SlideShare a Scribd company logo
Temas de lectura SSD3
Unidad 1:
Equipo 1—expone 2 de febrero de 2010
1.1.1 A Simple Java Application
       Readings:

          •   Required:
                 o Barker, second edition, chapter 2 (pages 15–32).




1.1.2 Data: Primitives and Objects
       Readings:

          •   Required:
                 o Barker, second edition, chapter 2 (pages 32–38),
                    chapter 3 (pages 77-85)




Equipo 2—expone 5 de febrero de 2010
1.1.3 Operators, Expressions, and Statements
       Readings:

          •   Required:
                 o Barker, second edition, chapter 2 (pages 38-44).




1.1.4 Control Statements
       Readings:

          •   Required:
                 o Barker, second edition, chapter 2 (pages 44–54).
Equipo 3—expone 12 de febrero de 2010
1.1.5 Classes
       Readings:

          •   Required:
                 o Barker, second edition, chapter 3, chapter 4, chapter
                    7 (pages 313-20).



1.1.6 Code Conventions
       Readings:

          •   Required:
                 o Java Software, Sun Microsystems, Inc, Code
                    Conventions for the Java Programming Language.
                    This document contains the standard conventions
                    that Sun Microsystems follows and recommends that
                    others follow. It covers file names, file organization,
                    indentation, comments, declarations, statements,
                    white space, naming conventions, and programming
                    practices. It also includes a code example.



Equipo 4—expone 16 de febrero de 2010
1.1.8 Javadoc
       Readings:

          •   Required:
                 o Java Software, Sun Microsystems, Inc., How to Write
                    Doc Comments for the Javadoc Tool. This document
                    describes the conventions that are used to write
                    Javadoc comments at Sun.

              Sequence: Read sections "Format of a Doc Comment,"
              "Descriptions," "A Style Guide," and "Tag Conventions."

1.2.3 Exception Objects
Readings:

          •   Required:
                 o Barker, second edition, chapter 13 (pages 473–501).

              Sequence: Read the textbook before reading this page.



Equipo 5—expone 23 de febrero de 2010
1.3.1 UML Class Diagrams
       Readings:

          •   Required:
                 o Barker, second edition, chapter 10 (pages 372–6).



Equipo 6—expone 26 de febrero de 2010
1.3.2 Relationships Between Classes
       Readings:

          •   Required:
                 o Barker, second edition, chapter 5 (pages 167–74);
                    chapter 10 (pages 376–86).



1.3.5 Modeling Classes
       Readings:

          •   Required:
                 o Barker, second edition, chapter 10 (pages 355–72)
Unidad 2:
Equipo 1—expone 12 de marzo de 2010
2.1.1 Defining Classes
       Readings:

          •   Required:
                 o Barker, first edition, chapter 3 (pages 59–62), chapter
                    4 (pages 83–109), chapter 7 (pages 179-85), chapter
                    13 (pages 326-33).
                 o Barker, second edition, chapter 3 (pages 68–71),
                    chapter 4 (pages 97–161), chapter 7 (pages 313-20).



Equipo 2—expone 16 de marzo de 2010
2.1.2 Inheritance
       Readings:

          •   Required:
                 o Barker, first edition, chapter 5 (pages 120–39);
                    chapter 13 (pages 305-11 and 335–43).
                 o Barker, second edition, chapter 5 (pages 174–208).



Equipo 3—expone 19 de marzo de 2010
2.1.3 Method equals and Method toString
       Readings:

          •   Required:
                 o Barker, first edition, chapter 13 (pages 362–5).
                 o Barker, second edition, chapter 13 (pages 523–32).



Equipo 4—expone 23 de marzo de 2010
2.2.1 Arrays
       Readings:

          •   Required:
                 o Barker, first edition, chapter 6 (pages 143–8); chapter
                    13 (pages 316–8).
                 o Barker, second edition, chapter 6 (pages 219–27).



Equipo 5—expone 26 de marzo de 2010
2.2.2 ArrayList and Iterators
       Readings:

          •   Required:
                 o Barker, first edition, chapter 13 (pages 343–6).
                 o Barker, second edition, chapter 6 (pages 227-40,
                    pages 249-59); chapter 13 (pages 316–8).

                     Note: The first edition does not address the use
                     of ArrayList and generics.

Equipo 6—expone 6 de abril de 2010
2.3.1 Abstract Classes
       Readings:

          •   Required:
                 o Barker, first edition, chapter 7 (pages 169–75).
                 o Barker, second edition, chapter 7 (pages 282–90).



Equipo 1—expone 20 de abril de 2010
2.3.2 Polymorphism
       Readings:

          •   Required:
o   Barker, first edition, chapter 7 (pages 164–8).
                   o   Barker, second edition, chapter 7 (pages 274–80).



Equipo 2—expone 23 de abril de 2010
2.3.3 Interfaces
       Readings:

          •   Required:
                 o Barker, first edition, chapter 7 (pages 175–8).
                 o Barker, second edition, chapter 7 (pages 290–304).
Unidad 3:
Equipo 3—expone 30 de abril de 2010
3.1.1 File I/O
       Readings:

          •   Required:
                 o Barker, first edition, chapter 15 (pages 427–32).
                 o Barker, second edition, chapter 15 (pages 624–630).



Equipo 4—expone 4 de mayo de 2010
3.2.1 Swing Components and Containers
       Readings:

          •   Required:
                 o Barker, first edition, chapter 16 (pages 471–522).
                 o Barker, second edition, chapter 16 (pages 681–735).



Equipo 5—expone 7 de mayo de 2010
3.2.2 Swing Event Handling
       Readings:

          •   Required:
                 o Barker, first edition, chapter 16 (pages 522-44).
                 o Barker, second edition, chapter 16 (pages 735–61).



Equipo 6—expone 11 de mayo de 2010
3.2.3 Class JFileChooser
Readings:

   •   Required:
          o Barker, first edition, chapter 16 (pages 545–52).
          o Barker, second edition, chapter 16 (pages 761–69).

More Related Content

More from UVM

Portafolio de evidencias del curso Programación Avanzada
Portafolio de evidencias del curso Programación AvanzadaPortafolio de evidencias del curso Programación Avanzada
Portafolio de evidencias del curso Programación Avanzada
UVM
 
Eficiencia en uso tiempo
Eficiencia en uso  tiempoEficiencia en uso  tiempo
Eficiencia en uso tiempo
UVM
 
Administración de memoria arreglos dinamicos
Administración de memoria arreglos dinamicosAdministración de memoria arreglos dinamicos
Administración de memoria arreglos dinamicos
UVM
 
Practica de arreglos
Practica de arreglosPractica de arreglos
Practica de arreglos
UVM
 
Otra introducción a apuntadores
Otra introducción a apuntadoresOtra introducción a apuntadores
Otra introducción a apuntadores
UVM
 
Ejemplo de solución de práctica funciones stl
Ejemplo de solución de práctica funciones stlEjemplo de solución de práctica funciones stl
Ejemplo de solución de práctica funciones stl
UVM
 
Breve repaso de apuntadores
Breve repaso de apuntadoresBreve repaso de apuntadores
Breve repaso de apuntadores
UVM
 
Arreglos conceptos básicos
Arreglos conceptos básicosArreglos conceptos básicos
Arreglos conceptos básicos
UVM
 
Resolución práctica de tipos de datos
Resolución práctica de tipos de datosResolución práctica de tipos de datos
Resolución práctica de tipos de datos
UVM
 
Resumen de funciones
Resumen de funcionesResumen de funciones
Resumen de funciones
UVM
 
Biblioteca estándar de funciones
Biblioteca estándar de funcionesBiblioteca estándar de funciones
Biblioteca estándar de funciones
UVM
 
Manejo de bits
Manejo de bitsManejo de bits
Manejo de bits
UVM
 
Aclaración de dudas 4 de septiembre
Aclaración de dudas 4 de septiembreAclaración de dudas 4 de septiembre
Aclaración de dudas 4 de septiembre
UVM
 
Aclaraciones varias a códigos entregados en sesión 3
Aclaraciones varias a códigos entregados en sesión 3Aclaraciones varias a códigos entregados en sesión 3
Aclaraciones varias a códigos entregados en sesión 3
UVM
 
Funciones definidas por el usuario
Funciones definidas por el usuarioFunciones definidas por el usuario
Funciones definidas por el usuario
UVM
 
Función main()
Función main()Función main()
Función main()
UVM
 
Depuración de un programa en c++
Depuración de un programa en c++Depuración de un programa en c++
Depuración de un programa en c++
UVM
 
Algunas dudas de la sesión 28 agosto
Algunas dudas de la sesión 28 agostoAlgunas dudas de la sesión 28 agosto
Algunas dudas de la sesión 28 agosto
UVM
 
Estructura programa c++
Estructura programa c++Estructura programa c++
Estructura programa c++
UVM
 
Objetos y arreglos en C#
Objetos y arreglos en C#Objetos y arreglos en C#
Objetos y arreglos en C#
UVM
 

More from UVM (20)

Portafolio de evidencias del curso Programación Avanzada
Portafolio de evidencias del curso Programación AvanzadaPortafolio de evidencias del curso Programación Avanzada
Portafolio de evidencias del curso Programación Avanzada
 
Eficiencia en uso tiempo
Eficiencia en uso  tiempoEficiencia en uso  tiempo
Eficiencia en uso tiempo
 
Administración de memoria arreglos dinamicos
Administración de memoria arreglos dinamicosAdministración de memoria arreglos dinamicos
Administración de memoria arreglos dinamicos
 
Practica de arreglos
Practica de arreglosPractica de arreglos
Practica de arreglos
 
Otra introducción a apuntadores
Otra introducción a apuntadoresOtra introducción a apuntadores
Otra introducción a apuntadores
 
Ejemplo de solución de práctica funciones stl
Ejemplo de solución de práctica funciones stlEjemplo de solución de práctica funciones stl
Ejemplo de solución de práctica funciones stl
 
Breve repaso de apuntadores
Breve repaso de apuntadoresBreve repaso de apuntadores
Breve repaso de apuntadores
 
Arreglos conceptos básicos
Arreglos conceptos básicosArreglos conceptos básicos
Arreglos conceptos básicos
 
Resolución práctica de tipos de datos
Resolución práctica de tipos de datosResolución práctica de tipos de datos
Resolución práctica de tipos de datos
 
Resumen de funciones
Resumen de funcionesResumen de funciones
Resumen de funciones
 
Biblioteca estándar de funciones
Biblioteca estándar de funcionesBiblioteca estándar de funciones
Biblioteca estándar de funciones
 
Manejo de bits
Manejo de bitsManejo de bits
Manejo de bits
 
Aclaración de dudas 4 de septiembre
Aclaración de dudas 4 de septiembreAclaración de dudas 4 de septiembre
Aclaración de dudas 4 de septiembre
 
Aclaraciones varias a códigos entregados en sesión 3
Aclaraciones varias a códigos entregados en sesión 3Aclaraciones varias a códigos entregados en sesión 3
Aclaraciones varias a códigos entregados en sesión 3
 
Funciones definidas por el usuario
Funciones definidas por el usuarioFunciones definidas por el usuario
Funciones definidas por el usuario
 
Función main()
Función main()Función main()
Función main()
 
Depuración de un programa en c++
Depuración de un programa en c++Depuración de un programa en c++
Depuración de un programa en c++
 
Algunas dudas de la sesión 28 agosto
Algunas dudas de la sesión 28 agostoAlgunas dudas de la sesión 28 agosto
Algunas dudas de la sesión 28 agosto
 
Estructura programa c++
Estructura programa c++Estructura programa c++
Estructura programa c++
 
Objetos y arreglos en C#
Objetos y arreglos en C#Objetos y arreglos en C#
Objetos y arreglos en C#
 

Recently uploaded

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 

Recently uploaded (20)

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 

Temas De Exposicion Ssd3 01 10

  • 1. Temas de lectura SSD3 Unidad 1: Equipo 1—expone 2 de febrero de 2010 1.1.1 A Simple Java Application Readings: • Required: o Barker, second edition, chapter 2 (pages 15–32). 1.1.2 Data: Primitives and Objects Readings: • Required: o Barker, second edition, chapter 2 (pages 32–38), chapter 3 (pages 77-85) Equipo 2—expone 5 de febrero de 2010 1.1.3 Operators, Expressions, and Statements Readings: • Required: o Barker, second edition, chapter 2 (pages 38-44). 1.1.4 Control Statements Readings: • Required: o Barker, second edition, chapter 2 (pages 44–54).
  • 2. Equipo 3—expone 12 de febrero de 2010 1.1.5 Classes Readings: • Required: o Barker, second edition, chapter 3, chapter 4, chapter 7 (pages 313-20). 1.1.6 Code Conventions Readings: • Required: o Java Software, Sun Microsystems, Inc, Code Conventions for the Java Programming Language. This document contains the standard conventions that Sun Microsystems follows and recommends that others follow. It covers file names, file organization, indentation, comments, declarations, statements, white space, naming conventions, and programming practices. It also includes a code example. Equipo 4—expone 16 de febrero de 2010 1.1.8 Javadoc Readings: • Required: o Java Software, Sun Microsystems, Inc., How to Write Doc Comments for the Javadoc Tool. This document describes the conventions that are used to write Javadoc comments at Sun. Sequence: Read sections "Format of a Doc Comment," "Descriptions," "A Style Guide," and "Tag Conventions." 1.2.3 Exception Objects
  • 3. Readings: • Required: o Barker, second edition, chapter 13 (pages 473–501). Sequence: Read the textbook before reading this page. Equipo 5—expone 23 de febrero de 2010 1.3.1 UML Class Diagrams Readings: • Required: o Barker, second edition, chapter 10 (pages 372–6). Equipo 6—expone 26 de febrero de 2010 1.3.2 Relationships Between Classes Readings: • Required: o Barker, second edition, chapter 5 (pages 167–74); chapter 10 (pages 376–86). 1.3.5 Modeling Classes Readings: • Required: o Barker, second edition, chapter 10 (pages 355–72)
  • 4. Unidad 2: Equipo 1—expone 12 de marzo de 2010 2.1.1 Defining Classes Readings: • Required: o Barker, first edition, chapter 3 (pages 59–62), chapter 4 (pages 83–109), chapter 7 (pages 179-85), chapter 13 (pages 326-33). o Barker, second edition, chapter 3 (pages 68–71), chapter 4 (pages 97–161), chapter 7 (pages 313-20). Equipo 2—expone 16 de marzo de 2010 2.1.2 Inheritance Readings: • Required: o Barker, first edition, chapter 5 (pages 120–39); chapter 13 (pages 305-11 and 335–43). o Barker, second edition, chapter 5 (pages 174–208). Equipo 3—expone 19 de marzo de 2010 2.1.3 Method equals and Method toString Readings: • Required: o Barker, first edition, chapter 13 (pages 362–5). o Barker, second edition, chapter 13 (pages 523–32). Equipo 4—expone 23 de marzo de 2010
  • 5. 2.2.1 Arrays Readings: • Required: o Barker, first edition, chapter 6 (pages 143–8); chapter 13 (pages 316–8). o Barker, second edition, chapter 6 (pages 219–27). Equipo 5—expone 26 de marzo de 2010 2.2.2 ArrayList and Iterators Readings: • Required: o Barker, first edition, chapter 13 (pages 343–6). o Barker, second edition, chapter 6 (pages 227-40, pages 249-59); chapter 13 (pages 316–8). Note: The first edition does not address the use of ArrayList and generics. Equipo 6—expone 6 de abril de 2010 2.3.1 Abstract Classes Readings: • Required: o Barker, first edition, chapter 7 (pages 169–75). o Barker, second edition, chapter 7 (pages 282–90). Equipo 1—expone 20 de abril de 2010 2.3.2 Polymorphism Readings: • Required:
  • 6. o Barker, first edition, chapter 7 (pages 164–8). o Barker, second edition, chapter 7 (pages 274–80). Equipo 2—expone 23 de abril de 2010 2.3.3 Interfaces Readings: • Required: o Barker, first edition, chapter 7 (pages 175–8). o Barker, second edition, chapter 7 (pages 290–304).
  • 7. Unidad 3: Equipo 3—expone 30 de abril de 2010 3.1.1 File I/O Readings: • Required: o Barker, first edition, chapter 15 (pages 427–32). o Barker, second edition, chapter 15 (pages 624–630). Equipo 4—expone 4 de mayo de 2010 3.2.1 Swing Components and Containers Readings: • Required: o Barker, first edition, chapter 16 (pages 471–522). o Barker, second edition, chapter 16 (pages 681–735). Equipo 5—expone 7 de mayo de 2010 3.2.2 Swing Event Handling Readings: • Required: o Barker, first edition, chapter 16 (pages 522-44). o Barker, second edition, chapter 16 (pages 735–61). Equipo 6—expone 11 de mayo de 2010 3.2.3 Class JFileChooser
  • 8. Readings: • Required: o Barker, first edition, chapter 16 (pages 545–52). o Barker, second edition, chapter 16 (pages 761–69).