Through the study of the First chapter, I have a deep understanding of the unfamiliar words of Java. I understand Java's emergence, history, strengths and weaknesses, and its future. In the first chapter of the study, I encountered the problem is that many professional terminology is very unfamiliar, so look at the book to feel very laborious. I think I should read more about Java-related professional
)After the actual operation of the code in the book, it is found that not all the code should be written again ... Always after writing a piece of code to read the book found that the code does not make much sense, and the real need to operate the part is still behind, so efficiency is a lot lower. For this week's study I basically spend 80% of my spare time in learning Java is not only reading books and wa
Week10 "Java Programming" job Summary 1. This week's study summary 1.1 summarizes anomalies related content in the way you like (mind map or other).For::2. Written workThis PTA job problem set anomaly1. Common exceptionsCombined Topic 7-1 Answer1.1 What exceptions do you often have in code that you have written before, and what do you need to capture (why)? What should be avoided?For:
Frequently oc
borrowing system, try using object-oriented modeling.7.1 Who is the user of this system?
Students, faculty, and administrators.
7.2 Main function modules (not too many) and the owner of each module. Next week everyone is going to submit their own module code and run the video.
Student/faculty:
LoginLossEnquiry FormView current Lending informationBorrowing booksReturn booksExit system
Administrator:
Search for book informationAd
UDP is an unreliable protocol that establishes a socket on both ends of the communication, which does not establish a persistent communication connection and only sends data unilaterally to the other party without checking the results of the transmission.UDP protocol-based communication in Java uses the receive and send methods of the Datagramsocket class, but the message needs to be encapsulated by a specific class (Datagrampacket)The following is an
modify it to resolve the information and to store the reader information in another file.3. Code Cloud and PTATopic Set: Exceptions3.1. Code cloud codes Submission record
In the Code cloud Project, select statistics-commits history-set time period, and then search for and
3.2 PTA Problem set complete situation diagramTwo graphs are required (1. Ranking chart. 2.PTA Submission list diagram)3.3 count The amount of code completed this weekThe weekly code statistics need to be fused i
situation diagramTwo graphs are required (1. Ranking chart. 2.PTA Submission list diagram)3.3 Count the amount of code completed this weekThe weekly code statistics need to be fused into a single table.
Week Time
Total code Amount
New Code Volume
1
98
98
2
338
240
3
535
197
4
705
170
5
818
113
6
1073
255
Java programming those things 7-the concept of hexadecimal Author: Chen yuefeng from: http://blog.csdn.net/mailbomb
1.2 hexadecimal ConceptBecause it is impossible to create a symbol for each value, a composite value needs to be combined with a basic number. In this way, the concept of hexadecimal is introduced. In fact, all inputs are artificial creations, which are used for counting convenience. Currently
chart. 2.PTA Submission list diagram)3.3 Count the amount of code completed this weekThe weekly code statistics need to be fused into a single table.
Week Time
Total code Amount
New Code Volume
total number of files
number of new files
1
0
0
0
0
2
0
0
0
0
3
0
0
0
0
4
0
0
0
0
5
1167
1167
26
com.ibm write the Stringutil class in a package, there is a method insidepublic static void foo1(){ System.out.println(StringUtil.class+" method:foo1");}edu.jmuwrite the main class in the package, where the Foo1 method of Com.ibm.StringUtil is dropped7.1 Try to compile and run with the command line,7.2 Put the generated stringutil.class under the correct directory structure under D:\lib, put the main.class into the correct directory structure under D:\test, try to run under the command line, an
, thinking, etc., optional)
This week the study task is heavier, in the study tenth chapter, because lacks the eighth chapter knowledge, learns to be difficult, the understanding of the code is not deep enough, encounters does not understand only then forwards the corresponding knowledge point to learn the side to supplement, the efficiency is not high. ShouldAfter encountering the knowledge points that do not understand, will be related to the knowledge of the system to complement, and
12 weeks in Thursday, the teacher made a small quiz on the first four chapters and explained it in the second class. In the first to Nineth chapter summarizes the review material to have many tests to mention the knowledge point. The last one of the books I programmed was demonstrated in the Friday experiment class. The following is a review of the Java Collection framework. The
significantly reduce program performance; CAS is only suitable for situations where there is less thread conflict.2, synchronized after jdk1.6, has improved the optimization. Synchronized the underlying implementation of the main rely on the Lock-free queue, the basic idea is the spin after blocking, competition after the switch to continue the competition lock, a little sacrifice of fairness, but achieved high throughput. With fewer thread conflicts, you can get similar performance to CAS, whi
1. Summary of this week's studyRelational database:
Base element table, row, column
A unique record is determined by the primary key, and each row must have a primary key and the primary key cannot be empty
MySQL Basic operation:Jdbc:Load jdbc→ Build connection→ execute statement→ return results resultset→ release resourcesPS.JDBC 4.0 no longer requires manual loading2. Using database technology your system 2.1 briefly describes how to use the database to transform your system. What t
statistics need to be fused into a single table.
Week Time
Total code Amount
New Code Volume
total number of files
number of new files
1
0
0
0
0
2
0
0
0
0
3
619
619
12
12
4
619
0
12
0
5
970
351
17
5
6
1118
148
25
8
7
1231
113
: In a database, a transaction is a unit of work consisting of one or more statements that update the database, and the transaction mechanism is that when a transaction is processed, the transaction can be committed to the database only if all the operations in the transaction are completed properly, and if an item is not completed, the work is undone.In the JDBC API, the system automatically commits transactions by default, so to make multiple statements into a transaction, you have to use the
Learning programming language at school is just plain understanding, there are a lot of things that do not understand, want to pass this book to the Java language has a deeper understanding, for future study and work will have great benefits. Rather than a cursory look at some of your books, know it but do not know why, this is not what I want to learn.The readin
201621123080 Java Programming 13th Week of study Summary 1. Summary of this week's studySummarize multiple web-related content in the way you like (mind Mapping, OneNote, or others).2. Add network functions to your system (shopping cart, library management, landlords, etc.)-group completeTo allow your system to be used by multiple users over the network, you need to add network functionality to your system.
Original article: http://www.cnblogs.com/QG-whz/p/8351298.html Note: suggested to see the original blogger's article, alone on this point of knowledge, than books speak thoroughly, if there is a violation, contact will be deleted!When programming in a concurrent environment, it is necessary to use the lock mechanism to synchronize the operation between multiple threads to ensure mutually exclusive access to
In network applications, synchronous I/O (blocking I/O) and non-blocking I/O can be used for data communication. These two methods are not mutually exclusive and replace each other. We can use either of the two communication methods separately or in combination in our daily applications. In this article, we will introduce what is non-blocking I/O and why this communication method is used, the next article provides a simple example to demonstrate how to use non-blocking I/O for communication in n
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.