Acerca de este Curso
4.7
1,168 calificaciones
208 revisiones
100 % en línea

100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.
Fechas límite flexibles

Fechas límite flexibles

Restablece las fechas límite en función de tus horarios.
Nivel principiante

Nivel principiante

Horas para completar

Aprox. 24 horas para completar

Sugerido: 4 weeks of study, 4-8 hours/week...
Idiomas disponibles

Inglés (English)

Subtítulos: Inglés (English), Coreano

Habilidades que obtendrás

Data StructureCryptographyHash TableJava Programming
100 % en línea

100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.
Fechas límite flexibles

Fechas límite flexibles

Restablece las fechas límite en función de tus horarios.
Nivel principiante

Nivel principiante

Horas para completar

Aprox. 24 horas para completar

Sugerido: 4 weeks of study, 4-8 hours/week...
Idiomas disponibles

Inglés (English)

Subtítulos: Inglés (English), Coreano

Programa - Qué aprenderás en este curso

Semana
1
Horas para completar
13 minutos para completar

Welcome

Welcome to “Java Programming: Arrays, Lists, and Structured Data”! We are excited that you are starting our course to learn how to write programs in Java, one of the most popular programming languages in the world. In this introductory module, you will hear an overview of this course and be introduced to the supporting resources available....
Reading
1 video (Total 3 minutos), 1 reading
Video1 video
Reading1 lectura
Programming Resources10m
Horas para completar
4 horas para completar

Cryptography: Keeping Information Secret

In this module, you will learn about the basics of cryptography, the science of keeping information private and secure. You will learn about simpler cryptographic systems, which were used from the Roman Empire through the early 1900s. You will learn how to implement these ciphers, as well as how to break them. To solve these problems, you will work more with processing Strings, but also learn about arrays—a way to store an indexable sequence of elements. You will be able to: (1) combine Strings using concatenation; (2) build Strings within a Java program using StringBuilder; (3) use arrays to store and manipulate collections of data; (4) refactor your programs for improved organization using object-oriented principles; (5) and practice effective algorithm design....
Reading
21 videos (Total 111 minutos), 5 readings, 4 quizzes
Video21 videos
Introduction5m
Creating and Manipulating Strings5m
Counting Loops9m
Character Class5m
Developing an Algorithm5m
Translating into Code4m
Testing and Debugging1m
Summary40s
Introduction5m
Arrays9m
Random Numbers and Arrays11m
Counting with Arrays10m
Developing an Algorithm5m
Summary3m
Introduction2m
Rewriting with Encapsulation3m
Fields6m
Visibility4m
Constructors3m
Summary57s
Reading5 lecturas
Module Learning Outcomes / Resources10m
Programming Exercise: Implementing the Caesar Cipher10m
Programming Exercise: Breaking the Caesar Cipher10m
Programming Exercise: Object Oriented Caesar Cipher10m
End of Module Survey10m
Quiz4 ejercicios de práctica
Implementing the Caesar Cipher12m
Breaking the Caesar Cipher22m
Object Oriented Caesar Cipher8m
Cryptography28m
Semana
2
Horas para completar
3 horas para completar

GladLibs: Stories from Templates

After completing this module, you will be able (1) to program a word frequency counter to analyze any input text file, (2) to select and substitute words from a list into a document template using both ArrayList and HashMap, (3) to create new lists to use in templates, (4) to recognize brittle code, and (5) to improve code with flexible, object-oriented design. You will gain these skills in the framework of developing a randomly generated story that we call GladLibs. You may discover that bald lions change peoples’ lives, or that fluffy dinosaurs get things done in a jiffy. We hope you have fun developing your Java skills this week!...
Reading
13 videos (Total 72 minutos), 4 readings, 3 quizzes
Video13 videos
High-level Design Concepts5m
ArrayList6m
ArrayList for Unique Words7m
ArrayList Advantages and Issues7m
Summary3m
Introduction7m
Brittle Code3m
Adding New Labels4m
HashMap7m
HashMap for Unique Words4m
HashMap for Flexible Design7m
Summary3m
Reading4 lecturas
Module Learning Outcomes / Resources10m
Programming Exercise: Telling a Random Story10m
Programming Exercise: Using GladLibs10m
Programming Exercise: Improving GladLibs10m
Quiz3 ejercicios de práctica
Telling a Random Story12m
Using and Improving GladLibs20m
GladLibs38m
Semana
3
Horas para completar
2 horas para completar

Web Server Logs: From Logs to Visits

In this module, you will learn about how web server logs store information about visitors to a website, and you will write programs to access information like user IP address, date and time of access, and more. Using Java programs you write in this module, you will be able (1) to read information from a web server log, (2) to count the number of unique visitors to your website, and (3) to count the number of times each visitor uses your website....
Reading
15 videos (Total 51 minutos), 4 readings, 4 quizzes
Video15 videos
Understanding Log Files6m
LogEntry Class with toString5m
Parsing Log Files3m
Summary45s
Introduction1m
Developing an Algorithm3m
Translating to Code3m
Equality4m
Summary43s
Introduction1m
Developing an Algorithm4m
Translating to Code11m
HashMap for Unique IPs1m
Summary50s
Reading4 lecturas
Module Learning Outcomes / Resources10m
Programming Exercise: Reading Log Files10m
Programming Exercise: Finding Unique IP Addresses10m
Programming Exercise: Counting Website Visits10m
Quiz4 ejercicios de práctica
Reading Log Files6m
Finding Unique IP Addresses8m
Counting Website Visits8m
Web Server Logs20m
Semana
4
Horas para completar
2 horas para completar

MiniProject: Vigenère Cipher

In this module, you will develop a program to break the Vigenère Cipher, a more complex version of the Caesar Cipher. You will improve your program in three stages: first decrypting messages where you know the language and key length, then adding the capability to handle messages with unknown key length, then extending the program to handle messages in a range of possible languages. Through this project, you will be able (1) to effectively use HashSet and HashMap, (2) to expand an algorithm from solving a simpler problem to handle broader, more complex problems, and (3) to design and modify program code involving a more complex collection of classes, methods, and data. ...
Reading
4 videos (Total 17 minutos), 5 readings, 3 quizzes
Video4 videos
Known Language and Key Length5m
Unknown Key Length4m
Unknown Language4m
Reading5 lecturas
Module Resources10m
Programming Exercise: Known Language and Key Length10m
Programming Exercise: Unknown Key Length10m
Programming Exercise: Unknown Language, Unknown Key Length10m
Extend Your Program10m
Quiz3 ejercicios de práctica
Known Language and Key Length4m
Unknown Key Length8m
Breaking the Vigenère Cipher14m
4.7
208 revisionesChevron Right
Dirección de la carrera

58%

comenzó una nueva carrera después de completar estos cursos
Beneficio de la carrera

41%

consiguió un beneficio tangible en su carrera profesional gracias a este curso

Principales revisiones

por CTJul 20th 2018

The course was pretty challenging (and occasionally frustrating) for a novice programmer, but doable.\n\nI enjoyed the course, and came away with a greater understanding of computers and programming.

por GBMar 30th 2017

Good and practical training approach to solve real worlds problems. Assignments and quizzes are quite challenging and interesting. Greatly motivates us towards programming and problem solving skills.

Instructores

Avatar

Andrew D. Hilton

Associate Professor of the Practice
Electrical and Computer Engineering
Avatar

Robert Duvall

Lecturer
Computer Science
Avatar

Owen Astrachan

Professor of the Practice
Computer Science
Avatar

Susan H. Rodger

Professor of the Practice
Computer Science

Acerca de Duke University

Duke University has about 13,000 undergraduate and graduate students and a world-class faculty helping to expand the frontiers of knowledge. The university has a strong commitment to applying knowledge in service to society, both near its North Carolina campus and around the world....

Acerca del programa especializado Object Oriented Programming in Java

This Specialization is for aspiring software developers with some programming experience in at least one other programming language (e.g., Python, C, JavaScript, etc.) who want to be able to solve more complex problems through objected-oriented design with Java. In addition to learning Java, you will gain experience with two Java development environments (BlueJ and Eclipse), learn how to program with graphical user interfaces, and learn how to design programs capable of managing large amounts of data. These software engineering skills are broadly applicable across wide array of industries....
Object Oriented Programming in Java

Preguntas Frecuentes

  • Una vez que te inscribes para obtener un Certificado, tendrás acceso a todos los videos, cuestionarios y tareas de programación (si corresponde). Las tareas calificadas por compañeros solo pueden enviarse y revisarse una vez que haya comenzado tu sesión. Si eliges explorar el curso sin comprarlo, es posible que no puedas acceder a determinadas tareas.

  • Cuando te inscribes en un curso, obtienes acceso a todos los cursos que forman parte del Programa especializado y te darán un Certificado cuando completes el trabajo. Se añadirá tu Certificado electrónico a la página Logros. Desde allí, puedes imprimir tu Certificado o añadirlo a tu perfil de LinkedIn. Si solo quieres leer y visualizar el contenido del curso, puedes auditar el curso sin costo.

  • No. Completion of a Coursera course does not earn you academic credit from Duke; therefore, Duke is not able to provide you with a university transcript. However, your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.

¿Tienes más preguntas? Visita el Centro de Ayuda al Alumno.