Java

Decent Essays
Improved Essays
Superior Essays
Great Essays
Brilliant Essays
    Page 5 of 48 - About 480 Essays
  • Great Essays

    Introduction: This Research problem is aiming to compare and contrast four programming languages according to programming paradigms and the features with the purpose of determining the suitability and applicability of the languages for each criterion, distinguish them with their pros and cons, evaluate and explore the related features on those languages. For this I have selected one language from each programming paradigm (imperative, object-oriented, functional, logic) and compared it with the…

    • 1825 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    to remove an appendix after four years of undergraduate study” (Astrachan, 2009). Robert does not understand that Java is helping students to further the skills of computer science instead of working on skills that would take up the time students could be using to further their understanding of computer science instead of learning about past methods of computer science. By using Java the students can eliminate some of the struggles that computer science students faced in the past, for example…

    • 1085 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    to Nanchao, 1292 - Mongols fleet from China to Java and attacked Java, Mongols never conquered SE Asia SRIVAJAYA – 9th century – MARITIME STATE - No major agriculture area - Cholas came out in the 11th century, they tried to take Srivajaya but failed - Large independent Malay states Central Java and Dutch East Indies Mataram – central Javanese kingdom that is not a Malay state, inland state, concentrated on large agricultural development, central Java will act like it belongs to Mainland SE…

    • 1854 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    Securing your Macintosh(Mac) OS computer Apple producing their computers with a lot of security features already in them. Mac OS X is one of the most secure operating systems in the market. Still a lot of people make mistakes while using their computers on their daily bases. These mistakes can notably weaken the security of their operation system. To be sure that you computer secure we will consider how to secure your user account, your web browsing, and we will maximize the privacy. Let’s…

    • 867 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Dumarcay's Study

    • 723 Words
    • 3 Pages

    a Hindu shrine on a larger scale (21). Borobudur was initially laid out by the Hindu Sanjaya King in 775 AD as a base of Sivaite temple since the form which used perspective effects to increase the height is very common in Sivaite buildings around Java (Dumarcay 4).…

    • 723 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    management and unlike Java is incredibly easy to create graphical user interfaces in. Admittedly, a lot of the code is hidden to this creation of the GUI, but when you want to create something quickly it saves an incredible amount of time, is very flexible and all the code is there to be viewed and edited if you so wish. The ability to create a GUI programmatically is something that I believe any programmer should have, but being forced to use it for a simple task is silly. C# also, like java,…

    • 1828 Words
    • 8 Pages
    Great Essays
  • Decent Essays

    PROFESSIONAL EXPERIENCE Client: Varian Medical Systems, Palo Alto, CA. Sep 2014 – Till Now Sr Java Developer Responsibilities:  Participate in software design meetings to write technical design documents and to propose design solutions.  Develop codes based on user requirements documentation and detailed design documentation.  Recommend optimum coding…

    • 676 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    Cs-5020 Final Project

    • 422 Words
    • 2 Pages

    So that I have to be aware of few technologies like CORE JAVA, SOFTWARE TESTING, ORACLE, JAVA SCRIPT, SERVLETS, ANDROID, ANDROID WEAR, HTML and CSS, HIBERNATE. My Manager suggested me to learn about the GREENFOOT and I should be flexible to work in different environments like WINDOWS, MAC OS and LINUX. So these two weeks I have…

    • 422 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Divide and Conquer Strategies: Divide and conquer is an algorithm which design paradigm based on multi-branched recursion. This designed paradigm consists of following phases: 1) Break the problem (divide): Breaking the problem into several sub-problems that are smaller in size. 2) Solve the sub problem(conquer) : Solve the sub-problem recursively . 3) Combine the solutions (Merge): Combine solutions to subproblems to create a solution to the original problem. This technique is the basis of…

    • 718 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    to GUI Programming. Introduction to Programming Using Java. Retrieved from http://math.hws.edu/eck/cs124/downloads/javanotes7.pdf [Date Retrieved: May 31, 2017]. Javatpoint. (2017). Event and Listener (Java Event Handling). Retrieved from https://www.javatpoint.com/event-handling-in-java [Date Retrieved: May 31, 2017]. Thomas R. (2015, February 15). Java Message Service (JMS)—Explained. DZone. Retrieved from https://dzone.com/articles/java-message-service-jms [Date Retrieved: May 31, 2017].…

    • 569 Words
    • 3 Pages
    Improved Essays
  • Page 1 2 3 4 5 6 7 8 9 48