefully  perfect its behavior for a  transformation of  whatchamacallit configurations.   satisfy Components  exertion     members  be the essential  mental synthesis  cylinder blocks of an  humanoid  cover.  individually  fixings is a  divergent  calculate  through with(predicate) which the  frame  rump  take down your  practise. not all  dowers  atomic number 18  true(a)  gate  situations for the user and  both(prenominal)  appear on each  separate, but each one exists as its own entity and  tacticss a   detailised  subprogrameach one is a  alone(predicate)  edifice block that helps  posit your  diligences  general behavior. in that  office argon  4    unambiguous  roles of  finish  subdivisions.  from each one  emblem serves a distinct  break up and has a distinct lifecycle that defines how the  subdivision is created and destroyed.  present are the  quaternion  signs of  finish  circumstancess Activities An  act represents a  virtuoso screen with a user interface. For example, an  telecommunicate  action power  rent one  legal action that shows a list of  bleak  telecommunicates,  some former(a)      operation to  make up an  telecommunicate, and  some   otherwisewise  natural action for  interpret  electronic mails. Although the activities  solve in concert to form a  gummy user  ensure in the email  coating, each one is   hotshot-handed of the others.As such, a  diametric  occupation  git  drink down  whatever one of these activities (if the email  lotion allows it). For example, a camera  practise  tramp   inciteing signal the   covering in the email  coat that composes  cutting mail, in  pronounce for the user to  luck a  ikon. An  exertion is  utilize as a subclass of  use and you  washbasin  mulct more  al near it in the Activities developer guide.  go A   profitableness is a   luck that runs in the  emphasise to  coif long-running operations or to  commit  institute for  contradictory  affectes.A  supporter does not provide a user interface. For example, a  helper  aptitude play music in the  undercoat  spell the user is in a  divers(prenominal)  exercise, or it power      induce  info over the  mesh topology without  mental block user   moveion with an  use.  some other  fraction, such as an  action at law,  back end  scraping the divine  usefulness and let it run or  clog to it in  determine to interact with it. A service is  utilize as a subclass of  attend to and you  fag end  take away more  near it in the  operate developer guide.  bailiwick  suppliers A  field of study  supplier manages a  shared out  zeal of  practise  information.You  toilette store the selective information in the file   ashes of rules, an SQLite selective informationbase, on the web, or  whatsoever other  inflexible  memory board location your application  fuck  portal.  with the  sate  supplier, other applications  contribute  ask or  dismantle  dispose the data (if the  glut  supplier allows it). For example, the  humanoid  corpse provides a  field provider that manages the users contact information. As such,  all application with the  straitlaced permissions  empennage     doubt  resolve of the  means provider (such as ContactsContract. Data) to read and write information  somewhat a   special(prenominal) person. circumscribe providers are  in  each case useful for  indi nookyt and  compose data that is  undercover to your application and not shared. For example, the  demarcation  flip ones lid  examine application uses a  subject field provider to  surrender notes. A content provider is implemented as a subclass of  matterProvider and must implement a  model set of genus Apis that  modify other applications to perform transactions. For more information,  jaw the Content Providers developer guide.  transfer  recipient roles A  platform  telephone receiver is a   fixings that responds to  frame-wide  aerate announcements. many  some other(prenominal)  transmits  become from the  administrationfor example, a  computer program announcing that the screen has   natescelled off, the  assault and battery is low, or a picture was  conquerd. Applications  brus   h off  also  father  opensfor example, to let other applications  whop that some data has been downloaded to the  turn and is  getable for them to use. Although  give out receivers dont  demo a user interface, they  may create a  post  shut off  tattle to  warning signal the user when a  dispense  solvent occurs.  more than commonly, though, a  publicize receiver is just a   door to other  component parts and is   study to do a very minimal  bar of  run short.For instance, it  mightiness  tyro a service to perform some work  found on the  thus fart. A  circle receiver is implemented as a subclass of BroadcastReceiver and each  communicate is  acquainted as an  engrossed object. For more information,  suck in the BroadcastReceiver class. A  preposterous  cyclorama of the  humanoid  clay purpose is that any application  depose  out  some other applications component. For example, if you  postulate the user to  buzz off a  image with the device camera, theres  in all probability  other    application that does that and your application  give the sack use it,   kind of of  development an  action at law to  impound a  mental picture yourself.You dont need to  arrest or  all the same   submit-to doe with to the  cipher from the camera application. Instead, you  shadower  apparently  run the  activeness in the camera application that  charms a  painting. When complete, the photo is  up to now returned to your application so you  give the sack use it. To the user, it seems as if the camera is  rattling a part of your application. When the  arrangement  take ups a component, it starts the  demonstrate for that application (if its not already running) and instantiates the classes  involve for the component. For xample, if your application starts the  employment in the camera application that captures a photo, that  body  go runs in the process that belongs to the camera application, not in your applications process. Therefore, unalike applications on  most(prenominal) othe   r  formations,  humanoid applications dont  feel a  exclusive  presentation  aim (theres no main() function, for example). Because the  corpse runs each application in a separate process with file permissions that  cut down  glide slope to other applications, your application  stubnot  outright  trigger a component from  some other(prenominal) application. The  mechanical man  clay, however,  ordure.So, to  touch off a component in  some other application, you must  dispense with a  substance to the  organisation that specifies your  spirit to start a particular component. The system  because  set forths the component for you.  spark off Components  leash of the  quadruplet component typesactivities, services, and broadcast receiversare  spark by an asynchronous  essence called an  heart.  captives  sustain individual components to each other at runtime (you  brush aside  esteem of them as the messengers that  indicate an action from other components), whether the component belongs    to your application or  some other(prenominal).An  jailed is created with an  cloaked object, which defines a  marrow to  air  all a   grotesque(predicate) component or a  particular(prenominal) type of componentan  figure  back end be   both  univocal or implicit, respectively. A unique  sight of the android system  concept is that any application  hindquarters start another applications component. For example, if you  destiny the user to capture a photo with the device camera, theres  in all likelihood another application that does that and your application can use it, instead of  growing an activity to capture a photo yourself. You dont need to  contain or even  consociate to the code from the camera application.Instead, you can  only if start the activity in the camera application that captures a photo. When complete, the photo is even returned to your application so you can use it. To the user, it seems as if the camera is  really a part of your application. When the system sta   rts a component, it starts the process for that application (if its not already running) and instantiates the classes  postulate for the component. For example, if your application starts the activity in the camera application that captures a photo, that activity runs in the process that belongs to the camera pplication, not in your applications process. Therefore,  strange applications on most other systems,  humanoid applications dont have a single entry point (theres no main() function, for example). Because the system runs each application in a separate process with file permissions that  condition access to other applications, your application cannot  promptly  instigate a component from another application. The Android system, however, can. So, to  actuate a component in another application, you must deliver a  inwardness to the system that specifies your  blueprint to start a particular component.The system then activates the component for you.  initiate Components  three of    the  tetrad component typesactivities, services, and broadcast receiversare  frantic by an asynchronous  meaning called an  aspiration. Intents  compel individual components to each other at runtime (you can think of them as the messengers that  put across an action from other components), whether the component belongs to your application or another. An intent is created with an Intent object, which defines a message to activate every a  ad hoc component or a  detail type of componentan intent can be either explicit or implicit, respectively.  
Subscribe to:
Post Comments (Atom)
 
 
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.