TextListener question

Posted on 2004-08-05
Last Modified: 2009-12-16
I am confused how to use the TextListener on a JTextField.

Since there is no JTextListener Interface, how can I trap every key stroke on a JTextField
by  using the TextListener?

Does any one have an example of how to do this (on a JTextField and not TextField ) or otherwise???
Question by:prain

Accepted Solution

ikerasd earned 25 total points
ID: 11726647
you can use the KeyListener class and the methods keyPressed(KeyEvent e) and keyTyped(KeyEvent e)
LVL 30

Expert Comment

by:Mayank S
ID: 11726659
LVL 37

Assisted Solution

zzynx earned 25 total points
ID: 11726678
As an alternative you can add a document listener to the JTextField's document:

yourTextField.getDocument().addDocumentListener( someDocListener );
LVL 37

Expert Comment

ID: 11738234
>> how can I trap every key stroke on a JTextField
Just to know, why do you want that?
Is it to ignore/skip some characters typed in?
Then you should certainly use the document approach.

Expert Comment

ID: 11741511
import java.awt.event.*;
import java.awt.*;
import javax.swing.*;

class MyFrame extends JFrame implements KeyListener
    JTextField textField;
     Container contentPane;

   public MyFrame()
          contentPane = this.getContentPane();

          textField = new JTextField();



     public void keyPressed(KeyEvent event)
System.out.println("PRESSED : " + event.getKeyChar());

     public void keyReleased(KeyEvent event)
System.out.println("RELEASED : " + event.getKeyChar());

      public void keyTyped(KeyEvent event)
System.out.println("TYPED : " + event.getKeyChar());

     public void processWindowEvent(WindowEvent event)
             if ( event.getID() == WindowEvent.WINDOW_CLOSING)

         public static void main(String args[])
                     MyFrame frame = new MyFrame();

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Protect jar file - windows app 2 39
mapAB Challlenge 35 127
best (free) software to access postgres db (java) 1 33
Java array passed to SQL where clause 23 64
Java had always been an easily readable and understandable language.  Some relatively recent changes in the language seem to be changing this pretty fast, and anyone that had not seen any Java code for the last 5 years will possibly have issues unde…
Introduction Java can be integrated with native programs using an interface called JNI(Java Native Interface). Native programs are programs which can directly run on the processor. JNI is simply a naming and calling convention so that the JVM (Java…
Viewers will learn about arithmetic and Boolean expressions in Java and the logical operators used to create Boolean expressions. We will cover the symbols used for arithmetic expressions and define each logical operator and how to use them in Boole…
Viewers will learn how to properly install Eclipse with the necessary JDK, and will take a look at an introductory Java program. Download Eclipse installation zip file: Extract files from zip file: Download and install JDK 8: Open Eclipse and …

867 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now