Skip to main content

The Principles of Java

 Before writing programs, I had to install Java, which is simple with the right resources. First, I downloaded the Java Development Kit (JDK) from Oracle or OpenJDK. Then I ran the installer, which sets up everything you need, including the compiler and runtime. Most modern installers handle the system path automatically. Finally, I tested it by creating a simple HelloWorld.java program, compiling it with javac HelloWorld.java, and running it with java HelloWorld. For detailed guidance, I found Oracle’s Java tutorials and JavaTpoint very helpful.


Learning Java introduced me to object-oriented programming (OOP), a way of designing software around “objects” that model real-world concepts. OOP makes programs easier to maintain, reuse, and expand—skills that are useful whether you’re building small apps or large systems.


I explored the four main principles of OOP:


  • Encapsulation: Keeping data and the methods that act on it together in a class, controlling access to internal details. Think of it like keeping your personal information in a locked file and only sharing it in controlled ways. (JavaTpoint)
  • Abstraction: Focusing on what an object does instead of how it works. Like using a car’s steering wheel without worrying about the engine mechanics. This makes programs simpler to understand and use. (Oracle)
  • Inheritance: Letting one class borrow features from another. For example, a “Car” class can inherit common properties from a “Vehicle” class. This saves time and reduces duplicated code. (vDocuments)
  • Polymorphism: Allowing the same method to behave differently depending on the object. It’s like a single “open” button doing different things on your phone, tablet, or laptop. This makes programs flexible and easier to extend.


Understanding these principles helps developers design software that is organized, scalable, and closer to real-world systems. 


Comments

Popular

Traveling Through a Network

The path for pinging the three websites all sent and received the same amount of packets without any loss. The path to Google was the quickest with an average roundtrip time of 85ms. The path to the Australian site, accountantsdaily.au, took the longest with an average round trip time of 285ms. The trace route to good took twenty four hops. For accountantsdaily.au it took twenty two. And the Chinese website that I chose, eggplantdigital.cn, was only sixteen hops. I noticed that the hops later in the route for each three site tended to be higher than the earlier ones. While Google had the highest amount of hops the average speed of those hops were faster than the other two sites. Eggplantdigital.cn had the lowest amount of hops with only sixteen. Geographic location is key to quicker routes. When pinging an IP address or domain that is far away it will take longer to complete. Pings and trace routes can help troubleshooting problems by pinpointing a location where communication is unabl...

Network Security

Individuals need information security to protect their important personal information from being stolen. They need system security to prevent harmful cyber attacks that hurt application programming or operating systems. There are many ways that your information and system security can be threatened and also many ways to protect it. Malware is malicious software that runs on a computer causes it to do harmful things like running services that charge you or messing up your data. Ransomware is a type of malware that steals data and holds it requiring you to meet specific terms to regain access.  It is important to regularly scan your computer for any malware. There may be important updates that patch any vulnerabilities. It is also smart to have back up data and being prepared in case of malware infection. One of the best ways to keep your information secure is through the use of antivirus software.  “It primarily works by using a list of known virus patterns, called definitions ...

Computers

Computers  Past, present, & future The beginning Computers have changed the way we live. They connect us by sending electrical signals through a network to convey different messages. At first the speed and extent of that process was limited by less advanced technology. It took more hardware to complete certain tasks. For example, DSL wires would get congested but now that there are many towers built we have wireless connections that speed things up for us. Or things like fiber that communicate information through light rays. Modern Computers Computers have now reached a point of ultimate sufficiency. Non-volatile memory is able to store more gigabytes of data with smaller hardware than ever before. Just a simple flash drive will probably suffice for most people’s needs. And with things like cloud storage that host large databases for different networks, there is less of a need for physical components. Volatile memory processes different bits of information faster than ever befo...