Skip to main content

Java! Another Programming Language

 Hello There,

There are many programming languages out there to choose from and choosing which one to learn after you worked with one becomes the real question. I am currently taking a course on Java. Java is an object-orientated programming language that deals more with data or objects instead of functions like other programming languages. It is more complex than other languages like Python, which is the first programming language I learned to work with. Although most programming languages can do the same thing choosing one over another becomes a question of what I am using it for and which language suits me best.

You can install Java on your computer to use but if you cannot install it on your computer there are a lot of resources online you could use to help you get familiar with Java. I will share links to the online resources I used to help me use Java online without having to download it and I will link you with a simple program I had to write for class. It was a simple program that I was able to run on my browser and it helped me get familiar with using Java. I hope you get familiar with it as well. Have fun learning and coding in a new language.

Link to online compiler. This online compiler allows you to choose different programming languages, Java is one of them https://www.onlinegdb.com/

Link to another online compiler this one is for Java https://www.jdoodle.com/online-java-compiler/

Link to the “Hello World!” program to help get you familiar with working in Java https://docs.oracle.com/javase/tutorial/getStarted/cupojava/netbeans.html#netbeans-2a

Comments

Popular posts from this blog

  Network Security Connection             Network security is very important in today’s world, and it will continue to be an essential part of the future of the cyber world. With each new technological advancement, there is a threat that arises that is set in motion to try and exploit that new technology. From the dawn of the first home computers, some seek to use those same systems with malicious intent. Cybercrime is the fastest-growing form of criminal activity (Vahid & Lysecky, 2017). The growing rate of cybercrime means there must be people at the forefront trying to protect against it and it starts with protecting networks as well as devices that are in use. Network security is a cornerstone to any computer database and this security needs to stay prepared for any cyber threat that will try to take advantage of its users.            Having a reliable network requir...
Information Highway  Sending and receiving information on the internet does have its snags at times and having ways to help determine what causes them can help make that information travel better. I have used ping and traceroute extensively due to my line of work. I work for an internet service provider and running ping tests can come in handy when a customer is experiencing slow internet speeds. When you run a ping test to a certain destination you are sending packets to that place and awaiting a response. This can help determine if the line of communication to that destination is a clear one and if there isn’t a clear route for that packet it can be lost. If the packet of information doesn’t make it to its destination it could be resent causing a slight delay to that information. Traceroute is used to see the number of places a packet must hit before reaching its destination. Each server it hits is marked down along with the amount of time it took to reach that server. I did a ...
 Network Security      There are several security threats to those that jump on any network even when it isn’t connected to the internet. The number of computing devices out there can all be targeted and if these threats are not checked the damage can be very costly. The threats to one’s network, devices, and even information come in many forms. These threats are serious but there are a few tried and true methods to help avert them. This paper will cover two specific threats in detail as well as outline some protective measures to help.            One of the threats that are very popular in the cyberworld is called phishing. Phishing is a scam that runs on the internet to try to exploit a user’s sensitive information (Vahid & Lysecky, 2017). These types of threats are mainly targeted at a specific user of a device that can connect to a network or internet. Once a breach has happened the user’s information can be...