Preview

Inroduction to Java

Satisfactory Essays
Open Document
Open Document
536 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Inroduction to Java
Lesson 1 Introduction to Java
History
Was created in 1991
James Gosling et al. of Suns Microsystems
Initially called Oak, in honor of the oak tree, but there is an Oak language so its was changed into Java
Original motivation was need for platform independent language that could be embed in various consumer electronic products
Star7 – a personal hand-held remote, first project developed with java.
Java Technology
1. A programming language – can create all kinds of applications that you could create using any conventional programming language.
2. A Development environment – large suits of tools
a. Compiler
b. Interpreter
c. Documentation generator
d. A class file packaging tool
3. An Application and run-time environment – general purpose program that run n any machine where the java run time environment (JRE) is installed.
Java Features
1. Java Virtual machine
a. Java Virtual Machine – an imaginary machine that is implemented by emulating software on a real machine
b. Bytecode – a special machine language that can be understood by the JVM.
2. Garbage Collection Thread – responsible for freeing any memory that can be freed.
3. Code Security – is attained in Java through the implementation of its java Runtime Environment. JRE runs code compiled for a JVM and perform class loading, code verification, and final code execution.
a. Class loader – responsible for loading all classes needed for the java program
b. Bytecode verifier – test the format of code fragments and checks the code fragments for illegal code that can violate access rights to objects
Phases of Java Program
Editor –> Hello.java –> Java Compiler –> Hello.class –> java Interpreter
1. Write the Program – any text editor – file with .java extension.
2. Compile the Program – Java Compiler – file with .class extension.
3. Run the Program – java interpreter – Program Output
Lesson 2 – Programming Environment
Console – this is where you type in commands. Linux, Mac, Command prompt

You May Also Find These Documents Helpful

  • Good Essays

    IS3445 Project Part 5

    • 343 Words
    • 2 Pages

    There are many techniques software developers should use while reviewing their code. These techniques will help ensure that the application is secured while also having an ease of use for the customers. Using these techniques will help bring the application to a secure point which will prevent unauthorized…

    • 343 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Pt1420 Unit 1 Assignment 2

    • 1305 Words
    • 6 Pages

    Hosch, L., Liesandthem, G., Luebring, J.E., Pallardy, R., Young, G. (2014). Java. In Encyclopedia Britannica.…

    • 1305 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    NT2670 Midtern Questions

    • 842 Words
    • 3 Pages

    A complete installation of an operating system that runs in a software environment emulating a physical computer.…

    • 842 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Application: Generally, a function on any kind of computer or electronic device that is useful to the user, which can give the user a reason to want to own and use the device. More specifically, software that performs some useful function for a user.…

    • 539 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    BIS 320 Week 2 Asm

    • 1188 Words
    • 5 Pages

    Application software is computer software that is designed to help users perform specific tasks. Applications use the DBMS for four operations: to read, insert, modify,…

    • 1188 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Java exam 1 practice test

    • 6434 Words
    • 53 Pages

    That a program may be written on one type of computer and then run on a wide variety of computers with little or no modification necessary.…

    • 6434 Words
    • 53 Pages
    Powerful Essays
  • Satisfactory Essays

    Kizza Chapter *

    • 528 Words
    • 3 Pages

    2. List three important facts that the author uses to support the main idea: A. Verification and Validation involves static formal mathematical techniques such as proof of correctness and dynamic techniques such as testing to show consistency between the code and the basic initial specifications. B. Consumer protection consists of laws and organizations designed to ensure the rights of consumers as well as fair trade competition and the free flow of truthful information in the marketplace. The laws are designed to prevent businesses that engage in fraud or specified unfair practices from gaining an advantage over competitors and may provide additional protection for the weak and those unable to take care of themselves. C. Software is an integral part of a computer system and the security of such a system depends on its hardware but even more so on the software component. There are more security attacks on systems through software “holes” than hardware, mainly through piracy, deletion and alteration of programs and data.…

    • 528 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Prg420 Syllabus

    • 1691 Words
    • 7 Pages

    Horton, I. (2005). Ivor Horton’s Beginning Java 2, JDK (5th ed.). Indianapolis, IN: Wiley Publishing.…

    • 1691 Words
    • 7 Pages
    Satisfactory Essays
  • Powerful Essays

    Application-a function on any kind of computer or electronic device that is useful to the user, which can give the user a reason to want to own and use the device…

    • 483 Words
    • 2 Pages
    Powerful Essays
  • Powerful Essays

    irement” and the AS3.0 is its successor. I notice that AS3.0 is not just containing a…

    • 1535 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    3]Allen Julia, Barnum Sean, Ellison Robert, McGraw Gary and Mead Nancy. “Software Security: A Guide for Project Managers”, Addison-Wesley, 2008.…

    • 1558 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Software Security

    • 4565 Words
    • 19 Pages

    References: [1] M. Howard and D. LeBlanc, “Writing Secure Code”, Microsoft Press, 2001. [2] CERT Coordination Center, CERT/CC statistics 19882005. Available at: http://www.cert.org/stats/cert_stats.html [3] National Institute of Standards and Technology, “Software Errors Cost U.S. Economy $59.5 Billion Annually” (NIST2002-10). Available at: http://www.nist.gov/public_affairs/releases/n02-10.htm [4] Gary McGraw, “Software Security”, IEEE Security & Privacy, vol. 2(2), 2004, pp. 80-83. [5] K.S. Hoo, A.W. Sudbury, and A.R. Jaquith, “Tangible ROI Through Secure Software Engineering”, Secure Business Quarterly, vol.1(2), 2001. [6] J. Viega and G. McGraw, Building Secure Software: How to Avoid Security Problems the Right Way?, Addison-Wesley, 2001 [7] S. Barnum and G. McGraw, “Knowledge for Software Security”, IEEE Security & Privacy, vol. 3(2), 2005, pp. 74-78. [8] NSA, “National IA Education & Training Program”, Available at: http://www.nsa.gov/ia/academia/cnsstesstandards.cfm [9] CSE591 Software Security at: http://enpub.fulton.asu. edu/iacdev/courses/CSE591s/home.html [10] G. Hoglund and G. McGraw, “Exploiting Software: How to break code”, Addison-Wesley, 2004…

    • 4565 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    • The Android operating system is a multi-user Linux system in which each application is a different user.…

    • 1963 Words
    • 8 Pages
    Good Essays
  • Good Essays

    fbgfhgfh

    • 1961 Words
    • 8 Pages

    Case Sensitivity - Java is case sensitive which means identifier Hello and hello would have different meaning in Java.…

    • 1961 Words
    • 8 Pages
    Good Essays
  • Good Essays

    What Is a Virtual Machine

    • 537 Words
    • 2 Pages

    One instance of an operating system along with one or more applications running in an isolated partition within the computer. It enables different operating systems to run in the same computer at the same time as well as prevents applications from interfering with each other. This differs from a dual-boot or multiboot environment, in which the user has to choose only one OS at startup . All virtual machines run simultaneously.…

    • 537 Words
    • 2 Pages
    Good Essays

Related Topics