...UNIVERSITY College of Computer Studies Introduction to Programming Activity Book Compiled by: Mark Godfrey D. Torres 2012 Introduction to Programming ii Table of Contents Weeks 1 to 3 – Creating Your First Java Classes ....................................................................................... 1 Objectives ........................................................................................................................................... 1 Summary ............................................................................................................................................ 1 The Don’ts........................................................................................................................................... 2 Key Terms ........................................................................................................................................... 3 Seatwork............................................................................................................................................. 6 Where to Save Your Files ................................................................................................................. 6 Configuring Windows to Work with the Java SE Development Kit................................................... 6 Your First Application ...................................................................................................................... 8 Adding...
Words: 4647 - Pages: 19
...Hitachi Virtual Storage Platform Hitachi Storage Navigator User Guide FASTFIND LINKS Document Organization Product Version Getting Help Contents MK-90RD7027-00 Copyright © 2010 Hitachi, Ltd. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, or stored in a database or retrieval system for any purpose without the express written permission of Hitachi, Ltd. (hereinafter referred to as “Hitachi”) and Hitachi Data Systems Corporation (hereinafter referred to as “Hitachi Data Systems”). Hitachi and Hitachi Data Systems reserve the right to make changes to this document at any time without notice and assume no responsibility for its use. This document contains the most current information available at the time of publication. When new and/or revised information becomes available, this entire document will be updated and distributed to all registered users. Some of the features described in this document may not be currently available. Refer to the most recent product announcement or contact your local Hitachi Data Systems sales office for information about feature and product availability. Notice: Hitachi Data Systems products and services can be ordered only under the terms and conditions of the applicable Hitachi Data Systems agreement(s). The use of Hitachi Data Systems products is governed by the terms of your agreement(s) with Hitachi Data Systems. Hitachi...
Words: 42378 - Pages: 170
...In this tutorial, the required steps has been described for setting up a pseudo-distributed, single-node Hadoop cluster backed by the Hadoop Distributed File System, running on Ubuntu Linux. Installing Python $ sudo apt-get install python-software-properties $ sudo add-apt-repository ppa:ferramroberto/java Update the source list $ sudo apt-get update Install Sun Java 6 JDK $ sudo apt-get install sun-java6-jdk Select Sun's Java as the default on your machine. (See 'sudo update-alternatives --config java' for more information.) $ sudo update-java-alternatives -s java-6-sun The full JDK which will be placed in /usr/lib/jvm/java-6-sun (well, this directory is actually a symlink on Ubuntu). After installation, make a quick check whether Sun’s JDK is correctly set up: $ java –version java version "1.6.0_20" Java(TM) SE Runtime Environment (build 1.6.0_20-b02) Java HotSpot(TM) Client VM (build 16.3-b01, mixed mode, sharing) Adding a dedicated Hadoop system user $ sudo addgroup hadoop $ sudo adduser --ingroup hadoop hduser This will add the user hduser and the group hadoop to your local machine. Configuring SSH user@ubuntu:~$ su – hduser hduser@ubuntu:~$ ssh-keygen -t rsa -P "" Generating public/private rsa key pair. Enter file in which to save the key (/home/hduser/.ssh/id_rsa): Created directory '/home/hduser/.ssh'. Your identification has been saved in /home/hduser/.ssh/id_rsa. Your public key has been saved in /home/hduser/.ssh/id_rsa...
Words: 2067 - Pages: 9
...Oracle® Business Intelligence Applications Installation Guide for Informatica PowerCenter Users Release 7.9.6.4 E35271-01 November 2012 Provides the steps to install and set up Oracle Business Intelligence Applications Release 7.9.6.4. Oracle Business Intelligence Applications Installation Guide for Informatica PowerCenter Users, Release 7.9.6.4 E35271-01 Copyright © 2009, 2012, Oracle and/or its affiliates. All rights reserved. Primary Author: P Brownbridge This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed...
Words: 60905 - Pages: 244
...online through the upload link available in the UMS. Q1. What are the various implicit objects available in JSP? Explain each of them with an example. Ans: Implicit Objects In any JSP Page, there are a bunch of implicit objects that are available for the programmer to use. It contains a variety of information that can be used to display stuff on the page. In this chapter, we are going to look at the following JSP Implicit Objects that are available for a programmer. • request • response • out • session • config • application • page • pageContext So, Lets get Started!!! JSP Implicit Objects The JSP Implicit objects mentioned in the list in the previous paragraph are available by means of automatically defined variables. These variables have the same name and case as the list above. In the forthcoming paragraphs we will be looking at them one by one. request This is the HttpServletRequest instance associated with the client request. As you know, the data between the Servlet and the JSP flows by using the HttpServletRequest and the HttpServletResponse objects. The page receives a request and sends a response. The data sent by a JSP page is available in the request in the Servlet and similarly the data sent by the servlet is available in the JSP again in the request object. There is a surprising amount of information stored in it. For example, you can get the request type (whether it is GET, POST, or HEAD) and the associated cookies. You can extract information...
Words: 2737 - Pages: 11
...Android ™ A Programmer’s Guide This page intentionally left blank Android ™ A Programmer’s Guide J.F. DiMarzio New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto Copyright © 2008 by The McGraw-Hill Companies. All rights reserved. Manufactured in the United States of America. Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher. 0-07-159989-4 The material in this eBook also appears in the print version of this title: 0-07-159988-6. All trademarks are trademarks of their respective owners. Rather than put a trademark symbol after every occurrence of a trademarked name, we use names in an editorial fashion only, and to the benefit of the trademark owner, with no intention of infringement of the trademark. Where such designations appear in this book, they have been printed with initial caps. McGraw-Hill eBooks are available at special quantity discounts to use as premiums and sales promotions, or for use in corporate training programs. For more information, please contact George Hoare, Special Sales, at george_hoare@mcgraw-hill.com or (212) 904-4069. TERMS OF USE This is a copyrighted work and The McGraw-Hill Companies, Inc. (“McGraw-Hill”) and its licensors reserve all rights in and...
Words: 43266 - Pages: 174
...Java Server Faces (JSF) Tutorial JAVA SERVER FACES TUTORIAL Simply Easy Learning by tutorialspoint.com tutorialspoint.com i ABOUT THE TUTORIAL Java Server Faces Tutorial JavaServer Faces (JSF) is a Java-based web application framework intended to simplify development integration of webbased user interfaces. JavaServer Faces is a standardized display technology which was formalized in a specification through the Java Community Process. This tutorial will teach you basic JSF concepts and will also take you through various advance concepts related to JSF framework. Audience This tutorial has been prepared for the beginners to help them understand basic JSF programming. After completing this tutorial you will find yourself at a moderate level of expertise in JSF programming from where you can take yourself to next levels. Prerequisites Before proceeding with this tutorial you should have a basic understanding of Java programming language, text editor and execution of programs etc. Because we are going to develop web based applications using JSF, so it will be good if you have understanding on other web technologies like, HTML, CSS, AJAX etc. Copyright & Disclaimer Notice All the content and graphics on this tutorial are the property of tutorialspoint.com. Any content from tutorialspoint.com or this tutorial may not be redistributed or reproduced in any way, shape, or form without the written permission of tutorialspoint.com. Failure to do so is a violation...
Words: 11815 - Pages: 48
...The Java™ Web Services Tutorial For Java Web Services Developer’s Pack, v2.0 February 17, 2006 Copyright © 2006 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, California 95054, U.S.A. All rights reserved.U.S. Government Rights - Commercial software. Government users are subject to the Sun Microsystems, Inc. standard license agreement and applicable provisions of the FAR and its supplements. This distribution may include materials developed by third parties. Sun, Sun Microsystems, the Sun logo, Java, J2EE, JavaServer Pages, Enterprise JavaBeans, Java Naming and Directory Interface, EJB, JSP, J2EE, J2SE and the Java Coffee Cup logo are trademarks or registered trademarks of Sun Microsystems, Inc. in the U.S. and other countries. Unless otherwise licensed, software code in all technical materials herein (including articles, FAQs, samples) is provided under this License. Products covered by and information contained in this service manual are controlled by U.S. Export Control laws and may be subject to the export or import laws in other countries. Nuclear, missile, chemical biological weapons or nuclear maritime end uses or end users, whether direct or indirect, are strictly prohibited. Export or reexport to countries subject to U.S. embargo or to entities identified on U.S. export exclusion lists, including, but not limited to, the denied persons and specially designated nationals lists is strictly prohibited. DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR...
Words: 55069 - Pages: 221
...CITRIIX LICENSE CLUSTERING INTRUCTIONS The following steps describe the overall process involved in installing and configuring licensing on a cluster-enabled server. These steps assume you configured the clustering on the hardware on which you intend to install the license server. A detailed procedure follows. 1. Ensure that the first node has control of the cluster resources. 2. On the first node of the cluster, start the Citrix Licensing installation from the command-line and install it on the first node to the shared cluster drive (not the quorum drive). 3. Move the resources from the active node in the cluster to the second node. 4. Install the license server on the second node to the same shared location as the first node. 5. Obtain license files that specify the cluster name of the license server as the host name. After obtaining license files, you must add them to the license server and then reread them. 6. Configure your Citrix product to use the cluster name—not the node name—of the license server cluster. Note: When a clustered license server fails over, the cluster service renames the lmgrd_debug.log to the name of the node that previously hosted the services. Then it starts the services on the new active node and creates a new lmgrd_debug.log. To install licensing on a cluster-enabled server 1. Install Java on both cluster nodes. You can find a supported version on the Citrix product CD in the Support folder. 2. Ensure that the cluster IP address, cluster...
Words: 1830 - Pages: 8
...IBM ® WebSphere ® Redpaper Carla Sadtler Susan Hanson WebSphere Application Server: New Features in V8.5.5 IBM® WebSphere® Application Server helps drive business agility with an innovative, performance-based foundation to build, reuse, run, integrate, and manage service-oriented architecture (SOA) applications and services. From business critical enterprise-wide applications to the smallest departmental level applications, WebSphere Application Server offers reliability, availability, security, and scalability. WebSphere Application Server V8.5 addresses the needs of today’s agile enterprises and developers. It provides increased scalability, resiliency, and security for critical applications, and the flexibility to deploy new offerings quickly and efficiently. It includes a lightweight and powerful, yet simple, application server to satisfy multiple requirements around a simplified “low-end” application environment. For the developer, it provides an improved developer experience and a simplified server configuration that can have multiple versions and be maintained in source control along with the applications. This IBM Redpaper™ publication presents a high-level view of some of the features and enhancements in WebSphere Application Server V8.5. and WebSphere Application Server V8.5.5. © Copyright IBM Corp. 2012, 2013. All rights reserved. ibm.com/redbooks 1 WebSphere Application Server overview Application infrastructure trends show a push towards rapid...
Words: 12331 - Pages: 50
...Front cover WebSphere Service Registry and Repository Handbook Best practices Sample integration scenarios SOA governance Chris Dudley Laurent Rieu Martin Smithson Tapan Verma Byron Braswell ibm.com/redbooks International Technical Support Organization WebSphere Service Registry and Repository Handbook March 2007 SG24-7386-00 Note: Before using this information and the product it supports, read the information in “Notices” on page xv. First Edition (March 2007) This edition applies to Version 6, Release 0, Modification 0.1 of IBM WebSphere Service Registry and Repository (product number 5724-N72). © Copyright International Business Machines Corporation 2007. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvi Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii The team that wrote this redbook. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii Become a published author . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxi Comments welcome. . . . . . . . . . . . . . . . . . . . . . . . ...
Words: 163740 - Pages: 655
...Getting Started with SAS Enterprise Miner 5.2 ® TM The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2006. Getting Started with SAS ® Enterprise Miner TM 5.2. Cary, NC: SAS Institute Inc. Getting Started with SAS® Enterprise MinerTM 5.2 Copyright © 2006, SAS Institute Inc., Cary, NC, USA ISBN-13: 978-1-59994-002-1 ISBN-10: 1-59994-002-7 All rights reserved. Produced in the United States of America. For a hard-copy book: No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, or otherwise, without the prior written permission of the publisher, SAS Institute Inc. For a Web download or e-book: Your use of this publication shall be governed by the terms established by the vendor at the time you acquire this publication. U.S. Government Restricted Rights Notice. Use, duplication, or disclosure of this software and related documentation by the U.S. government is subject to the Agreement with SAS Institute and the restrictions set forth in FAR 52.227–19 Commercial Computer Software-Restricted Rights (June 1987). SAS Institute Inc., SAS Campus Drive, Cary, North Carolina 27513. 1st printing, April 2006 SAS Publishing provides a complete selection of books and electronic products to help customers use SAS software to its fullest potential. For more information about our e-books, e-learning products, CDs, and hard-copy books, visit the SAS Publishing...
Words: 15666 - Pages: 63
...Java Quick Reference Console Input Scanner input = new Scanner(System.in); int intValue = input.nextInt(); long longValue = input.nextLong(); double doubleValue = input.nextDouble(); float floatValue = input.nextFloat(); String string = input.next(); Console Output System.out.println(anyValue); JOptionPane.showMessageDialog(null, "Enter input"); GUI Input Dialog String string = JOptionPane.showInputDialog( "Enter input"); int intValue = Integer.parseInt(string); double doubleValue = Double.parseDouble(string); Message Dialog Primitive Data Types byte short int long float double char boolean 8 bits 16 bits 32 bits 64 bits 32 bits 64 bits 16 bits true/false Arithmetic Operators + * / % ++var --var var++ var-addition subtraction multiplication division remainder preincrement predecrement postincrement postdecrement Assignment Operators = += -= *= /= %= assignment addition assignment subtraction assignment multiplication assignment division assignment remainder assignment Relational Operators < >= == != less than less than or equal to greater than greater than or equal to equal to not equal Logical Operators && || ! ^ short circuit AND short circuit OR NOT exclusive OR if Statements if (condition) { statements; } if (condition) { statements; } else { statements; } if (condition1) { statements; } else if (condition2) { statements; } else { statements; } switch Statements switch (intExpression) { case value1: statements; break; ... case valuen: statements; break;...
Words: 73366 - Pages: 294
...TE AM FL Y Mastering Apache Velocity Joseph D. Gradecki Jim Cole Wiley Publishing, Inc. Mastering Apache Velocity Joseph D. Gradecki Jim Cole Wiley Publishing, Inc. Publisher: Joe Wikert Copyeditor: Elizabeth Welch Executive Editor: Robert Elliott Compositors: Gina Rexrode and Amy Hassos Editorial Manager: Kathryn Malm Managing Editor: Vincent Kunkemueller Book Producer: Ryan Publishing Group, Inc. Copyright © 2003 by Joseph D. Gradecki and Jim Cole. All rights reserved. Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8700. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4447, E-mail: permcoordinator@wiley.com. Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations...
Words: 70755 - Pages: 284
...Benefits of using IPv6 in Distributed Virtual Private Networks (VPNs) Introduction The many advantages of improving and corporation's network, particularly its Virtual personal Networks (VPNs) from IPv4 to IPv6 create the expenses related to the move recoverable from increased network steadiness, auto-configuration, security, mobility, increase and quality-of-service and multicast capability (Cisco 2007). First, in phrases of quantitative, address varies for an IPv6-based network is 128-bits, providing the company lots higher security, likewise (Fink, 1999). Secondly, the safety concerns with regards to utilizing DHCP to assign information science addresses victimization IPv4 these days will be mitigated with the homeless reconfiguration capability of IPv6 (Lehtovirta, J 2006). With several of the systems throughout the company administered remotely exploitation IPsec-based VPNs, the opportunity to maneuver to more secure VPNs attributable to IPsec-mandated end-to-end security exploitation IPv6 also adds in greater levels of security moreover. The increasing use of wireless connections by members among the IT employees to observe and maintain IT systems also can currently be potential exploitation Mobile IP with Direct Routing (Cisco 2007). The redoubled support for protocols specifically for multicast routing are also supported in IPv6, that may build marketing’s’ several webinars and on-line initiatives additional expeditiously delivered, moreover. Most vital concerning...
Words: 3876 - Pages: 16