Java Core Technology and interview guide: Video list

Source: Internet
Author: User
Tags define local

The following is a list of videos related to this book, which will be updated dynamically

Chapter I.

1 Video 1.1 The differences between JDK and JRE and JVM, install Java Development Environment 1.1.1 2nd page

2 Video 1.2 Writing the first HelloWorld program 1.1.2 2nd page

3 video 1.3 Developing slightly complex programs with function calls 1.1.3 5th page

4 Video 1.4Debug Program 1.1.4 5th page

5 video 1.5 Input runtime parameters 1.1.5 page 7th

Chapter II

6 Video 2.1 Distinguish between the base data type and the wrapper class from int and integer 2.1.1 page 20th

7 Videos 2.2 left and right Gaga recommendations for use 2.1.2 21st page

8 video 2.3== and equals difference 2.1.4 23rd page

9 usage of Video 2.4if...else 2.2.1 Page 24th

10 video 2.5 Points of attention in the expression of the article 2.2.2 26th page

11 Video 2.6for,while and do...while explanation 2.2.3 27th page

12 The usage of video 2.7switch...case 2.2.4 28th page

13 Video 2.8String constants and variables on storage differences 2.3.1 30th page

14 Video 2.9 Understanding "Memory Value immutable" by string 2.3.2 32nd page

15 Video 2.10 Memory optimization 2.3.3 through string and StringBuilder differences 34th page

16 Video 2.13 Explanation of the encapsulation features in object-oriented 2.4 37th page

17 Video 2.11 The parameter of the method is a copy, return value requires return 2.4.2 39th page

18 Video 2.12 Usage of static methods and static variables 2.4.4 page 41st

19 Video 2.13 Explanations of inheritance, including the differences between abstract classes and Interfaces 2.5 43rd page

20 Video 2.14 polymorphic explanations (including overlays and overlays) 2.6 49th page

Chapter III

21 Video 3.1 Common usage of Arrays 3.1.1 59th page

22 common usage of Video 3.2Map class objects 3.1.2 60th page

23 Basic usage of video 3.3Set 3.1.3 62nd page

24 Video 3.4ArrayList and LinkedList comparison 3.2.1 63rd page

25 Video 3.5 Basics of generics 3.2.3 67th page

26 Video 3.6Set How to take the weight of the principle of 3.2.4 68th page

27 Video 3.7 Deep copy with light copy 3.2.5 74th page

28 Video 3.8 Accessing the Linear table class collection via iterators 3.2.6 page 78th

29 Video 3.9 Using hash algorithm to understand the efficiency of HashMap Object 3.3.1 80th page

30 Video 3.10 Why rewrite the Equals and Hashcode methods 3.3.2 81st page

31 Video 3.11 In-depth study of generics 3.5 90th page

Fourth Chapter

32 Video 4.1 Exception handling, try...catch...finally statement 4.1.2 99th Page

33 Video 4.2 Advanced programmers need to master the exception part of the Knowledge Point 4.2 102th page

34 video 4.3 Traversing the contents of the specified folder 4.3.1 108th page

35 Video 4.4 How to read and write files by copying a file's case 4.3.2 109th page

36 video 4.5 Generating and unlocking Compressed files 4.3.4 115th page

37 Video 4.6 Parsing an XML file based on the DOM tree 4.5.2 page 125th

38 Video 4.7 How to parse XML based on event 4.5.3 127th page

Fifth Chapter

39 Video 5.1 code to read and write databases through JDBC 5.2.2 139th page

40 Video 5.2 Deleting a database by using JDBC Insert Update 5.2.3 page 141th

41 Video 5.3 Write the relative fixed connection information to the configuration file 5.3.1 page 145th

42 Video 5.4 PreparedStatement object explanation 5.3.2 148th page

43 Video 5.5 Using C3P0 connection Pool 5.3.4 150th page

44 Video 5.6 Transactional operations via JDBC 5.4 153th page

Sixth chapter

45 Video 6.1 View the modifier, type, and name of a property by reflection 6.2.1 162th page

46 Video 6.2 View the return type of the method, parameter and first name 6.2.2 on page 163th

47 Video 6.3 Loading Class 6.2.3 164th page by Forname and Newinstance methods

48 video 6.4 Methods of invoking classes by reflection mechanism 6.2.4 166th page

Seventh Chapter

49 Video 7.1 Multithreading 7.1.3 by extends thread 179th page

50 Video 7.2 Multithreading 7.1.4 by implements runnable 181th page

51 Video 7.3 Let the thread release the CPU resources through the Sleep method 7.2.1 183th page

52 Video 7.4 Synchronized effect on method 7.2.2 184th page

53 Video 7.5 Synchronized action on Code block 7.2.3 189th page

54 Video 7.6 Supporting the use of the wait and notify method 7.2.4 191th page

55 Video 7.7 Deadlock case 7.2.5 195th page

56 Limitations of Video 7.8Synchronized 7.2.6 196th page

57 Video 7.9 Managing concurrency at the business level through locks 7.2.7 No. 200 page

58 Video 7.10 Communication between threads via condition 7.2.8 No. 204 page

59 Video 7.11 Semaphore manage multi-threaded competition 7.2.9 No. 208 page

60 video 7.12 Visually understand thread safety and insecurity 7.4.1 page No. 217

61 Video 7.13 Understanding the cause of inconsistent concurrency results from the thread memory structure 7.4.2 page NO. 219

62 Video 7.14volatile does not solve the problem of inconsistent data 7.4.3 No. 220 page

63 Video 7.15 Define local variables for each thread by threadlocal 7.4.4 page No. 221

64 Video 7.16 Implementing thread pool 7.5.1 by threadpoolexecutor No. 223 page

65 Video 7.17 Let the thread return the result 7.5.2 the No. 226 page by callable

Eighth Chapter

66 Video 8.1 Implementation code and application scenario for Singleton mode 8.2.1 No. 234 page

67 Video 8.2 The difference between the abstract factory and the general factory model 8.2.4 NO. 228 page

68 Video 8.3 Analysis of differences between builders ' and factory models 8.2.5 No. 239 page

69 Video 8.4 Adorner mode 8.3.1 No. 243 page

70 Video 8.5 Reconcile call relationships between different classes through adapter mode 8.3.2 NO. 245 page

71 Video 8.6 Viewer mode for linkage Scenarios 8.4.3 page No. 251

72 Video 8.7 Applying a dependency reversal principle can reduce the range of changes affected 8.5.1 No. 254 page

73 Video 8.8 A single responsibility principle that can keep classes as stable as possible 8.5.2 No. 256 page

74 Video 8.9 The Richter replacement principle to follow when inheriting 8.5.3 No. 257 page

75 Video 8.10 Optimizing inherited usage scenarios by using the synthetic Multiplexing Principle page No. 261 of 8.5.5

Nineth Chapter

76 Video 9.1 Virtual machine Architecture 9.1.2 No. 268 page

77 Video 9.2 Summarize the storage location of data such as static data, basic data types, and references 9.1.3 the NO. 270 page

78 Video 9.3 Java garbage collection mechanism 9.2 The NO. 271 page

79 Video 9.4 Judging objects can be recycled based on 9.2.3 No. 273

80 video 9.5 In-depth understanding of Finalize Method 9.2.4 page No. 274

81 Video 9.6 Usage of soft and weak references 9.3.1 page No. 276

82 Video 9.7 Usage scenarios for soft references 9.3.2 No. 277 page

83 Video 9.8 Using Weakhashmap to learn about weak reference usage Scenarios 9.3.3 page No. 278

84 Video 9.9 Stop the world, stack overflow error, and memory overflow error 9.4.1 No. 284 page

85 Video 9.10 Example of a memory leak 9.4.2 page No. 285

86 video 9.11 specific practices for optimizing memory performance in code 9.4.3 No. 288 page

87 video 9.12 Internal class, Final and garbage collection 9.6 page No. 298

Java Core Technology and interview guide: Video list

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.