an applet with a text field and three buttons. When you press each button, make
some different text appear in the text field.
a check box to the applet created in Exercise 1, capture the event, and insert
different text into the text field.
an applet and add all the components that cause
to be called, then capture their events and display an appropriate message for
each inside a text field.
to Exercise 3 the components that can be used only with events detected by
and display appropriate messages for each inside a text field.
an applet with a
so that if the button has the focus, characters typed into it will appear in the
an application and add to the main frame all the components described in this
chapter, including menus and a dialog box.
so that the characters in
retain the original case that they were typed in, instead of automatically
being forced to upper case.
so that it uses the Java 1.1 event model.
to the manifest file shown in this chapter and run
to create a JAR file containing both
Now either download and install the BDK from Sun or use your own Beans-enabled
program builder tool and add the JAR file to your environment so you can test
the two Beans.
your own Java Bean called
contains two properties: a Boolean called “on” and an integer
called “level.” Create a manifest file, use
to package your Bean, then load it into the beanbox or into your own
Beans-enabled program builder tool so that you can test it.
so that it handles cascading menus.
Event Date: September 10, 2014
Modern mobile applications connect systems-of-engagement (mobile apps) with systems-of-record (traditional IT) to deliver new and innovative business value. But the lifecycle for development of mobile apps is also new and different. Emerging trends in mobile development call for faster delivery of incremental features, coupled with feedback from the users of the app "in the wild." This loop of continuous delivery and continuous feedback is how the best mobile …
One of the most foolproof ways for an online system to confirm, "Is it really you?" is by adding two-factor authentication. Modern two-factor solutions have evolved to support new, complex technology models that change how we use data, including cloud computing and bring-your-own-device (BYOD). However, not all two-factor authentication solutions are created equal. This guide walks through some of the key area of differentiation between two-factor authentication solutions and provides some concrete criteria …