56 WEB DB PRESS Vol.4

Size: px
Start display at page:

Download "56 WEB DB PRESS Vol.4"

Transcription

1 WEB DB PRESS Vol.4

2 q w import java.io.*; public class Test extends java.applet.applet { public void start() { System.out.println( System.getProperty("user.home") + ":"); String[] files = new File( System.getProperty("user.home")).list(); for (int i = 0; i < files.length; i++) { System.out.println("\t" + files[i]); if (i >= 5) break; public static void main(string[] args) { new Test().start(); <applet code="test" width="200" height="200"> </applet> % javac Test.java % appletviewer test.html java.security.accesscontrolexception: access denied (java.util.propertypermission user.home read) at java.security.accesscontrolcontext.checkpermission (AccessControlContext.java:272) at java.security.accesscontroller.checkpermission (AccessController.java:399) at java.lang.securitymanager.checkpermission (SecurityManager.java:545) at java.lang.securitymanager.checkpropertyaccess (SecurityManager.java:1278) at java.lang.system.getproperty(system.java:560) at Test.start(Test.java:5) at sun.applet.appletpanel.run(appletpanel.java:358) at java.lang.thread.run(thread.java:484) WEB DB PRESS Vol.4 57

3 % java Test C: WINDOWS: COMMAND OPTIONS SYSTEM ADDLFNPR.REG DOSSTART.BAT MSDOS.SYS % appletviewer test.html C: WINDOWS: java.security.accesscontrolexception: access denied (java.io.filepermission C: WINDOWS read) at java.security.accesscontrolcontext.checkpermission (AccessControlContext.java:272) at java.security.accesscontroller.checkpermission (AccessController.java:399) at java.lang.securitymanager.checkpermission (SecurityManager.java:545) at java.lang.securitymanager.checkread (SecurityManager.java:890) at java.io.file.list(file.java:772) at Test.start(Test.java:7) at sun.applet.appletpanel.run(appletpanel.java:358) at java.lang.thread.run(thread.java:484) grant codebase "file:/-" { permission java.util.propertypermission "user.home", "read"; ; grant codebase "file:/-" { permission java.util.propertypermission "user.home", "read"; permission java.io.filepermission "<<ALL FILES>>", "read"; ; % appletviewer test.html C: WINDOWS: COMMAND OPTIONS SYSTEM ADDLFNPR.REG DOSSTART.BAT MSDOS.SYS q w qw 58 WEB DB PRESS Vol.4

4 q w e r t y u i WEB DB PRESS Vol.4 59

5 public class Test2 extends java.applet.applet { private void checkpermission(class clazz) { System.out.println(clazz.getName() + ":"); System.out.print(clazz.getProtectionDomain()); System.out.print(clazz.getName() + " "); if (clazz.getprotectiondomain().implies( new java.io.filepermission( "<<ALL FILES>>", "read"))) System.out.println("has"); else System.out.println("does not have"); System.out.println("\t" + "java.io.filepermission(" + "\"<<ALL FILES>>\", \"read\")"); System.out.println(); i = n; while (i > 0) { if (domain i does not have permission) throw AccessControllExcepion; else if (domain i is privileged) return; i = i - 1; return; public void start() { checkpermission( java.security.accesscontrolcontext.class); checkpermission(java.security.accesscontroller.class); checkpermission(java.lang.securitymanager.class); checkpermission(java.io.file.class); checkpermission(test.class); checkpermission(sun.applet.appletpanel.class); checkpermission(java.lang.thread.class); public static void main(string[] args) { new Test2().start(); qw q 60 WEB DB PRESS Vol.4

6 % javac Test2.java % java Test2 java.io.file: ProtectionDomain null java.security.permissions@6b97fd ( (java.security.allpermission <all permissions> <all actions>) ) java.io.file has java.io.filepermission("<<all FILES>>", "read") Test: ProtectionDomain (file:/c:/my Documents/ <no certificates>) java.security.permissions@2d086a ( (java.net.socketpermission localhost:1024- listen,resolve) (java.io.filepermission C: My Documents - read) (java.lang.runtimepermission exitvm) (java.lang.runtimepermission stopthread) (java.util.propertypermission java.vendor read) (java.util.propertypermission java.specification.version read) (java.util.propertypermission line.separator read) (java.util.propertypermission java.class.version read) (java.util.propertypermission java.specification.name read) (java.util.propertypermission java.vendor.url read) (java.util.propertypermission java.vm.version read) (java.util.propertypermission os.name read) (java.util.propertypermission os.arch read) (java.util.propertypermission os.version read) (java.util.propertypermission java.version read) (java.util.propertypermission java.vm.specification.version read) (java.util.propertypermission java.vm.specification.name read) (java.util.propertypermission java.specification.vendor read) (java.util.propertypermission java.vm.vendor read) (java.util.propertypermission file.separator read) (java.util.propertypermission path.separator read) (java.util.propertypermission java.vm.name read) (java.util.propertypermission java.vm.specification.vendor read) ) Test does not have java.io.filepermission("<<all FILES>>", "read") % java -Djava.security.manager Test Exception in thread "main" java.security.accesscontrolexception: access denied (java.util.propertypermission user.home read) at java.security.accesscontrolcontext.checkpermission (AccessControlContext.java:272) at java.security.accesscontroller.checkpermission (AccessController.java:399) at java.lang.securitymanager.checkpermission (SecurityManager.java:545) at java.lang.securitymanager.checkpropertyaccess (SecurityManager.java:1278) at java.lang.system.getproperty(system.java:560) at Test.start(Test.java:5) at Test.main(Test.java:17) WEB DB PRESS Vol.4 61

7 q w e r t y u i o COLUMN 62 WEB DB PRESS Vol.4

8 ! # COLUMN WEB DB PRESS Vol.4 63

Security SYSTEM SOFTWARE 1

Security SYSTEM SOFTWARE 1 Security SYSTEM SOFTWARE 1 Security Introduction Class Loader Security Manager and Permissions Summary SYSTEM SOFTWARE 2 Security Mechanisms in Java Virtual machine erroneous array accesses forbidden casts

More information

Advanced Security and Mobile Networks

Advanced Security and Mobile Networks Advanced Security and Mobile Networks W.Buchanan (1) 3. Encryption 2. IDS 4. Forensic Computing 5. Software Security Unit 5 Software Security Security Goals. Weaknesses. Buffer Overflows. Java Security.

More information

DOCMA: USER MANUAL DOCMA/TEC/002-R. Issue: 1.I. Date: 05/06/2011. Number of pages: 112. FRACTAL S.L.N.E.

DOCMA: USER MANUAL DOCMA/TEC/002-R. Issue: 1.I. Date: 05/06/2011. Number of pages: 112. FRACTAL S.L.N.E. DOCMA: USER MANUAL Code: DOCMA/TEC/002-R Issue: 1.I Date: 05/06/2011 Number of pages: 112 FRACTAL S.L.N.E. www.fractal-es.com info@fractal-es.com Authors: Ana Pérez Calpena Emma Mujica Alvarez María Luisa

More information

The "standard" error output stream. currenttimemillis() Returns the current time in milliseconds.

The standard error output stream. currenttimemillis() Returns the current time in milliseconds. Página 1 de 18 Overview Package Class Use Tree Deprecated Index Help PREV CLASS NEXT CLASS FRAMES NO FRAMES SUMMARY: NESTED FIELD CONSTR METHOD DETAIL: FIELD CONSTR METHOD Java TM 2 Platform Standard Ed.

More information

Security for the Java. Going Beyond Standard. Otto Moerbeek. Chief Architect, Tryllian

Security for the Java. Going Beyond Standard. Otto Moerbeek. Chief Architect, Tryllian Going Beyond Standard Security for the Java Platform Otto Moerbeek Chief Architect, Tryllian otto@tryllian.com 2 Outline Tryllian s platform Standard Java security model Tryllian s requirements Tryllian

More information

System resources. Security Manager.

System resources. Security Manager. Security Manager. Accessing system resources Sometimes, a program requires access to system resources such as system properties, standard input and output, or the current time. Your program could make

More information

Multithreaded OO. Questions:

Multithreaded OO. Questions: Multithreaded OO Questions: 1 1. What s the following Applet code snippet doing? Also, which statement is establishing the network connection? public void actionperformed( ActionEvent evt ) { try { String

More information

Java 2 Security. Dean Wette Senior Software Engineer Object Computing, Inc.

Java 2 Security. Dean Wette Senior Software Engineer Object Computing, Inc. Java 2 Security Dean Wette Senior Software Engineer Object Computing, Inc. St. Louis Java Users Group, 11 Oct. 2001 University of MO-Rolla, Computer Science Colloquium, 1 Nov. 2001 Overview Java Platform

More information

TCK Results report for OSS/J API: JSR264 Order Management API

TCK Results report for OSS/J API: JSR264 Order Management API TCK Version: 1.0.2 Generated at: Mon Mar 29 11:28:44 EDT 2010 Summary Integration Profile Result Passed tests Failed tests JMS-Profile Passed 29 0 WS-Profile Passed 29 0 EJB-Profile Passed 29 0 Integration

More information

TCK Results report for OSS/J API: JSR 91 Trouble Ticket API

TCK Results report for OSS/J API: JSR 91 Trouble Ticket API TCK Version: 1.2.2 Generated at: Tue Nov 05 14:43:40 GMT+08:00 2013 The tests are NOT executed for the following integration profiles: JMS-Profile EJB-Profile Summary Integration Profile Result Passed

More information

CS335 Graphics and Multimedia

CS335 Graphics and Multimedia CS335 Graphics and Multimedia Fuhua (Frank) Cheng Department of Computer Science University of Kentucky Lexington, KY 40506-0046 -2-1. Programming Using JAVA JAVA history: WHY JAVA? Simple Objected-oriented

More information

TEXT-BASED APPLICATIONS

TEXT-BASED APPLICATIONS Objectives 9 TEXT-BASED APPLICATIONS Write a program that uses command-line arguments and system properties Write a program that reads from standard input Write a program that can create, read, and write

More information

Chapter 3. Java Object-Oriented Programming for Enterprise Applications

Chapter 3. Java Object-Oriented Programming for Enterprise Applications Chapter 3 Java Object-Oriented Programming and Enterprise Applications 48 Chapter 3 Java Object-Oriented Programming for Enterprise Applications - An Overview of Enterprise Applications - Object-Oriented

More information

Enabling dynamic security policy in the Java security manager

Enabling dynamic security policy in the Java security manager 1 Enabling dynamic security policy in the Java security manager Fabien Autrel, Frédéric Cuppens, Nora Cuppens FPS 2012 symposium October 26 th 2012 2 1 Introduction 2 JVM sandbox 3 Modelisation 4 Example

More information

Goals. Java - An Introduction. Java is Compiled and Interpreted. Architecture Neutral & Portable. Compiled Languages. Introduction to Java

Goals. Java - An Introduction. Java is Compiled and Interpreted. Architecture Neutral & Portable. Compiled Languages. Introduction to Java Goals Understand the basics of Java. Introduction to Java Write simple Java Programs. 1 2 Java - An Introduction Java is Compiled and Interpreted Java - The programming language from Sun Microsystems Programmer

More information

Generic architecture

Generic architecture Java-RMI Lab Outline Let first builds a simple home-made framework This is useful to understand the main issues We see later how java-rmi works and how it solves the same issues Generic architecture object

More information

Security Policy File Best Practices For Your Java/JDBC Modules

Security Policy File Best Practices For Your Java/JDBC Modules Security Policy File Best Practices For Your Java/JDBC Modules Ilesh Garish, PMTS, Oracle Douglas Surber, CMTS, Oracle Kuassi Mensah, Director, PM, Oracle Oct 02, 2017 2 Safe Harbor Statement The following

More information

CSE331: Introduction to Networks and Security. Lecture 26 Fall 2004

CSE331: Introduction to Networks and Security. Lecture 26 Fall 2004 CSE331: Introduction to Networks and Security Lecture 26 Fall 2004 Announcements Midterm 2 will be Monday, Nov. 15 th. Covers material since midterm 1 Today: Java/C# access control model CSE331 Fall 2004

More information

Java. Massimo Dong. November 27, Massimo Dong Java November 27, / 26

Java. Massimo Dong. November 27, Massimo Dong Java November 27, / 26 Java Massimo Dong November 27, 2017 Massimo Dong Java November 27, 2017 1 / 26 Outline 1 The Java Language Java Virtual Machine(JVM) 2 Java Memory Management References & Garbage Collection Array Check

More information

Java Security. A Brief Introduction. Fred Long. The University of Wales, Aberystwyth UK. U.W. Aberystwyth CS25610/CHM5610. Java Security p.

Java Security. A Brief Introduction. Fred Long. The University of Wales, Aberystwyth UK. U.W. Aberystwyth CS25610/CHM5610. Java Security p. Java Security A Brief Introduction Fred Long The University of Wales, Aberystwyth UK Java Security p.1/24 Some Books Java Security, by Scott Oaks, O Reilly, 2nd edition, 2001. Inside Java 2 Platform Security,

More information

CHAPTER 1 CODE SECURITY

CHAPTER 1 CODE SECURITY CHAPTER 1 CODE SECURITY OBJECTIVES After completing Code Security, you will be able to: Explain the security features built into the Java architecture, from JVM bytecode management to the Core API s security

More information

System Properties. View System Properties. System properties relate to the system environment Ready! API operates in.

System Properties. View System Properties. System properties relate to the system environment Ready! API operates in. System Properties System properties relate to the system environment Ready! API operates in. View System Properties The System Properties are visible in Ready! API from the Help menu This opens a window

More information

CHAPTER 1 J2SE SECURITY

CHAPTER 1 J2SE SECURITY CHAPTER 1 J2SE SECURITY OBJECTIVES After completing J2SE Security, you will be able to: Explain the security features built into the Java architecture, from JVM bytecode management to the Core API s security

More information

Lecture Static Methods and Variables. Static Methods

Lecture Static Methods and Variables. Static Methods Lecture 15.1 Static Methods and Variables Static Methods In Java it is possible to declare methods and variables to belong to a class rather than an object. This is done by declaring them to be static.

More information

Alexander V. Konstantinou. Java Security. Columbia University. Fall 2002

Alexander V. Konstantinou. Java Security. Columbia University. Fall 2002 Java Security Alexander V. Konstantinou Columbia University akonstan@cs.columbia.edu Fall 2002 1 The Java Platform (Review) Java Programming Language Java Libraries Java Virtual Machine (JVM) Java Source

More information

Lecture Static Methods and Variables. Static Methods

Lecture Static Methods and Variables. Static Methods Lecture 15.1 Static Methods and Variables Static Methods In Java it is possible to declare methods and variables to belong to a class rather than an object. This is done by declaring them to be static.

More information

Java An example of a secured architecture

Java An example of a secured architecture Software security& secure programming Java An example of a secured architecture Master M2 CyberSecurity & Master MoSiG Academic Year 2016-2017 Applets : remote/mobile code execution Native application

More information

830512@itri.org.tw import java.net.socket; import java.net.serversocket; import java.io.ioexception; /* ---------- Java Server ---------- */ public class Nets static Socket thesocket; static ServerThread

More information

CORBA Java. Java. Java. . Java CORBA. Java CORBA (RMI) CORBA ORB. . CORBA. CORBA Java

CORBA Java. Java. Java. . Java CORBA. Java CORBA (RMI) CORBA ORB. . CORBA. CORBA Java CORBA Java?? OMG CORBA IDL C, C++, SmallTalk, Ada Java COBOL, ORB C Ada Java C++ CORBA Java CORBA Java (RMI) JDK12 Java CORBA ORB CORBA,, CORBA? CORBA,,, CORBA, CORBA CORBA Java (, ) Java CORBA Java :

More information

Java RMI. Algorithmen und Programmierung V Netzprogrammierung. Volker Roth. Wintersemester 2009/2010. Institut für Informatik Freie Universität Berlin

Java RMI. Algorithmen und Programmierung V Netzprogrammierung. Volker Roth. Wintersemester 2009/2010. Institut für Informatik Freie Universität Berlin Java RMI Algorithmen und Programmierung V Netzprogrammierung Volker Roth Institut für Informatik Freie Universität Berlin Wintersemester 2009/2010 Overview 1. Factory design pattern 2. Codebases 3. Remote

More information

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 4

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 4 CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 4 Access Control Last time: Unix/Windows access control at the OS level. Access control matrix Reference monitor Today: Stack Inspection

More information

THE RMI PROXY USER GUIDE

THE RMI PROXY USER GUIDE THE RMI PROXY USER GUIDE Copyright Telekinesis Pty Ltd, 2000, 2002. All rights reserved. 1 Introduction Java RMI allows Java programs executing within different Java Virtual Machines to communicate using

More information

RMI. (Remote Method Invocation)

RMI. (Remote Method Invocation) RMI (Remote Method Invocation) Topics What is RMI? Why RMI? Architectural components Serialization & Marshaled Objects Dynamic class loading Code movement Codebase ClassLoader delegation RMI Security Writing

More information

2018/2/5 话费券企业客户接入文档 语雀

2018/2/5 话费券企业客户接入文档 语雀 1 2 2 1 2 1 1 138999999999 2 1 2 https:lark.alipay.com/kaidi.hwf/hsz6gg/ppesyh#2.4-%e4%bc%81%e4%b8%9a%e5%ae%a2%e6%88%b7%e6%8e%a5%e6%94%b6%e5%85%85%e5 1/8 2 1 3 static IAcsClient client = null; public static

More information

Crash Course in Java. Why Java? Java notes for C++ programmers. Network Programming in Java is very different than in C/C++

Crash Course in Java. Why Java? Java notes for C++ programmers. Network Programming in Java is very different than in C/C++ Crash Course in Java Netprog: Java Intro 1 Why Java? Network Programming in Java is very different than in C/C++ much more language support error handling no pointers! (garbage collection) Threads are

More information

Vendor: Oracle. Exam Code: 1Z Exam Name: Java SE 8 Programmer. Version: Demo

Vendor: Oracle. Exam Code: 1Z Exam Name: Java SE 8 Programmer. Version: Demo Vendor: Oracle Exam Code: 1Z0-808 Exam Name: Java SE 8 Programmer Version: Demo DEMO QUESTION 1 Which of the following data types will allow the following code snippet to compile? A. long B. double C.

More information

Java Applets. Last Time. Java Applets. Java Applets. First Java Applet. Java Applets. v We created our first Java application

Java Applets. Last Time. Java Applets. Java Applets. First Java Applet. Java Applets. v We created our first Java application Last Time v We created our first Java application v What are the components of a basic Java application? v What GUI component did we use in the examples? v How do we write to the standard output? v An

More information

LECTURE 2 (Gaya College of Engineering)

LECTURE 2 (Gaya College of Engineering) LECTURE 2 (Gaya College of Engineering) 1) CHARACTERISTICS OF OBJECTS: Object is an instance of a class. So, it is an active entity. Objects have three basic characteristics. They are- State: An object

More information

CMPSC 497: Java Security

CMPSC 497: Java Security CMPSC 497: Java Security Trent Jaeger Systems and Internet Infrastructure Security (SIIS) Lab Computer Science and Engineering Department Pennsylvania State University 1 Enforcement Mechanisms Static mechanisms

More information

presentation DAD Distributed Applications Development Cristian Toma

presentation DAD Distributed Applications Development Cristian Toma Lecture 8 S4 - Core Distributed Middleware Programming in JEE presentation DAD Distributed Applications Development Cristian Toma D.I.C.E/D.E.I.C Department of Economic Informatics & Cybernetics www.dice.ase.ro

More information

Getting started with Java

Getting started with Java Getting started with Java by Vlad Costel Ungureanu for Learn Stuff Programming Languages A programming language is a formal constructed language designed to communicate instructions to a machine, particularly

More information

PASS4TEST IT 인증시험덤프전문사이트

PASS4TEST IT 인증시험덤프전문사이트 PASS4TEST IT 인증시험덤프전문사이트 http://www.pass4test.net 일년동안무료업데이트 Exam : 1z0-809 Title : Java SE 8 Programmer II Vendor : Oracle Version : DEMO Get Latest & Valid 1z0-809 Exam's Question and Answers 1 from

More information

CS/B.TECH/CSE(New)/SEM-5/CS-504D/ OBJECT ORIENTED PROGRAMMING. Time Allotted : 3 Hours Full Marks : 70 GROUP A. (Multiple Choice Type Question)

CS/B.TECH/CSE(New)/SEM-5/CS-504D/ OBJECT ORIENTED PROGRAMMING. Time Allotted : 3 Hours Full Marks : 70 GROUP A. (Multiple Choice Type Question) CS/B.TECH/CSE(New)/SEM-5/CS-504D/2013-14 2013 OBJECT ORIENTED PROGRAMMING Time Allotted : 3 Hours Full Marks : 70 The figures in the margin indicate full marks. Candidates are required to give their answers

More information

Java Security Architecture(JDK1.2)

Java Security Architecture(JDK1.2) Java Security Architecture(JDK1.2) Author: Li Gong (li.gong@sun.com) Date: October 2, 1998 Version 1.0 This document gives an overview of the motivation of the major security features that are being implemented

More information

CS 335 Lecture 02 Java Programming

CS 335 Lecture 02 Java Programming 1 CS 335 Lecture 02 Java Programming Programming in Java Define data Calculate using data Output result Java is object-oriented: Java program must: Merge data and functions into object Invoke functions

More information

CS Internet programming Unit- I Part - A 1 Define Java. 2. What is a Class? 3. What is an Object? 4. What is an Instance?

CS Internet programming Unit- I Part - A 1 Define Java. 2. What is a Class? 3. What is an Object? 4. What is an Instance? CS6501 - Internet programming Unit- I Part - A 1 Define Java. Java is a programming language expressly designed for use in the distributed environment of the Internet. It was designed to have the "look

More information

Options for User Input

Options for User Input Options for User Input Options for getting information from the user Write event-driven code Con: requires a significant amount of new code to set-up Pro: the most versatile. Use System.in Con: less versatile

More information

Classes and Objects 3/28/2017. How can multiple methods within a Java class read and write the same variable?

Classes and Objects 3/28/2017. How can multiple methods within a Java class read and write the same variable? Peer Instruction 8 Classes and Objects How can multiple methods within a Java class read and write the same variable? A. Allow one method to reference a local variable of the other B. Declare a variable

More information

Lecture 14 CSE11 Fall 2013 For loops, Do While, Break, Continue

Lecture 14 CSE11 Fall 2013 For loops, Do While, Break, Continue Lecture 14 CSE11 Fall 2013 For loops, Do While, Break, Continue General Loops in Java Look at other loop constructions Very common while loop: do a loop a fixed number of times (MAX in the example) int

More information

RMI Example RMI. CmpE 473 Internet Programming RMI

RMI Example RMI. CmpE 473 Internet Programming RMI CmpE 473 Internet Programming Pınar Yolum pinar.yolum@boun.edu.tr Department of Computer Engineering Boğaziçi University RMI Examples from Advanced Java: Internet Applications, Art Gittleman Remote Method

More information

ORF 201 COMPUTER METHODS FOR PROBLEM SOLVING. Lecture 7 Searching. (C) Princeton University

ORF 201 COMPUTER METHODS FOR PROBLEM SOLVING. Lecture 7 Searching. (C) Princeton University ORF 201 COMPUTER METHODS FOR PROBLEM SOLVING Lecture 7 Searching (C) Princeton University Hints on Java Applets Edit /u/yourname/.login and set umask to 022. Copy /u/orf201/lab1/.rhosts to /u/yourname.

More information

JAVA EXAMPLES - SOLVING DEADLOCK

JAVA EXAMPLES - SOLVING DEADLOCK JAVA EXAMPLES - SOLVING DEADLOCK http://www.tutorialspoint.com/javaexamples/thread_deadlock.htm Copyright tutorialspoint.com Problem Description: How to solve deadlock using thread? Solution: Following

More information

Distributed Objects. Remote Method Invokation

Distributed Objects. Remote Method Invokation Distributed Objects Remote Method Invokation Distributed Systems Object Oriented Paradigm invoke method Object 1 Object 2 respond Distributed Object Oriented Paradigm Client Host/Process invoke method

More information

Module 5 Applets About Applets Hierarchy of Applet Life Cycle of an Applet

Module 5 Applets About Applets Hierarchy of Applet Life Cycle of an Applet About Applets Module 5 Applets An applet is a little application. Prior to the World Wide Web, the built-in writing and drawing programs that came with Windows were sometimes called "applets." On the Web,

More information

Give one example where you might wish to use a three dimensional array

Give one example where you might wish to use a three dimensional array CS 110: INTRODUCTION TO COMPUTER SCIENCE SAMPLE TEST 3 TIME ALLOWED: 60 MINUTES Student s Name: MAXIMUM MARK 100 NOTE: Unless otherwise stated, the questions are with reference to the Java Programming

More information

Selected Questions from by Nageshwara Rao

Selected Questions from  by Nageshwara Rao Selected Questions from http://way2java.com by Nageshwara Rao Swaminathan J Amrita University swaminathanj@am.amrita.edu November 24, 2016 Swaminathan J (Amrita University) way2java.com (Nageshwara Rao)

More information

Midterm I - CSE11 Fall 2013 CLOSED BOOK, CLOSED NOTES 50 minutes, 100 points Total.

Midterm I - CSE11 Fall 2013 CLOSED BOOK, CLOSED NOTES 50 minutes, 100 points Total. Midterm I - CSE11 Fall 2013 CLOSED BOOK, CLOSED NOTES 50 minutes, 100 points Total. Name: ID: Problem 1) (8 points) For the following code segment, what are the values of i, j, k, and d, after the segment

More information

1. Download the JDK 6, from

1. Download the JDK 6, from 1. Install the JDK 1. Download the JDK 6, from http://java.sun.com/javase/downloads/widget/jdk6.jsp. 2. Once the file is completed downloaded, execute it and accept the license agreement. 3. Select the

More information

A Third Look At Java. Chapter Seventeen Modern Programming Languages, 2nd ed. 1

A Third Look At Java. Chapter Seventeen Modern Programming Languages, 2nd ed. 1 A Third Look At Java Chapter Seventeen Modern Programming Languages, 2nd ed. 1 A Little Demo public class Test { public static void main(string[] args) { int i = Integer.parseInt(args[0]); int j = Integer.parseInt(args[1]);

More information

Input from Files. Buffered Reader

Input from Files. Buffered Reader Input from Files Buffered Reader Input from files is always text. You can convert it to ints using Integer.parseInt() We use BufferedReaders to minimize the number of reads to the file. The Buffer reads

More information

CS 335 Graphics, Image Processing, User Interface Design

CS 335 Graphics, Image Processing, User Interface Design CS 335 Graphics, Image Processing, User Interface Design 2-3:15 TR 207 RGAN Brent Seales 1 Course Goals Programming with Java and associated APIs Graphical User Interfaces (GUIs) Introduction to Image

More information

Introduction to Java

Introduction to Java Introduction to Java Module 1: Getting started, Java Basics 22/01/2010 Prepared by Chris Panayiotou for EPL 233 1 Lab Objectives o Objective: Learn how to write, compile and execute HelloWorld.java Learn

More information

TEXT-BASED APPLICATIONS

TEXT-BASED APPLICATIONS Objectives 9 TEXT-BASED APPLICATIONS Write a program that uses command-line arguments and system properties Write a program that reads from standard input Write a program that can create, read, and write

More information

(A) 99 (B) 100 (C) 101 (D) 100 initial integers plus any additional integers required during program execution

(A) 99 (B) 100 (C) 101 (D) 100 initial integers plus any additional integers required during program execution Ch 5 Arrays Multiple Choice 01. An array is a (A) (B) (C) (D) data structure with one, or more, elements of the same type. data structure with LIFO access. data structure, which allows transfer between

More information

Programming by Delegation

Programming by Delegation Chapter 2 a Programming by Delegation I. Scott MacKenzie a These slides are mostly based on the course text: Java by abstraction: A client-view approach (4 th edition), H. Roumani (2015). 1 Topics What

More information

Timing ListOperations

Timing ListOperations Timing ListOperations Michael Brockway November 13, 2017 These slides are to give you a quick start with timing operations in Java and with making sensible use of the command-line. Java on a command-line

More information

Advanced Internet Programming CSY3020

Advanced Internet Programming CSY3020 Advanced Internet Programming CSY3020 Java Applets The three Java Applet examples produce a very rudimentary drawing applet. An Applet is compiled Java which is normally run within a browser. Java applets

More information

Integrating CapeConnect with WebLogic

Integrating CapeConnect with WebLogic Integrating CapeConnect with WebLogic 2 CapeConnect includes a full implementation of the Java 2 Platform, Enterprise Edition (J2EE) called the CapeConnect J2EE engine. However, CapeConnect also works

More information

Solutions to Sample JAC444 Midterm Test

Solutions to Sample JAC444 Midterm Test Solutions to Sample JAC444 Midterm Test 1-2016 A. Theory (10 marks = 5 marks + 5 marks) 1. When can one implement a deep cloning in Java? see deep cloning lecture 3 2. What are the differences between

More information

University of Palestine. Mid Exam Total Grade: 100

University of Palestine. Mid Exam Total Grade: 100 First Question No. of Branches (5) A) Choose the correct answer: 1. If we type: system.out.println( a ); in the main() method, what will be the result? int a=12; //in the global space... void f() { int

More information

CSC 1214: Object-Oriented Programming

CSC 1214: Object-Oriented Programming CSC 1214: Object-Oriented Programming J. Kizito Makerere University e-mail: jkizito@cis.mak.ac.ug www: http://serval.ug/~jona materials: http://serval.ug/~jona/materials/csc1214 e-learning environment:

More information

PROGRAMMING FUNDAMENTALS

PROGRAMMING FUNDAMENTALS PROGRAMMING FUNDAMENTALS Q1. Name any two Object Oriented Programming languages? Q2. Why is java called a platform independent language? Q3. Elaborate the java Compilation process. Q4. Why do we write

More information

Are Sockets a Good Programming Paradigm? EDA095 Remote Method Invocation. The Remote Procedure Call Model. The Remote Procedure Call Architecture

Are Sockets a Good Programming Paradigm? EDA095 Remote Method Invocation. The Remote Procedure Call Model. The Remote Procedure Call Architecture Are Sockets a Good Programming Paradigm? EDA095 Remote Method Invocation Pierre Nugues Lund University http://www.cs.lth.se/home/pierre_nugues/ April 21, 2010 To request a service from a server, sockets

More information

Java Security. Lecture 10 March 5, 2013

Java Security. Lecture 10 March 5, 2013 Java Security Lecture 10 March 5, 2013 1 Java Technology Has been established as important for enterprise applications To ease platform independent application development Java Servlets, JavaServer Pages

More information

THIS EXAMINATION PAPER MUST NOT BE REMOVED FROM THE EXAMINATION ROOM

THIS EXAMINATION PAPER MUST NOT BE REMOVED FROM THE EXAMINATION ROOM UNIVERSITY OF LONDON GOLDSMITHS COLLEGE B. Sc. Examination 2012 COMPUTER SCIENCE IS52025A Internet and Distributed Programming Duration: 2 hours 15 minutes Date and time: There are five questions in this

More information

BIT Java Programming. Sem 1 Session 2011/12. Chapter 2 JAVA. basic

BIT Java Programming. Sem 1 Session 2011/12. Chapter 2 JAVA. basic BIT 3383 Java Programming Sem 1 Session 2011/12 Chapter 2 JAVA basic Objective: After this lesson, you should be able to: declare, initialize and use variables according to Java programming language guidelines

More information

ITI Introduction to Computing II

ITI Introduction to Computing II ITI 1121. Introduction to Computing II Marcel Turcotte School of Electrical Engineering and Computer Science Version of February 23, 2013 Abstract Handling errors Declaring, creating and handling exceptions

More information

JDK 7 (2011.7) knight76.tistory.com Knight76 at gmail.com

JDK 7 (2011.7) knight76.tistory.com Knight76 at gmail.com JDK 7 (2011.7) JDK 7 #2 Project Coin knight76.tistory.com Knight76 at gmail.com 1 Project Coin 2 Project Leader Joseph D. Darcy( ) IDEA 2 27, 2009 3 30, 2009 (open call) 70 jdk 7, Language, The Java programming-language

More information

1 Short Answer (5 Points Each)

1 Short Answer (5 Points Each) 1 Short Answer (5 Points Each) 1. Write a declaration of an array of 300 strings. String strarray[] = new String[300];. Write a method that takes in an integer n as a parameter and returns one half of

More information

April 3 April 3. Has been established as important for enterprise applications

April 3 April 3. Has been established as important for enterprise applications Java Security April 3 April 3 Java Technology Has been established as important for enterprise applications To ease platform independent application development Java Servlets, JavaServer Pages (JSP), Enterprise

More information

Are Sockets a Good Programming Paradigm? EDA095 Remote Method Invocation. The Remote Procedure Call Model. The Remote Procedure Call Architecture

Are Sockets a Good Programming Paradigm? EDA095 Remote Method Invocation. The Remote Procedure Call Model. The Remote Procedure Call Architecture Are Sockets a Good Programming Paradigm? EDA095 Remote Method Invocation Pierre Nugues Lund University http://www.cs.lth.se/pierre_nugues/ May 2, 2013 To request a service from a server, sockets use explicit

More information

EDA095 Remote Method Invocation

EDA095 Remote Method Invocation EDA095 Remote Method Invocation Pierre Nugues Lund University http://www.cs.lth.se/pierre_nugues/ April 25, 2012 Covers: Elliotte Rusty Harold, Java Network Programming, 3 rd ed., Chapter 18, pages 610

More information

ITI Introduction to Computing II

ITI Introduction to Computing II ITI 1121. Introduction to Computing II Marcel Turcotte School of Electrical Engineering and Computer Science Version of February 23, 2013 Abstract Handling errors Declaring, creating and handling exceptions

More information

An overview of Java, Data types and variables

An overview of Java, Data types and variables An overview of Java, Data types and variables Lecture 2 from (UNIT IV) Prepared by Mrs. K.M. Sanghavi 1 2 Hello World // HelloWorld.java: Hello World program import java.lang.*; class HelloWorld { public

More information

Module - 3 Classes, Inheritance, Exceptions, Packages and Interfaces. OOC 4 th Sem, B Div Prof. Mouna M. Naravani

Module - 3 Classes, Inheritance, Exceptions, Packages and Interfaces. OOC 4 th Sem, B Div Prof. Mouna M. Naravani Module - 3 Classes, Inheritance, Exceptions, Packages and Interfaces OOC 4 th Sem, B Div 2016-17 Prof. Mouna M. Naravani Introducing Classes A class defines a new data type (User defined data type). This

More information

Java Programming Language Mr.Rungrote Phonkam

Java Programming Language Mr.Rungrote Phonkam 3 Java Programming Language Mr.Rungrote Phonkam rungrote@it.kmitl.ac.th Contents 1. Identify 2. Method Member 3. Literals 4. Data Type 6. Variable 1. Identify ก ก Class, Data, Method, Variable, Label,

More information

EDA095 Remote Method Invocation

EDA095 Remote Method Invocation EDA095 Remote Method Invocation Pierre Nugues Lund University http://www.cs.lth.se/pierre_nugues/ March 31, 2011 Covers: Elliotte Rusty Harold, Java Network Programming, 3 rd ed., Chapter 18, pages 610

More information

GUAVA - CHARMATCHER CLASS

GUAVA - CHARMATCHER CLASS GUAVA - CHARMATCHER CLASS http://www.tutorialspoint.com/guava/guava_charmatcher.htm Copyright tutorialspoint.com CharMatcher provides various methods to handle various JAVA types for char values. Class

More information

(A) 99 ** (B) 100 (C) 101 (D) 100 initial integers plus any additional integers required during program execution

(A) 99 ** (B) 100 (C) 101 (D) 100 initial integers plus any additional integers required during program execution Ch 5 Arrays Multiple Choice Test 01. An array is a ** (A) data structure with one, or more, elements of the same type. (B) data structure with LIFO access. (C) data structure, which allows transfer between

More information

Programming: You will have 6 files all need to be located in the dir. named PA4:

Programming: You will have 6 files all need to be located in the dir. named PA4: PROGRAMMING ASSIGNMENT 4: Read Savitch: Chapter 7 and class notes Programming: You will have 6 files all need to be located in the dir. named PA4: PA4.java ShapeP4.java PointP4.java CircleP4.java RectangleP4.java

More information

1. What is the difference between a compiler and an interpreter? Also, discuss Java s method.

1. What is the difference between a compiler and an interpreter? Also, discuss Java s method. Name: Write all of your responses on these exam pages. 1 Short Answer (5 Points Each) 1. What is the difference between a compiler and an interpreter? Also, discuss Java s method. 2. Java is a platform-independent

More information

JAVA RMI Java, summer semester

JAVA RMI Java, summer semester JAVA RMI Overview Remote Method Invocation usage of remote object objects in a different VM (on the same computer or over the network) as there would be local objects (almost) calls just take longer time

More information

Name:... ID:... class A { public A() { System.out.println( "The default constructor of A is invoked"); } }

Name:... ID:... class A { public A() { System.out.println( The default constructor of A is invoked); } } KSU/CCIS/CS CSC 113 Final exam - Fall 12-13 Time allowed: 3:00 Name:... ID:... EXECRICE 1 (15 marks) 1.1 Write the output of the following program. Output (6 Marks): class A public A() System.out.println(

More information

Java Certification Mock Exam

Java Certification Mock Exam Java Certification Mock Exam John Hunt Email: john.hunt@jttc.demon.co.uk URL: //www.jttc.demon.co.uk/cert.htm As with any examination technique is an important aspect of the examination process. In most

More information

An applet is a program written in the Java programming language that can be included in an HTML page, much in the same way an image is included in a

An applet is a program written in the Java programming language that can be included in an HTML page, much in the same way an image is included in a CBOP3203 An applet is a program written in the Java programming language that can be included in an HTML page, much in the same way an image is included in a page. When you use a Java technology-enabled

More information

BufferedReader br = new BufferedReader(new InputStreamReader(System.in));

BufferedReader br = new BufferedReader(new InputStreamReader(System.in)); 2.A. Design a superclass called Staff with details as StaffId, Name, Phone, Salary. Extend this class by writing three subclasses namely Teaching (domain, publications), Technical (skills), and Contract

More information

CHETTINAD COLLEGE OF ENGINEERING & TECHNOLOGY JAVA

CHETTINAD COLLEGE OF ENGINEERING & TECHNOLOGY JAVA 1. JIT meaning a. java in time b. just in time c. join in time d. none of above CHETTINAD COLLEGE OF ENGINEERING & TECHNOLOGY JAVA 2. After the compilation of the java source code, which file is created

More information

Jubula Installation Manual

Jubula Installation Manual BX Jubula Installation Manual Jubula Team BREDEX GmbH June 29, 2012 June 29, 2012 1 Jubula Installation Manual BREDEX GmbH Mauernstr. 33 38100 Braunschweig Germany Tel: +49-531 - 243 30-0 Fax: +49-531

More information

A socket is a software endpoint that establishes bidirectional communication between a server program and one or more client programs.

A socket is a software endpoint that establishes bidirectional communication between a server program and one or more client programs. PART 24 Java Network Applications 24.1 Java Socket Programming A socket is a software endpoint that establishes bidirectional communication between a server program and one or more client programs. A server

More information

S.E. Sem. III [CMPN] Object Oriented Programming Methodology

S.E. Sem. III [CMPN] Object Oriented Programming Methodology S.E. Sem. III [CMPN] Object Oriented Programming Methodology Time : 3 Hrs.] Prelim Question Paper Solution [Marks : 80 Q.1(a) Write a program to calculate GCD of two numbers in java. [5] (A) import java.util.*;

More information