Solved

Java Source Code Library

Posted on 2007-11-14
9
1,489 Views
Last Modified: 2012-05-05
Hi,
Can anyone suggest a good link for Java classes.  I am looking for code like:

- Loading/Saving to File
- Sorting
- Merging

Just the standard stuff which should be plug and play when developing a standalone Java application

Regards
Angus
0
Comment
Question by:amacfarl
  • 3
  • 2
  • 2
  • +2
9 Comments
 
LVL 8

Expert Comment

by:mnrz
ID: 20279537
0
 
LVL 17

Expert Comment

by:contactkarthi
ID: 20279741
thes sites jave pueces of code on how to use certain classes in java

http://www.java2s.com/
http://www.exampledepot.com/
0
 
LVL 23

Accepted Solution

by:
Siva Prasanna Kumar earned 500 total points
ID: 20279795
Use the following sites they are really excellent with lost of examples.

http://www.java2s.com/
www.exampledepot.com/

0
 
LVL 23

Expert Comment

by:Siva Prasanna Kumar
ID: 20279823
Great :) I am sorry contactkarthi: It was just matter of minutes :)
0
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

 
LVL 9

Expert Comment

by:Nick_72
ID: 20281010
You could try this one too

<a href="http://www.javadb.com" target="_blank">www.javadb.com</a>
0
 
LVL 9

Expert Comment

by:ysnky
ID: 20283800
0
 
LVL 9

Expert Comment

by:ysnky
ID: 20305638
as shivaspk said "It was just matter of minutes" you must accept contactkarthi's solution if you  were satisfied with the links.

but for me, it should be splitted.
0
 
LVL 17

Expert Comment

by:contactkarthi
ID: 20306026
:) atleast a split would have been nice.. np
0
 
LVL 23

Expert Comment

by:Siva Prasanna Kumar
ID: 20306190
Hi amacfarl,

Please Accept  contactkarthi comment :) He is the one who first suggested :) and minutes do matter here in EE.

Thank you.
0

Featured Post

6 Surprising Benefits of Threat Intelligence

All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
ArrayLists in ArrayLists/HashMaps? 4 40
HashMap Vs TreeMap 12 49
JAVA part two 5 41
JList custom Cell Renderer refresh 15 43
This was posted to the Netbeans forum a Feb, 2010 and I also sent it to Verisign. Who didn't help much in my struggles to get my application signed. ------------------------- Start The idea here is to target your cell phones with the correct…
Introduction This article is the last of three articles that explain why and how the Experts Exchange QA Team does test automation for our web site. This article covers our test design approach and then goes through a simple test case example, how …
Viewers will learn one way to get user input in Java. Introduce the Scanner object: Declare the variable that stores the user input: An example prompting the user for input: Methods you need to invoke in order to properly get  user input:
Viewers will learn about if statements in Java and their use The if statement: The condition required to create an if statement: Variations of if statements: An example using if statements:

747 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now