In this quality assurance training session, you will learn Core Java for Selenium. Topics covered in this course are:
• Java Fundamentals
• Introduction to Java
• Programming Language fundamentals
• Key Java Concepts
• Strings and collections
TO know more, visit this link: https://www.mindsmapped.com/courses/quality-assurance/get-practical-training-on-software-testing-quality-assurance-qa/
In this quality assurance training session, you will learn JIRA. Topics covered in this course are:
• What is JIRA?
• JIRA Scheme
• JIRA Issues & Types
• Issue Types
• JIRA Components
• Priority
• Jira Workflow
TO know more, visit this link: https://www.mindsmapped.com/courses/quality-assurance/get-practical-training-on-software-testing-quality-assurance-qa/
JIRA Introduction, What is JIRA, JIRA Training, JIRA Tutorial for beginners | Atlassian JIRA Training in USA
JIRA is a proprietary issue tracking product, developed by Atlassian. It provides bug tracking, issue tracking, and project management functions. Although normally styled JIRA, the product name is not an acronym, but a truncation of Gojira, the Japanese name for Godzilla. It has been developed since 2002.
Contact us:
www.h2kinfosys.com
Email: Training@h2kinfosys.com
USA: +1-770-777-1269
UK: 020-33717615
Many organizations are using JIRA for issue tracking – incident, service request, problem and change management, as well as for project management. However, JIRA can also be used as a tool for test management.
Presentation was given on TAPOST 2012: http://www.itbaltic.com/en/conferences/tapost-2012/
Learn JIRA Quickly
Plan, track, work – smarter and faster
http://www.udemy.com/learn-jira-quickly
Enhance your resume skills and improve your productivity quickly
JIRA is the project management and issue tracking software. It is used by teams in all types of products and industries. It's used by Agile teams, bug tracking, helpdesk tickets and thousands of companies!
It's a must skill to have in today's industry and this course will get you started with JIRA in under 2 hours.
In this quality assurance training session, you will learn JIRA. Topics covered in this course are:
• What is JIRA?
• JIRA Scheme
• JIRA Issues & Types
• Issue Types
• JIRA Components
• Priority
• Jira Workflow
TO know more, visit this link: https://www.mindsmapped.com/courses/quality-assurance/get-practical-training-on-software-testing-quality-assurance-qa/
JIRA Introduction, What is JIRA, JIRA Training, JIRA Tutorial for beginners | Atlassian JIRA Training in USA
JIRA is a proprietary issue tracking product, developed by Atlassian. It provides bug tracking, issue tracking, and project management functions. Although normally styled JIRA, the product name is not an acronym, but a truncation of Gojira, the Japanese name for Godzilla. It has been developed since 2002.
Contact us:
www.h2kinfosys.com
Email: Training@h2kinfosys.com
USA: +1-770-777-1269
UK: 020-33717615
Many organizations are using JIRA for issue tracking – incident, service request, problem and change management, as well as for project management. However, JIRA can also be used as a tool for test management.
Presentation was given on TAPOST 2012: http://www.itbaltic.com/en/conferences/tapost-2012/
Learn JIRA Quickly
Plan, track, work – smarter and faster
http://www.udemy.com/learn-jira-quickly
Enhance your resume skills and improve your productivity quickly
JIRA is the project management and issue tracking software. It is used by teams in all types of products and industries. It's used by Agile teams, bug tracking, helpdesk tickets and thousands of companies!
It's a must skill to have in today's industry and this course will get you started with JIRA in under 2 hours.
The GoJira presentation is an introduction to the the concepts in Atlassian Jira. It suggest some best practices for both beginning and experienced Jira users. The author has been using Jira since 2005 and written several plugins for the system.
Scrum Project Management with Jira as showcasejavadch
This presentation gives an overview to project management in software products, drills down to Scrum, gives an live demo of Jira and motivates the audience to start using source control systems.
Wikidsmart PM: Requirements Management within Confluence, Integrated with JIRAzAgile
Defining requirements and tracking them through the software delivery process is a constant challenge. Challenges include: tracking requirement completion, quality (bugs and test execution against requirements), and traceability (changes across releases). zAgile's Wikidsmart PM offers an open source and pragmatic approach to Requirements Management by enabling Atlassian's Confluence wiki and JIRA issue tracker to manage Requirements in a powerful, flexible way, while addressing all of the challenges mentioned earlier. Wikidsmart is an open source platform which enables integration of software engineering tools as well as business applications like CRM. In addition, it enables composite applications - such as Wikidsmart PM for Requirements Management - to be manifested within your existing tools and applications.
This is the poster that I presented at the 10th Summer School on Ontology Engineering and the Semantic Web which has held on July, 2013. at Cercedilla, Madrid, Spain.
JIRA Software Introduction prepared by Francis Yan, an Atlassian Certified Professional in Agile Development with JIRA Software based in Hong Kong.
It is an introduction cover basic function of JIRA with overview and screenshot, it aim to help JIRA beginner to know basic of JIRA and prepare for first JIRA requirement discussion meeting :)
The GoJira presentation is an introduction to the the concepts in Atlassian Jira. It suggest some best practices for both beginning and experienced Jira users. The author has been using Jira since 2005 and written several plugins for the system.
Scrum Project Management with Jira as showcasejavadch
This presentation gives an overview to project management in software products, drills down to Scrum, gives an live demo of Jira and motivates the audience to start using source control systems.
Wikidsmart PM: Requirements Management within Confluence, Integrated with JIRAzAgile
Defining requirements and tracking them through the software delivery process is a constant challenge. Challenges include: tracking requirement completion, quality (bugs and test execution against requirements), and traceability (changes across releases). zAgile's Wikidsmart PM offers an open source and pragmatic approach to Requirements Management by enabling Atlassian's Confluence wiki and JIRA issue tracker to manage Requirements in a powerful, flexible way, while addressing all of the challenges mentioned earlier. Wikidsmart is an open source platform which enables integration of software engineering tools as well as business applications like CRM. In addition, it enables composite applications - such as Wikidsmart PM for Requirements Management - to be manifested within your existing tools and applications.
This is the poster that I presented at the 10th Summer School on Ontology Engineering and the Semantic Web which has held on July, 2013. at Cercedilla, Madrid, Spain.
JIRA Software Introduction prepared by Francis Yan, an Atlassian Certified Professional in Agile Development with JIRA Software based in Hong Kong.
It is an introduction cover basic function of JIRA with overview and screenshot, it aim to help JIRA beginner to know basic of JIRA and prepare for first JIRA requirement discussion meeting :)
In this session you will learn:
Implement classes and objects in Java
Create class constructors
Overload constructors
Inherit classes and create sub-classes
Implement abstract classes and methods
Use static keyword
For more information: https://www.mindsmapped.com/courses/software-development/become-a-java-developer-hands-on-training/
This is an intermediate conversion course for C++, suitable for second year computing students who may have learned Java or another language in first year.
In this session you will learn:
Introduction to Hibernate
Hibernate Architecture
The Persistence Lifecycle
Getting Started with Hibernate
Relationships and Associations
Advanced Mapping Concepts
Hibernate Queries
Hibernate Transactions
Hibernate Extensions
Hibernate Cache
For more information, visit: https://www.mindsmapped.com/courses/software-development/java-developer-training-for-beginners/
In this session you will learn:
Introduction
Architecture
The Persistence Lifecycle
Getting Started
Relationships and Associations
Advanced Mapping Concepts
Hibernate Queries
Hibernate Transactions
Hibernate Extensions
Hibernate Cache
For more information, visit this link: https://www.mindsmapped.com/courses/software-development/online-java-training-for-beginners/
Presented by: N.V.RajaSekhar Reddy
www.technolamp.co.in
Want more interesting...
Watch and Like us @ https://www.facebook.com/Technolamp.co.in
subscribe videos @ http://www.youtube.com/user/nvrajasekhar
In this session you will learn:
Java History
Features of Java
Java Versions
Application Area
For more information, visit: https://www.mindsmapped.com/courses/software-development/java-developer-training-for-beginners/
In this session you will learn:
Java History
Features of Java
Java Versions
Application Area
For more information, visit this link: https://www.mindsmapped.com/courses/software-development/online-java-training-for-beginners/
In this quality assurance training session, you will learn HP ALM. Topics covered in this course are:
• ALM – What is ALM? Why use ALM? Architecture of ALM.
• ALM – Workflow
• Test Execution and its cycles
• Testing Methodology (BBT , WBT)
• Class Assignment
TO know more, visit this link: https://www.mindsmapped.com/courses/quality-assurance/get-practical-training-on-software-testing-quality-assurance-qa/
In this quality assurance training session, you will learn Selenium WebDriver. Topics covered in this course are:
• Selenium Components
• Introduction to Web Driver
• Downloading and Configuring Web Driver with Eclipse
• Web Driver Methods
• Web Driver Locators
• Interacting with different UI elements
• Synchronization, Alert and multiple window
• Dynamic Menus
• Cookie Management
• Launching different web browsers
• Introduction to Test NG
TO know more, visit this link: https://www.mindsmapped.com/courses/quality-assurance/get-practical-training-on-software-testing-quality-assurance-qa/
In this quality assurance training session, you will learn QTP/UFT automation testing. Topics covered in this course are:
• Introduction to QTP
• Features of QTP
• Recording modes of QTP
• Object Repository
• Synchronization point
• Step Generator
• Object Spy
• Checkpoints
• Data-driven testing & Parameterization
• Working with actions
• Reporting in QTP
TO know more, visit this link: https://www.mindsmapped.com/courses/quality-assurance/get-practical-training-on-software-testing-quality-assurance-qa/
In this quality assurance training session, you will learn Other Testing Types. Topics covered in this course are:
• Testing the code – WBT
• Database Testing
• UI Testing
• Non Functionality Testiing
• Class Assignment
TO know more, visit this link: https://www.mindsmapped.com/courses/quality-assurance/get-practical-training-on-software-testing-quality-assurance-qa/
In this quality assurance training session, you will learn introduction to software testing. Topics covered in this course are:
• Course Overview
• Introduction to Software Testing
• Is Testing a Technical role
• Project And Product
• Quality Assurance Vs Quality Control
• QC VS QA
• Verification and Validation
TO know more, visit this link: https://www.mindsmapped.com/courses/quality-assurance/get-practical-training-on-software-testing-quality-assurance-qa/
In this quality assurance training session, you will learn defects and its categories. Topics covered in this course are:
• Defects / Bug and few Scenarios
• Reason for defects
• Defect template
• Defect Life Cycle
• Defect report & Defect Tracking tools
• Class Assignment
TO know more, visit this link: https://www.mindsmapped.com/courses/quality-assurance/get-practical-training-on-software-testing-quality-assurance-qa/
In this quality assurance training session, you will learn Test Execution. Topics covered in this course are:
• Test Execution and its purpose
• Entry and Exit Criteria
• Test Execution and its cycles
• Testing Methodology (BBT , WBT)
• Class Assignment
TO know more, visit this link: https://www.mindsmapped.com/courses/quality-assurance/get-practical-training-on-software-testing-quality-assurance-qa/
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
4. Page 4Classification: Restricted
i. History of Java
• Background: Electronic Consumer Device
• Sun Commissioned ‘Project Green’
• Developed language ‘Oak-Later renamed to Java’
• Invented by Dr.James A.Gosling and his team in 1994
• Was dismissed as just another OO programming language
• Became popular with the rising popularity of ‘www’
5. Page 5Classification: Restricted
ii. Features of Java
• Simple
• Robust
• Distributed
• Secure
• Portable
• Interpreted
• Multithreaded
• Portable
• Object Oriented
6. Page 6Classification: Restricted
Simple
• Java designed as closely to C++ as possible
• Omits many confusing and rarely used features :
No header files
Structures
Unions
Pointers
Operator overloading
Virtual base class etc..
7. Page 7Classification: Restricted
Robust
• Java Programs are reliable
• Early checking for potential problems
• Dynamic checking to eliminate error-prone situations.
• Developer doesn’t have to worry about
Bad Pointers
Memory Allocation Errors
Memory Leakage
8. Page 8Classification: Restricted
Distributed
• An application when divided into smaller units is called as distributed
system
• Extensive library support protocols like TCP/IP, HTTP & FTP
• Applications can access objects across the net with ease.
Creating socket connections
Servlets
CGI Scripting
RMI enables communication between different objects
9. Page 9Classification: Restricted
Platform Independence
.java file Intermediate
language code
abc.java abc.class
• Java compiler generates byte code
Platform independent
Bytecode code is an architecture-neutral file format to transport code efficiently
independent of hardware and Operating systems
The use of the same bytecode for all JVMs on all platforms
Allows Java to be described as a “compile once, run everywhere”
programming language
Source
Code
Compile
Byte
Code
Window
Linux
Mac
10. Page 10Classification: Restricted
Secure
• Java applications used in distributed environments require emphasis on
memory
Security Manager
Allows applications to implement a security policy before
performing a possible unsafe or sensitive operation.
ByteCode Verifier
ByteCode Verifier is responsible for verifying the byte codes.
ByteCode do not violate Java’s security restrictions.
11. Page 11Classification: Restricted
Portable
• Behavior of java basic types & arithmetic operators is consistent
• Java programs’s behavior is same on every platform – no data type
incompatibilities across platforms.
int is always a 32-bit int
Strings stored in standard Unicode format
12. Page 12Classification: Restricted
Interpreted
• ByteCode can be executed on any machine that has java interpreter and
java run time system
• Classes are linked only on need basis
• Java is both compiled and interpreted
14. Page 14Classification: Restricted
Abstraction
• Abstraction is the process of identifying the key aspects of an entity and
ignoring the rest
• Only those aspects are selected that are important to the current problem
scenario
• Eg) Abstraction of a person object
• Enumerate attributes of a “person object” that needs to be created for
developing a database
• Useful for social survey
• Useful for health care industry
• Useful for payroll system
15. Page 15Classification: Restricted
Abstraction of a Person Object
Social Survey Health Care Payroll System
Name Name Name
Age Age Age
Marital status -- --
Religion -- --
Income group -- --
Address Address Address
Occupation occupation Occupation
-- Blood group --
-- Weight --
-- Previous record --
-- -- Basic salary
-- -- Department
-- -- Qualification
16. Page 16Classification: Restricted
Abstraction :Process of identifying the key aspects of an entity & ignoring the
rest
Encapsulation: Ensures that data within an object is protected and accessed
only by its methods
17. Page 17Classification: Restricted
Encapsulation
• Encapsulation is a mechanism used to hide the data, internal structure and
implementation details of an object
• All interaction with the object is through the public interface of operations
• The user knows only about the interface, any changes to the
implementation does not affect the user
Methods
Variables
18. Page 18Classification: Restricted
What is an Object?
• An entity is an entity which has a well defined structure and behaviour.
An object possesses certain characteristics as:
• State
• Behavior
• Identity
19. Page 19Classification: Restricted
State of an Object
• The state of an object includes the current values of all its attributes.
• An attribute can be static or dynamic
• Employee Attributes
empid
name static
gender
Age
Address
Phone
Basicsal dynamic
Education
experience
20. Page 20Classification: Restricted
Behavior of the Object
• Behavior is how an object acts and reacts, in terms of its changes and
message passing
Employee as an object
calculateSalary
printDetails Employee
Totality of operations – how an employee behaves or
responds to, is the behavior of the person.
21. Page 21Classification: Restricted
Identity of an Object
• Identity is that property of an object which distinguishes it from all other
objects
• A single or a group of attributes can be an identity of an object
Employee
empId
Name
Gender
Phone
Age
Address
Phone
Basicsal
Education
empId uniquely
identifies a person
among others
22. Page 22Classification: Restricted
Person as an Object
Attributes State Identity Behavior
empID empId = 10 empId = 10 Swipe Card
Name Name =
“Dhruv”
Fill TimeSheet
Gender Gender =
“male”
Wear Icard
Age Age=27 Calculate
Salary
Address Address =
“pune”
Print details
Phone Phone =
2342432
basicSalary basicSalary=80
00
Education
experience
23. Page 23Classification: Restricted
Inheritance
• Classification helps in handling complexity
• Inheritance is the process by which one object acquire the properties of
another object
• “is a ”kind of hierarchy
Person
Employee
Wage
Employee Manager
Sales Person
24. Page 24Classification: Restricted
Inheritance
• Generalization
Factoring out common elements within a set of categories into a more
general category called super class.
Requires good skill of abstraction
• Specialization
Allows to capture specific features of a set of objects.
Requires a depth of knowledge of domain.
25. Page 25Classification: Restricted
Polymorphism
• The ability of different types of related objects to respond to the same
message in their own ways is called polymorphism
• Polymorphism helps to design extensible software, as new objects can be
added to the design without rewriting existing procedures
26. Page 26Classification: Restricted
Polymorphism: same method having different implementations
• Compile/ static polymorphism – by function overloading
• Run time polymorphism – by function overriding
27. Page 27Classification: Restricted
2. Introduction to Java
i. Compilation & execution of Java Program
ii. JDK, JVM & JRE
iii. Class & Object
iv. Access Modifiers
v. Data type
vi. Java class syntax
28. Page 28Classification: Restricted
i) Compilation & Execution of Java Program
.java file
Java Class libraries
JDK
JRE
Source
code
compiler Byte
code
Class
loader
ByteCode verifier
Interpreter
Native OS
JVM
awt net rmii/o
29. Page 29Classification: Restricted
ii) JDK, JVM and JRE
• JDK (Java Development Kit)
Comes along with standard class libraries and JVM embedded in it.
Contains software development tools such as a compiler or a debugger
which are used to compile and run the Java program.
• JRE(Java Runtime Environment)
It is an implementation of JVM, which actually executes the Java program
JRE provides some standard libraries and the JVM which can be used to
execute the java program
• JVM(Java Virtual Machine)
• JVM loads the appropriate class files for execution the java program and
then execute it
• JVM is a :
- Abstract specification
- A concrete implementation or
- A runtime instance
30. Page 30Classification: Restricted
iii) Anatomy of JAVA class
• The term ‘class’ comes from the word called ‘classification’
• A class is a template for creation of like objects
• An object is an instance of class
• Classes are used to map real world entities into data members and member
functions
• By writing a class and creating objects of the class one can map two key
concepts of major pillars of object msodel i.e. Abstraction and
Encapsulation
33. Page 33Classification: Restricted
iv) Access Modifiers
• Access modifiers allow to specify the scope of the class members. We use
access modifiers to define the access control for classes, methods and
variables
• Access modifiers are of 4 types:
private – is accessible only within class
default – if we don’t specify any modifier then it is treated as default, this
can be accessible only within package
protected – is accessible within package , outside of the package but
through inheritance only
public – is accessible anywhere
• Non Access Modifiers
Static
Final : more like constant in C
34. Page 34Classification: Restricted
Modifier Within
Class
Within
Package
Outside of
Package
(By Sub
Class)
Outside of
Package
Private Y N N N
default Y Y N N
protected Y Y Y N
public Y Y Y Y
35. Page 35Classification: Restricted
v) Data Types : Is the classification of the type of data that variable can hold
in computer programming
Primitive Data Type
Boolean
Type
Numeric
Type
boolean
Integral
Type
Floating
Point Type
float double
Characte
r Type
Integer
Type
char longbyte short int
36. Page 36Classification: Restricted
vi) Java Class Syntax
By Convention:
class Class_Name class name starts with capital case
{ e.g. class MySample
variable_Declaration;
variable(attribute or property)
method_Declaration() { name starts with small case
….. e.g. int date
…..
}
public static void main(String args[]) Method(behavior) name starts with
{ first word small case then next
…. Words 1st letter capital case called
…. Camel case
} //end of class e.g. void printDate() {
}
37. Page 37Classification: Restricted
First Java Class
/* This is a comment */
//This is another comment
class MyDate
{ private int day, month, year; //variable
public void initDate() //method 1
{
day = 30;
month = 6;
year =2011;
}
public void printDate() //method 2
{
System.out.println(“Date is:” + day +”/” + month +”/” +year);
}
38. Page 38Classification: Restricted
Create an Object
//continuation
public static void main(String args[])
{
MyDate d = new MyDate();
//method invocation
d.initDate();
d.printDate();
}
}
39. Page 39Classification: Restricted
3. Language Fundamentals
i. Operators in Java
ii. Conditional & Loop statements
iii. Arrays in Java
iv. Exception handling
v. File handling
42. Page 42Classification: Restricted
Loop Statements
• Loop statements are used to iterate a part of the program several times.
• Three types of loops
For loop
for(initialization ; condition ;incr / decr){
//code to be executed
}
While loop
while(condition){
//code to be executed
}
Do.. While loop
do{
//code to be executed
}while(condition);
43. Page 43Classification: Restricted
Break, Continue & Comments
• Break statement
The Java break is used to break loop or switch statement. It breaks the
current flow of the program at specified condition. In case of inner loop, it
breaks only inner loop.
• Continue statement
The Java continue statement is used to continue loop. It continues the
current flow of the program and skips the remaining code at specified
condition. In case of inner loop, it continues only inner loop.
Comments in Java:
The java comments are statements that are not executed by the compiler
and interpreter. The comments can be used to provide information or
explanation about the variable, method, class or any statement. It can also
be used to hide program code for specific time.
44. Page 44Classification: Restricted
iii) Arrays in Java
Normally, array is a collection of similar type of elements that have
contiguous memory location. Java array is an object the contains elements
of similar data type
• Advantage:
Code Optimization
Random access
• Disadvantage:
Size limit
Types of Array:
• Single dimensional
• Multi dimensional
45. Page 45Classification: Restricted
iv. Exception Handling
• There is no perfect world
• Errors are inevitable
• Errors are shipped even with the best software
• Occur due to
Wrong input
Error on platform or system not configured
Program bugs
• Occur when the software is operational
46. Page 46Classification: Restricted
Types of Errors
• Logical Errors
Counter not incremented in the while loop
Wrong expression written, resulting in incorrect output
• Run time Errors
Division by Zero
Array out of bounds
Dynamic memory allocation failed
File not found
File is corrupt
47. Page 47Classification: Restricted
v) File Handling in Java
• High level operations/External operation
Create a folder
Delete a folder
Create a text file
Delete a text file
• Low level operations/ Internal operation
Read data from a file
Write data to a file
48. Page 48Classification: Restricted
4. Key Java Concepts
i. Constructor
ii. Method overloading
iii. Method overriding
iv. Abstract Class
v. Interface
49. Page 49Classification: Restricted
i) Constructor
• A constructor is used to initialize a newly created object
• It is implicitly invoked just after the memory is allocated for the object
using ‘new’ keyword
• It is a special method with same name as it’s class name
• No return type for constructor. Not even void
• A constructor without input parameter is default constructor
• Constructor can be overloaded
50. Page 50Classification: Restricted
ii) Method Overloading
• Reusing the same name for method
• The method calls are resolved at compile time using
method signature.
• Compile time error occurs if compiler cannot match the arguments or if
more than one match is possible
• Method signature consists of
Number of arguments passed to a function
Data types of arguments
Sequence in which they are passed
51. Page 51Classification: Restricted
Sample Program
class MathEngine
{
public int add(int num1, int num2)
{
….
}
public int add(int num1, int num2, int num3)
{
…
}
}
class Program
{
public static void main(String args[])
{
MathEngine obj = new MathEngine();
int result = obj.add(12,13);
int output = obj.add(15,16,17);
}
}
52. Page 52Classification: Restricted
iii) Method Overriding
• Polymorphism is achieved using overriding functions using inheritance
• It gives ability to define a behavior that’s specific to the sub class type
based on its requirements
• The version of a method that is executed will be determined by the object
that is used to invoke a method
Parent object ---- > parent method
Child object ----- > child method
53. Page 53Classification: Restricted
vi) Concrete and Abstract Class
• Concrete class
A class which describes the functionality of an object
It can be instantiated
• Abstract class
A class which contains generic non implemented methods.
Descendant classes comes up with the implementation for those methods in
their own ways
It can contain abstract as well as non abstract methods
Abstract methods do not have implementation
Implementation is left to the inheriting sub classes
Cannot be instantiated
54. Page 54Classification: Restricted
v) Interface
• An interface defines a contract between a provider and a consumer.
• Enables common design even across those classes not in hierarchy
• Defines a standard set of properties, methods and events.
• Any class implementing an interface has to provide the functionality
Interface
(Some
common
design)
Provider
class
Consumer
class
Implemented
by
Used
by
contract
55. Page 55Classification: Restricted
Features of an Interface
• Interface is essentially a collection of constants and abstract methods
• The interface approach is sometimes known as “programming by contract”
• Data members in an interface are always public, static and final
• A sub class can only have a single superclass in java but a class can
implement any number of interfaces
• If a class implements an interface then have to implement all the methods
of it.
57. Page 57Classification: Restricted
String class
• Java library contains a predefined class called as String.
• The String type is not a primitive type.
• But in certain cases Java treats it like one
• The ability to declare String literals instead of using new to instantiate a
copy of the class
String s = “seed”
• String is the “First class object”
58. Page 58Classification: Restricted
String Class
• String class represents an “immutable” string.
• ie. Once an instance is created, the string it contains can not be changed.
• To change the String referenced by a string variable, you throw away the
old string and replace it with the modified one.
“Bye”
“Hello”
New String
Old
String
59. Page 59Classification: Restricted
StringBuffer Class
• StringBuffer class allows to create “mutable” strings
• It reallocates memory of a given length to accommodate changes within a
same object
• StringBuffer is thread safe
• The buffer grows automatically as characters are added.
Eg StringBuffer sb = new StringBuffer();
60. Page 60Classification: Restricted
StringBuilder Class
• StringBuilder is introduced in Java 5.0 version.
• This is just an alternative to StringBuffer class.
• There is no difference between StringBuffer and StringBuilder
• Methods of StringBuilder class are not thread safe
• Recommended for faster applications.
61. Page 61Classification: Restricted
Why collections?
• Array size is fixed. Size cannot be increased dynamically.
• In actual development scenario, same type of objects need to be
processed.
• Data is obtained from data source like files or database.
63. Page 63Classification: Restricted
Collection Interfaces
• Allow collections to support a different browser
Interface Description
List Represents a collection of objects
that is accessed by an index. An
ordered collection
Set Represents a collection that contains
no duplicate elements. An order is
not fixed
Map Represents a collection of key- value
pairs
Queue Represents a collection designed for
holding elements prior to processing
Iterator Supports a simple iteration over
collection
Comparator Comparison function which imposes
a total ordering on some collection
of objects
64. Page 64Classification: Restricted
List Interface
• Ordered Collection
• May contain duplicates
• Implemented by classes
-- ArrayList [Resizable – array implementation of the List interface]
-- LinkedList [Doubly linked list implementation of the list]
--Vector [the Vector class implements a growable array of objects]
65. Page 65Classification: Restricted
Set Interface
• Collection of unique elements
• No duplicate elements allowed
• Collection not in any particular order (random)
• Implemented by the Hashset