Java Essay

Java Database Connectivity ( JDBCTM ) : It provides entree to a broad scope of relational databases.

The Java platform besides has APIs for 2D and 3D artworks, handiness, waiters, coaction, telephone, address, life, etc. The undermentioned figure shows what is included in the Java 2 SDK.

We will write a custom essay sample on
Java Essay
or any similar topic only for you
Order now



Swing is an extension library to the AWT ; it includes new and improved constituents that enhance the expression and functionality of GUIs. Swinging can be used to construct Stand-alone swing GUI Applications every bit good as Servlets and Applets. It provides a theoretical account or position design architecture. Swing is more portable and more flexible than AWT.

Swing is built on top of AWT and is wholly written in Java, utilizing AWT’s lightweight constituent support. Particularly, unlike AWT, the architecture of the Swing constituents makes it easy to custom-make both their visual aspect and the behaviour. Components from AWT and Swing can be assorted, leting you to add Swinging support to bing AWT-based plans. For illustration, swing constituents such as JSlider, JButton and JCheckbox could be used in the same plan with standard AWT labels, textfields and scrollbars. You could subclass the bing Swing UI, theoretical account, or alteration hearer categories without holding to reinvent the full execution. Swing besides has the ability to replace these objects on-the-fly.

  • 100 % Java execution of constituents
  • Pluggable Look & A ; Feel
  • Lightweight constituents
  • Uses MVC ArchitectureModel represents the informations View as a ocular representation of the informations Controller takes input and translates it to alterations in informations
  • Three partsComponent set ( subclasses of JComponent ) Support classes Interfaces

In Swing, classes that represent GUI constituents have names get downing with the missive J. Some illustrations are JButton, JLabel, and JSlider. Altogether there are more than 250 new categories and 75 interfaces in Swinging — twice every bit many as in AWT.

Java Swing category hierarchy

The category JComponent, descended straight from Container is the root category for most of Swings user interface constituents.


Swinging contains constituents that you will utilize to construct a GUI. We are naming you some of the commonly used Swing constituents. To larn and understand these swing plans, AWT Programming cognitionis nonrequired.


An application is a plan that runs on our Computer under the operating system of the computing machine. It is bit similar in making utilizing C or C++ . Java’s ability to make Applets makes it of import. An Applet is an application design to be transmitted over the Internet and executed by a Java –compatible web browser. An applet is really a bantam Java plan ; dynamically it is downloaded across the web merely like an image. But the difference is that it is an intelligent plan it is non merely a media file. It can respond to the user input besides and can dynamically alter.



Every clip you download a “normal” plan, you are put on the lining a viral infection. Prior to Java, most users will non download feasible plans often, and those who did scan for them viruses prior to executing. Most of the users are still worried about the possibility of infecting their systems with a virus. In add-on, another type of malicious plan exists that must be guarded. This type of plan can roll up private information, such as recognition card Numberss, bank history balances, and watchwords. Java answers both of these concerns by supplying a “firewall” between a networked application and your computing machine. When you use a Java-compatible Web browser, you can safely download Java applets without fright of virus infection or malicious purpose because Java has security and no virus can accommodate to the system.


Plans can be dynamically downloaded to all the assorted types of platforms connected to the Internet some agencies of bring forthing portable feasible codification is needed.As you will see, the same mechanism that helps to guarantee security it besides helps to make portability. Indeed, Java’s solution to these two jobs is both elegant and efficient.

The Byte codification

The key that allows the Java to work out the jobs of security and portability is that the end product of Java compiler is Byte codification. Byte codification is a extremely optimized. Byte Code is set of instructions designed to put to death by the Java run-time system which is called the Java Virtual Machine ( JVM ) . That is, in its standard signifier, the JVM is an translator for byte codification.

Translation of a Java plan into byte codification helps makes it much easier to run a plan in a broad assortment of environments. The ground is one time the run-time bundle exists for a given system any Java plan can run on it.

Although Java was designed for reading there is technically nil about Java that prevents on-the-fly digest of byte codification into the native codification. Sun has merely completed its Just- In-Time ( JIT ) compiler for byte codification. When the JIT compiler is a portion of JVM, it compiles byte codification into the feasible codification in a existent clip on a piece-by-piece demand footing. It is non possible to roll up an full Java plan into feasible codification all at one time, because Java performs assorted run-time cheques that can be done merely at run clip. The JIT compiles codification as it is needed during the executing.

Java Virtual Machine ( JVM )

Beyond the Java linguistic communication there is the Java practical machine. The Java practical machine is an of import component of the Java engineering. The practical machine can be embedded within a web browser or an operating system. Once a piece of Java codification is loaded onto a machine it is verified as portion of the burden procedure, a category stevedore is invoked and does byte code confirmation makes certain that the codification that has been generated by the compiler will non pervert the machine that it is loaded on. Byte codification confirmation takes topographic point at the terminal of the digest procedure to do certain that it is all accurate and correct. So byte codification confirmation is built-in to the compilation and execution of Java codification.


The above diagram shows the development procedure is a typical Java scheduling utilizations to bring forth byte codifications and executes them. The first box indicates that the Java beginning codification is located in a.Java file that is processed with a Java compiler calledJava. The Java compiler produces a file called a.class file which contains the byte codification. The category file is so loaded across the web or loaded locally on your machine into the executing environment is the Java practical machine which interprets and executes the byte codification.

Java Architecture

Java architecture provides a portable, robust, high public presentation environment for development. Java provides portability by roll uping the byte codifications for the Java Virtual Machine which is so interpreted on each platform by the run-time environment. Java is a dynamic system able to lade the codification when needed from a machine in the same room or across the planet.

Compilation of Code

When you compile the codification the Java compiler creates machine codification ( called byte codification ) for a conjectural machine called Java Virtual Machine ( JVM ) . The JVM is supposed to put to death the byte codification the JVM is created for get the better ofing the issue of portability the codification is written and compiled for one machine and interpreted on all machines. This machine is called Java Virtual Machine.

During run-time the Java translator tricks the byte codification file into believing that it is running on a Java Virtual Machine. In world this could be a Intel Pentium Windows 95 or Suns ARC station running Solaris or Apple Macintosh running system and all could have the codification from any of the computing machine through Internet and run the Applets.


Java was designed to be easy for the Professional coder to larn and to utilize efficaciously. If you are an experient C++ coder, larning Java will be even easier. Because Java inherits the C/C++ sentence structure and many of the object oriented characteristics of C++ . Most of the confounding constructs from C++ are either left out of Java or implemented in a cleansing agent and in a more accessible mode. In Java there are a little figure of clearly defined ways to carry through the given undertaking.


Java was non designed to be source-code compatible with any other linguistic communication. This allowed the Java squad the freedom to plan with a clean slate. One result of this was a clean useable, matter-of-fact attack to objects. The object theoretical account in Java is simple and easy to widen, while simple types, such as whole numbers, are kept as high-performance non-objects.


The multi-platform environment of the Web topographic points extraordinary demands on a plan, because the plan must put to death faithfully in a assortment of systems. The ability to make robust plans was given a high precedence in the design of Java. Java is purely typed linguistic communication ; it checks your codification at compile clip and run clip. Java virtually eliminates the jobs of memory direction and de-allocation, which is wholly automatic. In a well-written Java plan, all run clip mistakes can –and should –be managed by your plan.

What is networking?

Computers running on the Internet communicate to each other utilizing either the Transmission Control Protocol ( TCP ) or the User Datagram Protocol ( UDP ) , as this diagram illustrates:


When you write Java plans that communicate over the web, you are programming at the application bed. Typically, you do n’t necessitate to concern yourself with the TCP and UDP beds. Alternatively, you can utilize the categories in the bundle. These categories provide system-independent web communicating. However, to make up one’s mind which Java classes your plans should utilize, you do necessitate to understand how TCP and UDP differ.

Transmission control protocol

When two applications want to pass on with each other faithfully so they set up a connexion between them and so direct informations back and Forth over that connexion. This is correspondent to doing a telephone call. If you want to talk to Aunt Beatrice in Kentucky, a connexion is established when you dial her phone figure and she replies for your call. You send informations back and Forth over the connexion by talking to one another over the phone lines. Like the phone company, TCP guarantees that informations sent from one terminal of the connexion really gets to the other terminal and in the same order it was sent. Otherwise an mistake is reported.

TCP provides a point-to-point channel for applications that require dependable communications between the computing machines. The Hypertext Transfer Protocol ( HTTP ) , File Transfer Protocol ( FTP ) , and Telnet are all illustrations of applications that require a dependable communicating channel. The order in which the information is sent and received over the web is critical to the success of these applications. When HTTP is used to read from a URL, the informations must be received in the order in which it was sent. Otherwise you end up with a disorderly HTML file a corrupt nothing file, or some other invalid information.

Definition: TCP ( Transmission Control Protocol ) is a connection-based protocol that provides a dependable flow of informations between two computing machines.


The UDP protocol provides for communicating that is non guaranteed between two applications on the web. UDP is non connection-based like TCP. Rather, it sends independent packages of informations called datagrams, from one application to the application. Sending datagrams is like directing a missive through the postal service. The bringing is non that of import and is non guaranteed and each message is independent of any other.

Definition: UDP ( User Datagram Protocol ) is a protocol that sends independent packages of informations called datagrams from one computing machine to another with no warrants about arrival.Hence UDP is non connection-based like TCP.


Hi there, would you like to get such a paper? How about receiving a customized one? Check it out