Computer Science Wiki

            • Amazon Machine Image (AMI)
            • Connect to an EC2 instance
            • EC2 - Elastic Compute Cloud
            • EC2 Image Builder
            • EC2 Purchase Options
            • EC2 Sizing and Configuration Options
            • Security and Permissions
            • Types of EC2 Instances
          • ASG - Auto Scaling Group
          • ECR - Elastic Container Registry
          • ECS - Elastic Container Service
          • ELB - Elastic Load Balancer
          • Amazon Athena
          • Amazon Aurora
          • Amazon ElastiCache
          • Amazon Glue
          • Amazon Managed Blockchain
          • Amazon Neptune
          • Amazon QLDB
          • Amazon QuickSight
          • Amazon Timestream
          • DMS - Database Migration Service
          • DocumentDB
          • DynamoDB
          • EMR - Elastic MapReduce
          • RDS - Relational Database Service
          • RDS Deployment Options
          • Redshift
          • AWS Identity and Access Management (IAM)
          • IAM Guidelines and Best Practices
          • IAM Security Tools
          • IAM Users, Groups, Roles, and Policies
          • Serverless and AWS Lambda
            • Amazon FSx
            • EBS - Elastic Block Store
            • EBS Snapshot
            • EC2 Instance Store
            • EFS - Elastic File System
            • Amazon S3
            • Amazon S3 Bucket Policies
            • Amazon S3 Encryption
            • Amazon S3 Replication (CRR & SRR)
            • Amazon S3 Security
            • Amazon S3 Static Website Hosting
            • Amazon S3 Storage Class
            • Amazon S3 Versioning
          • AWS Snow Family
          • AWS Storage Gateway
          • Edge Computing with AWS Snow Family
        • AWS Command Line Interface (CLI)
        • AWS Region and Availability Zone
        • AWS Shared Responsibility Model
        • Pricing of the AWS
      • Cloud Computing
      • Scalability and High Availability in Cloud Computing
      • The Delivery of Cloud Services
      • The Deployment Models of the Cloud
      • Traditional Computing VS Cloud Computing
      • Types of Cloud Computing Services
        • Address Resolution Protocol (ARP)
        • Application Layer
        • Border Gateway Protocol (BGP)
        • Determine if destination outside the LAN
        • DNS Nameserver
        • DNS Record
        • DNS Resolution
        • Domain Name System (DNS)
        • Hypertext Transfer Protocol (HTTP)
        • Internet Control Message Protocol (ICMP)
        • Internet Layer
        • Internet Protocol (IP)
        • Internet Protocol Suite
        • Link Layer
        • Reaching destinations outside the LAN
        • Simple Mail Transfer Protocol (SMTP)
        • SMTP Commands
        • TCP Port
        • Transport Layer
      • Circuit Switching VS Packet Switching
      • Computer Networks
      • Ethernet
      • LAN and WAN
      • Network Layered Architecture
        • Role of Management and Board in the Cybersecurity Picture
          • Business Information System Ethics
          • Business Information Systems (BIS)
          • Business Process (BP)
          • Business Process Management (BPM)
          • Business Process Model and Notation (BPMN)
          • Databases and Data Modelling
          • Information System (IS)
          • IS Five Components Example
          • Porter's Five Forces Analysis
          • Porter's Four Competitive Strategies
          • Porter's Value Chain Model
          • Process Improvement
          • Strategy and Competitive Advantage
          • What Is Business
          • Computing Project Management
          • Introduction to IT Project Management
          • IT Project Cost - Tools and Techniques
            • Information Architecture (IA)
            • Understanding Users - Information Collection
            • What is Usability
          • Human Computer Interaction (HCI)
          • Interview
      • Computing Research and Cross-Disciplinary Studies
        • Asymmetric Cryptography
        • Caesar Cipher
        • Diffie-Hellman Key Exchange
        • Digital Certificate
        • Digital Signature
        • Hash Algorithms
        • Hash Extension Attack
        • HMAC Key Derivation Function (HKDF)
        • HTTP Secure (HTTPS)
        • Key Distribution
        • Message Authentication Code (MAC)
        • Network Attacks and Preventions
        • Network Security and Cryptography
        • One-Time Pad (OTP)
        • Password Based Attacks
        • RSA Algorithm
        • Secure Shell (SSH)
        • Stream Cipher and Block Cipher
        • Symmetric Cryptography
        • Transport Layer Security (TLS)
        • Vigenère Cipher
      • Cyber Security and Security Engineering
      • Cybersecurity Culture and Framework
      • Human Factors in Cybersecurity
      • Number Theory and Abstract Algebra in Cryptography
      • Principle of Psychological Acceptability
      • Security Concepts
      • System Security and Access Control
      • Usability and Security of Passwords
            • Hill-Climbing Search
            • Optimisation Problems
            • Informed Search - A* Search
            • Informed Search - Greedy Search
            • Minimax Algorithm
            • Uninformed Search - Breadth-First Search (BFS)
            • Uninformed Search - Depth-First Search (DFS)
            • Uninformed Search - Iterative Deepening Search (IDS)
            • Uninformed Search - Uninformed Cost Search (UCS)
          • Problem Solving and Search
        • Game Playing
          • 1R Algorithm
          • K-Nearest Neighbour (Classification)
          • K-NN Issue - Curse of Dimensionality
          • Supervised Machine Learning
          • Weighted Nearest Neighbour
          • Unsupervised Learning - Association Rule learning
          • Unsupervised Learning - Clustering
          • Unsupervised Machine Learning
        • Machine Learning (ML)
      • Computational Data Science and Artificial Intelligence (AI)
          • Divide and Conquer
          • Divide and Conquer Master theorem Examples
          • Divide and Conquer Unrolling Examples
          • Integer Multiplication
          • Maxima Set
          • Binary Search
          • Graph Breadth-First Search (BFS)
          • Graph Depth-First Search (DFS)
          • Bubble Sort
          • Merge Sort
          • Selection Sort
          • Count Character
          • Dijkstras Shortest Path
          • MST - Kruskal's Algorithm
          • MST - Prim's Algorithm
          • Range Query in BST
        • Greedy Algorithm
        • Abstract Data Type (ADT)
        • ADT - Binary Tree
        • ADT - Disjoint Set
        • ADT - Graph
        • ADT - Map
        • ADT - Priority Queue
        • ADT - Set
        • ADT - Tree
        • AVL Tree
        • Binary Search Tree (BST)
        • Hash Table
        • Heap
        • Linked List
      • Big-O Notation and Algorithm Complexities
      • Data Structure and Algorithms Cheat Sheet
      • Data Structures and Algorithms
      • Pseudocode Conventions
      • Sequence and Series
      • Database Systems
      • Relational Database Management System (RDBMS)
      • Relational Database Normalisation
          • Bash
          • Bash Basic Operators
          • Bash Process Management
          • File Manipulation
          • File Permission
          • Network Configuration and Troubleshooting
          • Regular Expressions (Regex)
          • Text Processing and Manipulation
          • Work with Variables
        • Bit Masking
        • Character Representation
        • Data Representation
        • Number System Conversion
        • Operating Systems (OS)
        • Process management and System calls
        • Processes and Memory Management
        • Shell
        • Unix Systems
              • Basic Git Commands
              • Getting a Git repository
              • Git
              • Git Configuration
              • Git Distributed Workflows
              • Git Internals 1 - Introduction to Git
              • Git Internals 2 - Git Objects
              • Git Internals 3 - Git Branches
              • Git Internals 4 - Git Merge
              • Git Transfer Protocol
              • Record Changes to the Repository
            • Version Control System
          • DevOps
          • Docker
          • GitHub Actions
          • YAML
          • HTML
              • Java Database Connectivity (JDBC)
              • Reflection API
              • Stream API
                • Apache Maven
              • Java Enterprise Edition (Java EE)
              • Servlet and Apache Tomcat
                  • Java-Based Configuration 1 - Intro & Bean Annotation
                  • Java-Based Configuration 2 - Dependency Injection (DI) & Wiring
                  • XML-Based Configuration 1 - Intro & Spring Bean
                  • XML-Based Configuration 2 - Dependency Injection (DI) & Wiring
                  • XML-Based Configuration 3 - Autowiring
                • Spring and Spring Boot
                • Spring JDBC
                • Model View Controller (MVC)
              • Apache Tomcat
              • Annotation
              • Enum 1 - Enum Class
              • Enum 2 - Natural Ordering
              • Exception
              • Exception Hierarchy
              • Lambda Expressions
              • User Input using BufferReader and Scanner
                • Collections Class
                • Comparable Interface
                • Comparator Interface
                • Generics
                • Java Collections Framework Overview
                • Vector
                • Character
                • Integer Class
                • Literals
                • String Class
                • StringBuffer
                • StringBuilder
                • Type Casting
                • Abstraction
                • Class and Object
                • Dynamic Method Dispatch (Runtime Polymorphism)
                • Encapsulation
                • Inheritance
                • Nested Class
                • Object Class
                • Polymorphism
                • Access Modifier
                • Autoboxing and Unboxing
                • Do-While Loop
                • Final Keyword
                • Static Keyword
              • Java Standard Edition (Java SE) and Java Programming
              • JVM Performance Tuning
              • Java Threads and Multiple Threads
              • Thread Safety
              • Compile Time VS Runtime
              • How Does Java Work
              • Java Platform
              • Java Platform Overview
              • JIT Compilation and Java bytecode
              • JVM Class Loader Sub-System
              • JVM Overview
              • JVM Runtime Data Area
            • Java
                • Dunder Method New VS Init
                • Keyword Self VS Cls
              • Dunder Methods
              • For Loops
              • Generator and the yield Keyword
              • Lambda
              • Ternary Operator
            • Python
            • Behavioural Patterns
            • Behavioural Patterns - Command Pattern
            • Behavioural Patterns - Iterator Pattern
            • Behavioural Patterns - Memento Pattern
            • Behavioural Patterns - Observer Pattern
            • Behavioural Patterns - State Pattern
            • Behavioural Patterns - Strategy Pattern
            • Behavioural Patterns - Template Method Pattern
            • Creational Patterns
            • Creational Patterns - Builder Pattern
            • Creational Patterns - Factory Method Pattern
            • Creational Patterns - Prototype Pattern
            • Creational Patterns - Singleton Pattern
            • Software Design Patterns
            • Structural Patterns
            • Structural Patterns - Adapter Pattern
            • Structural Patterns - Decorator Pattern
            • Structural Patterns - Facade Pattern
          • Code Reviews
          • GRASP Design Principles
          • Low Coupling Principle
          • SOLID Design Principles
            • Analysis Modelling
            • Behavioural Modelling
            • Behavioural State Machine
            • Class Responsibility Collaboration (CRC) Cards
            • Functional Modelling
            • Structural Modelling
            • Requirement Elicitation and Analysis
            • Software Requirement Engineering
            • Software Requirement Specification (SRS)
            • User Requirement Specification (URS)
            • Vision & Scope Document
            • UML - Activity Diagram
            • UML - Class Diagram
            • UML - Use Case Diagram
            • UML Diagrams
            • UML-Sequence Diagram
          • Design
          • Implementation
          • Planing
          • Software Development Life Cycle (SDLC)
          • Software Development Methodologies
          • Assumptions of Blackbox Testing
          • Black and White Box Testing
          • Boundary Value Test
          • Building Effective Test Suites
          • Equivalence Partitioning
          • Random Choice Test Design
          • RIPR Model For Failure Observation
          • Software Testing
        • Coupling and Cohesion
        • Dependency
        • Web and Application Development
      • CODE_OF_CONDUCT
      • Contributor Manual
      • Design Specifications
      • First Time Contributor
      • Tired?
      • Wiki Design Principles
    Home

    ❯

    Web and App Development

    ❯

    Programming Languages

    ❯

    Java

    ❯

    Java Programming Core

    ❯

    Java Standard Edition (Java SE) and Java Programming

    Java Standard Edition (Java SE) and Java Programming

    May 14, 20251 min read

    This chapter is about Java programming concepts based on Java SE & JDK Version 11, from basic data types to advanced topics like exception hierarchy and Java reflection API.

    Java programming core

    Java data types

    • Literals
    • Character
    • String Class
    • StringBuffer
    • StringBuilder
    • Integer Class

    Miscellaneous

    • Do-While Loop
    • Static Keyword
    • Access Modifier
    • Final Keyword
    • Type Casting
    • Autoboxing and Unboxing

    Object-Oriented Programming (OOP)

    • Class and Object
    • Object Class
    • Encapsulation
    • Inheritance
    • Abstraction
    • Polymorphism
    • Dynamic Method Dispatch (Runtime Polymorphism)
    • Nested Class

    Java collections framework

    • Java Collections Framework Overview
    • Generics
    • Collections Class
    • Vector
    • Comparable Interface
    • Comparator Interface

    Java programming advanced

    • Enum 1 - Enum Class
    • Enum 2 - Natural Ordering
    • Lambda Expressions
    • Exception
    • Exception Hierarchy
    • Annotation
    • User Input Using BufferReader and Scanner

    Java API

    • Stream API
    • Reflection API
    • Java Database Connectivity (JDBC)

    Back to parent page: Java

    Web_and_App_Development Programming_Languages Java Java_SE


    Graph View

    • Java programming core
    • Java data types
    • Miscellaneous
    • Object-Oriented Programming (OOP)
    • Java collections framework
    • Java programming advanced
    • Java API

    Backlinks

    • Stream API
    • Annotation
    • Enum 1 - Enum Class
    • Enum 2 - Natural Ordering
    • Exception Hierarchy
    • Exception
    • Lambda Expressions
    • User Input using BufferReader and Scanner
    • Collections Class
    • Comparable Interface
    • Comparator Interface
    • Generics
    • Character
    • Integer Class
    • Literals
    • String Class
    • StringBuffer
    • StringBuilder
    • Type Casting
    • Abstraction
    • Class and Object
    • Dynamic Method Dispatch (Runtime Polymorphism)
    • Encapsulation
    • Inheritance
    • Nested Class
    • Object Class
    • Polymorphism
    • Access Modifier
    • Autoboxing and Unboxing
    • Do-While Loop
    • Final Keyword
    • Static Keyword
    • Java
    • Python

    Computer Science Wiki is licensed under CC BY 4.0