Skip to main content

The Java Program Life Cycle

Java Program Life Cycle

Java Program Life Cycle
(Image by - Sharma Guides | Subham232330)


Java requires the source code of your program to be compiled first.
It gets converted to machine-specific code, a byte code that is understood by some run-time engine, or a java virtual machine.

Not only will the program be checked for syntax errors by a Java compiler, but some other libraries of Java code can be added (linked) to your program after completing the compilation (deployment stage).

Java Program Life Cycle



* Step1: Create a source document using any editor and save the file as .java (e.g. abc.java)

* Step2: Compile the abc.java file using “javac” command or eclipse will compile it automatically.

* Step3: Byte Code (abc.class) will be generated on disk.

* Step4: This byte code can run on any platform or device having JVM (java.exe convert byte code in machine language)


Let’s get familiar with various terminologies used by java programmers.


* JDK (Java Development Kit): JDK contains JRE along with various development tools like Java libraries, Java source compilers, Java debuggers, bundling and deployment tools

* JRE (Java Runtime Environment): It is part of JDK but can be used independently to run any byte code (compiled java program). It can be called JVM implementation.

* JVM (Java Virtual Machine): ‘JVM’ is software that can be ported to various hardware platforms. JVM will become an instance of JRE at runtime of the java program. Byte codes are the machine language for the JVM. Like a real computing machine, JVM has an instruction set that manipulates various memory areas at run time. Thus for different hardware platforms, one has corresponding the implementation of JVM available as vendor-supplied JREs.

* Java API (Application Programming Interface): A set of classes’ written using Java programming language which runs on JVM. These classes will help programmers by providing standard methods like reading from the console, writing to the console, saving objects in the data structure, etc.


Advantages of Java programming language :

* Built-in support for multi-threading, socket communication, and memory management (automatic garbage collection).

* Object Oriented (OO).

* Better portability than other languages across operating systems.

* Supports Web-based applications (Applet, Servlet, and JSP), distributed applications (sockets, RMI, EJB, etc.), and network protocols (HTTP, JRMP, etc.) with the help of extensive standardized APIs (Application Programming Interfaces).


Comments

Popular posts from this blog

How To Make Symbols With Keyboard

HOW TO MAKE SYMBOLS WITH A KEYBOARD (Image By - Sharma Guides | Subham232330) Alt + 0153 :   ™  (trademark symbol) Alt + 0169 :   ©  (copyright symbol) Alt + 0174 :   ®  (registered trademark symbol) Alt + 0176 :   °  (degree symbol) Alt + 0177 :  ±  (plus-or-minus sign) Alt + 0182 :   ¶  (paragraph mark) Alt + 0190 :   ¾  (fraction, three-fourths) Alt + 0215 :   × (multiplication sign) Alt + 0162 :   ¢  (thecent sign) Alt + 0161 :   ¡  (upside down exclamation point) Alt + 0191 :   ¿  (upside down question mark) Alt + 1 : ☺ (smiley face) Alt + 2 :   ☻ (black smiley face) Alt + 15 :   ☼  (Sun) Alt + 12 :   ♀  (female sign) Alt + 11 :   ♂  (male sign) Alt + 6 :   ♠  (spade) Alt + 5 :   ♣  (Club) Alt + 3 :   ♥  (Heart) Alt + 4 :   ♦  (Diamond) Alt + 13 :   ♪  (eighth note...

Natural Language Processing (NLP)

What is Natural Language Processing (NLP) ? Natural Language Processing (NLP)* is a field of artificial intelligence (AI) that focuses on the interaction between computers and humans using natural language. It involves the development of algorithms and models that enable computers to understand, interpret, and generate human language. Here are key aspects of NLP: 1. *Text Understanding:* NLP systems aim to comprehend the meaning of written or spoken language. This involves tasks such as text classification, sentiment analysis, and named entity recognition. 2. *Speech Recognition:* NLP extends to processing spoken language, converting audio signals into text. This technology is used in voice assistants, transcription services, and more. 3. *Language Generation:* NLP systems can generate human-like text. This is employed in chatbots, language translation services, and content generation. 4. *Machine Translation:* NLP is fundamental to machine translation systems that enable the automatic...

Access Control Methods in DBMS

Access control in DBMS Database access control is a method of allowing access to a company’s sensitive data only to those people (database users) who are allowed to access such data and to restrict access to unauthorized persons. It includes two main components: authentication and authorization. Authentication is a method of verifying the identity of a person who is accessing your database. Note that authentication isn’t enough to protect data. An additional layer of security is required, authorization, which determines whether a user should be allowed to access the data or make the transaction he’s attempting. Without authentication and authorization, there is no data security. Any company whose employees connect to the Internet, thus, every company today, needs some level of access control implemented. Types of Access Control Obsolete access models include Discretionary Access Control (DAC) and Mandatory Access Control (MAC). Role Based Access Control (RBAC) is the most common method...