SlideShare a Scribd company logo
1 of 35
HISTORY OF JAVA
JAVA
• Father of Java: James Gasoline
EXPANSIONS:
• API-Application Programming Interface
• SDK-Software Development Kit
• JVM-Java virtual machine
History of Java
• 1990 oak : To control microprocessors
Embedded in customer item
• Oak needed to be
– Platform independent
– Extremely reliable
– Compact
• 1993: Java
– Internet and web exploration
– Internet application
• 1994: Hot Java Browser
• 1995: java1. 0
VERSIONS OF JAVA
• 1995 version 1.0:
– The Java development kit was released for free by
the sun
– 8-packages 212-classes
– Microsoft and other companies licensed Java
• 1997 version 1.1:
– 23 -packages 504-classes
– Improvement include better event handling inner
classes , improved jvm
– Microsoft developed its own 1.1 compatible Java
virtual machine for internet explorer
– Many browsers in use are still compatible only
with 1.1
1999 version 1.2:
-It is also called as the Java 2 platform
-59 packages 1520 classes
-Code & tools distributed as the SDK
-A Java foundation class based on swings
for improved graphics and user interfaces
– Collection API included list sets and hash map
2000 VERSION 1.3:
- 76 packages 1842 classes
- Java sound
2002 VERSION 1.4:
- 135 PACKAGES 2991 classes
- Improved I , xml support etc..,
2004 VERSION 5.0 (1.5):
- 165 packages over 3000 classes
- Faster startup metadata formatted
output
– Generic to operate on objects of various types
2006 JAVA SE 6:
– Scripting language support
2011 JAVA SE 7:
– JVM support for dynamic language
– String in switch
– Allowing underscores in numeric literals
FUTURE RELEASES:
JAVA SE 8:
– LAMBDA OPERATOR is expected in summer 2013
JAVA SE 9:
– Under planning
PACKAGES
• Each class has different methods is called
packages
FEAUTURES OF JAVA TECHNOLOGY
PLATFORM INDEPENDENT:
– Write once run anywhere
OBECT ORIENTED:
– No coding outside of class definitions including
main ()
– An extensive class library available in the core
language packages
COMPILER AND INTERPRETER:
– Code is compiled to byte codes that are
interpreted by a JVM
– This provides portability to any machine for which
a virtual machine has been written
– The two steps of compilation and interpretation
allow for extensive code checking and improved
security
ROBUST:
– Exception handling built-in strong type checking
Several dangerous features of c & c++
– No memory pointers
– No pre processor
– Garbage collector
AUTOMATIC MEMORY MANAGEMENT:
– Automatic garbage collection memory
management handled by the JVM
SECURITY:
– No memory pointers
– Programs run inside the virtual machine sandbox
CODE PATHOLOGIES REDUCED BY:
Byte code verifier:
– Checks classes after loading
Class loaders:
– Confines object of unique namespace
Security manager:
– Determines what resources a class can access
Java
Source
(. Java)
Java compiler
Java byte
code
(. Byte)
Java byte
code
move
locally or
through
the
network
Class loader
byte codes
Verifier
Java class
libraries
Java
interpreter
Just in
time
compiler
Run time system
Operating system
Hardware
Difference
c
• Focus on logic
• Procedure or structure
oriented
• Top – down approach
(Based on variable declaration)
c++
• Focus on both logic and
data
• Object oriented
programming language
• Bottom – top approach
(Variable declaration
C++
• Partially object oriented
language
• Pointers concept and
Preprocessor are available
• Operator overloading is
available
• Platform dependent
• A destructor is used to free
the memory
• The compiler is present
JAVA
• Purely object oriented
language
• Pointers concept and
Preprocessor is not
available
• Operator overloading is not
available
• Platform independent
• Automatic garbage
collection
• Both compiler and
interpreter is present
Markup language
• HTML, XML
• Design based language
Programming language
• C, C++, JAVA etc..,
• Logic based language
XML
• User defined tags
• Focused on data storage
• Case sensitive
HTML
• Predefined tags
• Focused on design
• Non case sensitive
Difference between function member
function and method
Function:
• Independent calling (in c)
Member function:
• Partially dependent on object (in c++)
(Members of class)
Methods:
• Fully dependent on object (Java)
Version 1.7 (string in switch)
Import Java. Io. *;
Class strswitch
{
Public static void main(string g[])
{
String s=“aaa”;
Switch (s)
{
Case “aaa”:
system.out.println(“from aaa”);
Case “bbb”:
system.out.println(“from bbb”);
Default:
system.out.println(“from default”);
}}}
Output
from aaa
Integer literal
Import java.io.*;
Class intliteral
{
Public static void main(string g[])
{
int a=12_78_56;
System.out.println(“a=“+a);
}
}
Output
a=127856
Special Keywords in Java
• Static
• Final
• Volatile
• Transient
• Strictfp
• Assert
• Byte
• Native
• Boolean
Final:
– Final is also like constant the give value can not
change throughout the program
Transient:
– Used within a certain period of time So it's not used
more
Strictfp:
– Display the exact result in a float
Assert:
– Implementing our assumption
Native:
– A program created in c can be accessed in Java
Byte:
– Between range (-128 to 0 to 127)
– Eg: byte b=123 is accepted
Byte b=129 is not accepted
Boolean:
– Assigning true or false to a statement or block
Static and Volatile
Static :
– A common memory allocation
Volatile:
– Share the value
Example for static and volatile
Eg Program:
Class samp
{
int a;
Static int b;
Volatile int c;
}
{
Samp s1.new samp;
Samp s2.new samp;
Samp s3.new samp;
}
Static memory allocation
a=1 ,b=2 ,c=3
s1 s2 s3
a
c
b (b is declared as static so it is
used in common)
1 0 0
3 3 3
2
Volatile memory allocation
a=1 ,b=2 ,c=3
s1 s2 s3
a
c (volatile value will be
shared among the object)
b
1 0 0
3 3 3
2
Java literals
Integer literal:
Eg: int a=10;
int b=010;
In integer literal if the first value is ‘0’ compiler
will take that as octal value.
Perform the operation and display the output
Output:
8
int a=1;
int b=2;
int c=0x10;
In integer literal if the first value is ‘0x’ compiler
will take that as hexadecimal value.
Perform the operation and display the output
Output:
16
Character literals
Declarations:
Char c=’p’;
Char c=98;
Char c=‘n’; ”0 is not used in java”
Char c=‘u0009’; (unicode)
Float literals
Declaration:
Float f=12.56f;
Float f=12.; (‘f’ no need compiler will take that
as 12.0)
Bytes =4;Maximum digits =6
Double:
double d=75.76835457786(maximum range is
not defined)
String literals
string s=“erode”;
String s=“erobde”(o/p:erde(since /b is defined
as backspace))
Eg:
int a=10;
int b=20;
int c=30;
string s=“hai”;
s.o.p(“a+b+c+s”);
s.o.p(“a+b+s+c”);
s.o.p(“a+s+b+s”);
output
60hai
30hai30
10hai2030(still it finds the string it will add the
content or numbers)

More Related Content

What's hot

Introduction to Java Programming
Introduction to Java ProgrammingIntroduction to Java Programming
Introduction to Java ProgrammingRavi Kant Sahu
 
Applet life cycle
Applet life cycleApplet life cycle
Applet life cyclemyrajendra
 
Basics of JAVA programming
Basics of JAVA programmingBasics of JAVA programming
Basics of JAVA programmingElizabeth Thomas
 
Java Data Types
Java Data TypesJava Data Types
Java Data TypesSpotle.ai
 
Introduction to Java Programming Language
Introduction to Java Programming LanguageIntroduction to Java Programming Language
Introduction to Java Programming Languagejaimefrozr
 
Java Exception handling
Java Exception handlingJava Exception handling
Java Exception handlingkamal kotecha
 
Java package
Java packageJava package
Java packageCS_GDRCST
 
oops concept in java | object oriented programming in java
oops concept in java | object oriented programming in javaoops concept in java | object oriented programming in java
oops concept in java | object oriented programming in javaCPD INDIA
 
Presentation on-exception-handling
Presentation on-exception-handlingPresentation on-exception-handling
Presentation on-exception-handlingNahian Ahmed
 
Operators in java presentation
Operators in java presentationOperators in java presentation
Operators in java presentationkunal kishore
 
Inheritance in java
Inheritance in javaInheritance in java
Inheritance in javaTech_MX
 
Java Presentation
Java PresentationJava Presentation
Java Presentationpm2214
 

What's hot (20)

Introduction to Java Programming
Introduction to Java ProgrammingIntroduction to Java Programming
Introduction to Java Programming
 
Applet life cycle
Applet life cycleApplet life cycle
Applet life cycle
 
Basics of JAVA programming
Basics of JAVA programmingBasics of JAVA programming
Basics of JAVA programming
 
Java Data Types
Java Data TypesJava Data Types
Java Data Types
 
Introduction to Java Programming Language
Introduction to Java Programming LanguageIntroduction to Java Programming Language
Introduction to Java Programming Language
 
Java Exception handling
Java Exception handlingJava Exception handling
Java Exception handling
 
Arrays in Java
Arrays in JavaArrays in Java
Arrays in Java
 
Java package
Java packageJava package
Java package
 
C language ppt
C language pptC language ppt
C language ppt
 
oops concept in java | object oriented programming in java
oops concept in java | object oriented programming in javaoops concept in java | object oriented programming in java
oops concept in java | object oriented programming in java
 
Presentation on-exception-handling
Presentation on-exception-handlingPresentation on-exception-handling
Presentation on-exception-handling
 
JAVA PROGRAMMING
JAVA PROGRAMMING JAVA PROGRAMMING
JAVA PROGRAMMING
 
Arrays in Java
Arrays in JavaArrays in Java
Arrays in Java
 
Operators in java presentation
Operators in java presentationOperators in java presentation
Operators in java presentation
 
Inheritance in java
Inheritance in javaInheritance in java
Inheritance in java
 
Java
JavaJava
Java
 
Constructor in java
Constructor in javaConstructor in java
Constructor in java
 
Java Programming
Java ProgrammingJava Programming
Java Programming
 
Java Presentation
Java PresentationJava Presentation
Java Presentation
 
C++ Overview PPT
C++ Overview PPTC++ Overview PPT
C++ Overview PPT
 

Similar to History of java'

j-chap1-Basics.ppt
j-chap1-Basics.pptj-chap1-Basics.ppt
j-chap1-Basics.pptSmitaBorkar9
 
Introduction to java
Introduction to java Introduction to java
Introduction to java Java Lover
 
JAVA_Day1_BasicIntroduction.pptx
JAVA_Day1_BasicIntroduction.pptxJAVA_Day1_BasicIntroduction.pptx
JAVA_Day1_BasicIntroduction.pptxMurugesh33
 
JAVAPart1_BasicIntroduction.pptx
JAVAPart1_BasicIntroduction.pptxJAVAPart1_BasicIntroduction.pptx
JAVAPart1_BasicIntroduction.pptxMurugesh33
 
1 java programming- introduction
1  java programming- introduction1  java programming- introduction
1 java programming- introductionjyoti_lakhani
 
JAVA-History-buzzwords-JVM_architecture.pptx
JAVA-History-buzzwords-JVM_architecture.pptxJAVA-History-buzzwords-JVM_architecture.pptx
JAVA-History-buzzwords-JVM_architecture.pptx20EUEE018DEEPAKM
 
basic core java up to operator
basic core java up to operatorbasic core java up to operator
basic core java up to operatorkamal kotecha
 
Java Programming concept
Java Programming concept Java Programming concept
Java Programming concept Prakash Poudel
 
1 Introduction To Java Technology
1 Introduction To Java Technology 1 Introduction To Java Technology
1 Introduction To Java Technology dM Technologies
 
1 Introduction To Java Technology
1 Introduction To Java Technology 1 Introduction To Java Technology
1 Introduction To Java Technology dM Technologies
 
Core java over view basics introduction by quontra solutions
Core java over view basics introduction by quontra solutionsCore java over view basics introduction by quontra solutions
Core java over view basics introduction by quontra solutionsQUONTRASOLUTIONS
 

Similar to History of java' (20)

Java Introduction
Java IntroductionJava Introduction
Java Introduction
 
j-chap1-Basics.ppt
j-chap1-Basics.pptj-chap1-Basics.ppt
j-chap1-Basics.ppt
 
Java1 in mumbai
Java1 in mumbaiJava1 in mumbai
Java1 in mumbai
 
Introduction to java
Introduction to java Introduction to java
Introduction to java
 
JAVA_Day1_BasicIntroduction.pptx
JAVA_Day1_BasicIntroduction.pptxJAVA_Day1_BasicIntroduction.pptx
JAVA_Day1_BasicIntroduction.pptx
 
JAVAPart1_BasicIntroduction.pptx
JAVAPart1_BasicIntroduction.pptxJAVAPart1_BasicIntroduction.pptx
JAVAPart1_BasicIntroduction.pptx
 
1 java programming- introduction
1  java programming- introduction1  java programming- introduction
1 java programming- introduction
 
JAVA PROGRAM CONSTRUCTS OR LANGUAGE BASICS.pptx
JAVA PROGRAM CONSTRUCTS OR LANGUAGE BASICS.pptxJAVA PROGRAM CONSTRUCTS OR LANGUAGE BASICS.pptx
JAVA PROGRAM CONSTRUCTS OR LANGUAGE BASICS.pptx
 
Introduction to JAVA
Introduction to JAVAIntroduction to JAVA
Introduction to JAVA
 
basic_java.ppt
basic_java.pptbasic_java.ppt
basic_java.ppt
 
JAVA-History-buzzwords-JVM_architecture.pptx
JAVA-History-buzzwords-JVM_architecture.pptxJAVA-History-buzzwords-JVM_architecture.pptx
JAVA-History-buzzwords-JVM_architecture.pptx
 
basic core java up to operator
basic core java up to operatorbasic core java up to operator
basic core java up to operator
 
Java Programming concept
Java Programming concept Java Programming concept
Java Programming concept
 
Letest
LetestLetest
Letest
 
Unit 1
Unit 1Unit 1
Unit 1
 
1 Introduction To Java Technology
1 Introduction To Java Technology 1 Introduction To Java Technology
1 Introduction To Java Technology
 
1 Introduction To Java Technology
1 Introduction To Java Technology 1 Introduction To Java Technology
1 Introduction To Java Technology
 
Comp102 lec 3
Comp102   lec 3Comp102   lec 3
Comp102 lec 3
 
unit1.pptx
unit1.pptxunit1.pptx
unit1.pptx
 
Core java over view basics introduction by quontra solutions
Core java over view basics introduction by quontra solutionsCore java over view basics introduction by quontra solutions
Core java over view basics introduction by quontra solutions
 

Recently uploaded

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 

History of java'

  • 2. JAVA • Father of Java: James Gasoline EXPANSIONS: • API-Application Programming Interface • SDK-Software Development Kit • JVM-Java virtual machine
  • 3. History of Java • 1990 oak : To control microprocessors Embedded in customer item • Oak needed to be – Platform independent – Extremely reliable – Compact • 1993: Java – Internet and web exploration – Internet application • 1994: Hot Java Browser • 1995: java1. 0
  • 4. VERSIONS OF JAVA • 1995 version 1.0: – The Java development kit was released for free by the sun – 8-packages 212-classes – Microsoft and other companies licensed Java • 1997 version 1.1: – 23 -packages 504-classes – Improvement include better event handling inner classes , improved jvm
  • 5. – Microsoft developed its own 1.1 compatible Java virtual machine for internet explorer – Many browsers in use are still compatible only with 1.1 1999 version 1.2: -It is also called as the Java 2 platform -59 packages 1520 classes -Code & tools distributed as the SDK -A Java foundation class based on swings for improved graphics and user interfaces
  • 6. – Collection API included list sets and hash map 2000 VERSION 1.3: - 76 packages 1842 classes - Java sound 2002 VERSION 1.4: - 135 PACKAGES 2991 classes - Improved I , xml support etc.., 2004 VERSION 5.0 (1.5): - 165 packages over 3000 classes - Faster startup metadata formatted output
  • 7. – Generic to operate on objects of various types 2006 JAVA SE 6: – Scripting language support 2011 JAVA SE 7: – JVM support for dynamic language – String in switch – Allowing underscores in numeric literals FUTURE RELEASES: JAVA SE 8: – LAMBDA OPERATOR is expected in summer 2013 JAVA SE 9: – Under planning
  • 8. PACKAGES • Each class has different methods is called packages
  • 9. FEAUTURES OF JAVA TECHNOLOGY PLATFORM INDEPENDENT: – Write once run anywhere OBECT ORIENTED: – No coding outside of class definitions including main () – An extensive class library available in the core language packages
  • 10. COMPILER AND INTERPRETER: – Code is compiled to byte codes that are interpreted by a JVM – This provides portability to any machine for which a virtual machine has been written – The two steps of compilation and interpretation allow for extensive code checking and improved security ROBUST: – Exception handling built-in strong type checking
  • 11. Several dangerous features of c & c++ – No memory pointers – No pre processor – Garbage collector AUTOMATIC MEMORY MANAGEMENT: – Automatic garbage collection memory management handled by the JVM SECURITY: – No memory pointers – Programs run inside the virtual machine sandbox
  • 12. CODE PATHOLOGIES REDUCED BY: Byte code verifier: – Checks classes after loading Class loaders: – Confines object of unique namespace Security manager: – Determines what resources a class can access
  • 13. Java Source (. Java) Java compiler Java byte code (. Byte) Java byte code move locally or through the network Class loader byte codes Verifier Java class libraries Java interpreter Just in time compiler Run time system Operating system Hardware
  • 14. Difference c • Focus on logic • Procedure or structure oriented • Top – down approach (Based on variable declaration) c++ • Focus on both logic and data • Object oriented programming language • Bottom – top approach (Variable declaration
  • 15. C++ • Partially object oriented language • Pointers concept and Preprocessor are available • Operator overloading is available • Platform dependent • A destructor is used to free the memory • The compiler is present JAVA • Purely object oriented language • Pointers concept and Preprocessor is not available • Operator overloading is not available • Platform independent • Automatic garbage collection • Both compiler and interpreter is present
  • 16. Markup language • HTML, XML • Design based language Programming language • C, C++, JAVA etc.., • Logic based language
  • 17. XML • User defined tags • Focused on data storage • Case sensitive HTML • Predefined tags • Focused on design • Non case sensitive
  • 18. Difference between function member function and method Function: • Independent calling (in c) Member function: • Partially dependent on object (in c++) (Members of class) Methods: • Fully dependent on object (Java)
  • 19. Version 1.7 (string in switch) Import Java. Io. *; Class strswitch { Public static void main(string g[]) { String s=“aaa”; Switch (s) { Case “aaa”: system.out.println(“from aaa”); Case “bbb”: system.out.println(“from bbb”); Default: system.out.println(“from default”); }}}
  • 21. Integer literal Import java.io.*; Class intliteral { Public static void main(string g[]) { int a=12_78_56; System.out.println(“a=“+a); } }
  • 23. Special Keywords in Java • Static • Final • Volatile • Transient • Strictfp • Assert • Byte • Native • Boolean
  • 24. Final: – Final is also like constant the give value can not change throughout the program Transient: – Used within a certain period of time So it's not used more Strictfp: – Display the exact result in a float Assert: – Implementing our assumption
  • 25. Native: – A program created in c can be accessed in Java Byte: – Between range (-128 to 0 to 127) – Eg: byte b=123 is accepted Byte b=129 is not accepted Boolean: – Assigning true or false to a statement or block
  • 26. Static and Volatile Static : – A common memory allocation Volatile: – Share the value
  • 27. Example for static and volatile Eg Program: Class samp { int a; Static int b; Volatile int c; } { Samp s1.new samp; Samp s2.new samp; Samp s3.new samp; }
  • 28. Static memory allocation a=1 ,b=2 ,c=3 s1 s2 s3 a c b (b is declared as static so it is used in common) 1 0 0 3 3 3 2
  • 29. Volatile memory allocation a=1 ,b=2 ,c=3 s1 s2 s3 a c (volatile value will be shared among the object) b 1 0 0 3 3 3 2
  • 30. Java literals Integer literal: Eg: int a=10; int b=010; In integer literal if the first value is ‘0’ compiler will take that as octal value. Perform the operation and display the output Output: 8
  • 31. int a=1; int b=2; int c=0x10; In integer literal if the first value is ‘0x’ compiler will take that as hexadecimal value. Perform the operation and display the output Output: 16
  • 32. Character literals Declarations: Char c=’p’; Char c=98; Char c=‘n’; ”0 is not used in java” Char c=‘u0009’; (unicode)
  • 33. Float literals Declaration: Float f=12.56f; Float f=12.; (‘f’ no need compiler will take that as 12.0) Bytes =4;Maximum digits =6 Double: double d=75.76835457786(maximum range is not defined)
  • 34. String literals string s=“erode”; String s=“erobde”(o/p:erde(since /b is defined as backspace)) Eg: int a=10; int b=20; int c=30; string s=“hai”; s.o.p(“a+b+c+s”); s.o.p(“a+b+s+c”); s.o.p(“a+s+b+s”);
  • 35. output 60hai 30hai30 10hai2030(still it finds the string it will add the content or numbers)

Editor's Notes

  1. Last value stored in b will be taken as common valueIf b= 7 means the value will be changed as 7