OCP Oracle Certified Professional Java SE 11 Programmer II Study Guide: Exam 1Z0-816 and Exam 1Z0-817 1st Edition, Kindle Edition
Use the Amazon App to scan ISBNs and compare prices.
Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required. Learn more
Read instantly on your browser with Kindle Cloud Reader.
Using your mobile phone camera - scan the code below and download the Kindle app.
Enter your mobile phone or email address
By pressing "Send link," you agree to Amazon's Conditions of Use.
You consent to receive an automated text message from or on behalf of Amazon about the Kindle App at your mobile number above. Consent is not a condition of any purchase. Message & data rates may apply.
From the Publisher
|816 Code||1Z0-816 Exam Topics||819 Code||1Z0-819 Exam Topics|
|Java Fundamentals||1.1||Create and use final classes||3.5||Create and use subclasses and superclasses, including abstract classes|
|Java Fundamentals||1.2||Create and use inner, nested and anonymous classes||3.1||Declare and instantiate Java objects including nested class objects, and explain objects' lifecycles (including creation, dereferencing by reassignment, and garbage collection)|
|Java Fundamentals||1.3||Create and use enumerations||3.8||Create and use enumerations|
|Exception Handling and Assertions||2.1||Use the try-with-resources construct||4.1||Handle exceptions using try/catch/finally clauses, try-with-resource, and multi-catch statements|
|Exception Handling and Assertions||2.2||Create and use custom exception classes||4.2||Create and use custom exceptions|
|Exception Handling and Assertions||2.3||Test invariants by using assertions||NA||Out of scope|
|Java Interfaces||3.1||Create and use interfaces with default methods||3.7||Create and use interfaces, identify functional interfaces, and utilize private, static, and default methods|
|Java Interfaces||3.2||Create and use interfaces with private methods||3.7||Create and use interfaces, identify functional interfaces, and utilize private, static, and default methods|
|Generics and Collections||4.1||Use wrapper classes, autoboxing and autounboxing||5.1||Use generics, including wildcards|
|Generics and Collections||4.2||Create and use generic classes, methods with diamond notation and wildcards||5.1||Use generics, including wildcards|
|Generics and Collections||4.3||Describe the Collections Framework adn use key collection interfaces||5.2||Use a Java array and List, Set, Map and Deque collections, including convenience methods|
|Generics and Collections||4.4||Use Comparator and Comparable interfaces||5.3||Sort collections and arrays using Comparator and Comparable interfaces|
|Generics and Collections||4.5||Create and use convenience methods for collections||5.2||Generics and Collections|
|Functional Interface adn Lambda Expressions||5.1||Define and write functional interfaces||3.7||Create and use interfaces, identify functional interfaces, and utilize private, static, and default methods|
|Functional Interface adn Lambda Expressions||5.2||Create and use lambda expressions including statement lambdas, local-variable for lambda parameters||1.3, 6.1||Use local variable type inference, including as lambda parameters; Implement functional interfaces using lambda expressions, including interfaces from the java.util.function package|
|Java Stream API||7.1||Use interfaces from the java.util.function package||6.2||Use Java Streams to filter, transform and process data|
|Java Stream API||7.2||Use core functional interfaces including Predicate, Consumer, Function and Supplier||6.1||Implement functional interfaces using lambda expressions, including interfaces from the java.util.function package|
|Java Stream API||7.3||Use primitive and binary variations of base interfaces of java.util.function package||6.1||Implement functional interfaces using lambda expressions, including interfaces from the java.util.function package|
|Lambda Operations on Streams||8.1||Extract stream data using map, peek and flatMap methods||6.2||Use Java Streams to filter, transform and process data|
|Lambda Operations on Streams||8.2||Search stream data using search findFirst, findAny, anyMatch, allMatch and noneMatch methods||6.2||Use Java Streams to filter, transform and process data|
|Lambda Operations on Streams||8.3||Use the Optional class||6.2||Use Java Streams to filter, transform and process data|
|Lambda Operations on Streams||8.4||Perform calculations using count, max, min, average and sum stream operations||6.2||Use Java Streams to filter, transform and process data|
|Lambda Operations on Streams||8.5||Sort a collection using lambda expressions||6.2||Use Java Streams to filter, transform and process data|
|Lambda Operations on Streams||8.6||Use Collectors with streams, including the groupingBy and partitioningBy operations||6.3||Perform decomposition and reduction, including grouping and partitioning on sequential and parallel streams|
|Migration to a Modular Application||9.1||Migrate the application developed using a Java version prior to SE 9 to SE 11 including top-down and bottom-up migration, splitting a Java SE 8 application into modules for migration||7.2||Declare, use, and expose modules, including the use of services|
|Migration to a Modular Application||9.2||Use jdeps to determine dependencies and identify ways to address the cyclic dependencies||7.2||Declare, use, and expose modules, including the use of services|
|Services in Modular Application||10.1||Describe the components of Services including directives||7.2||Declare, use, and expose modules, including the use of services|
|Migration to a Modular Application||10.2||Design a service type, load services using ServiceLoader, check for dependencies of the services including consumer and provider modules||7.2||Declare, use, and expose modules, including the use of services|
|Concurrency||11.1||Create worker threads using Runnable, Callable and use an ExecutorService to concurrently execute tasks||8.1||Create worker threads using Runnable and Callable, and manage concurrency using an ExecutorService and java.util.concurrent API|
|Concurrency||11.2||Use java.util.concurrent collections and classes including CyclicBarrier and CopyOnWriteArrayList||8.2||Develop thread-safe code, using different lockingmechanisms and java.util.concurrent API|
|Concurrency||11.3||Write thread-safe code||8.2||Develop thread-safe code, using different lockingmechanisms and java.util.concurrent API|
|Concurrency||11.4||Identify threading problems such as deadlocks and livelocks||8.2||Develop thread-safe code, using different lockingmechanisms and java.util.concurrent API|
|Parallel Streams||12.1||Develop code that uses parallel streams||6.3||Perform decomposition and reduction, including grouping and partitioning on sequential and parallel streams|
|Parallel Streams||12.2||Implement decomposition and reduction with streams||6.3||Perform decomposition and reduction, including grouping and partitioning on sequential and parallel streams|
|I/O (Fundamentals and NIO2)||13.1||Read data from and write console and file data using I/O streams||9.1||Read and write console and file data using I/O streams|
|I/O (Fundamentals and NIO2)||13.2||Use I/O streams to read and write files||9.1||Read and write console and file data using I/O streams|
|I/O (Fundamentals and NIO2)||13.3||Read and write objects by using serialization||9.2||Implement serialization and deserialization techniques on Java objects|
|I/O (Fundamentals and NIO2)||13.4||Use the Path interface to operate on file and directory paths||9.3||Handle file system objects using java.nio.file API|
|I/O (Fundamentals and NIO2)||13.5||Use the Files class to check, delete, copy or move a file or directory||9.3||Handle file system objects using java.nio.file API|
|I/O (Fundamentals and NIO2)||13.6||Use the Stream API with Files||9.3||Handle file system objects using java.nio.file API|
|Secure Coding in Java SE Application||14.1||Prevent Denial of Service in Java applications||10.1||Develop code that mitigates security threats such as denial of service, code injection, input validation and ensure data integrity|
|Secure Coding in Java SE Application||14.2||Secure confidential information in Java application||10.1||Develop code that mitigates security threats such as denial of service, code injection, input validation and ensure data integrity|
|Secure Coding in Java SE Application||14.3||Implement Data integrity guidelines - injections and inclusion and input validation||10.1||Develop code that mitigates security threats such as denial of service, code injection, input validation and ensure data integrity|
|Secure Coding in Java SE Application||14.4||Prevent external attack of the code by limiting Accessibility and Extensibility, properly handling input validation, and mutability||10.1|
|Secure Coding in Java SE Application||14.5||Securely constructing sensitive objects||10.2||Secure resource access including filesystems, manage policies and execute privileged code|
|Secure Coding in Java SE Application||14.6||Secure Serialization and Deserialization||10.2||Secure resource access including filesystems, manage policies and execute privileged code|
|Database Applications with JDBC||15.1, 15.2||Connect to databases using JDBC URLs and DriverManager; Use PreparedStatement to perform CRUD operations||11.1||Connect to and perform database SQL operations, process query results using JDBC API|
|Database Applications with JDBC||15.3||Use PreparedStatement and CallableStatement APIs to perform database operations||11.1||Connect to and perform database SQL operations, process query results using JDBC API; CallableStatement out of scope|
|Localization||16.1, 16.2, 16.3||Use the Locale class; Use the resource bundles; Format messages, date, and numbers with Java||12.1||Implement Localization using Locale, resource bundles, and Java APIs to parse and format messages, dates, and numbers|
|Annotations||17.1, 17.2, 17.3, 17.4||Describe the purpose of annotations and typical usage patterns; Apply annotations of classes to methods; Describe commonly used annotations in the JDK; Declare custom annotations||13.1||Create, apply, and process annotations|
From the Inside Flap
The new study guide for the latest Oracle Certified Java SE 11 Programmer II and Upgrade exams.
The OCP Oracle Certified Professional Java SE 11 Programmer II Study Guide??is essential for anyone preparing for this challenging exam. Oracle has updated its Java Programmer certification track for OCP certificationthis must-have guide covers 100% of the latest Exam 1Z0-816 objectives PLUS an appendix custom tailored for those taking the 1Z0-817 Upgrade Exam.
In-depth chapters provide clear and accurate coverage of the knowledge and skills needed to be thoroughly prepared on exam day. This one-stop resource includes access to the Sybex online interactive learning environment and test bank, featuring a self-assessment test, chapter quizzes, bonus practice exam questions, electronic flashcards, a searchable glossary of key terms, and more.
Coverage of 100% of all exam objectives in this Study Guide means you'll be ready for:
- Class Design
- Functional Programming
- Secure Coding
- Advanced strings and Localization
- Functional Interface and Lambda Expressions
- Java Stream API
- Lambda Operations on Streams
- Database Applications with JDBC
- Threads, Concurrency, I/O, and NIO.2
ABOUT THE OCP PROGRAM
The Oracle Certified Professional (OCP)??credential validates a high level of skill and knowledge in a specific area of Oracle technology, such as Java SE and Oracle Cloud Infrastructure. OCP certification is regularly used by IT managers as a benchmark to evaluate the qualifications of employees and job candidates. Visit education.oracle.com/certification for more information.
Interactive learning environment
Take your exam prep to the next level with Sybex's superior interactive online study tools. To access our learning environment, simply visit http://www.wiley.com/go/ sybextestprep, type in your unique PIN, and instantly gain one year of FREE access after activation to:
- Interactive test bank with 2 practice exams. Practice exams help you identify areas where further review is needed. Get more than 90% of the answers correct, and you're ready to take the certification exam.
- More than 250 electronic flashcards to reinforce learning and last-minute prep before the exam
- Comprehensive glossary in PDF format gives you instant access to the key terms so you are fully prepared
From the Back Cover
- 2 custom practice exams
- More than 250 electronic flashcards
- Searchable key term glossary
- ASIN : B08C9XVGV5
- Publisher : Sybex; 1st edition (June 30, 2020)
- Publication date : June 30, 2020
- Language : English
- File size : 7182 KB
- Text-to-Speech : Enabled
- Screen Reader : Supported
- Enhanced typesetting : Enabled
- X-Ray : Not Enabled
- Word Wise : Not Enabled
- Print length : 748 pages
- Lending : Enabled
- Best Sellers Rank: #570,897 in Kindle Store (See Top 100 in Kindle Store)
- Customer Reviews:
About the authors
Top reviews from the United States
There was a problem filtering reviews right now. Please try again later.
Top reviews from other countries
The result is a very choppy book with massive gaps. There are times in the book where it literally just tells you how to code something, with no explanation of why, or how it would be useful. A great example of this is module services. The text spends 5 pages describing how to create a module service, but never actually says where something like this would actually be useful.
Other chapters will use concepts that aren't introduced until pages or chapters later but expect you to understand how the code runs. A great example of this is in the concurrency chapter (one of the most difficult in the exam). There are a number of examples using Future<T> near the beginning that are imperative to understand, but the concept of futures isn't introduced until half way through. So I found myself going forward and back A LOT through this book making actually learning the concepts very difficult.
Other chapters just completely skip over very important parts. The java security chapter is very short in the book, and skips over basically everything from the Oracle secure coding guide (https://www.oracle.com/java/technologies/javase/seccodeguide.html) which 90% of the security questions come from. Another example of this in the security chapter is AccessController and its doPrivileged methods. This is never mentioned but pops up very frequently.
I get that it's on the reader to find supplemental material to reinforce the concepts, but in many cases I would go learn the full chapters worth of material elsewhere (java docs) just because I never knew what important parts this book decided to leave out.
Overall, it’s better than nothing but subpar to barely average at best.
Reviewed in Brazil on September 6, 2021