Featured Post

URLS



Teknosys
Java.util Packages Tutorial


Java.util package tutorial







Java.util package contains the collections framework, legacy collection classes, event model, date and time facilities, internationalization, and miscellaneous utility classes.

This reference will take you through simple and practical methods available in java.util package.

Audience

This reference has been prepared for the beginners to help them understand the basic functionality related to all the methods available in Java.util package.

Prerequisites

Before you start doing practice with various types of examples given in this reference, I'm making an assumption that you are already aware of basic Java Programming.




Advertisements


Teknosys
Teknosys
Apache Xerces Tutorial


Apache Xerces Tutorial



Apache Xerces2 is a java based processor and provides standard interfaces and implementations for DOM, SAX and StAX XML parsing API standards.

This tutorial will teach you basic XML concepts and usage of various types of Apache Xerces XML parsers in a simple and intuitive way.

Audience

This reference has been prepared for the beginners to help them understand the basic to advanced concepts related to XML parsing using Java Programming language.

After completing this tutorial you will find yourself at a moderate level of expertise in knowledge of XML parsing using Java from where you can take yourself to next levels

Prerequisites

Knowledge of computers is not a prerequisite to follow the contents of this tutorial. This tutorial assumes no background in computers or computer programming, though basic knowledge of computer terminologies will help in understanding given concepts very easily.




Advertisements


Teknosys
Teknosys
Apache POI Word Tutorial


Apache POI Word Tutorial

This tutorial provides a basic understanding of Apache POI library and its features. Here we will learn how to read, write, and manage MS-Word documents using Java programs.

Audience

This tutorial is designed for the readers working on Java and especially those who want to create, read, write, and modify Word files using Java.

Prerequisites

A general awareness of Java programming with JDK 1.5 or later versions and IO concepts in Java are the only prerequisites to understand this tutorial.




Advertisements


Teknosys
Teknosys
Java XML Tutorial


Java XML Tutorial



Extensible Markup Language, XML is a very popular simple text based language to be used as a mode of communication between the applications. It is considered as a standard means to transport and store data. JAVA provides an execellent support and rich set of libraries to parse, modify or inquire XML documents.

This tutorial will teach you basic XML concepts and usage of various types of JAVA based XML parsers in a simple and intuitive way.

Audience

This reference has been prepared for the beginners to help them understand the basic to advanced concepts related to XML parsing using Java Programming language.

After completing this tutorial you will find yourself at a moderate level of expertise in knowledge of XML parsing using Java from where you can take yourself to next levels

Prerequisites

Knowledge of computers is not a prerequisite to follow the contents of this tutorial. This tutorial assumes no background in computers or computer programming, though basic knowledge of computer terminologies will help in understanding given concepts very easily.




Advertisements


Teknosys
Teknosys
JUnit Tutorial


JUnit Tutorial

JUnit is a unit testing framework for the Java programming language. JUnit has been important in the development of test-driven development, and is one of a family of unit testing frameworks collectively known as xUnit that originated with JUnit.

This tutorial will teach you how to use JUnit in your day-2-day life of any project unit testing while working with Java programming language.

Audience

This tutorial has been prepared for the beginners to help them understand basic functionality of JUnit tool. After completing this tutorial you will find yourself at a moderate level of expertise in using JUnit testing framework from where you can take yourself to next levels.

Prerequisites

We assume you are going to use JUnit to handle all levels of Java projects development. So it will be good if you have knowledge of software development using any programming language specially Java programming and software testing process.




Advertisements


Teknosys
Teknosys
jBPM5 Tutorial


jBPM5 Tutorial

Organizations throughout the world have been searching for a structured approach of designing their actions or transactions which can be transformed by implementing them using automated solutions. jBPM is one such tool that helps business automation needs of an organization. This tutorial provides an overview of how to use jBPM 5 in practice.

Audience

This tutorial is designed for Java professionals who would like to understand the features and capabilities of jBPM in a simple and easily understandable way.

Prerequisites

You are expected to have a basic understanding of business processes and application of technology to automate manual processes.




Advertisements


Teknosys
Teknosys
Maven Tutorial


Maven Tutorial

Apache Maven is a software project management and comprehension tool. Based on the concept of a project object model (POM), Maven can manage a project's build, reporting and documentation from a central piece of information.

This tutorial will teach you how to use Maven in your day-2-day life of any project development using Java, or any other programming language.

Audience

This tutorial has been prepared for the beginners to help them understand basic functionality of Maven tool. After completing this tutorial you will find yourself at a moderate level of expertise in using Apache Maven from where you can take yourself to next levels.

Prerequisites

We assume you are going to use Maven to handle enterprise level Java projects development. So it will be good if you have knowledge of software development, Java SE, overview of Java EE development and deployment process.




Advertisements


Teknosys
Teknosys
Java.math Packages Tutorial


Java.math package tutorial







Java.math package provides classes for performing arbitrary-precision integer arithmetic (BigInteger) and arbitrary-precision decimal arithmetic (BigDecimal).

This reference will take you through simple and practical methods available in java.math package.

Audience

This reference has been prepared for the beginners to help them understand the basic functionality related to all the methods available in Java.math package.

Prerequisites

Before you start doing practice with various types of examples given in this reference, I'm making an assumption that you are already aware of basic Java Programming.




Advertisements


Teknosys
Teknosys
Effective Resume Writing


Effective Resume Writing


A resume is a medium for advertising yourself, its the first most means which you use to present yourself and try to claim that you are the best choice to your prospects employer. Through your resume you have to showcase your major assets like ?

  • Qualifications
  • Experience
  • Achievements
  • Capabilities, and
  • Qualities

You have to prepare your resume in such a way that it gives impression in first look that you are a perfect fit for the job you have applied. An employer hardly takes 10-15 seconds to make a decision about your interview call after looking at your resume. If your resume is well written then definitely you will be in the shortlisted candidates does not matter you have required potential or not but you will get a call otherwise your resume will become a part of either recycle bin or dustbin, again it does not matter if you are Einstein or Newton.

The first draft of your resume may not be so impressive because a resume is always an evolving document which improves over the period of time, so keep modifying and improving it after its first draft and keep its different versions with you.

Now without complicating the things, I will take you through step by step to create a great resume for you. I'm assuming you have Microsoft Word to write your resume, so now just follow the following steps ?

Step 1: Address Section

This section will be on top of your resume giving a detail about your name, address, phone number and e-mail address. Keep this section left aligned and put a bold line below to the section to separate it from rest of the document as follows ?

JOHN WILLIAMS
Kondapur, Hyderabad - INDIA
Contact No: +91 2295103049
Email Id: john.william@gmail.com

  

If you are currently working then you can specify your company name just below to your name as follows ?

JOHN WILLIAMS
IT Tools India Pvt Ltd
Kondapur, Hyderabad - INDIA
Contact No: +91 2295103049
Email Id: john.william@gmail.com

  

Step 2: Summary Section

This section will start with a heading called Summary and followed by listing down your over-all experience, achievements, certifications and positive attributes etc. It is very similar to a movie trailer where editor keeps all great scenes from the movie and after watching that trailer you get excited to watch complete movie. You will have to choose attractive & heavy words while documenting this section.

To draft summary section you will have to think a while with peaceful mind, jot down great points about yourself on a plain paper and check to make them more impressive and effective. If they are not leaving any impact on the reader then there is no point in including those points in the summary section.

If you are a fresh graduate then you should specify about your small but impressive projects you have done at university, highlight your achievements and project capabilities etc.

Let's look at one example which lists down few points about a telecom System Software Engineer, in your case this list can go from 2-3 bulleted points to 8-10 points.

SUMMARY
  • A System Software Engineer graduated from Delhi University and having overall 4 years of extensive experience in developing state-of-the-art software modules for telecom industry specializing with BSS & OSS.

  • Core expertise in rating and billing services related to 2G and 3G, 3G+ technologies including GSM, GPRS, VOIP, WiMax, V-SAT, VAS Services, and Leased Lines with various access technologies.

  • A Software Assocaite Analyst grown System Software Engineer having great experience with all the stages of SDLC including designing, developing, testing and rolling out complex telecom software's.

  • Exposure in drafting and implementing different processes and have been actively involved in ISO 9001 and ISO 27001 certifications.

  • Result oriented, selft driven, highly motivated, smart and hungry to learn new technologies, methodologies, strategies and processes.

Step 3: Education Detail

Because you already have given summary of your experience and achievements, so now let's start telling about our educational background. There are many organizations who give lot of preference to your educational background. So it is important to tell about your academic records. You should put your highest degree on top and then lower qualifications at lower levels.

This is extremely important to give information about your position, rank, percentage or CPI along with degree or certification otherwise many employers would throw your resume in dustbin if you don't give clear picture of your educational background. Now lets see one example on how to put educational records in a resume.

Education Detail
  • B.Tech in Computer Science (2005) from Ambehta University with 8.8 CPI.

  • B.Sc in Mathematics (2002) from Meerut University with 57.20% marks

  • 10+2 with Maths, Stats (1999) from U.P. board with 67.20% marks

  • High School (1997) from U.P. board with 77.20% marks

  • Secured first position in statistics during B.Sc.

  • Gold medalist at 10+2 level due to highest rank in mathematics.

If you have done various certifications and trainings then I would recommend to add a separate section for
Trainings & Certifications just below to Educational Section.

Step 4: Technical Skills

Next section in your resume will present your Technical Skills. This section will start with telling your major skills on which you have good command. So list down all the skills first where you are fully confident and then keep rest of the skills at lower levels. Have a look at the following example where candidate has good command over Pro*C and C but less experienced in Perl so put Pro*C and C first and Perl later. This is important to note that all the lines given below are not required in all the cases. If you know only one skill then just tell about that skill, for example if you don't have any experience in any protocol then don't give that line in your resume

Technical Skills
  • Programming Languages: C, Pro*C, C++, JAVA and PERL

  • Operating Systems: Red Hat Linux 9.0, Windows XP and Solaris 2.0

  • Tools & Technologies: Front Page-2000, CGI, J2EE, JSP, CORBA

  • Databases: MySQL, Sybase

  • Protocols: SMTP, FTP, PO3, IMAP

  • Others: Socket Programming, Multithreading, SDLC, OOP, UML

Step 5: Projects Detail

Here comes real story and this is really important to show your all the projects, assignments etc. Reader should understand what exactly you have done in past. Here you will put hands on experience with different type of projects, people and tools and technologies. You have to be clear on what was your, organizations, year of the project, roles, responsibilities, value add, achievements etc. on each and every project or position. You should also mention about what were the tools and technologies you have used during that project.

If your experience is not project based then you can simply name this heading as Experience Detail and list down all the experiences either in buletted form or in simple & short 2-3 paragraphs.

You will start with the most recent project and continue listing down all the projects till the oldest one. If you have done only training project or thesis project then you can mention those projects along with your University projects in the same format. Here I will give examples of two projects ?

Projects Detail
1 - Library Information System [National Library, NY,USA ]
  • Duration: Mar 2005 - Jun 2005
  • Team Size: 3
  • Role Played: Developer and Tester
  • Skills Used: Pro*C, Red Hat Linux, MySQL

This system simplifies day to day operation of a library which enables you to maintain library catalogue on electronic media and to keep a record of all the issued books in a particular day. Using this system, a user can generate a report of all the available books for a particular subject or ISBN and a report can be generated for all the issued books for a particular subject or ISBN.

2 - Tiny Editor Implementation [Aligarh University, UP, INDIA]
  • Duration: Jan 2005 - Feb 2005
  • Team Size: 1
  • Role Played: Designer, Developer and Tester
  • Skills Used: Java, MySQL and Red Hat Linux

This was a small but useful text file editor which enables you to edit any text files available on Linux System. Using this editor user can open new or an existing file in text mode and can update its content and then finally that file can be saved on hard disk.

Step 6: Strengths

After giving a complete detail of all the projects, now you can tell about your major strengths. Look at the following examples, may be you don't have all the strengths so list down only whatever you posses ?

Strengths
  • Good oral, written & presentation skills

  • A high tolerance of stress and enjoys responsibilities

  • Quick learner with good grasping ability

  • Action-oriented and result-focused

  • Lead & work as a team in an organized way

  • Great time management skill

Step 7: Extra Curricular

This section is optional because it is always not necessary that you would have been involved in some extra curricular activities same time for various roles its not required to have any extra curricular. Some time this section may have lot of weightage specially when your resume reader and you have same curriculum. I'm giving you a simple example to list down your curricular activities

Extra Curricular
  • Have been a member of University Technical Council

  • Won first prize for debate at inter state level competition

  • Played Cricket at inter state level

  • Mono acting, Singing and Reading

Step 8: Personal Detail

This will be the last but mandatory section of your resume but will provide all important information about you. A simple and easy example is given here ?

Personal Detail
  • Date of Birth: 5th Aug 1983

  • Sex & Status: Male & Single

  • Nationality: INDIAN

  • Languages Known: English, Hindi, Urdu

  • Passport Number: A09384848 valid till 2018

Step 9: Conclusion

Now you are done and you have a great resume in your hand. Let me put all the sections together in a word document to prepare a final resume. You can download Sample Resume from here and you can modify this resume based on your experience, skill etc. In fact resume building is an evolutionary process and your resume will get better and better over the period of time.

I will recommend to go through the following tips to add lot of value into your resume.

  • Keep your resume file name short, simple and informational. A good resume file name could be like JohnWilliams-Resume2013.docx

  • You can keep a small passport size photo at the top-right corner of the resume but this is really not required.

  • Don't use various unnecessary formatting in your resume. Keep simple text as much as possible in your resume. Have a look at sample resume. You will find many HRs who prefer resume only in simple text format. So if you will keep resume formating simple then it would be easy to format that resume in any format.

  • Don't include too many phone numbers, email addresses or addresses.

  • Don't prepare too big resume. It should be as precise as possible.

  • Always give a summary of the resume at the beginning.

  • Always give a detail of roles and responsibilities you have taken during any project.

  • Make sure the resume is neat, free of typing errors, and on plain white paper.

  • Never give a reason for leaving your previous job, your salary expectations, your current job challenges etc, and better to leave such points to be discussed at the time of interview if required.

Hope you enjoyed reading all the above instructions and we at tutorialspoint wish you very best of luck.




Advertisements


Teknosys
Teknosys

Java Interview Questions


Advertisements




Dear readers, these Java Interview Questions have been designed especially to get you acquainted with the nature of questions you may encounter during your interview for the subject of Java Programming Language. As per my experience, good interviewers hardly planned to ask any particular question during your interview, normally questions start with some basic concept of the subject and later they continue based on further discussion and what you answer ?



Java is a high-level programming language originally developed by Sun Microsystems and released in 1995. Java runs on a variety of platforms, such as Windows, Mac OS, and the various versions of UNIX.




Java runs on a variety of platforms, such as Windows, Mac OS, and the various versions of UNIX/Linux like HP-Unix, Sun Solaris, Redhat Linux, Ubuntu, CentOS, etc.




Some features include Object Oriented, Platform Independent, Robust, Interpreted, Multi-threaded




It’s compiler generates an architecture-neutral object file format, which makes the compiled code to be executable on many processors, with the presence of Java runtime system.




Java uses Just-In-Time compiler to enable high performance. Just-In-Time compiler is a program that turns Java bytecode, which is a program that contains instructions that must be interpreted into instructions that can be sent directly to the processor.




It is designed to adapt to an evolving environment. Java programs can carry extensive amount of run-time information that can be used to verify and resolve accesses to objects on run-time.




When Java is compiled, it is not compiled into platform specific machine, rather into platform independent byte code. This byte code is distributed over the web and interpreted by virtual Machine (JVM) on whichever platform it is being run.




Netbeans, Eclipse, etc.




Some Java keywords are import, super, finally, etc.




Object is a runtime entity and it’s state is stored in fields and behavior is shown via methods. Methods operate on an object's internal state and serve as the primary mechanism for object-to-object communication.




A class is a blue print from which individual objects are created. A class can contain fields and methods to describe the behavior of an object.




A class consist of Local variable, instance variables and class variables.




Variables defined inside methods, constructors or blocks are called local variables. The variable will be declared and initialized within the method and it will be destroyed when the method has completed.




Instance variables are variables within a class but outside any method. These variables are instantiated when the class is loaded.




These are variables declared with in a class, outside any method, with the static keyword.




Singleton class control object creation, limiting the number to one but allowing the flexibility to create more objects if the situation changes.




Constructor gets invoked when a new object is created. Every class has a constructor. If we do not explicitly write a constructor for a class the java compiler builds a default constructor for that class.




An Object is first declared, then instantiated and then it is initialized.




Default value of byte datatype is 0.




Default value of float and double datatype in different as compared to C/C++. For float its 0.0f and for double it’s 0.0d




This data type is used to save space in large arrays, mainly in place of integers, since a byte is four times smaller than an int.




Class variables also known as static variables are declared with the static keyword in a class, but outside a method, constructor or a block.




Java provides access modifiers to set access levels for classes, variables, methods and constructors. A member has package or default accessibility when no accessibility modifier is specified.




Variables, methods and constructors which are declared protected in a superclass can be accessed only by the subclasses in other package or any class within the package of the protected members' class.




Java provides these modifiers for providing functionalities other than Access Modifiers, synchronized used to indicate that a method can be accessed by only one thread at a time.




Postfix operators i.e () [] . is at the highest precedence.




Variables used in a switch statement can only be a byte, short, int, or char.




This method is used to get the primitive data type of a certain String.




The String class is immutable, so that once it is created a String object cannot be changed. Since String is immutable it can safely be shared between many threads ,which is considered very important for multithreaded programming.




The String class is considered as immutable, so that once it is created a String object cannot be changed. If there is a necessity to make alot of modifications to Strings of characters then StringBuffer should be used.




Use StringBuilder whenever possible because it is faster than StringBuffer. But, if thread safety is necessary then use StringBuffer objects.




java.util.regex package is used for this purpose.




java.util.regex consists of three classes ? Pattern class, Matcher class and PatternSyntaxException class.




It is possible to define a method that will be called just before an object's final destruction by the garbage collector. This method is called finalize( ), and it can be used to ensure that an object terminates cleanly.




An exception is a problem that arises during the execution of a program. Exceptions are caught by handlers positioned along the thread's method invocation stack.




It is an exception that is typically a user error or a problem that cannot be foreseen by the programmer. For example, if a file is to be opened, but the file cannot be found, an exception occurs. These exceptions cannot simply be ignored at the time of compilation.




It is an exception that occurs that probably could have been avoided by the programmer. As opposed to checked exceptions, runtime exceptions are ignored at the time of compliation.




The Exception class has two main subclasses : IOException class and RuntimeException Class.




If a method does not handle a checked exception, the method must declare it using the throwskeyword. The throws keyword appears at the end of a method's signature.




An exception can be thrown, either a newly instantiated one or an exception that you just caught, by using throw keyword.




The finally keyword is used to create a block of code that follows a try block. A finally block of code always executes, whether or not an exception has occurred.




While creating your own exception ?

  • All exceptions must be a child of Throwable.

  • If you want to write a checked exception that is automatically enforced by the Handle or Declare Rule, you need to extend the Exception class.

  • You want to write a runtime exception, you need to extend the RuntimeException class.




It is the process where one object acquires the properties of another. With the use of inheritance the information is made manageable in a hierarchical order.




If the method overrides one of its superclass's methods, overridden method can be invoked through the use of the keyword super. It can be also used to refer to a hidden field.




Polymorphism is the ability of an object to take on many forms. The most common use of polymorphism in OOP occurs when a parent class reference is used to refer to a child class object.




It refers to the ability to make a class abstract in OOP. It helps to reduce the complexity and also improves the maintainability of the system.




These classes cannot be instantiated and are either partially implemented or not at all implemented. This class contains one or more abstract methods which are simply method declarations without a body.




If you want a class to contain a particular method but you want the actual implementation of that method to be determined by child classes, you can declare the method in the parent class as abstract.




It is the technique of making the fields in a class private and providing access to the fields via public methods. If a field is declared private, it cannot be accessed by anyone outside the class, thereby hiding the fields within the class. Therefore encapsulation is also referred to as data hiding.




The main benefit of encapsulation is the ability to modify our implemented code without breaking the code of others who use our code. With this Encapsulation gives maintainability, flexibility and extensibility to our code.




An interface is a collection of abstract methods. A class implements an interface, thereby inheriting the abstract methods of the interface.




It includes ?

  • Interface cannot be instantiated

  • An interface does not contain any constructors.

  • All of the methods in an interface are abstract.




A Package can be defined as a grouping of related types(classes, interfaces, enumerations and annotations ) providing access protection and name space management.




Packages are used in Java in-order to prevent naming conflicts, to control access, to make searching/locating and usage of classes, interfaces, enumerations and annotations, etc., easier.




A multithreaded program contains two or more parts that can run concurrently. Each part of such a program is called a thread, and each thread defines a separate path of execution.




Thread can be created by: implementing Runnable interface, extending the Thread class.




An applet is a Java program that runs in a Web browser. An applet can be a fully functional Java application because it has the entire Java API at its disposal.




An applet extends java.applet.Applet class.




It uses garbage collection to free the memory. By cleaning those objects that is no longer reference by any of the program.




An immutable object can’t be changed once it is created.




It is used with variables or methods and used to call constructer of same class.




It is a collection of element which cannot contain duplicate elements. The Set interface contains only methods inherited from Collection and adds the restriction that duplicate elements are prohibited.




It is a Set implemented when we want elements in a sorted order.




It is used to sort collections and arrays of objects using the collections.sort() and java.utils. The objects of the class implementing the Comparable interface can be ordered.




It includes:

  • Throw is used to trigger an exception where as throws is used in declaration of exception.

  • Without throws, Checked exception cannot be handled where as checked exception can be propagated with throws.




The following shows the explanation individually ?

  • public ? it is the access specifier.

  • static ? it allows main() to be called without instantiating a particular instance of a class.

  • void ? it affirns the compiler that no value is returned by main().

  • main() ? this method is called at the beginning of a Java program.

  • String args[ ] ? args parameter is an instance array of class String




Java Runtime Environment is an implementation of the Java Virtual Machine which executes Java programs. It provides the minimum requirements for executing a Java application;




JAR files is Java Archive fles and it aggregates many files into one. It holds Java classes in a library. JAR files are built on ZIP file format and have .jar file extension.




This is Web Archive File and used to store XML, java classes, and JavaServer pages. which is used to distribute a collection of JavaServer Pages, Java Servlets, Java classes, XML files, static Web pages etc.




It improves the runtime performance of computer programs based on bytecode.




Object based programming languages follow all the features of OOPs except Inheritance. JavaScript is an example of object based programming languages.




The java compiler creates a default constructor only if there is no constructor in the class.




No, this is not possible.




It is used to initialize the static data member, It is excuted before main method at the time of classloading.




Holding the reference of the other class within some other class is known as composition.




If a class has multiple functions by same name but different parameters, it is known as Method Overloading.




If a subclass provides a specific implementation of a method that is already provided by its parent class, it is known as Method Overriding.




Method overloading increases the readability of the program. Method overriding provides the specific implementation of the method that is already provided by its super class parameter must be different in case of overloading, parameter must be same in case of overriding.




Final classes are created so the methods implemented by that class cannot be overridden. It can’t be inherited.




A NullPointerException is thrown when calling the instance method of a null object, accessing or modifying the field of a null object etc.




A thread can enter the waiting state by invoking its sleep() method, by blocking on IO, by unsuccessfully attempting to acquire an object's lock, or by invoking an object's wait() method. It can also enter the waiting state by invoking its (deprecated) suspend() method.




The operating system's task scheduler allocates execution time to multiple tasks. By quickly switching between executing tasks, it creates the impression that tasks execute sequentially.




After a thread is started, via its start() method of the Thread class, the JVM invokes the thread's run() method when the thread is initially executed.




Yes, it does. The FileNoFoundException is inherited from the IOException. Exception's subclasses have to be caught first.




When a task invokes its yield() method, it returns to the ready state. When a task invokes its sleep() method, it returns to the waiting state.




The Vector class provides the capability to implement a growable array of objects. Vector proves to be very useful if you don't know the size of the array in advance, or you just need one that can change sizes over the lifetime of a program.




Unicode requires 16 bits and ASCII require 7 bits. Although the ASCII character set uses only 7 bits, it is usually represented as 8 bits. UTF-8 represents characters using 8, 16, and 18 bit patterns. UTF-16 uses 16-bit and larger bit patterns.




These are classes that allow primitive types to be accessed as objects. Example: Integer, Character, Double, Boolean etc.




The Frame class extends Window to define a main application window that can have a menu bar.




javax.Swing package. All components in Swing, except JApplet, JDialog, JFrame and JWindow are lightweight components.




The paint() method supports painting via a Graphics object. The repaint() method is used to cause paint() to be invoked by the AWT painting thread.




It is used to create objects that provide access to the files and directories of a local file system.




The Reader/Writer class hierarchy is character-oriented, and the InputStream/OutputStream class hierarchy is byte-oriented.




The Class class is used to obtain information about an object's design and java.lang.Class class instance represent classes, interfaces in a running Java application.




A static variable is associated with the class as a whole rather than with specific instances of a class. Non-static variables take on unique values with each object instance.




Serialization is the process of writing the state of an object to a byte stream. Deserialization is the process of restoring these objects.




It is part of the analysis of a program and describes a situation that a program might encounter and what behavior the program should exhibit in that circumstance.




Sub class inherits all the public and protected methods and the implementation. It also inherits all the default modifier methods and their implementation.




If there is a button instance called b1, you may add menu short cut by calling b1.setMnemonic('F'), so the user may be able to use Alt+F to click the button.




Yes, just add a main() method to the applet.




AWT components are heavy-weight, whereas Swing components are lightweight. Heavy weight components depend on the local windowing toolkit. For example, java.awt.Button is a heavy weight component, when it is running on the Java platform for Unix platform, it maps to a real Motif button.




Constructors must have the same name as the class and can not return a value. They are only called once while regular methods could be called many times.




Yes, since inheritance inherits everything from the super class and interface, it may make the subclass too clustering and sometimes error-prone when dynamic overriding or dynamic overloading in some situation.




When copying elements between different arrays, if the source or destination arguments are not arrays or their types are not compatible, an ArrayStoreException will be thrown.




Yes, use this() syntax.




The code sleep(2000); puts thread aside for exactly two seconds. The code wait(2000), causes a wait of up to two second. A thread could stop waiting earlier if it receives the notify() or notifyAll() call. The method wait() is defined in the class Object and the method sleep() is defined in the class Thread.




The ArithmeticException is thrown when integer is divided by zero or taking the remainder of a number by zero. It is never thrown in floating-point operations.




A transient variable is a variable that may not be serialized during Serialization and which is initialized by its default value during de-serialization,




Synchronization is the capability to control the access of multiple threads to shared resources. synchronized keyword in java provides locking which ensures mutual exclusive access of shared resource and prevent data race.




The Collections API is a set of classes and interfaces that support operations on collections of objects.




Garbage collection does not guarantee that a program will not run out of memory. It is possible for programs to use up memory resources faster than they are garbage collected. It is also possible for programs to create objects that are not subject to garbage collection.




Panel is the immediate superclass. A panel provides space in which an application can attach any other component, including other panels.




The = operator is right associative.




A break statement results in the termination of the statement to which it applies (switch, for, do, or while). A continue statement is used to end the current loop iteration and return control to the loop statement.




A private variable may only be accessed within the class in which it is declared.




The purpose of the System class is to provide access to system resources.




The eight primitive types are byte, char, short, int, long, float, double, and boolean.




When a window is repainted by the AWT painting thread, it sets the clipping regions to the area of the window that requires repainting.




Component class is the immediate super class.




The Java runtime system generates RuntimeException and Error exceptions.




The garbage collector invokes an object's finalize() method when it detects that the object has become unreachable.




A dead thread cannot be restarted.




Integer / and % can result in the throwing of an ArithmeticException.




The default value of the boolean type is false.




Yes




A class loader is an object that is responsible for loading classes. The class ClassLoader is an abstract class.




An abstract class can have instance methods that implement a default behavior. An Interface can only declare constants and instance methods, but cannot implement default behavior and all methods are implicitly abstract. An interface has all public members and no implementation.




Program throws "NoSuchMethodError" error at runtime.




Null, unless it is defined explicitly.




No, a top level class can not be private or protected. It can have either "public" or no modifier.




We can pass them around as method parameters where a method expects an object. It also provides utility methods.




An error is an irrecoverable condition occurring at runtime. Such as OutOfMemory error. Exceptions are conditions that occur because of bad input etc. e.g. FileNotFoundException will be thrown if the specified file does not exist.




It is not necessary that each try block must be followed by a catch block. It should be followed by either a catch block or a finally block.




A thread is in the ready state as initial state after it has been created and started.




The Locale class is used to tailor program output to the conventions of a particular geographic, political, or cultural region.




Synchronized methods are methods that are used to control access to an object. A synchronized statement can only be executed after a thread has acquired the lock for the object or class referenced in the synchronized statement.




Runtime polymorphism or dynamic method dispatch is a process in which a call to an overridden method is resolved at runtime rather than at compile-time. In this process, an overridden method is called through the reference variable of a superclass.




Binding refers to the linking of a procedure call to the code to be executed in response to the call. Dynamic binding means that the code associated with a given procedure call is not known until the time of the call at run-time.




No, constructor cannot be inherited.




ArrayList can grow dynamically and provides more powerful insertion and search mechanisms than arrays.




Deletion in linked list is fast because it involves only updating the next pointer in the node before the deleted node and updating the previous pointer in the node after the deleted node.




If you need to frequently add and remove elements from the middle of the list and only access the list elements sequentially, then LinkedList should be used. If you need to support random access, without inserting or removing elements from any place other than the end, then ArrayList should be used.




It is a collection returned by the values() method of the Map Interface, It contains all the objects present as values in the map.




The dot operator(.) is used to access the instance variables and methods of class objects.It is also used to access classes and sub-packages from a package.




Private constructor is used if you do not want other classes to instantiate the object and to prevent subclassing.T




Type casting means treating a variable of one type as though it is another type.




A thread is a execution in a program. The life cycle of a thread include ?

  • Newborn state
  • Runnable state
  • Running state
  • Blocked state
  • Dead state



The >> operator carries the sign bit when shifting right. The >>> zero-fills bits that have been shifted out.




setBounds() method is used for this purpose.




The range of the short type is -(2^15) to 2^15 - 1.




MenuItem class




No, Java does not allow Default Arguments.




Octal Numbers are denoted by leading zero in java, example: 06




Hexadecimal Numbers are denoted by leading 0x or 0X in java, example ? 0XF




Yes, an example can be break one;




Import statement is allowed at the beginning of the program file after package statement.




It is used to pause or temporarily stop the execution of the thread.




It is used to find out whether a thread is still running or not.




It is a public static method used to obtain a reference to the current thread.




The main thread is created automatically and it begins to execute immediately when a program starts. It ia thread from which all other child threads originate.




Life cycle involves the following steps ?

  • Initialization

  • Starting

  • Stopping

  • Destroying

  • Painting




It initializes the applet and is the first method to be called.




getImage(URL object, filename) is used for this purpose.




It is used to specify the name of the applet class.




It is a simple drawing surface which are used for painting images or to perform other graphical operations.




It refers to writing programs that execute across multiple devices (computers), in which the devices are all connected to each other using a network.




Sockets provide the communication mechanism between two computers using TCP. A client program creates a socket on its end of the communication and attempts to connect that socket to a server.




Sockets are flexible and sufficient. Efficient socket based programming can be easily implemented for general communications. It cause low network traffic.




Socket based communications allows only to send packets of raw data between applications. Both the client-side and server-side have to provide mechanisms to make the data useful in any way.




java.net.ServerSocket class is used by server applications to obtain a port and listen for client requests




java.net.Socket class represents the socket that both the client and server use to communicate with each other.




Generics provide compile-time type safety that allows programmers to catch invalid types at compile time. Java Generic methods and generic classes enable programmers to specify, with a single method declaration, a set of related methods or, with a single class declaration, a set of related types.




CLASSPATH and PATH are the two variables.




No, there is no need to import this package. It is by default loaded internally by the JVM.




If a class is declared within a class and specify the static modifier, the compiler treats the class just like any other top-level class. Nested top-level class is an Inner class.




Externalizable is an interface which contains two methods readExternal and writeExternal. These methods give you a control over the serialization mechanism.




No in this case the finally block will not execute because when you say System.exit (0); the control immediately goes out of the program, and thus finally never executes.




Daemon thread is a low priority thread, which runs intermittently in the back ground doing the garbage collection operation for the java runtime system.




setDaemon method is used to create a daemon thread.




All tasks must implement the run() method




The GregorianCalendar provides support for traditional Western calendars




The SimpleTimeZone class provides support for a Gregorian calendar .




The size is the number of elements actually stored in the vector, while capacity is the maximum number of elements it can store at a given instance of time.




Yes a Vector can contain heterogenous objects. Because a Vector stores everything in terms of Object.




An enumeration is an interface containing methods for accessing the underlying data structure from which the enumeration is obtained. It allows sequential access to all the elements stored in the collection.




Path and Classpath are operating system level environment variales. Path is defines where the system can find the executables(.exe) files and classpath is used to specify the location of .class files.




No, it's not possible to accessed outside it's package.




A static method should not refer to instance variables without creating an instance and cannot use "this" operator to refer the instance.




Yes an Interface can inherit another Interface, for that matter an Interface can extend more than one Interface.




Polymorphism




An object's lock is a mechanism that is used by multiple threads to obtain synchronized access to the object. A thread may execute a synchronized method of an object only after it has acquired the object's lock.




It is the casting from a general to a more specific type, i.e. casting down the hierarchy.




Order of precedence determines the order in which operators are evaluated in expressions. Associatity determines whether an expression is evaluated left-to-right or right-to-left.




A protected method may only be accessed by classes or interfaces of the same package or by subclasses of the class in which it is declared.




When a class is defined within a scope of another class, then it becomes inner class. If the access modifier of the inner class is static, then it becomes nested class.




Overridden methods must have the same name, argument list, and return type. The overriding method may not limit the access of the method it overrides.




A child object constructor always first needs to construct its parent. In Java it is done via an implicit call to the no-args constructor as the first statement.




Yes, a double value can be cast to a byte.




When an exception is thrown within the body of a try statement, the catch clauses of the try statement are examined in the order in which they appear. The first catch clause that is capable of handling the exception is executed. The remaining catch clauses are ignored.




If the array is an array of primitive types, then all the elements of the array will be initialized to the default value corresponding to that primitive type.


What is Next?

Further, you can go through your past assignments you have done with the subject and make sure you are able to speak confidently on them. If you are fresher then interviewer does not expect you will answer very complex questions, rather you have to make your basics concepts very strong.

Second it really doesn't matter much if you could not answer few questions but it matters that whatever you answered, you must have answered with confidence. So just feel confident during your interview. We at tutorialspoint wish you best luck to have a good interviewer and all the very best for your future endeavor. Cheers :-)


java_questions_answers.htm


Advertisements


Teknosys
Teknosys
Apache POI PPT Tutorial


Apache POI PPT Tutorial

Apache POI is an API that allows to create, modify and display Microsoft Office files. This open source library is developed and distributed by Apache Software Foundation.

This tutorial provides a basic understanding of Apache POI library for MS Power Point and its features.

Audience

This tutorial is designed for all the readers working on Java and especially those who want to create, read, write, and modify Power Point files using Java.

Prerequisites

A general awareness of Java programming with JDK1.5 or later versions and IO concepts in Java are the only prerequisites to understand this tutorial.




Advertisements


Teknosys
Teknosys
TestNG Tutorial


TestNG Tutorial

TestNG is a testing framework developed in the lines of JUnit and NUnit, however it introduces some new functionalities that make it more powerful and easier to use.

TestNG is designed to cover all categories of tests ? unit, functional, end-to-end, integration, etc., and it requires JDK 5 or higher.

This tutorial provides a good understanding on TestNG framework needed to test an enterprise level application to deliver it with robustness and reliability.

Audience

This tutorial is designed for software professionals interested in learning the features of TestNG Framework in simple and easy steps and implement it in practice.

Prerequisites

Before proceeding with this tutorial, you should have a basic understanding of Java programming language, text editor, and execution of programs, etc. As you are going to use TestNG to handle all levels of Java project testing, it will be helpful if you have a prior knowledge of software development and software testing processes.




Advertisements


Teknosys
Teknosys
Who is Who in Computer Science


Who is who in Computer Science

Ali Aydar

Ali Aydar

Ali Aydar is a computer scientist and Internet entrepreneur. He is the chief executive officer at Sporcle. He is best known as an early employee and key technical contributor at the original Napster. Aydar bought Fanning his first book on programming in C++, the language he would use two years later to build the Napster file-sharing software.

Anita Borg

Anita Borg

Anita Borg (January 17, 1949 – April 6, 2003) was an American computer scientist. She founded the Institute for Women and Technology (now the Anita Borg Institute for Women and Technology). While at Digital Equipment, she developed and patented a method for generating complete address traces for analyzing and designing high-speed memory systems.

Alfred Aho

Alfred Aho

Alfred Aho (born August 9, 1941) is a Canadian computer scientist best known for his work on programming languages, compilers, and related algorithms, and his textbooks on the art and science of computer programming. Aho received a B.A.Sc. in Engineering Physics from the University of Toronto.

Bjarne Stroustrup

Bjarne Stroustrup

Bjarne Stroustrup (born 30 December 1950) is a Danish computer scientist, most notable for the creation and development of the widely used C++ programming language. He is a Distinguished Research Professor and holds the College of Engineering Chair in Computer Science.

Bill Gates

Bill Gates

Bill Gates (born October 28, 1955) is an American business magnate, philanthropist, investor, computer programmer, and inventor. Gates is the former chief executive and chairman of Microsoft, the world’s largest personal-computer software company, which he co-founded with Paul Allen.

Bruce Arden

Bruce Arden

Bruce Arden (born in 1927 in Minneapolis, Minnesota) is an American computer scientist. He graduated from Purdue University with a BS(EE) in 1949 and started his computing career in 1950 with the wiring and programming of IBM's hybrid (mechanical and electronic) Card Programmed Computer/Calculator at the Allison Division of General Motors.

Brendan Eich

Brendan Eich

Brendan Eich (born 1960 or 1961)is an American technologist and creator of the JavaScript scripting language. He cofounded the Mozilla project, the Mozilla Foundation and the Mozilla Corporation, and served as the Mozilla Corporation's chief technical officer and briefly its chief executive officer.

Barry Boehm

Barry Boehm

Barry Boehm (born 1935) is an American software engineer, Distinguished Professor of Computer Science, Industrial and Systems Engineering, the TRW Professor of Software Engineering. He is known for his many contributions to the area of software engineering.

Bert Bos

Bert Bos

Bert Bos (born 10 November 1963, The Hague, Netherlands) is a computer scientist. He studied mathematics at the University of Groningen, and wrote his PhD thesis on Rapid user interface development with the script language Gist. In 1996, he joined the World Wide Web Consortium (W3C) to work on Cascading Style Sheets (CSS).

Bryan Cantrill

Bryan Cantrill

Bryan Cantrill (born 1973) is an American Software Engineer who worked at Sun Microsystems and later at Oracle Corporation following its acquisition of Sun. Cantrill was included in the TR35 list for his development of DTrace, a function of the OS Solaris 10 that provides a non-invasive means for real-time tracing and diagnosis of software. He is currently Chief Technology Officer at Joyent.

Charles Babbage

Charles Babbage

Charles Babbage FRS (26 December 1791 – 18 October 1871) was an English polymath. He was a mathematician, philosopher, inventor and mechanical engineer, who is best remembered now for originating the concept of a programmable computer.

Dennis Ritchie

Dennis Ritchie

Dennis Ritchie(September 9, 1941 – c. October 12, 2011) was an American computer scientist. He created the C programming language and, with long-time colleague Ken Thompson, the Unix operating system. Ritchie and Thompson received the Turing Award from the ACM in 1983.

David J. Brown

David J. Brown

David J. Brown is an American computer scientist. He was one of a small group that helped to develop the system at Stanford that later resulted in Sun Microsystems, and later was a founder Silicon Graphics in 1982. He define the application binary interface for Solaris, Sun's principal system software product.

Edgar F. Codd

Edgar F. Codd

Edgar F. Codd (August 19, 1923 – April 18, 2003) was an English computer scientist who, while working for IBM, invented the relational model for database management, the theoretical basis for relational databases. He made other valuable contributions to computer science.

Frances Allen

Frances Allen

Frances Allen (born August 4, 1932) is an American computer scientist and pioneer in the field of optimizing compilers. Her achievements include seminal work in compilers, code optimization, and parallelization. She also had a role in intelligence work on programming languages.

Gordon Bell

Gordon Bell

Gordon Bell (born August 19, 1934) is an American electrical engineer and manager. An early employee of Digital Equipment Corporation (DEC) 1960–1966, Bell designed several of their PDP machines and later became Vice President of Engineering 1972-1983, overseeing the development of the VAX.

Gregory Chaitin

Gregory Chaitin

Gregory Chaitin (born 15th. November, 1947 in Argentina) is an Argentine-American mathematician and computer scientist. Beginning in the late 1960s, Chaitin made contributions to algorithmic information theory and metamathematics, in particular an computer-theoretic result equivalent to Godel's incompleteness theorem.

James Gosling

James Gosling

James Gosling OC (born May 19, 1955) is a Canadian computer scientist, best known as the father of the Java programming language. In 1977, Gosling received a Bachelor of Science in Computer Science from the University of Calgary.

John Backus

John Backus

John Backus (December 3, 1924 – March 17, 2007) was an American computer scientist. He directed the team that invented the first widely used high-level programming language (FORTRAN) and was the inventor of the Backus-Naur form (BNF), a widely used notation to define formal language syntax.

Jon Crowcroft

Jon Crowcroft

John Crowcroft (born 23 November 1957) is the Marconi Professor of Communications Systems in the Computer Laboratory of the University of Cambridge. Professor Jon Crowcroft is distinguished for his many seminal contributions to the development of the Internet. His work on satellite link interconnection techniques in the 1980s paved the way for rural broadband.

Larry Page

Larry Page

Larry Page (born March 26, 1973) is an American business magnate and computer scientist who is the co-founder of Google, alongside Sergey Brin. On April 4, 2011, Page succeeded Eric Schmidt as the chief executive officer of Google. As of 2014, Page's personal wealth is estimated to be US$32. 3 billion, ranking him #19 on the Forbes list of billionaires.

Larry Wall

Larry Wall

Larry Wall (born September 27, 1954) is a computer programmer and author, most widely known as the creator of the Perl programming language and Camelia, the spunky spokesbug for Perl 6. Wall grew up in south Los Angeles and then Bremerton, Washington, before starting higher education at Seattle Pacific University in 1976.

Linus Torvalds

Linus Torvalds

Linus Benedict Torvalds (born December 28, 1969) is a Finnish American software engineer, and he is well known for the architect and development of the Linux kernel. He was honored, along with Shinya Yamanaka, with the 2012 Millennium Technology Prize by the Technology Academy Finland "in recognition of his creation of a new open source operating system for computers leading to the widely used Linux kernel.

Luis Von Ahn

Luis Von Ahn

Luis Von Ahn (born 1979) is a Guatemalan entrepreneur and an associate professor in the Computer Science Department at Carnegie Mellon University. He is known as one of the pioneers of crowdsourcing. He is the founder of the company reCAPTCHA, which was sold to Google in 2009, and the co-founder and CEO of Duolingo, a popular language-learning platform.

Luca Cardelli

Luca Cardelli

Luca Cardelli FRS is an Italian computer scientist who is an Assistant Director at Microsoft Research in Cambridge, UK. Cardelli is well known for his research in type theory and operational semantics. Among other contributions, he helped design Modula-3, implemented the first compiler for the (non-pure) functional programming language ML.

Michael Dell

Michael Dell

Michael Dell (born February 23, 1965) is an American business magnate, investor, philanthropist, and author. He is known as the founder and CEO of Dell Inc., one of the world’s leading sellers of personal computers (PCs).

Michael Dertouzos

Michael Dertouzos

Michael Dertouzos (November 5, 1936 - August 27, 2001) was a Professor at the Massachusetts Institute of Technology and Director of the M.I.T. Laboratory for Computer Science (LCS) from 1974 to 2001. During Dertouzos's term, LCS innovated in a variety of areas, including RSA encryption, the spreadsheet, the NuBus, the X Window System, and the Internet.

Maurice Vincent Wilkes

Maurice Vincent Wilkes

Maurice Vincent Wilkes (26 June 1913 – 29 November 2010) was a British computer scientist credited with several important developments in computing. At the time of his death, Wilkes was an Emeritus Professor of the University of Cambridge. He received a number of distinctions.

Nello Cristianini

Nello Cristianini

Nello Cristianini (born 1968) is a Professor of Artificial Intelligence at the University of Bristol, a recipient of the Royal Society Wolfson Research Merit Award. His research contributions across different areas, such as machine learning, artificial intelligence and bioinformatics. Specifically, his work is concentrated in the statistical analysis of the learning algorithms.

Philip Don Estridge

Philip Don Estridge

Philip Don Estridge (June 23, 1937 - August 2, 1985), known as Don Estridge, led development of the original IBM Personal Computer (PC), and thus is known as "father of the IBM PC". His decisions dramatically changed the computer industry, resulting in a vast increase in the number of personal computers sold and bought.

Philip Matthaus Hahn

Philipp Matthaus Hahn

Philipp November 25, 1739 in Scharnhausen, today part of Ostfildern - May 2, 1790 in Echterdingen, today part of Leinfelden-Echterdingen) was a German priest and inventor. In about 1763 he devised a precision sundial, or heliochronometer that incorporated the correction for the equation of time.

Per Brinch Hansen

Per Brinch Hansen

Per Brinch Hansen (November 13, 1938 – July 31, 2007) was a Danish-American computer scientist known for concurrent programming theory. In 1970, his research in computer science focused on concurrent programming, Inspired by Ole-Johan Dahl and Kristen Nygaard's programming language Simula 67, he invented the monitor concept in 1972.

Rasmus Lerdorf

Rasmus Lerdorf

Rasmus Lerdorf (born 22 November 1968) is a Greenlandic programmer with Canadian citizenship. He created the PHP scripting language, authoring the first two versions of the language and participating in the development of later versions led by a group of developers including Jim Winstead.

Richard Stallman

Richard Stallman

Richard Stallman (born March 16, 1953) is an American is a software freedom activist and computer programmer. He is best known for launching the GNU Project, founding the Free Software Foundation, developing the GNU Compiler Collection and GNU Emacs, and writing the GNU General Public License.

Robert S. Boyer

Robert S. Boyer

Robert S.Boyer is a retired professor of computer science, mathematics, and philosophy at The University of Texas at Austin. He and J Strother Moore invented the Boyer–Moore string search algorithm, a particularly efficient string searching algorithm, in 1977. He and Moore also collaborated on the Boyer–Moore automated theorem prover, Nqthm, in 1992.

Sabeer Bhatia

Sabeer Bhatia

Sabeer Bhatia was born in Chandigarh on 30 December 1968. He grew up in Bangalore and had his early education at the Bishop's School in Pune and then at St Joseph's Boys High School in Bangalore. Sabeer Bhatia is an Indian American entrepreneur who founded the Hotmail email service and Jaxt.

Sergey brin

Sergey brin

Sergey Brin (born August 21, 1973) is an American computer scientist and internet entrepreneur who, with Larry Page, co-founded Google, one of the most profitable Internet companies. As of June 2014, his personal wealth was estimated to be US$ 30 billion. Together, Brin and Page own about 16 percent of the company.

Serge Abiteboul

Serge Abiteboul

Serge Abiteboul is a computer scientist working in the areas of data management, database theory, and finite model theory. He is currently a senior researcher at the Institute national de recherche en informatique et en automatique (INRIA), the French national research institute focussing on computer science and related areas, and has been a professor of the College de France.

Tim Berners Lee

Tim Berners Lee

Tim Berners Lee (born 8 June 1955), also known as "TimBL", is a British computer scientist, best known as the inventor of the World Wide Web. Berners Lee is the director of the World Wide Web Consortium (W3C), which oversees the Web's continued development.

Vint Cerf

Vint Cerf

Vint Cerf ( born June 23, 1943) is an American internet pioneer, who is recognized as one of "the fathers of the Internet", sharing this title with American engineer Bob Kahn. His contributions have been acknowledged and lauded, repeatedly. He was instrumental in the development of the first commercial email system (MCI Mail) connected to the Internet.




Advertisements


Teknosys
Teknosys
Teknosys
Teknosys
XStream Tutorial


XStream Tutorial

XStream is a simple Java-based library to serialize Java objects to XML and vice versa. This is a brief tutorial that adopts a simple and intuitive way to explain the basic feature of XStream library and how to use them.

Audience

This tutorial has been prepared to suit the requirements of Java developers who would like to understand the basic of XStream library and use it in their Java programs. from beginner to expert level.

Prerequisites

Since XStream is a Java-based library, you need to have a clear understanding of Java programming in order to make use of this library.




Advertisements


Teknosys
Teknosys
Teknosys
Teknosys
Java Tutorial


Java - Tutorial

Java is a high-level programming language originally developed by Sun Microsystems and released in 1995. Java runs on a variety of platforms, such as Windows, Mac OS, and the various versions of UNIX. This tutorial gives a complete understanding of Java.

This reference will take you through simple and practical approach while learning Java Programming language.

Audience

This reference has been prepared for the beginners to help them understand the basic to advanced concepts related to Java Programming language.

Prerequisites

Before you start doing practice with various types of examples given in this reference, I'm making an assumption that you are already aware about what is a computer program and what is a computer programming language?

Execute Java Online

For most of the examples given in this tutorial you will find Try it option, so just make use of this option to execute your Java programs at the spot and enjoy your learning.

Try following example using Try it option available at the top right corner of the below sample code box ?

public class MyFirstJavaProgram {

    public static void main(String []args) {
       System.out.println("Hello World");
    }
} 



Advertisements


Teknosys
Teknosys
log4j Tutorial


log4j Tutorial

log4j is a reliable, fast and flexible logging framework (APIs) written in Java, which is distributed under the Apache Software License. log4j is a popular logging package written in Java. log4j has been ported to the C, C++, C#, Perl, Python, Ruby, and Eiffel languages.

Audience

This tutorial has been prepared for beginners to help them understand the basic functionality of log4J logging framework.

Prerequisites

As you are going to use Log4J logging framework in various Java-based application development, it is imperative that you should have a good understanding of Java programming language.




Advertisements


Teknosys
Teknosys
jMeter tutorial


jMeter Tutorial

jMeter is an Open Source testing software. It is 100% pure Java application for load and performance testing. jMeter is designed to cover categories of tests like load, functional, performance, regression, etc., and it requires JDK 5 or higher. This tutorial will give you great understanding on jMeter framework needed to test an enterprise level application to deliver it with robustness and reliability.

Audience

This tutorial is designed for Software Professionals, who are willing to learn jMeter Framework in simple and easy steps. This tutorial will give you great understanding on jMeter Framework concepts, and after completing this tutorial, you will be at intermediate level of expertise from where you can take yourself to higher level of expertise.

Prerequisites

Before proceeding with this tutorial, you should have a basic understanding of Java programming language, text editor and execution of programs, etc., because you are going to use jMeter to handle all levels of Java project testing (regression, functional, load, performance, etc.,), so it will be good if you have knowledge of software development and software testing processes.




Advertisements


Teknosys
Teknosys
AWT Tutorial


AWT Tutorial

JAVA provides a rich set of libraries to create Graphical User Interface in platform independent way. In this article we'll look in AWT (Abstract Window Toolkit).

Audience

This tutorial is designed for Software Professionals who are willing to learn JAVA GUI Programming in simple and easy steps. This tutorial will give you great understanding on JAVA GUI Programming concepts and after completing this tutorial you will be at intermediate level of expertise from where you can take yourself at higher level of expertise.

Prerequisites

Before proceeding with this tutorial you should have a basic understanding of Java programming language, text editor and execution of programs etc.




Advertisements


Teknosys
Teknosys
JasperReports Tutorial


JasperReports Tutorial







Jasper Report is an open source java reporting engine, is Java based and doesn't have its own expression syntax.

As JasperReports is a Java class library, and is not meant for end users, but rather is targeted towards Java developers who need to add reporting capabilities to their applications.

Audience

This tutorial has been prepared for the Java developers who wish to equip themselves with reporting capabilities. After completing this tutorial you will find yourself at a moderate level of expertise in JasperReports from where you can take yourself to next levels.

Prerequisites

Before proceeding with this tutorial you should have a good understanding of Java programming language. A basic understanding of Apache ANT is also required because all the examples have been compiled and executed using ANT.




Advertisements


Teknosys
Teknosys
Jackson Tutorial


Jackson Tutorial

Jackson is a very popular and efficient Java-based library to serialize or map Java objects to JSON and vice versa. This tutorial uses a simple and intuitive way to explain the basic features of Jackson library API and how to use them in practice.

Audience

This tutorial will be useful for most Java developers, regardless of whether they are beginners or experts.

Prerequisites

Jackson is a Java-based library and it is imperative that you should have a thorough knowledge of Java programming language before proceeding with this tutorial.




Advertisements


Teknosys
Teknosys
Spring Tutorial


Spring Tutorial







Spring framework is an open source Java platform that provides comprehensive infrastructure support for developing robust Java applications very easily and very rapidly.

Spring framework was initially written by Rod Johnson and was first released under the Apache 2.0 license in June 2003.

This tutorial has been written based on Spring Framework version 4.1.6 released in Mar 2015.

Audience

This tutorial is designed for Java programmers with a need to understand the Spring framework in detail along with its architecture and actual usage. This tutorial will bring you at intermediate level of expertise from where you can take yourself at higher level of expertise.

Prerequisites

Before proceeding with this tutorial you should have a good understanding of Java programming language. A basic understanding of Eclipse IDE is also required because all the examples have been compiled using Eclipse IDE.

Questions and Answers

Spring Questions and Answers has been designed with a special intention of helping students and professionals preparing for various Certification Exams and Job Interviews. This section provides a useful collection of sample Interview Questions and Multiple Choice Questions (MCQs) and their answers with appropriate explanations - Study Spring Questions and Answers




Advertisements


Teknosys
Teknosys
Eclipse Tutorial


Eclipse Tutorial







Eclipse is an integrated development environment (IDE) for Java and other programming languages like C, C++, PHP, and Ruby etc. Development environment provided by Eclipse includes the Eclipse Java development tools (JDT) for Java, Eclipse CDT for C/C++, and Eclipse PDT for PHP, among others.

This tutorial will teach you how to use Eclipse in your day-2-day life while developing any software project using Eclipse IDE. We will give special emphasis on Java project.

Audience

This tutorial has been prepared for the beginners to help them understand basic functionality of Eclipse tool. After completing this tutorial you will find yourself at a moderate level of expertise in using Eclipse IDE from where you can take yourself to next levels.

Prerequisites

We assume you are going to use Eclipse IDE to handle all levels of Java projects development. So it will be good if you have knowledge of software development using any programming language specially Java programming.




Advertisements


Teknosys
Teknosys
JOGL Tutorial


JOGL Tutorial

This tutorial provides you the basic understanding of Java OpenGL library and its features. This tutorial also teaches how to develop 2D and 3D graphics applications using JOGL.

Audience

This tutorial is designed for the readers pursuing education in Java software development, web development domain and for all the enthusiastic readers.

Prerequisites

You need to have basic knowledge of Java programming, understanding of basic concepts such as AWT and Swings. Also, awareness of OpenGL graphics API is mandatory.




Advertisements


Teknosys
Teknosys
Computer Glossary

A

B

C

D

E

F

G

H

I

J

K

L

M

N

O

P

Q

R

S

T

U

V

W

X

Y

Z

Computer Glossary


Advertisements





Applet

A small Java application that is downloaded by an ActiveX or Java-enabled web browser. Once it has been downloaded, the applet will run on the user's computer. Common applets include financial calculators and web drawing programs.

Application

Computer software that performs a task or set of tasks, such as word processing or drawing. Applications are also referred to as programs.

ASCII

American Standard Code for Information Interchange, an encoding system for converting keyboard characters and instructions into the binary number code that the computer understands.

Bandwidth

The capacity of a networked connection. Bandwidth determines how much data can be sent along the networked wires. Bandwidth is particularly important for Internet connections, since greater bandwidth also means faster downloads.

Binary code

The most basic language a computer understands, it is composed of a series of 0s and 1s. The computer interprets the code to form numbers, letters, punctuation marks, and symbols.

Bit

The smallest piece of computer information, either the number 0 or 1. In short they are called binary digits.

Boot

To start up a computer. Cold boot means restarting computer after the power is turned off. Warm boot means restarting computer without turning off the power.

Browser

Software used to navigate the Internet. Google Chrome, Firefox, Netscape Navigator and Microsoft Internet Explorer are today's most popular browsers for accessing the World Wide Web.

Bug

A malfunction due to an error in the program or a defect in the equipment.

Byte

Most computers use combinations of eight bits, called bytes, to represent one character of data or instructions. For example, the word cat has three characters, and it would be represented by three bytes.

Cache

A small data-memory storage area that a computer can use to instantly re-access data instead of re-reading the data from the original source, such as a hard drive. Browsers use a cache to store web pages so that the user may view them again without reconnecting to the Web.

CAD-CAM

Computer Aided Drawing - Computer Aided Manufacturing. The instructions stored in a computer that will be translated to very precise operating instructions to a robot, such as for assembling cars or laser-cutting signage.

CD-ROM

Compact Disc Read-Only Memory, an optically read disc designed to hold information such as music, reference materials, or computer software. A single CD-ROM can hold around 640 megabytes of data, enough for several encyclopaedias. Most software programs are now delivered on CD-ROMs.

CGI

Common Gateway Interface, a programming standard that allows visitors to fill out form fields on a Web page and have that information interact with a database, possibly coming back to the user as another Web page. CGI may also refer to Computer-Generated Imaging, the process in which sophisticated computer programs create still and animated graphics, such as special effects for movies.

Chat

Typing text into a message box on a screen to engage in dialogue with one or more people via the Internet or other network.

Chip

A tiny wafer of silicon containing miniature electric circuits that can store millions of bits of information.

Client

A single user of a network application that is operated from a server. A client/server architecture allows many people to use the same data simultaneously. The program's main component (the data) resides on a centralized server, with smaller components (user interface) on each client.

Cookie

A text file sent by a Web server that is stored on the hard drive of a computer and relays back to the Web server things about the user, his or her computer, and/or his or her computer activities.

CPU

Central Processing Unit. The brain of the computer.

Cracker

A person who breaks in to a computer through a network, without authorization and with mischievous or destructive intent.

Crash

A hardware or software problem that causes information to be lost or the computer to malfunction. Sometimes a crash can cause permanent damage to a computer.

Cursor

A moving position-indicator displayed on a computer monitor that shows a computer operator where the next action or operation will take place.

Cyberspace

Slang for internet ie. An international conglomeration of interconnected computer networks. Begun in the late 1960s, it was developed in the 1970s to allow government and university researchers to share information. The Internet is not controlled by any single group or organization. Its original focus was research and communications, but it continues to expand, offering a wide array of resources for business and home users.

Database

A collection of similar information stored in a file, such as a database of addresses. This information may be created and stored in a database management system (DBMS).

Debug

Slang. To find and correct equipment defects or program malfunctions.

Default

The pre-defined configuration of a system or an application. In most programs, the defaults can be changed to reflect personal preferences.

Desktop

The main directory of the user interface. Desktops usually contain icons that represent links to the hard drive, a network (if there is one), and a trash or recycling can for files to be deleted. It can also display icons of frequently used applications, as requested by the user.

Desktop publishing

The production of publication-quality documents using a personal computer in combination with text, graphics, and page layout programs.

Directory

A repository where all files are kept on computer.

Disk

Two distinct types. The names refer to the media inside the container:

A hard disc stores vast amounts of data. It is usually inside the computer but can be a separate peripheral on the outside. Hard discs are made up of several rigid coated metal discs. Currently, hard discs can store 15 to 30 Gb (gigabytes).

A floppy disc, 3.5" square, usually inserted into the computer and can store about 1.4 megabytes of data. The 3.5" square floppies have a very thin, flexible disc inside. There is also an intermediate-sized floppy disc, trademarked Zip discs, which can store 250 megabytes of data.

Disk drive

The equipment that operates a hard or floppy disc.

Domain

Represents an IP (Internet Protocol) address or set of IP addresses that comprise a domain. The domain name appears in URLs to identify web pages or in email addresses. For example, the email address for the First Lady is first.lady@whitehouse.gov, whitehouse.gov, being the domain name. Each domain name ends with a suffix that indicates what top level domain it belongs to. These are : .com for commercial, .gov for government, .org for organization, .edu for educational institution, .biz for business, .info for information, .tv for television, .ws for website. Domain suffixes may also indicate the country in which the domain is registered. No two parties can ever hold the same domain name.

Domain name

The name of a network or computer linked to the Internet. Domains are defined by a common IP address or set of similar IP (Internet Protocol) addresses.

Download

The process of transferring information from a web site (or other remote location on a network) to the computer. It is possible to download a file which include text, image, audio, video and many others.

DOS

Disk Operating System. An operating system designed for early IBM-compatible PCs.

Drop-down menu

A menu window that opens vertically on-screen to display context-related options. Also called pop-up menu or pull-down menu.

DSL

Digital Subscriber Line, a method of connecting to the Internet via a phone line. A DSL connection uses copper telephone lines but is able to relay data at much higher speeds than modems and does not interfere with telephone use.

DVD

Digital Video Disc. Similar to a CD-ROM, it stores and plays both audio and video.

E-book

An electronic (usually hand-held) reading device that allows a person to view digitally stored reading materials.

Email

Electronic mail; messages, including memos or letters, sent electronically between networked computers that may be across the office or around the world.

Emoticon

A text-based expression of emotion created from ASCII characters that mimics a facial expression when viewed with your head tilted to the left. Here are some examples:

  • Smiling
  • Frowning
  • Winking
  • Crying

Encryption

The process of transmitting scrambled data so that only authorized recipients can unscramble it. For instance, encryption is used to scramble credit card information when purchases are made over the Internet.

Ethernet

A type of network.

Ethernet card

A board inside a computer to which a network cable can be attached.

File

A set of data that is stored in the computer.

Firewall

A set of security programs that protect a computer from outside interference or access via the Internet.

Folder

A structure for containing electronic files. In some operating systems, it is called a directory.

Fonts

Sets of typefaces (or characters) that come in different styles and sizes.

Freeware

Software created by people who are willing to give it away for the satisfaction of sharing or knowing they helped to simplify other people's lives. It may be free-standing software, or it may add functionality to existing software.

FTP

File Transfer Protocol, a format and set of rules for transferring files from a host to a remote computer.

Gigabyte (GB)

1024 megabytes. Also called gig.

Glitch

The cause of an unexpected malfunction.

Gopher

An Internet search tool that allows users to access textual information through a series of menus, or if using FTP, through downloads.

GUI

Graphical User Interface, a system that simplifies selecting computer commands by enabling the user to point to symbols or illustrations (called icons) on the computer screen with a mouse.

Groupware

Software that allows networked individuals to form groups and collaborate on documents, programs, or databases.

Hacker

A person with technical expertise who experiments with computer systems to determine how to develop additional features. Hackers are occasionally requested by system administrators to try and break into systems via a network to test security. The term hacker is sometimes incorrectly used interchangeably with cracker. A hacker is called a white hat and a cracker a black hat.

Hard copy

A paper printout of what you have prepared on the computer.

Hard drive

Another name for the hard disc that stores information in a computer.

Hardware

The physical and mechanical components of a computer system, such as the electronic circuitry, chips, monitor, disks, disk drives, keyboard, modem, and printer.

Home page

The main page of a Web site used to greet visitors, provide information about the site, or to direct the viewer to other pages on the site.

HTML

Hypertext Markup Language, a standard of text markup conventions used for documents on the World Wide Web. Browsers interpret the codes to give the text structure and formatting (such as bold, blue, or italic).

HTTP

Hypertext Transfer Protocol, a common system used to request and send HTML documents on the World Wide Web. It is the first portion of all URL addresses on the World Wide Web.

HTTPS

Hypertext Transfer Protocol Secure, often used in intracompany internet sites. Passwords are required to gain access.

Hyperlink

Text or an image that is connected by hypertext coding to a different location. By selecting the text or image with a mouse, the computer jumps to (or displays) the linked text.

Hypermedia

Integrates audio, graphics, and/or video through links embedded in the main program.

Hypertext

A system for organizing text through links, as opposed to a menu-driven hierarchy such as Gopher. Most Web pages include hypertext links to other pages at that site, or to other sites on the World Wide Web.

Icons

Symbols or illustrations appearing on the computer screen that indicate program files or other computer functions.

Input

Data that goes into a computer device.

Input device

A device, such as a keyboard, stylus and tablet, mouse, puck, or microphone, that allows input of information (letters, numbers, sound, video) to a computer.

Instant messaging (IM)

A chat application that allows two or more people to communicate over the Internet via real-time keyed-in messages.

Interface

The interconnections that allow a device, a program, or a person to interact. Hardware interfaces are the cables that connect the device to its power source and to other devices. Software interfaces allow the program to communicate with other programs (such as the operating system), and user interfaces allow the user to communicate with the program (e.g., via mouse, menu commands, icons, voice commands, etc.).

Internet

An international conglomeration of interconnected computer networks. Begun in the late 1960s, it was developed in the 1970s to allow government and university researchers to share information. The Internet is not controlled by any single group or organization. Its original focus was research and communications, but it continues to expand, offering a wide array of resources for business and home users.

IP (Internet Protocol) address

An Internet Protocol address is a unique set of numbers used to locate another computer on a network. The format of an IP address is a 32-bit string of four numbers separated by periods. Each number can be from 0 to 255 (i.e., 1.154.10.266). Within a closed network IP addresses may be assigned at random, however, IP addresses of web servers must be registered to avoid duplicates.

Java

An object-oriented programming language designed specifically for programs (particularly multimedia) to be used over the Internet. Java allows programmers to create small programs or applications (applets) to enhance Web sites.

JavaScript/ECMA script

A programming language used almost exclusively to manipulate content on a web page. Common JavaScript functions include validating forms on a web page, creating dynamic page navigation menus, and image rollovers.

Kilobyte (K or KB)

Equal to 1,024 bytes.

Linux

A UNIX - like, open-source operating system developed primarily by Linus Torvalds. Linux is free and runs on many platforms, including both PCs and Macintoshes. Linux is an open-source operating system, meaning that the source code of the operating system is freely available to the public. Programmers may redistribute and modify the code, as long as they don't collect royalties on their work or deny access to their code. Since development is not restricted to a single corporation more programmers can debug and improve the source code faster.

Laptop and notebook

Small, lightweight, portable battery-powered computers that can fit onto your lap. They each have a thin, flat, liquid crystal display screen.

Macro

A script that operates a series of commands to perform a function. It is set up to automate repetitive tasks.

Mac OS

An operating system with a graphical user interface, developed by Apple for Macintosh computers. Current System X.1.(10) combines the traditional Mac interface with a strong underlying UNIX. Operating system for increased performance and stability.

Megabyte (MB)

Equal to 1,048,576 bytes, usually rounded off to one million bytes (also called a meg).

Memory

Temporary storage for information, including applications and documents. The information must be stored to a permanent device, such as a hard disc or CD-ROM before the power is turned off, or the information will be lost. Computer memory is measured in terms of the amount of information it can store, commonly in megabytes or gigabytes.

Menu

A context-related list of options that users can choose from.

Menu bar

The horizontal strip across the top of an application's window. Each word on the strip has a context sensitive drop-down menu containing features and actions that are available for the application in use.

Merge

To combine two or more files into a single file.

MHz

An abbreviation for Megahertz, or one million hertz. One MHz represents one million clock cycles per second and is the measure of a computer microprocessor's speed. For example, a microprocessor that runs at 300 MHz executes 300 million cycles per second. Each instruction a computer receives takes a fixed number of clock cycles to carry out, therefore the more cycles a computer can execute per second, the faster its programs run. Megahertz is also a unit of measure for bandwidth.

Microprocessor

A complete central processing unit (CPU) contained on a single silicon chip.

Minimize

A term used in a GUI operating system that uses windows. It refers to reducing a window to an icon, or a label at the bottom of the screen, allowing another window to be viewed.

Modem

A device that connects two computers together over a telephone or cable line by converting the computer's data into an audio signal. Modem is a contraction for the process it performs : modulate-demodulate.

Monitor

A video display terminal.

Mouse

A small hand-held device, similar to a trackball, used to control the position of the cursor on the video display; movements of the mouse on a desktop correspond to movements of the cursor on the screen.

MP3

Compact audio and video file format. The small size of the files makes them easy to download and e-mail. Format used in portable playback devices.

Multimedia

Software programs that combine text and graphics with sound, video, and animation. A multimedia PC contains the hardware to support these capabilities.

MS-DOS

An early operating system developed by Microsoft Corporation (Microsoft Disc Operating System).

Network

A system of interconnected computers.

Open source

Computer programs whose original source code was revealed to the general public so that it could be developed openly. Software licensed as open source can be freely changed or adapted to new uses, meaning that the source code of the operating system is freely available to the public. Programmers may redistribute and modify the code, as long as they don't collect royalties on their work or deny access to their code. Since development is not restricted to a single corporation more programmers can debug and improve the source code faster.

Operating system

A set of instructions that tell a computer on how to operate when it is turned on. It sets up a filing system to store files and tells the computer how to display information on a video display. Most PC operating systems are DOS (disc operated system) systems, meaning the instructions are stored on a disc (as opposed to being originally stored in the microprocessors of the computer). Other well-known operating systems include UNIX, Linux, Macintosh, and Windows.

Output

Data that come out of a computer device. For example, information displayed on the monitor, sound from the speakers, and information printed to paper.

Palm

A hand-held computer.

PC

Personal computer. Generally refers to computers running Windows with a Pentium processor.

PC board

Printed Circuit board, a board printed or etched with a circuit and processors. Power supplies, information storage devices, or changers are attached.

PDA

Personal Digital Assistant, a hand-held computer that can store daily appointments, phone numbers, addresses, and other important information. Most PDAs link to a desktop or laptop computer to download or upload information.

PDF

Portable Document Format, a format presented by Adobe Acrobat that allows documents to be shared over a variety of operating systems. Documents can contain words and pictures and be formatted to have electronic links to other parts of the document or to places on the web.

Pentium chip

Intel's fifth generation of sophisticated high-speed microprocessors. Pentium means the fifth element.

Peripheral

Any external device attached to a computer to enhance operation. Examples include external hard drive, scanner, printer, speakers, keyboard, mouse, trackball, stylus and tablet, and joystick.

Personal computer (PC)

A single-user computer containing a central processing unit (CPU) and one or more memory circuits.

Petabyte

A measure of memory or storage capacity and is approximately a thousand terabytes.

Petaflop

A theoretical measure of a computer's speed and can be expressed as a thousand-trillion floating-point operations per second.

Platform

The operating system, such as UNIX, Macintosh, Windows, on which a computer is based.

Plug and play

Computer hardware or peripherals that come set up with necessary software so that when attached to a computer, they are recognized by the computer and are ready to use.

Pop-up menu

A menu window that opens vertically or horizontally on-screen to display context-related options. Also called drop-down menu or pull-down menu.

Power PC

A competitor of the Pentium chip. It is a new generation of powerful sophisticated microprocessors produced from an Apple-IBM-Motorola alliance.

Printer

A mechanical device for printing a computer's output on paper. There are three major types of printer:

  • Dot matrix - creates individual letters, made up of a series of tiny ink dots, by punching a ribbon with the ends of tiny wires. (This type of printer is most often used in industrial settings, such as direct mail for labelling.)

  • Ink jet - sprays tiny droplets of ink particles onto paper.

  • Laser - uses a beam of light to reproduce the image of each page using a magnetic charge that attracts dry toner that is transferred to paper and sealed with heat.

Program

A precise series of instructions written in a computer language that tells the computer what to do and how to do it. Programs are also called software or applications.

Programming language

A series of instructions written by a programmer according to a given set of rules or conventions (syntax). High-level programming languages are independent of the device on which the application (or program) will eventually run; low-level languages are specific to each program or platform. Programming language instructions are converted into programs in language specific to a particular machine or operating system (machine language). So that the computer can interpret and carry out the instructions. Some common programming languages are BASIC, C, C++, dBASE, FORTRAN, and Perl.

Puck

An input device, like a mouse. It has a magnifying glass with crosshairs on the front of it that allows the operator to position it precisely when tracing a drawing for use with CAD-CAM software.

Pull-down menu

A menu window that opens vertically on-screen to display context-related options. Also called drop-down menu or pop-up menu.

Push technology

Internet tool that delivers specific information directly to a user's desktop, eliminating the need to surf for it. PointCast, which delivers news in user-defined categories, is a popular example of this technology.

QuickTime

Audio-visual software that allows movie-delivery via the Internet and e-mail. QuickTime images are viewed on a monitor.

RAID

Redundant Array of Inexpensive Disks, a method of spreading information across several disks set up to act as a unit, using two different techniques:

  • Disk striping - storing a bit of information across several discs (instead of storing it all on one disc and hoping that the disc doesn't crash).

  • Disk mirroring - simultaneously storing a copy of information on another disc so that the information can be recovered if the main disc crashes.

RAM

Random Access Memory, one of two basic types of memory. Portions of programs are stored in RAM when the program is launched so that the program will run faster. Though a PC has a fixed amount of RAM, only portions of it will be accessed by the computer at any given time. Also called memory.

Right-click

Using the right mouse button to open context-sensitive drop-down menus.

ROM

Read-Only Memory, one of two basic types of memory. ROM contains only permanent information put there by the manufacturer. Information in ROM cannot be altered, nor can the memory be dynamically allocated by the computer or its operator.

Scanner

An electronic device that uses light-sensing equipment to scan paper images such as text, photos, and illustrations and translate the images into signals that the computer can then store, modify, or distribute.

Search engine

Software that makes it possible to look for and retrieve material on the Internet, particularly the Web. Some popular search engines are Alta Vista, Google, HotBot, Yahoo!, Web Crawler, and Lycos.

Server

A computer that shares its resources and information with other computers, called clients, on a network.

Shareware

Software created by people who are willing to sell it at low cost or no cost for the gratification of sharing. It may be freestanding software, or it may add functionality to existing software.

Software

Computer programs; also called applications.

Spider

A process search engines use to investigate new pages on a web site and collect the information that needs to be put in their indices.

Spreadsheet

Software that allows one to calculate numbers in a format that is similar to pages in a conventional ledger.

Storage

Devices used to store massive amounts of information so that it can be readily retrieved. Devices include RAIDs, CD-ROMs, DVDs.

Streaming

Taking packets of information (sound or visual) from the Internet and storing it in temporary files to allow it to play in continuous flow.

Stylus and tablet

An input device similar to a mouse. The stylus is pen shaped. It is used to draw on a tablet (like drawing on paper) and the tablet transfers the information to the computer. The tablet responds to pressure. The firmer the pressure used to draw, the thicker the line appears.

Surfing

Exploring the Internet.

Surge protector

A controller to protect the computer and make up for variances in voltage.

Telnet

A way to communicate with a remote computer over a network.

Trackball

Input device that controls the position of the cursor on the screen; the unit is mounted near the keyboard, and movement is controlled by moving a ball.

Terabytes (TB)

A thousand gigabytes.

Teraflop

A measure of a computer's speed. It can be expressed as a trillion floating-point operations per second.

Trojan Horse

See virus.

UNIX

A very powerful operating system used as the basis of many high-end computer applications.

Upload

The process of transferring information from a computer to a web site (or other remote location on a network). To transfer information from a computer to a web site (or other remote location on a network).

URL

Uniform Resource Locator.

  • The protocol for identifying a document on the Web.
  • A Web address (e.g., www.tutorialspoint.com). A URL is unique to each user. See also domain.

UPS

Universal Power Supply or Uninterruptible Power Supply. An electrical power supply that includes a battery to provide enough power to a computer during an outage to back-up data and properly shut down.

USB

A multiple-socket USB connector that allows several USB-compatible devices to be connected to a computer.

USENET

A large unmoderated and unedited bulletin board on the Internet that offers thousands of forums, called newsgroups. These range from newsgroups exchanging information on scientific advances to celebrity fan clubs.

User friendly

A program or device whose use is intuitive to people with a non-technical background.

Video teleconferencing

A remote "face-to-face chat," when two or more people using a webcam and an Internet telephone connection chat online. The webcam enables both live voice and video.

Virtual reality (VR)

A technology that allows one to experience and interact with images in a simulated three-dimensional environment. For example, you could design a room in a house on your computer and actually feel that you are walking around in it even though it was never built. (The Holodeck in the science-fiction TV series Star Trek : Voyager would be the ultimate virtual reality.) Current technology requires the user to wear a special helmet, viewing goggles, gloves, and other equipment that transmits and receives information from the computer.

Virus

An unauthorized piece of computer code attached to a computer program or portions of a computer system that secretly copies itself from one computer to another by shared discs and over telephone and cable lines. It can destroy information stored on the computer, and in extreme cases, can destroy operability. Computers can be protected from viruses if the operator utilizes good virus prevention software and keeps the virus definitions up to date. Most viruses are not programmed to spread themselves. They have to be sent to another computer by e-mail, sharing, or applications.The worm is an exception, because it is programmed to replicate itself by sending copies to other computers listed in the e-mail address book in the computer. There are many kinds of viruses, for example:

  • Boot viruses place some of their code in the start-up disk sector to automatically execute when booting. Therefore, when an infected machine boots, the virus loads and runs.

  • File viruses attached to program files (files with the extension .exe). When you run the infected program, the virus code executes.

  • Macro viruses copy their macros to templates and/or other application document files.

  • Trojan Horse is a malicious, security-breaking program that is disguised as something being such as a screen saver or game.

  • Worm launches an application that destroys information on your hard drive. It also sends a copy of the virus to everyone in the computer's e-mail address book.

WAV

A sound format (pronounced wave) used to reproduce sounds on a computer.

Webcam

A video camera/computer setup that takes live images and sends them to a Web browser.

Window

A portion of a computer display used in a graphical interface that enables users to select commands by pointing to illustrations or symbols with a mouse. "Windows" is also the name Microsoft adopted for its popular operating system.

World Wide Web ("WWW" or "the Web")

A network of servers on the Internet that use hypertext-linked databases and files. It was developed in 1989 by Tim Berners-Lee, a British computer scientist, and is now the primary platform of the Internet. The feature that distinguishes the Web from other Internet applications is its ability to display graphics in addition to text.

Word processor

A computer system or program for setting, editing, revising, correcting, storing, and printing text.

Worm

See virus.

WYSIWYG

What You See Is What You Get. When using most word processors, page layout programs (See desktop publishing), and web page design programs, words and images will be displayed on the monitor as they will look on the printed page or web page.



Advertisements


Teknosys
Teknosys
JPA tutorial


JPA Tutorial

Java Persistence API is a collection of classes and methods to persistently store the vast amounts of data into a database which is provided by the Oracle Corporation. This tutorial provides you the basic understanding of Persistence (storing the copy of database object into temporary memory), and we will learn the understanding of JAVA Persistence API (JPA).

Audience

This tutorial is designed for the readers pursuing Java programming with Database, using Persistence API and for all the enthusiastic readers.

Prerequisites

This tutorial is designed for absolute beginners. Assuming you are aware of Java programming with JDK1.6 or later version and JDBC concepts in java.




Advertisements


Teknosys
Teknosys
JDBC tutorial


JDBC Tutorial

JDBC API is a Java API that can access any kind of tabular data, especially data stored in a Relational Database. JDBC works with Java on a variety of platforms, such as Windows, Mac OS, and the various versions of UNIX.

Audience

This tutorial is designed for Java programmers who would like to understand the JDBC framework in detail along with its architecture and actual usage.

Prerequisites

Before proceeding with this tutorial, you should have a good understanding of Java programming language. As you are going to deal with RDBMS, you should have prior exposure to SQL and Database concepts.




Advertisements


Teknosys
Teknosys
JavaMail API tutorial


JavaMail API Tutorial

The JavaMail API provides a platform-independent and protocol-independent framework to build mail and messaging applications. The JavaMail API provides a set of abstract classes defining objects that comprise a mail system. It is an optional package (standard extension) for reading, composing, and sending electronic messages.

Audience

This tutorial has been prepared for the beginners to help them understand basic JavaMail programming. After completing this tutorial you will find yourself at a moderate level of expertise in JavaMail programming from where you can take yourself to next levels.

Prerequisites

JavaMail programming is based on Java programming language so if you have basic understanding on Java programming then it will be a fun to learn using JavaMail in application development.




Advertisements


Teknosys
Teknosys
Lucene Tutorial


Lucene Tutorial







Lucene is an open source java based search library. Lucene is very popular and fast search library used in java based application to add document search capability to any kind of application in a very simple and efficient way.

This tutorial will give you great understanding on Lucene concepts needed to understand the complexity of search requirements in enterprise level applications and need of lucene search engine.

Audience

This tutorial is designed for Software Professionals who are willing to learn Lucene search engine Programming in simple and easy steps. This tutorial will give you great understanding on Lucene concepts and after completing this tutorial you will be at intermediate level of expertise from where you can take yourself at higher level of expertise.

Prerequisites

Before proceeding with this tutorial you should have a basic understanding of Java programming language, text editor and execution of programs etc.




Advertisements


Teknosys
Teknosys
Hibernate Tutorial


Hibernate Tutorial

Hibernate is a high-performance Object/Relational persistence and query service which is licensed under the open source GNU Lesser General Public License (LGPL) and is free to download. Hibernate not only takes care of the mapping from Java classes to database tables (and from Java data types to SQL data types), but also provides data query and retrieval facilities.

This tutorial will teach you how to use Hibernate to develop your database based web applications in simple and easy steps

Audience

This tutorial is designed for Java programmers with a need to understand the Hibernate framework and API. After completing this tutorial you will find yourself at a moderate level of expertise in using Hibernate from where you can take yourself to next levels.

Prerequisites

We assume you have good understanding of the Java programming language. A basic understanding of relational databases, JDBC and SQL is very helpful.




Advertisements


Teknosys
Teknosys
JSP Tutorial


JSP Tutorial

JavaServer Pages (JSP) is a server-side programming technology that enables the creation of dynamic, platform-independent method for building Web-based applications. JSP have access to the entire family of Java APIs, including the JDBC API to access enterprise databases. This tutorial will teach you how to use Java Server Pages to develop your web applications in simple and easy steps.

Audience

This tutorial has been prepared for the beginners to help them understand basic functionality of Java Server Pages (JSP) to develop your web applications. After completing this tutorial you will find yourself at a moderate level of expertise in using JSP from where you can take yourself to next levels.

Prerequisites

We assume you have little knowledge how web application work over HTTP, what is web server and what is web browsers. It will be great if you have some knowledge of web application development using any programming language.




Advertisements


Teknosys
Teknosys
Struts 2 Tutorial


Struts 2 Tutorial

Apache Struts 2 is an elegant, extensible framework for creating enterprise-ready Java web applications. The framework is designed to streamline the full development cycle, from building, to deploying, to maintaining applications over time. Apache Struts 2 was originally known as WebWork 2.

This tutorial will teach you how to use Apache Struts for creating enterprise-ready Java web applications in simple and easy steps.

Audience

This tutorial is designed for Java programmers with a need to understand the Struts 2.x framework and its application. This tutorial will bring you at intermediate level of experties.

Prerequisites

Before proceeding with this tutorial you should have a good understanding of the Java programming language. A basic understanding of MVC Framework and JSP or Servlet is very helpful.




Advertisements


Teknosys
Teknosys
JSON Tutorial


JSON Tutorial

JSON or JavaScript Object Notation is a lightweight text-based open standard designed for human-readable data interchange. The JSON format was originally specified by Douglas Crockford, and is described in RFC 4627. The official Internet media type for JSON is application/json. The JSON filename extension is .json. This tutorial will help you understand JSON and its use within various programming languages such as PHP, PERL, Python, Ruby, Java, etc.

Audience

This tutorial has been designed to help beginners understand the basic functionality of JavaScript Object Notation (JSON) to develop the data interchange format. After completing this tutorial, you will have a good understanding of JSON and how to use it with JavaScript, Ajax, Perl, etc.

Prerequisites

Before proceeding with this tutorial, you should have a basic understanding of the web application’s work over HTTP and we assume that you have a basic knowledge of JavaScript.




Advertisements


Teknosys
Teknosys
Design Pattern Tutorial


Design Patterns in Java Tutorial

Design patterns represent the best practices used by experienced object-oriented software developers. Design patterns are solutions to general problems that software developers faced during software development. These solutions were obtained by trial and error by numerous software developers over quite a substantial period of time.

This tutorial will take you through step by step approach and examples using Java while learning Design Pattern concepts.

Audience

This reference has been prepared for the experienced developers to provide best solutions to certain problems faced during software development and for un-experienced developers to learn software design in an easy and faster way.

Prerequisites

Before you start proceeding with this tutorial, I'm making an assumption that you are already aware about basic java programming concepts. If you are not well aware of these concepts then I will suggest to go through our short tutorial on Java Programming.




Advertisements


Teknosys
Teknosys
Java.lang Packages Tutorial


Java.lang package tutorial







Java.util package contains the classes that are fundamental to the design of the Java programming language.

This tutorial cum reference will take you through all the methods available in java.lang package using simple and practical example.

Audience

This reference has been prepared for the beginners to help them understand the basic functionality related to all the methods available in Java.lang package.

Prerequisites

Before you start doing practice with various types of examples given in this reference, I'm making an assumption that you are already aware of basic Java Programming.




Advertisements


Teknosys
Teknosys
JAVA8 Tutorial


Java8 Tutorial

Java 8 is the most awaited and is a major feature release of Java programming language. This is an introductory tutorial that explains the basic-to-advanced features of Java 8 and their usage in a simple and intuitive way.

Audience

This tutorial will be useful for most Java developers, starting from beginners to experts. After completing this tutorial, you will find yourself at a moderate level of expertise in Java 8, from where you can take yourself to next levels.

Prerequisites

Knowledge of basic Java programming language is the only prerequisite for learning the concepts explained in this tutorial.

Execute Java 8 Online

For most of the examples given in this tutorial you will find Try it option, so just make use of this option to execute your Java 8 programs at the spot and enjoy your learning.

Try following example using Try it option available at the top right corner of the below sample code box:

/* Hello World! program in Java 8 */

public class HelloWorld {
   public static void main(String[] args) {
      System.out.println("Hello World");
   }
}



Advertisements


Teknosys
Teknosys
Java Programming Examples


Java Programming Examples







Find the best practical and ready to use Java Programming Examples. Java runs on a variety of platforms, such as Windows, Mac OS, and the various versions of UNIX. These examples would be very useful for your projects, thesis and learning.

Audience

This reference has been prepared for the beginners to help them understand the basic to advanced concepts related to Java Programming language.

Prerequisites

Before you start doing practice with various types of examples given in this reference, I'm making an assumption that you are already aware about what is a Java Programming and it's concepts.




Advertisements


Teknosys
Teknosys
Apache POI Tutorial


Apache POI Tutorial

This tutorial provides a basic understanding of Apache POI library and its features. Apache POI is a popular API that allows programmers to create, modify, and display MS Office files using Java programs. It is an open source library developed and distributed by Apache Software Foundation to design or modify Microsoft Office files using Java program. It contains classes and methods to decode the user input data or a file into MS Office documents.

Audience

This tutorial is designed for all enthusiastic readers working on Java and especially those who want to create, read, write, and modify Excel files using Java.

Prerequisites

A general awareness of Java programming with JDK1.5 or later versions and IO concepts in Java are the only prerequisites to understand this tutorial.




Advertisements


Teknosys
Teknosys
SWING Tutorial


SWING Tutorial







JAVA provides a rich set of libraries to create Graphical User Interface in platform independent way. In this article we'll look in SWING GUI controls.

Audience

This tutorial is designed for Software Professionals who are willing to learn JAVA GUI Programming in simple and easy steps. This tutorial will give you great understanding on JAVA GUI Programming concepts and after completing this tutorial you will be at intermediate level of expertise from where you can take yourself at higher level of expertise.

Prerequisites

Before proceeding with this tutorial you should have a basic understanding of Java programming language, text editor and execution of programs etc.




Advertisements


Teknosys
Teknosys
JDB Tutorial


JDB Tutorial

The Java Debugger, commonly known as jdb, is a useful tool to detect bugs in Java programs. This is a brief tutorial that provides a basic overview of how to use this tool in practice. In addition, the tutorial also covers how to debug a program through stepping, breakpoints, and managing exceptions.

Audience

This tutorial will be quite useful for beginners learning Java as well as programmers and professionals aspiring to make a career in Testing and Analytics using Java.

Prerequisites

Before you start with this tutorial, you need to know basic Java programming.




Advertisements


Teknosys
Teknosys
Developers Best Practices Tutorial


Developers Best Practices Tutorial







This small tutorial is based on my past 16+ years of experience in software development industry. I have gone through different stages in my career starting from trainee software developer till senior management.

I do not want to keep my learnings to myself, so I had written a small tutorial few years ago, and after getting lot of motivation from my dear readers, I thought of revising it and adding few more learnings which may benefit many other software engineers and developers working in this lovely industry.

I'm not going to dictate any of the points, but all the practices listed here contributed a lot in my software development career, so if you think they make some sense for you then try to adopt few. If you have any +/- comments, kindly feel free to write me back : Contact Us

Audience

If you are working for software industry as a software engineer or a software developer, then I'm sure you are going to enjoy this tutorial. Try to relate the facts mentioned in the tutorial with your day-2-day life and find so many hidden facts, which are very obvious but we never gave our serious attention to them.

Prerequisites

Before writing all the practices mentioned in this small tutorial, I have made an assumption that you are working as a software professional and you understand basic software terminologies and atmosphere around a software professional.




Advertisements


Teknosys
Teknosys
EJB Tutorial


EJB Tutorial

Enterprise Java Beans (EJB) is a development architecture for building highly scalable and robust enterprise level applications to be deployed on J2EE compliant Application Server such as JBOSS, Web Logic etc.

EJB 3.0 is being a great shift from EJB 2.0 and makes development of EJB based applications quite easy.

This tutorial will give you great understanding on EJB concepts needed to create and deploy an enterprise level application up and running.

Audience

This tutorial is designed for Software Professionals who are willing to learn EJB Programming in simple and easy steps. This tutorial will give you great understanding on EJB Programming concepts and after completing this tutorial you will be at intermediate level of expertise from where you can take yourself at higher level of expertise.

Prerequisites

Before proceeding with this tutorial you should have a basic understanding of Java programming language, text editor and execution of programs etc. Because we are going to develop enterprise based applications using EJB, so it will be good if you have understanding on other technologies like Database Servers, Application Servers.




Advertisements


Teknosys
Teknosys
Guava Tutorial


Guava Tutorial

Guava is an open source, Java based library developed by Google. It facilitates best coding practices and helps reduce coding errors. It provides utility methods for collections, caching, primitives support, concurrency, common annotations, string processing, I/O, and validations.

This tutorial adopts a simple and intuitive way to describe the basic-to-advanced concepts of Guava and how to use its APIs.

Audience

This tutorial will be useful for most Java developers, starting form beginners to experts. After completing this tutorial, we are confident you will find it easy to use Guava in your programs.

Prerequisites

Prior exposure to Java programming is the only requirement to make the most of this tutorial.




Advertisements


Teknosys
Teknosys
JFreeChart Tutorial


JFree Chart Tutorial

This tutorial describes various ways to incorporate JFreeChart in Java based standalone and web based applications. It will give you a quick start with JFreeChart and make you comfortable with JFreeChart programming with Java applications.

Audience

This reference has been prepared for the beginners to help them understand the basic to advanced concepts related to JFreeChart library.

Prerequisites

Before you start practising with various code examples given in the tutorial, I assume you are already aware of Java programming with JDK1.6 or later versions, swing, file management and database management in Java.




Advertisements


Teknosys
Teknosys
TIKA Tutorial


TIKA Tutorial

This tutorial provides a basic understanding of Apache Tika library, the file formats it supports, as well as content and metadata extraction using Apache Tika.

Audience

This tutorial is designed for the readers pursuing java programing, who want to learn document type detection, and content extraction, with Tika and for all the enthusiastic readers.

Prerequisites

To make the most of this tutorial, the readers should have prior exposure to Java programming with JDK 1.6 and IO concepts in Java.




Advertisements


Teknosys
Teknosys
EasyMock Tutorial


EasyMock Tutorial

EasyMock is a mocking framework, JAVA-based library that is used for effective unit testing of JAVA applications. EasyMock is used to mock interfaces so that a dummy functionality can be added to a mock interface that can be used in unit testing.

This tutorial should help you learn how to create unit tests with EasyMock as well as how to use its APIs in a simple and intuitive way.

Audience

This tutorial is meant for Java developers, from novice to expert level, who would like to improve the quality of their software through unit testing and test-driven development.

After completing this tutorial, you should gain sufficient exposure to EasyMock from where you can take yourself to next levels of expertise.

Prerequisites

Readers must have a working knowledge of JAVA programming language in order to make the best of this tutorial. Knowledge of JUnit is an added advantage.




Advertisements


Teknosys
Teknosys
Servlets Tutorial


Servlets Tutorial

Servlets provide a component-based, platform-independent method for building Web-based applications, without the performance limitations of CGI programs. Servlets have access to the entire family of Java APIs, including the JDBC API to access enterprise databases.

This tutorial will teach you how to use Java Servlets to develop your web based applications in simple and easy steps.

Audience

This tutorial is designed for Java programmers with a need to understand the Java Servlets framework and its APIs. After completing this tutorial you will find yourself at a moderate level of expertise in using Java Servelts from where you can take yourself to next levels.

Prerequisites

We assume you have good understanding of the Java programming language. It will be great if you have a basic understanding of web application and how internet works.




Advertisements


Teknosys
Teknosys
iBATIS Tutorial


iBATIS Tutorial

iBATIS is a persistence framework which automates the mapping between SQL databases and objects in Java, .NET, and Ruby on Rails. iBATIS makes it easier to build better database oriented-applications more quickly and with less code.

Audience

This tutorial is designed for Java programmers who would like to understand the iBATIS framework in detail along with its architecture and actual usage.

Prerequisites

Before proceeding with this tutorial, you should have a good understanding of Java programming language. As you are going to deal with SQL mapping, it is required that you have adequate exposure to SQL and Database concepts.




Advertisements


Teknosys
Teknosys
Java.io Packages Tutorial


Java.io package Tutorial







Java.io package provides classes for system input and output through data streams, serialization and the file system.

This reference will take you through simple and practical methods available in java.io package.

Audience

This reference has been prepared for the beginners to help them understand the basic functionality related to all the methods available in Java.io package.

Prerequisites

Before you start doing practice with various types of examples given in this reference, I'm making an assumption that you are already aware of basic Java Programming.




Advertisements


Teknosys
Teknosys
Ant Tutorial


Apache Ant Tutorial

Apache Ant is a Java based build tool from Apache Software Foundation. Apache Ant's build files are written in XML and they take advantage of being open standard, portable and easy to understand.

This tutorial should show you how to use Apache ANT to automate the build and deployment process in simple and easy steps. After completing this tutorial, you should find yourself at a moderate level of expertise in using Apache Ant from where you may take yourself to next levels.

Audience

This tutorial has been prepared for the beginners to help them understand the basic functionality of Apache ANT to automate the build and deployment process.

Prerequisites

For this tutorial, it is assumed that the readers have prior knowledge of basic software development using java or any other programming language. This should help if you had some exposure to the software build and deployment process.




Advertisements


Teknosys

Comments

Popular posts from this blog

[Inside AdSense] Understanding your eCPM (effective cost per thousand impress...