Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 1: Declarations and Access Control
Figure 1-1: The Relationship between interfaces and classes
Figure 1-2: Comparison of inheritance vs. dot operator for member access.
Figure 1-3: Effects of
public
and
private
access
Figure 1-4: Effects of
protected
access
Figure 1-5: The effects of the
abstract
modifier on concrete and
abstract
subclasses
Figure 1-6: The Sign bit for a byte
Figure 1-7: Comparison of modifiers on variables vs. methods
Figure 1-8: Effect of
final
on variables, methods, and classes
Chapter 2: Object Orientation
Figure 2-1: The nature of encapsulation
Figure 2-2: Inheritance tree for Vehicle, Car, Subaru
Figure 2-3: HAS-A relationship between Horse and Halter
Figure 2-4: Overloaded and overridden methods in class relationships
Figure 2-5: Comparing concrete and abstract examples of extends and implements
Figure 2-6: Constructors on the call stack
Figure 2-7: Overloaded constructors on the call stack
Figure 2-8: The effects of static on methods and variables
Chapter 3: Assignments
Figure 3-1: Overview of the Stack and the Heap
Figure 3-2: A one-dimensional array on the Heap
Figure 3-3: A two-dimensional array on the Heap
Figure 3-4: Declaring, constructing, and initializing an array of objects
Figure 3-5: Declaring, constructing, and initializing a two-dimensional array
Figure 3-6: Legal and illegal array assignments
Figure 3-7: "Island" objects eligible for garbage collection
Chapter 5: Flow Control, Exceptions, and Assertions
Figure 5-1: The Java method call stack
Figure 5-2: Exception class hierarchy
Chapter 6: Strings, I/O, Formatting, and Parsing
Figure 6-1: String objects and their reference variables
Figure 6-2: A String object is abandoned upon creation
Figure 6-3: An old String object is abandoned
Chapter 7: Generics and Collections
Figure 7-1: A simplified hashcode example
Figure 7-2: The interface and class hierarchy for collections
Figure 7-3: The structure of a List, a Set, and a Map
Chapter 9: Threads
Figure 9-1: Starting a thread
Figure 9-2: Transitioning between thread states
Figure 9-3: The
join()
method
Figure 9-4: Problems with concurrent access
Previous page
Table of content
Next page
SCJP Sun Certified Programmer for Java 5 Study Guide (Exam 310-055) (Certification Press)
ISBN: 0072253606
EAN: 2147483647
Year: 2006
Pages: 131
Authors:
Katherine Sierra
,
Bert Bates
BUY ON AMAZON
SQL Hacks
Hack 57. Generate Unique Sequential Numbers
Hack 78. Break It Down by Range
Hack 84. Store Comma-Delimited Lists in a Column
Hack 95. Issue Automatic Updates
Hack 99. Dont Run Out of Disk Space
Cisco Voice Gateways and Gatekeepers
The Role of IP-to-IP Gateways
Deployment Scenarios
Call Admission Control
Tcl IVR and VoiceXML Application Overview
Case Study: Implementing ACD Application
Mapping Hacks: Tips & Tools for Electronic Cartography
Hack 17. Map Nearby Wi-Fi Hotspots
Hack 31. Plot Dymaxion Maps in Perl
Hack 50. The Serial Port to USB Conundrum
Hack 75. Share Your GRASS Maps with the World
Hacks 93-100
Pocket Guide to the National Electrical Code(R), 2005 Edition (8th Edition)
Article 280 Surge Arresters
Article 386 Surface Metal Raceways
Article 392 Cable Trays
Article 503 Class III Locations
Example No. D2(c) Optional Calculation for One-Family Dwelling with Heat Pump(Single-Phase, 240/120-Volt Service) (See 220.82)
Microsoft VBScript Professional Projects
Conditional Logic and Iterative Structures
Project Case Study Desktop Customization and Deployment
Customizing the Desktop
Customizing the Start Menu and Quick Launch Toolbar
Designing the Web Site
Quartz Job Scheduling Framework: Building Open Source Enterprise Applications
Volatility, Durability, and Recoverability
Using the Quartz CronTrigger
Running the Quartz Cluster Nodes
Quartz and Web Applications
The Main Quartz Properties
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies