Basic Encryption Question

Hello all,
I am trying to do a basic string encryption and decription but am getting an exception.
java.security.NoSuchAlgorithmException: Algorithm DES not available Here is a code that I found online and I am trying to run it as an example. I am using j2sdk1.4.2_08 and have included sunjce_provider.jar in my class path.
package security1;
import java.security.Key;
import java.security.NoSuchAlgorithmException;
import java.security.Security;
import javax.crypto.KeyGenerator;
public class DESKeyGenerator {
    public static void main(String[] args) {
        Security.addProvider(new com.sun.crypto.provider.SunJCE());
        try {
            KeyGenerator kg = KeyGenerator.getInstance("DES");
            Key key = kg.generateKey();
            System.out.println("Key format: " + key.getFormat());
            System.out.println("Key algorithm: " + key.getAlgorithm());
        catch (NoSuchAlgorithmException e) {
            e.printStackTrace();
}I am getting the exception at
KeyGenerator kg = KeyGenerator.getInstance("DES");I would appreciate any help.
Thankyou

Thank you so much wetmore.
I looked up online to find out about the bug and was finally able to solve the issue.
Here is what I have done, verbatim, as reported on the Eclipse's bug reporting website. The solution is from the thread mentioned in the link below.
" ------- Comment #13 From M.H.  2003-10-23 06:49  -------
@Gary Murphy: there is a workaround (somewhere posted in bugzilla) how to get
it running in Eclipse. In your run configuration, remove the default JRE lib
entry from the bootstrap classes and add external jars jce.jar, rt.jar and
jsse.jar instead."The entire discussion for other fellow developers can be found at:
https://bugs.eclipse.org/bugs/show_bug.cgi?format=multiple&id=38370
Here are your remaining duke dollars wetmore.
Thank you once again.

Similar Messages

  • Basic iPhoto questions:

    I have some Basic iPhoto questions before I start using the program:
    - does iPhoto apply any compression or change images in any way when they
    are imported?
    - after images are imported, can the original source folder of images be deleted off of the mac?
    - can Quicktime files exported from iPhoto be viewed on a Windows computer?
    - can iPhoto handle large resolution images that might be as large as 8-15mb each? does it display them quick? are there any known file size issues?
    Thanks!!!!

    kat.
    Is there a way to use iPhoto on a network so other users can read and possibly write to an iPhoto library on a networked mac?
    iPhoto is a consumer level photo organiser, not a server. It's possible to share photos but libraries are very difficult and fraught with the danger of database corruption. Some have reported success.
    Is it possible to password protect or secure certain images in the library so they can not be seen by anyone?
    No. The best I can suggest there is to create a second library and store it in a secure area like a protected dmg. But remember, you can only have one library open at a time.
    After photos are deleted from iPhoto, are there any remaining traces or cached files anywhere other than the trash
    If you delete photos from iPhoto and empty the iPhoto trash then the pics are removed from the Finder as well. They remain as findable as any other deleted file from that point, which is, very, if the searcher in knowledgeable.
    Regards
    TD

  • Object class deployment - Basic form question

    OK, I subclass calendar object from Oracle provided standard
    object class. What do I need to deploy to use this form now
    apart from calendar.pll and my fmx. What about the object class
    from which I sub-class. Do I need to compile and deploy that
    also? How will form resolve this on run time the parent object
    class as I really did not copy, just sub class and we do not
    deploy original class? Basic form question. Thanks.

    You can set the "help" property on the field (which gives you the little "information" icon link beside the field).
    You could also try adding another field of another class above or below:
    <Display class='InlineAlert'/>
    <Display class='ErrorMessage'/>
    <Display class='HtmlPage'/>
    ..etc
    -Rob

  • Adding Date/Time Field + X Number of Days - Basic Calculation Question

    I am assuming this is a basic calculation question. New to Adobe LiveCycle Forms.
    I have a simple form containing a table. The table appears as such:
    Text
    Formatted as Date/Time Fields
    Header 3
    Monday
    user wil choose the beginning date (Date/Time) this is DateTimeField1
    Tuesday
    this should calculate DateTimeField1 + 1
    Wednesday
    this should calculate DateTimeField1 + 2
    Thursday
    this should calculate DateTimeField1 + 3
    Friday
    this should calculate DateTimeField1 + 4
    Saturday
    this should calculate DateTimeField1 + 5
    Sunday
    this should calculate DateTimeField1 + 6
    Calculations are performed after the date is chosen for Monday. My mind tells me the simple calculation of DateTimeField1 + 1 is not going to work (and in fact doesn't!) as it needs to change Monday to a number first. I saw on another thread the following:
    Num2Date(Date2Num(Date(DateTimeField1), "DD.MM.YYYY")+7, "DD.MM.YYYY")
    Thought this was going to get me close. No cigars though!
    Any quick help is greatly appreciated. And since I am new to this, details about what needs to be changed would be great too!
    Thanks

    Here an addition for you date field.
    This FormCalc script in the exit:Event will check it the selected date is on a monday.
    If not it will go the days back until the last monday.
    var Selection = Date2Num($.formattedValue, DateFmt(2))
    var WeekDay = Num2Date(Selection, "E")
    var NewDate
    if (WeekDay eq 1) then
              NewDate = Selection - 6
    elseif (WeekDay eq 3) then
              NewDate = Selection - 1
    elseif (WeekDay eq 4) then
              NewDate = Selection - 2
    elseif (WeekDay eq 5) then
              NewDate = Selection - 3
    elseif (WeekDay eq 6) then
              NewDate = Selection - 4
    elseif (WeekDay eq 7) then
              NewDate = Selection - 5
    else
              NewDate = Selection
    endif
    $ = Num2Date(NewDate, "EEE DD.MM.YYYY")
    Hope this helps, too.

  • Basic Exporting Question

    My main question is a very basic exporting question, but here is a super-condensed explanation of my big-picture goal for context:
    Large (~450 MB) aiff on CD --> trim w/ Quicktime --> small (~16 MB) MP3 in iTunes
    I would like to take an audio file (aiff) that is approximately 450 MB and export it from Quicktime and in doing so, reduce the file size and convert it to MP3. When I simply try to export it, it doesn't ask me about what size I want, nor does it give the option of MP3 formatting.
    I have figured out how to reach my goal, but it's a mess. After I make my trims in QT, I have to:
    1. select "share" instead of "export".
    2. It asks me what size I want and I select small.
    3. The file is then exported as a Quicktime movie into Mail and the size is reduced from 450 MB to about 20 MB.
    4. I then have to "right-click" on the attachment in the email that is created,
    5. save the attachment,
    6. discard the email,
    7. import the file into iTunes, and
    8. create an MP3 in iTunes to finally arrive at my goal.
    This seems like a ridiculously convoluted process to change a large aiff to a small MP3 and put it in iTunes. Any suggestions?

    Thanks. I guess the basic answer to my question is that it can't be done in one or two fell swoops. The problem is that it starts on a burned disc, and I need to make edits to it before it ends up in iTunes (to be eventually used in iWeb). I was hoping to avoid juggling back and forth between iTunes and QT. I either would have to send it back to QT to do the edits after -->iTunes-->mp3, or import the large file from the CD to QT, make the edits, save changes, import large file to iTunes, convert to mp3.

  • SAP 4.7 Encryption questions

    Dear SAP on i5 community,
    We are running SAP 4.7 and i5 OS 5.3.0 and have the following questions about how encryption works;
    Encryption questions
    1. How do we determine precisely what encryption algorithm is used to encrypt credit card data in our R/3 system?
    2. How are the encryption keys for this algorithm generated or provided?
    3. How and where are encryption keys for this algorithm are managed?
    4. Is there a way to change the encryption keys?
    We look forward to your replies...Thank you!
    TMM

    Hello Tim,
    You could take a look at the following blog and the Notes refered.
    Enable Credit Card Encryption
    If I am not mistaken...
    1. Decided by SAP already
    2. You generate the keys through SAP transactions (details in Notes and blog)
    3. Keys are saved in a file on the OS level (make sure it is safe)
    4. Yes, you can. But all the previous credit cards will be lost.
    Hope it helps.
    Best regards,
    Victor

  • Basic PBE questions and clarifications

    I have some basic questions about PBE and java.
    My first question is how do I determine the size of the derived key that will actually be used? Do we have any control over that? I guess that the password strength is probably more important than size of derived key in PBE(?), but I'd still like to understand what's happening.
    Following on that - do the characteristics of the initial PBE password have any bearing on the strength of the encryption (ie the size of the derived key), when using PBE?
    Finally with standard install of Sun 1.5 JRE, the security jurisdication policy files prohibit the use of PBEWithMD5AndTripleDES. However the Sun JDK from 1.5 supports PBEWithSHA1AndDESede and this appears to work with the standard (strong), policy files.
    This being the case (and please correct if this is wrong), what is the difference between TripleDES and DESede - I thought they were analogous. Why is one PBE scheme available with standard (strong), 1.5 policy files and the other prohibited?

    peckham wrote:
    Thanks for response - cleared some things up. My focus now is on why PBEWithMD5AndTripleDES fails with 1.5 strong policy files whereas PBEWithSHA1AndDESede appears to work.
    You said:
    ... The only difference I can imagine is that TripleDES could use the two key version which has only 2*56 bits for a key but this would still require the 'unlimited strength files.To clarify do you mean to say DESede could use the two key 2*56 version? I ask because DESede is the one that seems to work so I would expect that to be the one using the smaller key size.
    Could you also explain why you would expect 2*56 version to require unlimited strength files - I thought 128 bits was the limit for DESede keys with Strong Jurisdiction Policy files.I thought the threshold was lower than 128 bits but I can't be certain.
    >
    >>
    Why is one PBE scheme available with standard (strong), 1.5 policy files and the other prohibited?As I said, they are they should be the same.
    Note - there was a bug in earlier JRE whereby if one used the key.getAlgorithm() method to use to create a Cipher i.e.
    Cipher cipher = Cipher.getInstance(key.getAlgorithm());one always got PBEWithMD5AndDES. This, of course, does not require the 'unlimited strength' files.
    I found [this posting |http://forums.sun.com/thread.jspa?threadID=5129170&start=0&tstart=0] that you (sabre150), contributed to back in 2007. I've modified the JDKIssueTestCase to use:
    Cipher cipher = Cipher.getInstance(algorithm);Running this under 1.5 with 'strong' policy files PBEWithMD5AndTripleDES fails but PBEWithSHA1AndDESede succeeds. Here is the output:
    JVM Name: "Java HotSpot(TM) Client VM"  Version: "1.5.0_10-b03"  Vendor: "Sun Microsystems Inc."
    OS Name: "Windows XP"  Version: "5.1"  Architecture: "x86"
    Sun JCE: [SunJCE version 1.5]  Info: [SunJCE Provider (implements RSA, DES, Triple DES, AES, Blowfish, ARCFOUR, RC2, PBE, Diffie-Hellman, HMAC)]
    Algorithm: [PBEWITHMD5ANDTRIPLEDES]  Max key length: [128]
    Result Failed: [java.security.InvalidKeyException: Illegal key size]
    Algorithm: [PBEWITHSHA1ANDDESEDE]  Max key length: [128]
    Result Encrypted: [-70, -45, 57, 35, -29, 5, -113, -118, 102, 14, -119, -81, 125, 8, 56, -8]
    Algorithm: [PBEWITHMD5ANDDES]  Max key length: [128]
    Result Encrypted: [-56, -33, -40, -75, -41, 48, -39, 83, 122, 88, -70, 27, -69, 55, 85, -18]
    Algorithm: [PBEWITHSHA1ANDRC2_40]  Max key length: [128]
    Result Encrypted: [50, 66, -63, -84, -123, 13, -113, 77, 67, 80, -66, -70, 90, 23, -53, 13]
    Interesting.
    So I'd still like to know what is happening here especially in light of the bug highlighted in thread 5129170 - if I use PBEWithSHA1AndDESede without unlimited strength jurisdiction files what encryption strength am I actually getting? No real idea. Research is required.
    >
    I know that most people won't care about this but I work in a monolithic organisation where 1.4 is still the default JRE. There may be other unfortunates out there in similarly constrained environments so this might still be of some benefit.:-)

  • Cisco Aironet 1250 basic setup questions

    Hi,
    I'm going to be three Aironet 1250's within a building.  There is not going to be a wireless controller, the AP's are all going to be standalone.  I am going to set them all up the same, with WPA2 wireless encryption.  My question is, is it important/beneficial to add configuration to the AP's so they are aware of each other (for roaming perhaps)?  If so, what is this technology called and could someone point me towards a section of a guide that could illustrate this?
    Or am I good with just configuring 3 standalone AP's as is.
    Any other pointers are welcome.
    Thanks!

    Hi,
    On Autonomous APs you can use Wireless Domain Services (WDS) technology which allows the APs to be aware of each other and make roaming faster withouth needing full authentication each time the clients move from one AP to the other.
    Basically you configure the same SSIDs on all 3 APs, then only one will act as primary WDS.
    The primary WDS will be responsible for the communication between the clients and the RADIUS server, and the infrastructure APs will simply bypass all the info from the clients to the primary WDS and vice-versa.
    Evenually you can configure standby WDS with different priorities so that in case of the primary WDS goes down, another AP assumes the role of active WDS.
    Configuration Example via AP GUI:
    http://www.cisco.com/en/US/products/hw/wireless/ps458/products_configuration_example09186a008059a559.shtml.
    In attach you can find an example of config using WDS and Infra APs. You will find example to configure open ssid, psk, and eap using WPA2.
    3 diferent vlans.
    Clients authenticate against External RADIUS Server and APs authenticate on local RADIUS for WDS.
    HTH,
    Tiago

  • Airport Extreme: Native Firewall/Encryption question

    The Airport Exteme offers a built-in firewall and supports industry-standard encryption technologies including WPA/WPA2 and 128-bit WEP.  I plan to install a NAS device onto my home network (hard wired to my AE) for the purposes of RAID 0, mirrored backups of the multiple computers on my personal network.
    Question:  Given the native fireway/encryption built into the AE, would I still need to encrypt my backups to my NAS?  Can I consider this technology 'safe' enough from any outside hacker?  Please advise. 
    Thanks!

    Question:  Given the native fireway/encryption built into the AE, would I still need to encrypt my backups to my NAS?  Can I consider this technology 'safe' enough from any outside hacker?
    As far as unwanted access over wireless, the AirPort offers similar levels of protection as most consumer or commercial routers. Using WPA2 with a strong encryption key and changing that key every 60-90 days would be the best that you can expect for current technology.
    As far as access via the AirPort's WAN port that is somewhat a different matter. The Apple routers offer only a basic NAT-type firewall. Effective, but not the most secure method that can be had today. If you are concerned about potential unwanted access from the Internet, you may want to consider routers that offer multiple firewall options, like stateful packet inspection, or provides additional "layers of protection," like an Intrusion Protection System. Note; however, implementing most of these additional methods can significantly reduce the WAN-to-LAN throughput as each packet of data is inspected multiple times before it can pass through.

  • Few basic SRM questions .......

    I recently completed the SRM training from SAP and I have few basic questions and need help. Full points will be rewarded.
    These are my questions and it is based on SRM 5.0 Classic Scenario with R/3 backend
    1. Invoice  & confirmation transferred to R/3 via  ALE ? .  All other documents are transferred to R/3 via RFC?
    2. Based on the configuration, if the material is available in the backend then reservation will be created. Other wise PO will be created.  For text items, PR will be created.
         a. Who (purchaser) will process the PR in R/3 and how it is processed?.
         b. Who (purchaser?) will process the reservation in R/3 and how it is
             processed?. Assume no sourcing is setup in this case and No MRP run.
    3. How the vendor is linked to the Material or product category in SRM?. During the vendor replication from R/3, vendor and material/prod category link is automatically maintained?
    4. How the vendor is linked to a specific purchasing org/group? Is it based on the prod category assigned in the org structure for each purchasing org or purchasing group?
    5. How to do delta prod category replication?
    6. How to do Delta Material Replication?.
    7. Contracts and vendor list:-
        In our SAP training we created these from the browser. But in the actual
        implementation how do we create this?. Is it always from the browser?
    8. Direct Material and Plan driven Procurement.
       Can we use catalog items as direct material?. Just for example - > What
       about ‘Car Batteries’ that  is directly used in production and has the inventory
       also. But we are using electronic catalog for procuring this item. Is it possible to
       order this as direct material?
    9. How to replicate Plant. How to use DNL_PLNT?. Is BBP_LOCATIONS_GET_ALL will replicate all the PLANT's and its locations from the R/3 backend?
    10. In the HR system, which transaction we can view the org structure?

    Hi
    Answers to your questions ->
    1. http://help.sap.com/saphelp_srm50/helpdata/en/e9/d0fc3729b5db48e10000009b38f842/frameset.htm
    http://help.sap.com/saphelp_srm50/helpdata/en/74/ec7b3c91c1eb1ee10000000a114084/frameset.htm
    http://help.sap.com/saphelp_srm50/helpdata/en/55/d77c3c3fd53228e10000000a114084/frameset.htm
    http://help.sap.com/saphelp_srm50/helpdata/en/77/e97b3c91c1eb1ee10000000a114084/frameset.htm
    2.  Provided the necessary role is given to the Purchaser (Buyer) in the System.
    a) Yes
    b) Yes
    3. http://help.sap.com/saphelp_srm50/helpdata/en/e5/f5e938b4ece075e10000000a114084/frameset.htm
    http://help.sap.com/saphelp_srm50/helpdata/en/70/00c73a584611d6b21700508b5d5211/frameset.htm
    4. http://help.sap.com/saphelp_srm50/helpdata/en/2c/867d3ca2156c6ae10000000a114084/frameset.htm
    The vendor ORG has to be seperately created through trasaction PPOCV_BBP before replicating the Vendors from the R/3 System.
    http://help.sap.com/saphelp_srm50/helpdata/en/70/00c73a584611d6b21700508b5d5211/frameset.htm
    5. http://help.sap.com/saphelp_srm50/helpdata/en/42/d3b671ba67136fe10000000a1553f7/frameset.htm
    6.  http://help.sap.com/saphelp_srm50/helpdata/en/29/d586398dcfd74fe10000000a11402f/frameset.htm
    http://help.sap.com/saphelp_srm50/helpdata/en/05/9b8139437eac2ae10000000a11402f/frameset.htm
    http://help.sap.com/saphelp_srm50/helpdata/en/f5/b4bcdac7c40c4dba53e3695d18236c/frameset.htm
    7. Yes, from Browser it's quite easy and is quite user-friendly.
    8.
    http://help.sap.com/saphelp_srm50/helpdata/en/d3/4b9c3b122efc6ee10000000a114084/frameset.htm
    http://help.sap.com/saphelp_srm50/helpdata/en/18/db183d30805c59e10000000a114084/frameset.htm
    9.
    You can use the following three routines to download locations from the backend system and store them as business partners in SAP Enterprise Buyer.
    BBP_LOCATIONS_GET_ALL
    To get all the location numbers from each backend system that is connected
    BBP_LOCATIONS_GET_FROM_SYSTEM
    To get all the location numbers from one particular backend system
    BBP_LOCATIONS_GET_SELECTED
    To get selected locations
    Previously, locations were not given business partner numbers in SAP Enterprise Buyer. If you are configuring an upgrade, you can use routines BBP_LOCATIONS_GET_FROM_SYSTEM and BBP_LOCATIONS_GET_SELECTED to check that the following conversions have been made:
    ·        Conversion of user favorites
    ·        Conversion of user attributes
    ·        Conversion of old documents
    Routine BBP_LOCATIONS_GET_ALL checks these automatically.
    Once you have run the routines, the location data is available in the SAP Enterprise Buyer system. Table BBP_LOCMAP contains the mapping information (in other words, which business partner number corresponds to which location in which backend system).
    For more information, see SAP Note 563180 Locations for EBP 4.0 – plant replication
    http://help.sap.com/saphelp_srm50/helpdata/en/62/fb7d3cb7f58910e10000000a114084/frameset.htm
    http://help.sap.com/saphelp_srm50/helpdata/en/77/e97b3c91c1eb1ee10000000a114084/frameset.htm
    10. PPOCA_BBP(Create) / PPOMA_BBP(Change) / PPOSA_BBP(Display).
    Regards
    - Atul

  • Credit Card Encryption Question

    Question from my customer (on EBS 11i):
    I have a question about the Visa VCF 4 Transaction Loader. We are working
    on automating this process and have installed a secured storage area to
    hold the file. It is my understanding that the bank is going to send us an
    encrypted file.
    Is the Visa VCF 4 Transaction Loader can process a PGP encrypted file?
    Your help is appreciated - thanks!

    The answer is that you do not store the ciphertext in the card number field. You create a reference number which is 25 bytes long that substitutes for the card number, and is stored in the card number field. The reference number, in turn, is also stored in a custom table with the ciphertext. The reference number is a unique key to that table.
    You then create translation routines to encrypt/decrypt the ciphertext based on the reference number that you stored. These routines would be passed the card number field, which contains the reference number. The input parameter list for these routines are standard. The routines that do the encryption/decryption are configured to be called at the appropriate times.
    - Brendan

  • Basic swing question

    I just started looking at swing yesterday because I want to provide a GUI to replace a command line utility we use. I've basically finished it but have a quick question about form - I will get some literature later but would like to get a feel from the people here. If you have a JFrame with a few JPanels each which contain some other components, what is the best practice for variable declaration? Should I just declare the variables locally or should I make them instance variables? The reason I ask is that I have a button that submits a message but that message is dependant on check boxes, etc. from from the frame. If I declare them at the method level I then have to start passing them around whereas if I declare them as instance variables I can access them very easily BUT this may not be good form.
    For example:
    my class is SendMessageToo so in the main method I have a line like:
    final SendMessageToo smt = new SendMessageToo();
    now all the instance variables that I have can be accessed my the methods simply using smt.methodOne(), etc. Does that seem OK or is it just pure crap? :-)

    Thanks, that was something that crossed my mind before I just made eveything an instance variable. It was during that process that I thought, do these all need to be instance variables? Then I thought, SHOULD they all be instance variables. At that point my brain imploded so I came here. :)

  • Switching to mac, basic noob questions

    Hi, I'm new to this. I have some xmas and bday money and i need a laptop. I have two desktop PC's (one XP and one Vista) and have had PC's all my life. I feel like switching it up and giving macs a try, it would make my purchase more fun. I've done some research and i think i want the black macbook with 2 gigs of ram. Here are some questions i need answered before going much further.
    1.) I notice that every 6 months new macbook models come out. I also noticed that the last three (at least) have been very similar in hardware. Is it common that the new macbook probably coming out in the summer will be unvieled at macworld? If there is a big difference i might wait, i don't want to get the last model in a product line. Id the difference is another slight processor speed increase i won't bother waiting. As far as i know this isn't available information yet, so i'm just looking for a 'usually they do/don't' type of response.
    2.) Is the apple care support really all it's cracked up to be? I'm not about to let my purchase go to waste on me, but at the same time if the support is rarely needed i might not bother. I'm a student and don't have too much money to blow if it's usually a waste. I generally like getting the warrenty for my things, i'm just looking for a more experienced opinion.
    3.) Are the Apple stores in the Best Buys independent from Best Buy, or are they the same? I would like to put the 900 or so dollars i can down on this and put the rest of my best buy card to pay off over the next few months.
    4.) If they're the same, does anyone know if the apple computers fall under best buy's "no interest for blank months of purchases over black?"
    thanks!

    Hi Thomes08!
    Welcome to Apple Discussions.
    It sounds like you're in the process of making an excellent decision to go with a 2.2GHz "BlackBook" and up your RAM to 2.0GB. I think you'll be extremely pleased with your purchase.
    1.) Unfortunately, these forums are not designed to be used as a means of product speculation. Matter of fact, it's against the Terms of Use (of these discussion pages) to speculate on upcoming product releases. We'll have to wait the 2-weeks for Mac World to see what comes out, there's no way to have any insight into the excitement that Steve's Keynote brings to technology.
    2.) I'm a big fan of AppleCare, mostly because it ensures peace of mind over the reliability of my product for the 3-years that it'll serve as my primary machine. While, I've had multiple Macs last beyond 3-years, I also typically swap it out for the "latest and greatest." Especially with a portable and your student discount. The cost of APP for a MacBook is a relatively "no brainer" especially if you consider the cost (for parts & labor) of even the most basic repairs if the machine falls out of warranty.
    3. I'm not entirely familiar with the logistics of the agreement that Apple has with Best Buy, so I'd rather not speculate. I do know that Apple also offers financing options through BML (Bill Me Later) and Juniper Bank, but I'm unfamiliar with the specifics of a split payment. Buying an Apple product through Best Buy still entitles you to all the same "benefits" of ownership, so there's no advantage (or disadvantage) to shop @ Best Buy.

  • 4 basic java questions..

    ok so I already learned Java last year (in grade 11), but my teacher didn't really teach anything, we learnt everything by ourselves from the API... so theres a lot of things I actually don't understand, but for now I want to ask 4 basic questions:
    1. What does static mean?
    2. Why would u "final" a constant variable? ie. If you have a variable called SIZE which is set to 5, so if u want it to be a constant, just never change its value. But what does the keyword final do to it?
    3. What's super? I see it sometimes, and my teacher showed us in the applet exampls to use super.paint(g) or somethign like that for the paint method, but I never use that because I noticed it works fine without it..
    4. Whats a question mark? I saw a game that was made in java and it had a lot of places where it had a question mark , which was part of the syntax. For example,
    int j1 = i != 0 ? i - 1 : 199;
    OR
    JUMPVEL = (fSuperSlime) ? 65 : 31;
    I really don't understand these lines...
    feel free to answer any of these questions...

    wow cool...thanks.. that question mark thing is nice
    saves a few lines..
    now, about super, so u mean u can access the parent
    class's variables?Variables, methods, constructors, if the access level is such that it's allowed.
    This will be covered in any tutorial or text though.
    Sun's basic Java tutorial
    Sun's New To Java Center. Includes an overview of what Java is, instructions for setting up Java, an intro to programming (that includes links to the above tutorial or to parts of it), quizzes, a list of resources, and info on certification and courses.
    http://javaalmanac.com. A couple dozen code examples that supplement The Java Developers Almanac.
    jGuru. A general Java resource site. Includes FAQs, forums, courses, more.
    JavaRanch. To quote the tagline on their homepage: "a friendly place for Java greenhorns." FAQs, forums (moderated, I believe), sample code, all kinds of goodies for newbies. From what I've heard, they live up to the "friendly" claim.
    Bruce Eckel's Thinking in Java (Available online.)
    Joshua Bloch's Effective Java
    Bert Bates and Kathy Sierra's Head First Java.
    James Gosling's The Java Programming Language. Gosling is
    the creator of Java. It doesn't get much more authoratative than this.

  • Basic interview questions in abap ddic

    can any one pls give me the link for basic ddic interview questions

    Check these threads.
    need real time interview questions on data dictionary
    The specified item was not found.
    data dictionanry

Maybe you are looking for