Step 1
Make a new Android Project named Camera App
Step 2
Include the following permissions in Manifest.xml file :
Step 3
Make the Layout File activity_main.xml:
Step 4
MainActivity.java file
Initialize the request, the constants and view:
private static final int IMAGE_REQUEST_CODE=1;
private static final String IMAGE_DIRECTORY_NAME = “Hello Camera”;
private Uri fileUri;
private ImageView img;
private Button clk= (Button) findViewById(R.id.button1);
Method to capture the Image:
private void captureImage() {
Intent intent = new Intent(MediaStore.ACTION_IMAGE_CAPTURE);
fileUri = getOutputMediaFileUri(MEDIA_TYPE_IMAGE);
intent.putExtra(MediaStore.EXTRA_OUTPUT, fileUri);
startActivityForResult(intent, IMAGE_REQUEST_CODE);
}
Method OnActivityResult:
protected void onActivityResult(int requestCode, int resultCode, Intent data) {
// if the result is capturing Image
if (requestCode == CAMERA_CAPTURE_IMAGE_REQUEST_CODE) {
if (resultCode == RESULT_OK) {
previewCapturedImage();
} else if (resultCode == RESULT_CANCELED) {
Toast.makeText(getApplicationContext(),
“User cancelled image capture”, Toast.LENGTH_SHORT)
.show();
} else {
// failed to capture image
Toast.makeText(getApplicationContext(),
“Sorry! Failed to capture image”, Toast.LENGTH_SHORT)
.show();
}
}
}
Display Picture
BitmapFactory is a class for images which is used to display the picture on the screen.
private void previewCapturedImage() {
// bimatp factory
BitmapFactory.Options options = new BitmapFactory.Options();
options.inSampleSize = 8;
final Bitmap bitmap = BitmapFactory.decodeFile(fileUri.getPath(),
options);
imgPreview.setImageBitmap(bitmap);
}


- In just 2 mins you will get a response
- Your idea is 100% protected by our Non Disclosure Agreement.
Key takeaways: Network perimeter controls are necessary but insufficient. Access architecture must be rebuilt around identity as the primary security layer. Static access models, identity silos, MFA dependency, and ungoverned machine identities grow more expensive with every delay. APRA CPS 230, the Essential Eight, Privacy Act reforms, and the SOCI Act create a compliance environment…
Telehealth Business Ideas for 2026: Models, Technology Stack, and Growth Strategy
Key Takeaways Choose what people will keep using: The strongest telehealth models solve ongoing needs, not one-time problems. Integration matters more than features: Platforms that fit into real care workflows tend to scale without friction. Recurring care drives stable revenue: Chronic care, employer-led models, and guided programs create consistent usage. Partnerships accelerate growth: B2B and…
P2P Crypto Exchange Development: Architecture, Features, Cost & Enterprise Implementation Guide
Key Takeaways Enterprise P2P crypto exchanges require secure blockchain escrow orchestration, multi-chain crypto wallet infrastructure, and real-time compliance monitoring from day one. Stablecoin-powered settlement systems are reshaping cross-border transactions, OTC trading, and regional liquidity movement across digital asset ecosystems. Infrastructure decisions around custody, scalability, and compliance directly affect long-term exchange stability, transaction security, and operational…


































