The document discusses file input/output (IO) in Java. It provides an overview of key IO classes like OutputStream, InputStream, Writer, and Reader. It then describes common methods of each class for writing bytes/characters to output streams and reading bytes/characters from input streams, such as write(), read(), flush(), and close(). The document also covers bridge classes like OutputStreamWriter and InputStreamReader that allow bytes and characters to be used together.
At the end of this lecture students should be able to;
Define the declaration C strings.
Compare fixed length and variable length string.
Apply strings for functions.
Define string handling functions.
Apply taught concepts for writing programs.
This document provides an introduction to strings in C programming. It discusses that strings are arrays of characters terminated by a null character. It explains how to declare and initialize strings, and provides examples of simple string programs. It also lists common string functions like strlen(), strcpy(), and strcat(), and provides examples of using each function. The document is intended as a presentation on strings for C programming.
Function plot() is the main tool for 2D plotting in R. It allows plotting vectors x and y of equal length to generate a graph of the relationship y(x). Additional arguments can change aspects of the plot like point characters (pch), colors (col), line types (lty), titles, axes labels, and more. Multiple plots can be combined on the same graph using par(mfrow=c(n,m)) to arrange them in a grid. plot() is highly customizable and essential for data visualization in R.
The document discusses scanning (lexical analysis) in compiler construction. It covers the scanning process, regular expressions, and finite automata. The scanning process identifies tokens from source code by categorizing characters as reserved words, special symbols, or other tokens. Regular expressions are used to represent patterns of character strings and define the language of tokens. Finite automata are mathematical models for describing scanning algorithms using states, transitions, and acceptance.
Strings in C can be declared as character arrays that are terminated with a null character '\0'. Strings can be initialized by assigning character constants in quotes or curly braces. Common string library functions allow input of strings with scanf and gets, getting the length with strlen, concatenating with strcat, comparing with strcmp, and copying with strcpy.
45 Days C++ Programming Language Training in Ambalajatin batra
Are you looking for C++Programming Training In Ambala?
Now you search ends here... Batra Computer Centre provides you best C++ Programming Language Training in Ambala Cantt. We also proides you training in C, HTML, PHP, Web Designing, Web Development, SEO, SMO also.
At the end of this lecture students should be able to;
Define the declaration C strings.
Compare fixed length and variable length string.
Apply strings for functions.
Define string handling functions.
Apply taught concepts for writing programs.
This document provides an introduction to strings in C programming. It discusses that strings are arrays of characters terminated by a null character. It explains how to declare and initialize strings, and provides examples of simple string programs. It also lists common string functions like strlen(), strcpy(), and strcat(), and provides examples of using each function. The document is intended as a presentation on strings for C programming.
Function plot() is the main tool for 2D plotting in R. It allows plotting vectors x and y of equal length to generate a graph of the relationship y(x). Additional arguments can change aspects of the plot like point characters (pch), colors (col), line types (lty), titles, axes labels, and more. Multiple plots can be combined on the same graph using par(mfrow=c(n,m)) to arrange them in a grid. plot() is highly customizable and essential for data visualization in R.
The document discusses scanning (lexical analysis) in compiler construction. It covers the scanning process, regular expressions, and finite automata. The scanning process identifies tokens from source code by categorizing characters as reserved words, special symbols, or other tokens. Regular expressions are used to represent patterns of character strings and define the language of tokens. Finite automata are mathematical models for describing scanning algorithms using states, transitions, and acceptance.
Strings in C can be declared as character arrays that are terminated with a null character '\0'. Strings can be initialized by assigning character constants in quotes or curly braces. Common string library functions allow input of strings with scanf and gets, getting the length with strlen, concatenating with strcat, comparing with strcmp, and copying with strcpy.
45 Days C++ Programming Language Training in Ambalajatin batra
Are you looking for C++Programming Training In Ambala?
Now you search ends here... Batra Computer Centre provides you best C++ Programming Language Training in Ambala Cantt. We also proides you training in C, HTML, PHP, Web Designing, Web Development, SEO, SMO also.
11.the novel lossless text compression technique using ambigram logic and huf...Alexander Decker
This document summarizes a novel lossless text compression technique that uses ambigrams and Huffman coding. It begins with an introduction to ambigrams and Huffman coding. It then describes how the technique works by first using ambigrams to compress the text by about 50% and then further compressing it with Huffman coding to achieve over 60% compression overall. The technique is lossless as it allows perfect reconstruction of the original text. It also discusses potential applications in steganography by embedding confidential data into digital images.
The first lecture of the ACM Aleppo CPC training. The local contest of ICPC. This lecture will help you get started in programming contests word with the lower bound techniques. The lectures focus on the C++ programming language and the STL library to solve programming problems.
The first lecture of the ACM Aleppo CPC training. The local contest of ICPC. This lecture will help you get started in programming contests word with the lower bound techniques. The lectures focus on the C++ programming language and the STL library to solve programming problems.
The document discusses the C programming language. It provides the definition of a program and source code for a simple "Hello World" program in C. It describes how C was developed by Dennis Ritchie in 1972 and some key features of C like it being a structured, portable, middle-level language. The document also provides information on program structure in C, writing, compiling and running a C program, identifiers, constants, data types and more.
The document discusses greedy algorithms and their use for optimization problems. It provides examples of how greedy algorithms can find optimal solutions for counting coins to make a certain amount of money and designing Huffman codes to compress data. Specifically, it explains that greedy algorithms make locally optimal choices at each step to hopefully find a global optimum. While this works for coin counting, it may not find the optimal solution for other problems like scheduling tasks.
The document summarizes key concepts about context-free grammars and parsing from the book "Compiler Construction: Principles and Practice" by Kenneth C. Louden. It covers notations like EBNF and syntax diagrams for representing grammars, properties of context-free languages, and provides grammar rules and diagrams for a sample TINY language as an example.
Introduction To Programming with PythonSushant Mane
The document provides an introduction to the Python programming language. It discusses Python's core features like being an interpreted, object-oriented, and dynamic language. It covers basic Python concepts like data types, variables, operators, control flow, functions, modules, file handling, and object-oriented programming. The document contains examples and explanations of built-in types like numbers, strings, lists, tuples, and dictionaries. It also discusses control structures, functions, modules, and classes in Python.
The document discusses Huffman coding, a lossless data compression algorithm that uses variable-length codewords to encode symbols based on their frequency of occurrence. It works by building a binary tree from the frequency of symbols, where more frequent symbols are encoded by shorter codewords. This allows for more efficient representation of frequent symbols and achieves compression close to the theoretical minimum possible given the frequencies. The algorithm and encoding/decoding process are explained step-by-step with an example.
Huffman codes are a technique for lossless data compression that assigns variable-length binary codes to characters, with more frequent characters having shorter codes. The algorithm builds a frequency table of characters then constructs a binary tree to determine optimal codes. Characters are assigned codes based on their path from the root, with left branches representing 0 and right 1. Both encoder and decoder use this tree to translate between binary codes and characters. The tree guarantees unique decoding and optimal compression.
The second lecture of the ACM Aleppo CPC training. The local contest of ICPC. This lecture will help you get started in programming contests word with the lower bound techniques. The lectures focus on the C++ programming language and the STL library to solve programming problems.
The first lecture of the ACM Aleppo CPC training. The local contest of ICPC. This lecture will help you get started in programming contests word with the lower bound techniques. The lectures focus on the C++ programming language and the STL library to solve programming problems.
Designing a Software Application for Fiber Fano Planesinventionjournals
In this work, a computer program is designed to determine all fibered projective planes with base projective plane which is Fano plane. By applying this program we obtain the fiber points and lines of all these fibered projective planes using membership degrees of the points.
Functional Programming in Pattern-Match-Oriented Programming Style <Programmi...Rakuten Group, Inc.
The document discusses pattern-match-oriented programming (PMOP) using the Egison programming language. PMOP aims to clarify programming with patterns by showing examples that confine explicit recursions in patterns. The key features of Egison that enable PMOP include non-linear pattern matching with multiple results, polymorphic patterns via matchers, and built-in patterns like loop patterns. The document presents several PMOP design patterns like join-cons patterns for lists, cons patterns for multisets, and tuple patterns for comparing multiple data. Examples demonstrate using patterns to define functions like map, intersection, and difference.
The document discusses Huffman coding, which is a data compression technique that uses variable-length codes to encode symbols based on their frequency of occurrence, with more common symbols getting shorter codes. It provides details on how a Huffman tree is constructed by assigning codes to characters based on their frequency, with the most frequent characters assigned the shortest binary codes to achieve data compression. Examples are given to demonstrate how characters are encoded using a Huffman tree and how the storage size is calculated based on the path lengths and frequencies of characters.
This slide is presented in Tech Talk in Rakuten on March 28, 2014.
Egison is the world's first programming language that realized non-linear pattern-matching with backtracking.
We can directly represent pattern-matching against lists, multisets, sets, trees, graphs and any kind of data types.
Egison makes programming dramatically simple!
This document provides an introduction to Python data types including numbers, strings, tuples, and lists. It discusses integers, floating point numbers, complex numbers, Boolean values, and their representation in Python. Strings can be created using single, double, or triple quotes. Characters within a string can be accessed using indexes and slices. Tuples are immutable sequences while lists are mutable sequences. The document also covers precedence of operators in Python.
JavaScript was introduced in 1995 as LiveScript by Netscape and renamed JavaScript by Netscape Navigator 2. It is an interpreted, object-based programming language that is executed client-side in web browsers. JavaScript can be used to create interactive effects within web pages like validating forms or modifying elements. It has advantages like being embedded within HTML, having minimal syntax, and being easy to debug and test.
Presentation given by Ron Northrip (@ronnorthrip) Jan 23 at the Kentucky JavaScript Users Group meeting discussing the history and trending topics in JavaScript.
This chapter discusses IPv6, including its benefits over IPv4 such as a larger address space. It explains IPv6 addressing and configuration topics like global unicast addressing, stateful and stateless address autoconfiguration using DHCPv6, and IPv6 routing protocols. The chapter also covers IPv6 transition mechanisms from IPv4 like dual stack and tunneling approaches.
11.the novel lossless text compression technique using ambigram logic and huf...Alexander Decker
This document summarizes a novel lossless text compression technique that uses ambigrams and Huffman coding. It begins with an introduction to ambigrams and Huffman coding. It then describes how the technique works by first using ambigrams to compress the text by about 50% and then further compressing it with Huffman coding to achieve over 60% compression overall. The technique is lossless as it allows perfect reconstruction of the original text. It also discusses potential applications in steganography by embedding confidential data into digital images.
The first lecture of the ACM Aleppo CPC training. The local contest of ICPC. This lecture will help you get started in programming contests word with the lower bound techniques. The lectures focus on the C++ programming language and the STL library to solve programming problems.
The first lecture of the ACM Aleppo CPC training. The local contest of ICPC. This lecture will help you get started in programming contests word with the lower bound techniques. The lectures focus on the C++ programming language and the STL library to solve programming problems.
The document discusses the C programming language. It provides the definition of a program and source code for a simple "Hello World" program in C. It describes how C was developed by Dennis Ritchie in 1972 and some key features of C like it being a structured, portable, middle-level language. The document also provides information on program structure in C, writing, compiling and running a C program, identifiers, constants, data types and more.
The document discusses greedy algorithms and their use for optimization problems. It provides examples of how greedy algorithms can find optimal solutions for counting coins to make a certain amount of money and designing Huffman codes to compress data. Specifically, it explains that greedy algorithms make locally optimal choices at each step to hopefully find a global optimum. While this works for coin counting, it may not find the optimal solution for other problems like scheduling tasks.
The document summarizes key concepts about context-free grammars and parsing from the book "Compiler Construction: Principles and Practice" by Kenneth C. Louden. It covers notations like EBNF and syntax diagrams for representing grammars, properties of context-free languages, and provides grammar rules and diagrams for a sample TINY language as an example.
Introduction To Programming with PythonSushant Mane
The document provides an introduction to the Python programming language. It discusses Python's core features like being an interpreted, object-oriented, and dynamic language. It covers basic Python concepts like data types, variables, operators, control flow, functions, modules, file handling, and object-oriented programming. The document contains examples and explanations of built-in types like numbers, strings, lists, tuples, and dictionaries. It also discusses control structures, functions, modules, and classes in Python.
The document discusses Huffman coding, a lossless data compression algorithm that uses variable-length codewords to encode symbols based on their frequency of occurrence. It works by building a binary tree from the frequency of symbols, where more frequent symbols are encoded by shorter codewords. This allows for more efficient representation of frequent symbols and achieves compression close to the theoretical minimum possible given the frequencies. The algorithm and encoding/decoding process are explained step-by-step with an example.
Huffman codes are a technique for lossless data compression that assigns variable-length binary codes to characters, with more frequent characters having shorter codes. The algorithm builds a frequency table of characters then constructs a binary tree to determine optimal codes. Characters are assigned codes based on their path from the root, with left branches representing 0 and right 1. Both encoder and decoder use this tree to translate between binary codes and characters. The tree guarantees unique decoding and optimal compression.
The second lecture of the ACM Aleppo CPC training. The local contest of ICPC. This lecture will help you get started in programming contests word with the lower bound techniques. The lectures focus on the C++ programming language and the STL library to solve programming problems.
The first lecture of the ACM Aleppo CPC training. The local contest of ICPC. This lecture will help you get started in programming contests word with the lower bound techniques. The lectures focus on the C++ programming language and the STL library to solve programming problems.
Designing a Software Application for Fiber Fano Planesinventionjournals
In this work, a computer program is designed to determine all fibered projective planes with base projective plane which is Fano plane. By applying this program we obtain the fiber points and lines of all these fibered projective planes using membership degrees of the points.
Functional Programming in Pattern-Match-Oriented Programming Style <Programmi...Rakuten Group, Inc.
The document discusses pattern-match-oriented programming (PMOP) using the Egison programming language. PMOP aims to clarify programming with patterns by showing examples that confine explicit recursions in patterns. The key features of Egison that enable PMOP include non-linear pattern matching with multiple results, polymorphic patterns via matchers, and built-in patterns like loop patterns. The document presents several PMOP design patterns like join-cons patterns for lists, cons patterns for multisets, and tuple patterns for comparing multiple data. Examples demonstrate using patterns to define functions like map, intersection, and difference.
The document discusses Huffman coding, which is a data compression technique that uses variable-length codes to encode symbols based on their frequency of occurrence, with more common symbols getting shorter codes. It provides details on how a Huffman tree is constructed by assigning codes to characters based on their frequency, with the most frequent characters assigned the shortest binary codes to achieve data compression. Examples are given to demonstrate how characters are encoded using a Huffman tree and how the storage size is calculated based on the path lengths and frequencies of characters.
This slide is presented in Tech Talk in Rakuten on March 28, 2014.
Egison is the world's first programming language that realized non-linear pattern-matching with backtracking.
We can directly represent pattern-matching against lists, multisets, sets, trees, graphs and any kind of data types.
Egison makes programming dramatically simple!
This document provides an introduction to Python data types including numbers, strings, tuples, and lists. It discusses integers, floating point numbers, complex numbers, Boolean values, and their representation in Python. Strings can be created using single, double, or triple quotes. Characters within a string can be accessed using indexes and slices. Tuples are immutable sequences while lists are mutable sequences. The document also covers precedence of operators in Python.
JavaScript was introduced in 1995 as LiveScript by Netscape and renamed JavaScript by Netscape Navigator 2. It is an interpreted, object-based programming language that is executed client-side in web browsers. JavaScript can be used to create interactive effects within web pages like validating forms or modifying elements. It has advantages like being embedded within HTML, having minimal syntax, and being easy to debug and test.
Presentation given by Ron Northrip (@ronnorthrip) Jan 23 at the Kentucky JavaScript Users Group meeting discussing the history and trending topics in JavaScript.
This chapter discusses IPv6, including its benefits over IPv4 such as a larger address space. It explains IPv6 addressing and configuration topics like global unicast addressing, stateful and stateless address autoconfiguration using DHCPv6, and IPv6 routing protocols. The chapter also covers IPv6 transition mechanisms from IPv4 like dual stack and tunneling approaches.
This document outlines the syllabus for the second year of the BCA (Bachelor of Computer Applications) program for examinations from 2012-2014 at Jammu University. It includes details on 6 papers: Fundamentals of Discrete Mathematics, Data Structure using C/C++, Programming paradigm and C++, Circuits and Memory Organization, Database Management System, and Operating System & UNIX. For each paper, it lists the title, units of study, recommended textbooks, exam format, and % of changes compared to the previous syllabus.
This document discusses the application event framework in Java web applications. It describes eight types of listeners that can respond to different life cycle events in a web application, including servlet context, session, and request listeners. These listeners allow developers to monitor and respond to events like the creation and destruction of the servlet context or sessions. The document provides examples of using session listeners to count active sessions and monitor changes to session attributes. It also presents a case study on using a servlet context attribute listener to update an application-wide company name parameter when it changes.
This document is a presentation on nested types in Java prepared by Prof. Ashish Bhatia. It discusses different types of nested classes including top level nested classes, inner classes, local classes, anonymous classes, and enum types. It provides examples and explanations of each nested class type and why nested classes are useful for logical grouping of classes and increasing encapsulation.
The document discusses file input/output (IO) in Java. It provides an overview of IO classes for input and output streams, readers and writers. It then describes the key methods of various IO classes like OutputStream, InputStream, Writer, and Reader. These include methods for writing bytes/characters to output streams/writers, reading bytes/characters from input streams/readers, marking and resetting streams, and closing streams. The document is intended as teaching material for a class on Java file IO.
In Java, Input and Output (I/O) are used to process the input and produce the output.
This means an input stream can abstract many different input kinds: from a disk file, a keyboard, or a network socket. Likewise, an output stream may refer to the console, a disk file, or a network connection.
The document discusses input/output (I/O) in Java, including byte streams, character streams, and reading/writing to the console. It covers:
1) Byte and character streams for handling input/output of bytes and characters respectively. Character streams use Unicode for internationalization.
2) The InputStream, OutputStream, Reader, and Writer classes used for byte and character I/O.
3) Reading input from the console using a BufferedReader connected to System.in, and writing output using PrintStream/PrintWriter connected to System.out.
The document discusses Java input/output (I/O) streams. It covers character streams like Reader and Writer, byte streams like InputStream and OutputStream, and file I/O using FileInputStream, FileOutputStream, and RandomAccessFile. Example code is provided to demonstrate reading input from the console, writing to and reading from files, and using seek and getFilePointer methods of RandomAccessFile.
Python 3000 (Python 3.0) is an upcoming major release that will break backwards compatibility to fix early design mistakes and issues. It introduces many changes like Unicode as the default string type, a reworked I/O library, print as a function, and removal of some old features like classic classes. The document provides details on the changes and recommends projects support both Python 2.6 and 3.0 during the transition period.
In this tutorial, I take you through an important feature of Java: File Operations. We are going to take a look at Character and Byte Streams, some built-in Classes and their functionalities to be able to perform file operations. Then we are going to learn about a famous concept called exception handling. We are going to finalize this tutorial with Number Formatting.
Check out rest of the Tutorials: https://berksoysal.blogspot.com/2016/06/java-se-tutorials-basics-exercises.html
This document provides information on input/output operations, file handling, and serialization in Java. It discusses Java's input and output streams for reading and writing bytes and characters. It describes classes for working with files like File, FileInputStream, FileOutputStream, FileReader, and FileWriter. Examples are given for reading from and writing to files and the console. The document also introduces serialization in Java for converting objects to byte streams for storage or transmission.
This document provides instructions for Homework 3 in ECS40 Winter 2017. Students are tasked with modifying a Shape class and implementing a Domain class to randomly fill a rectangular domain with shapes. The Domain class must manage the shapes, ensuring they fit within boundaries and do not overlap. It will output the filled domain as an SVG file. Students must submit their Shape.cpp, Domain.cpp, and Makefile files in a tar archive for grading.
The document discusses the Fantom programming language, describing its features such as static typing with dynamic abilities, built-in modularity, and support for concurrency through message passing and immutable objects. It also provides brief biographies of the speakers and an overview of key concepts in Fantom like pods, classes, mixins, and serialization.
The document discusses Java I/O streams and collections framework. It covers byte streams, character streams, reading console input, writing console output, and reading and writing files. It also discusses different I/O stream classes like InputStream, OutputStream, Reader, Writer and their subclasses. It provides examples of reading input from the keyboard and writing output to the console using System.in, System.out and System.err streams. It also discusses reading characters and strings from the keyboard using BufferedReader class.
Syntax Comparison of Golang with C and Java - MindbowserMindbowser Inc
The document compares the syntax and features of C, Java, and Go programming languages. It discusses their file extensions, compilers, variable declaration, data types, operators, control flow statements, functions, arrays, maps, structs, classes, interfaces, pointers, error handling and concurrency models. The key differences summarized are that C uses .c extension and header files while Java uses .java extension and bytecode. Go can compile and run code directly without a virtual machine. Both Java and Go support OOPs concepts like classes while C uses structs. Go supports concurrency using goroutines and channels.
Python can be used as both an interpreted, interactive language and a scripting language. It supports common data types like integers, floats, strings, lists, and tuples. Tuples are immutable ordered sequences while lists are mutable. Strings support common sequence operations. Python code is indented with whitespace instead of braces. Variables are dynamically typed and assigned with '=' and objects can be sliced and tested for membership with operators like '+' and 'in'.
The document discusses Java character and string data types. It covers the char data type, Unicode encoding, ASCII character codes, escape sequences, methods in the Character class, the String type as a reference type, simple string methods like length(), concatenation, conversion methods, comparing strings, and substring methods.
Streams allow data to be transferred between locations. There are two main types of streams: byte streams which transfer data as a series of bytes, and character streams which transfer data as a series of characters. Byte streams can be used for any type of file, while character streams are only used for text files. Input streams are used for reading data and output streams are used for writing data. Buffered streams improve performance by transferring data in blocks rather than a byte at a time. File input/output streams allow reading from and writing to files on the disk.
Streams allow data to be transferred between locations in Java applications. There are two main types of streams: byte streams which transfer data as bytes, and character streams which transfer data as characters. Streams can be used for both input from and output to various resources and are classified further based on their direction and purpose. Common stream classes include FileInputStream, FileOutputStream, and BufferedInputStream which can improve performance.
String Handling, Inheritance, Packages and InterfacesPrabu U
The presentation starts with string handling. Then the concepts of inheritance is detailed. Finally the concepts of packages and interfaces are detailed.
This document provides an overview of Python for bioinformatics. It discusses what Python is, why it is useful for bioinformatics, and how to get started with Python. It covers installing Python on the Athena system, using IDEs like Eclipse and PyDev, code sharing with Git and GitHub, basic Python concepts like strings, control structures, and data types like lists and dictionaries. It also provides examples of bioinformatics tasks that can be done in Python like calculating Pi using random numbers.
The BitInputStream and BitOutputStream classes allow reading and writing of data in bit-level granularity between 1-32 bits. BitInputStream extends InputStream and can read bit sequences from Files or other InputStreams, while BitOutputStream extends OutputStream and can write bit sequences to OutputStreams or Files. These classes provide methods to read/write bits, as well as close, flush, and reset functionality.
This document contains a worksheet for the Compiler Design course CS6660. It includes questions related to lexical analysis, syntax analysis, and code generation. Specifically, it asks students to construct symbol tables, finite automata, parse trees, and three-address code. The questions are meant to help students learn and practice different phases of compiler construction.
Filters are programs that run before or after resources like servlets and JSPs. Filters can examine requests and modify responses, and can perform tasks like authentication, compression, logging. A filter is implemented by creating a class that implements the Filter interface and its methods. Filters are configured in web.xml by mapping them to URLs with filter and filter-mapping elements. Filters provide a way to modify requests and responses and perform preprocessing and postprocessing of resources in web applications.
This document discusses two approaches to creating custom tag libraries in JavaServer Pages (JSP): Java-based and JSP-based tags. Java-based tags use Java files for tag handling and have no version restrictions, while JSP-based tags use JSP files and are only available from JSP 2.0 onward. Both approaches involve a tag handler class, tag library descriptor (TLD) file, and JSP file using the tag library. The tag handler class defines the tag behavior by implementing the doTag() method. The TLD maps XML element names to the tag implementation. Attributes can be passed to tags and accessed via setter methods. Tag files provide an alternative to Java classes for simple formatting tags.
The document discusses the Document Object Model (DOM) and how browsers structure HTML pages in memory as objects. When a browser loads an HTML page, it assembles all the page elements as objects in memory. The DOM defines the JavaScript programming interface for accessing and manipulating these HTML elements. The DOM represents an HTML document as nodes and objects that have properties and methods. This allows JavaScript to access and update the content, structure, and style of a document dynamically.
The document discusses file input/output in Java. It describes streams as sequences of bytes used for input and output, and the File class for representing file and directory paths without reading/writing the files. Methods of the File class are outlined for obtaining file information and renaming, deleting, creating, and traversing files. Examples of programs using the File class are provided.
This document is a presentation on nested types in Java prepared by Prof. Ashish Bhatia. It discusses different types of nested classes including top level nested classes, inner classes, local classes, anonymous classes, and enum types. It provides examples and explanations of each nested class type and why nested classes are useful for logical grouping of classes and increasing encapsulation.
This document contains a presentation on servlets and HTTP basics. It includes slides on:
- The structure of an HTTP request and response
- HTTP methods like GET, POST, PUT, DELETE
- What servlets are and how they work within a servlet container like Tomcat
- An overview of the javax.servlet package, including interfaces like Servlet and classes like GenericServlet and HttpServlet
- The servlet lifecycle methods like init, service, destroy
- How to set up and use Tomcat as a servlet container
In summary, it provides an introduction to key concepts of HTTP and the servlet programming model in Java web applications.
Leveraging Generative AI to Drive Nonprofit InnovationTechSoup
In this webinar, participants learned how to utilize Generative AI to streamline operations and elevate member engagement. Amazon Web Service experts provided a customer specific use cases and dived into low/no-code tools that are quick and easy to deploy through Amazon Web Service (AWS.)
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
This document provides an overview of wound healing, its functions, stages, mechanisms, factors affecting it, and complications.
A wound is a break in the integrity of the skin or tissues, which may be associated with disruption of the structure and function.
Healing is the body’s response to injury in an attempt to restore normal structure and functions.
Healing can occur in two ways: Regeneration and Repair
There are 4 phases of wound healing: hemostasis, inflammation, proliferation, and remodeling. This document also describes the mechanism of wound healing. Factors that affect healing include infection, uncontrolled diabetes, poor nutrition, age, anemia, the presence of foreign bodies, etc.
Complications of wound healing like infection, hyperpigmentation of scar, contractures, and keloid formation.
Walmart Business+ and Spark Good for Nonprofits.pdfTechSoup
"Learn about all the ways Walmart supports nonprofit organizations.
You will hear from Liz Willett, the Head of Nonprofits, and hear about what Walmart is doing to help nonprofits, including Walmart Business and Spark Good. Walmart Business+ is a new offer for nonprofits that offers discounts and also streamlines nonprofits order and expense tracking, saving time and money.
The webinar may also give some examples on how nonprofits can best leverage Walmart Business+.
The event will cover the following::
Walmart Business + (https://business.walmart.com/plus) is a new shopping experience for nonprofits, schools, and local business customers that connects an exclusive online shopping experience to stores. Benefits include free delivery and shipping, a 'Spend Analytics” feature, special discounts, deals and tax-exempt shopping.
Special TechSoup offer for a free 180 days membership, and up to $150 in discounts on eligible orders.
Spark Good (walmart.com/sparkgood) is a charitable platform that enables nonprofits to receive donations directly from customers and associates.
Answers about how you can do more with Walmart!"
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxEduSkills OECD
Iván Bornacelly, Policy Analyst at the OECD Centre for Skills, OECD, presents at the webinar 'Tackling job market gaps with a skills-first approach' on 12 June 2024
Communicating effectively and consistently with students can help them feel at ease during their learning experience and provide the instructor with a communication trail to track the course's progress. This workshop will take you through constructing an engaging course container to facilitate effective communication.
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumMJDuyan
(𝐓𝐋𝐄 𝟏𝟎𝟎) (𝐋𝐞𝐬𝐬𝐨𝐧 𝟏)-𝐏𝐫𝐞𝐥𝐢𝐦𝐬
𝐃𝐢𝐬𝐜𝐮𝐬𝐬 𝐭𝐡𝐞 𝐄𝐏𝐏 𝐂𝐮𝐫𝐫𝐢𝐜𝐮𝐥𝐮𝐦 𝐢𝐧 𝐭𝐡𝐞 𝐏𝐡𝐢𝐥𝐢𝐩𝐩𝐢𝐧𝐞𝐬:
- Understand the goals and objectives of the Edukasyong Pantahanan at Pangkabuhayan (EPP) curriculum, recognizing its importance in fostering practical life skills and values among students. Students will also be able to identify the key components and subjects covered, such as agriculture, home economics, industrial arts, and information and communication technology.
𝐄𝐱𝐩𝐥𝐚𝐢𝐧 𝐭𝐡𝐞 𝐍𝐚𝐭𝐮𝐫𝐞 𝐚𝐧𝐝 𝐒𝐜𝐨𝐩𝐞 𝐨𝐟 𝐚𝐧 𝐄𝐧𝐭𝐫𝐞𝐩𝐫𝐞𝐧𝐞𝐮𝐫:
-Define entrepreneurship, distinguishing it from general business activities by emphasizing its focus on innovation, risk-taking, and value creation. Students will describe the characteristics and traits of successful entrepreneurs, including their roles and responsibilities, and discuss the broader economic and social impacts of entrepreneurial activities on both local and global scales.
Chapter wise All Notes of First year Basic Civil Engineering.pptxDenish Jangid
Chapter wise All Notes of First year Basic Civil Engineering
Syllabus
Chapter-1
Introduction to objective, scope and outcome the subject
Chapter 2
Introduction: Scope and Specialization of Civil Engineering, Role of civil Engineer in Society, Impact of infrastructural development on economy of country.
Chapter 3
Surveying: Object Principles & Types of Surveying; Site Plans, Plans & Maps; Scales & Unit of different Measurements.
Linear Measurements: Instruments used. Linear Measurement by Tape, Ranging out Survey Lines and overcoming Obstructions; Measurements on sloping ground; Tape corrections, conventional symbols. Angular Measurements: Instruments used; Introduction to Compass Surveying, Bearings and Longitude & Latitude of a Line, Introduction to total station.
Levelling: Instrument used Object of levelling, Methods of levelling in brief, and Contour maps.
Chapter 4
Buildings: Selection of site for Buildings, Layout of Building Plan, Types of buildings, Plinth area, carpet area, floor space index, Introduction to building byelaws, concept of sun light & ventilation. Components of Buildings & their functions, Basic concept of R.C.C., Introduction to types of foundation
Chapter 5
Transportation: Introduction to Transportation Engineering; Traffic and Road Safety: Types and Characteristics of Various Modes of Transportation; Various Road Traffic Signs, Causes of Accidents and Road Safety Measures.
Chapter 6
Environmental Engineering: Environmental Pollution, Environmental Acts and Regulations, Functional Concepts of Ecology, Basics of Species, Biodiversity, Ecosystem, Hydrological Cycle; Chemical Cycles: Carbon, Nitrogen & Phosphorus; Energy Flow in Ecosystems.
Water Pollution: Water Quality standards, Introduction to Treatment & Disposal of Waste Water. Reuse and Saving of Water, Rain Water Harvesting. Solid Waste Management: Classification of Solid Waste, Collection, Transportation and Disposal of Solid. Recycling of Solid Waste: Energy Recovery, Sanitary Landfill, On-Site Sanitation. Air & Noise Pollution: Primary and Secondary air pollutants, Harmful effects of Air Pollution, Control of Air Pollution. . Noise Pollution Harmful Effects of noise pollution, control of noise pollution, Global warming & Climate Change, Ozone depletion, Greenhouse effect
Text Books:
1. Palancharmy, Basic Civil Engineering, McGraw Hill publishers.
2. Satheesh Gopi, Basic Civil Engineering, Pearson Publishers.
3. Ketki Rangwala Dalal, Essentials of Civil Engineering, Charotar Publishing House.
4. BCP, Surveying volume 1
1. File IO in Java
Prof. AshishSingh Bhatia, ast.bhatia@gmail.com,
ashish@asbspace.in, Web: asbspace.in, M:9879009551
September 21, 2012
Prof. AshishSingh Bhatia, ast.bhatia@gmail.com, ashish@asbspace.in, Web: asbspace.in, M:9879009551 1
2. AGENDA
Overview of IO Classes
OutputStream of IO
InputStream of IO
Writer of IO
Reader of IO
Methods of OutputStream Class
Methods of Writer Class
Methods of Writer Class Extra
Methods of InputStream Class
Methods of Reader Class
InputStream Usage
OutputStream Usage
Bridge Classes
OutputStreamWriter
InputStream Reader
FileInput and FileOutput Stream
Prof. AshishSingh Bhatia, ast.bhatia@gmail.com, ashish@asbspace.in, Web: asbspace.in, M:9879009551 2
3. Overview of IO Classes
Prof. AshishSingh Bhatia, ast.bhatia@gmail.com, ashish@asbspace.in, Web: asbspace.in, M:9879009551 3
4. OutputStream of IO
Prof. AshishSingh Bhatia, ast.bhatia@gmail.com, ashish@asbspace.in, Web: asbspace.in, M:9879009551 4
5. InputStream of IO
Prof. AshishSingh Bhatia, ast.bhatia@gmail.com, ashish@asbspace.in, Web: asbspace.in, M:9879009551 5
6. Writer of IO
Prof. AshishSingh Bhatia, ast.bhatia@gmail.com, ashish@asbspace.in, Web: asbspace.in, M:9879009551 6
7. Reader of IO
Prof. AshishSingh Bhatia, ast.bhatia@gmail.com, ashish@asbspace.in, Web: asbspace.in, M:9879009551 7
8. Methods of OutputStream Class
public void write(int b)
Writes a single byte to an output stream. Why we need int as
argument?
Prof. AshishSingh Bhatia, ast.bhatia@gmail.com, ashish@asbspace.in, Web: asbspace.in, M:9879009551 8
9. Methods of OutputStream Class
public void write(int b)
Writes a single byte to an output stream. Why we need int as
argument?
public void write(byte[] b)
Writes complete byte array in to an outputstream.
Prof. AshishSingh Bhatia, ast.bhatia@gmail.com, ashish@asbspace.in, Web: asbspace.in, M:9879009551 9
10. Methods of OutputStream Class
public void write(int b)
Writes a single byte to an output stream. Why we need int as
argument?
public void write(byte[] b)
Writes complete byte array in to an outputstream.
public void write(byte[] b, int offset, int len)
Write a subrange from offset to specified length[number of
bytes].
Prof. AshishSingh Bhatia, ast.bhatia@gmail.com, ashish@asbspace.in, Web: asbspace.in, M:9879009551 10
11. Methods of OutputStream Class
public void write(int b)
Writes a single byte to an output stream. Why we need int as
argument?
public void write(byte[] b)
Writes complete byte array in to an outputstream.
public void write(byte[] b, int offset, int len)
Write a subrange from offset to specified length[number of
bytes].
public void flush()
Flushes the output buffer. Ensures the contents are written to
the destination.
Prof. AshishSingh Bhatia, ast.bhatia@gmail.com, ashish@asbspace.in, Web: asbspace.in, M:9879009551 11
12. Methods of OutputStream Class
public void write(int b)
Writes a single byte to an output stream. Why we need int as
argument?
public void write(byte[] b)
Writes complete byte array in to an outputstream.
public void write(byte[] b, int offset, int len)
Write a subrange from offset to specified length[number of
bytes].
public void flush()
Flushes the output buffer. Ensures the contents are written to
the destination.
public void close()
Closes the outputstream. Further write will generate
IOException
Prof. AshishSingh Bhatia, ast.bhatia@gmail.com, ashish@asbspace.in, Web: asbspace.in, M:9879009551 12
13. Methods of Writer Class
public void write(int ch)
Writes a single character to an output stream. Why we need
int as argument?
Prof. AshishSingh Bhatia, ast.bhatia@gmail.com, ashish@asbspace.in, Web: asbspace.in, M:9879009551 13
14. Methods of Writer Class
public void write(int ch)
Writes a single character to an output stream. Why we need
int as argument?
public void write(char[] ch)
Writes complete character array in to an outputstream.
Prof. AshishSingh Bhatia, ast.bhatia@gmail.com, ashish@asbspace.in, Web: asbspace.in, M:9879009551 14
15. Methods of Writer Class
public void write(int ch)
Writes a single character to an output stream. Why we need
int as argument?
public void write(char[] ch)
Writes complete character array in to an outputstream.
public void write(char[] b, int offset, int len)
Write a subrange from offset to specified length[number of
character].
Prof. AshishSingh Bhatia, ast.bhatia@gmail.com, ashish@asbspace.in, Web: asbspace.in, M:9879009551 15
16. Methods of Writer Class
public void write(int ch)
Writes a single character to an output stream. Why we need
int as argument?
public void write(char[] ch)
Writes complete character array in to an outputstream.
public void write(char[] b, int offset, int len)
Write a subrange from offset to specified length[number of
character].
public void flush()
Flushes the output buffer. Ensures the contents are written to
the destination.
Prof. AshishSingh Bhatia, ast.bhatia@gmail.com, ashish@asbspace.in, Web: asbspace.in, M:9879009551 16
17. Methods of Writer Class
public void write(int ch)
Writes a single character to an output stream. Why we need
int as argument?
public void write(char[] ch)
Writes complete character array in to an outputstream.
public void write(char[] b, int offset, int len)
Write a subrange from offset to specified length[number of
character].
public void flush()
Flushes the output buffer. Ensures the contents are written to
the destination.
public void close()
Closes the writer. Further write will generate IOException
Prof. AshishSingh Bhatia, ast.bhatia@gmail.com, ashish@asbspace.in, Web: asbspace.in, M:9879009551 17
18. Methods of Writer Class Extra
String is a sequence of Character.
public void write(String s)
Prof. AshishSingh Bhatia, ast.bhatia@gmail.com, ashish@asbspace.in, Web: asbspace.in, M:9879009551 18
19. Methods of Writer Class Extra
String is a sequence of Character.
public void write(String s)
public void write(String s, int offset, int len)
Prof. AshishSingh Bhatia, ast.bhatia@gmail.com, ashish@asbspace.in, Web: asbspace.in, M:9879009551 19
20. Methods of Writer Class Extra
String is a sequence of Character.
public void write(String s)
public void write(String s, int offset, int len)
public void append(char ch)
Prof. AshishSingh Bhatia, ast.bhatia@gmail.com, ashish@asbspace.in, Web: asbspace.in, M:9879009551 20
21. Methods of Writer Class Extra
String is a sequence of Character.
public void write(String s)
public void write(String s, int offset, int len)
public void append(char ch)
public void append(CharSequence cs)
Prof. AshishSingh Bhatia, ast.bhatia@gmail.com, ashish@asbspace.in, Web: asbspace.in, M:9879009551 21
22. Methods of Writer Class Extra
String is a sequence of Character.
public void write(String s)
public void write(String s, int offset, int len)
public void append(char ch)
public void append(CharSequence cs)
public void append(CharSequence cs, int offset,
int len)
Prof. AshishSingh Bhatia, ast.bhatia@gmail.com, ashish@asbspace.in, Web: asbspace.in, M:9879009551 22
23. Methods of InputStream Class
public int read()
Read the integer representation of the next available byte of
input. Returns -1 when the end of file is encountered.
Prof. AshishSingh Bhatia, ast.bhatia@gmail.com, ashish@asbspace.in, Web: asbspace.in, M:9879009551 23
24. Methods of InputStream Class
public int read()
Read the integer representation of the next available byte of
input. Returns -1 when the end of file is encountered.
public int read(byte[] b)
Attempt to read up to b.length bytes in the the b array.
Returns the number of actual bytes read. -1 is returned when
the end of file is encountered.
Prof. AshishSingh Bhatia, ast.bhatia@gmail.com, ashish@asbspace.in, Web: asbspace.in, M:9879009551 24
25. Methods of InputStream Class
public int read()
Read the integer representation of the next available byte of
input. Returns -1 when the end of file is encountered.
public int read(byte[] b)
Attempt to read up to b.length bytes in the the b array.
Returns the number of actual bytes read. -1 is returned when
the end of file is encountered.
public int read(byte[] b, int offset, int len)
Prof. AshishSingh Bhatia, ast.bhatia@gmail.com, ashish@asbspace.in, Web: asbspace.in, M:9879009551 25
26. Methods of InputStream Class
public int read()
Read the integer representation of the next available byte of
input. Returns -1 when the end of file is encountered.
public int read(byte[] b)
Attempt to read up to b.length bytes in the the b array.
Returns the number of actual bytes read. -1 is returned when
the end of file is encountered.
public int read(byte[] b, int offset, int len)
public long skip(long count)
count indicates number of bytes to be skipped and return the
number of byte skipped or -1 in case of end of file.
Prof. AshishSingh Bhatia, ast.bhatia@gmail.com, ashish@asbspace.in, Web: asbspace.in, M:9879009551 26
27. Methods of InputStream Class
public int read()
Read the integer representation of the next available byte of
input. Returns -1 when the end of file is encountered.
public int read(byte[] b)
Attempt to read up to b.length bytes in the the b array.
Returns the number of actual bytes read. -1 is returned when
the end of file is encountered.
public int read(byte[] b, int offset, int len)
public long skip(long count)
count indicates number of bytes to be skipped and return the
number of byte skipped or -1 in case of end of file.
public int available()
Number of bytes available for reading.
Prof. AshishSingh Bhatia, ast.bhatia@gmail.com, ashish@asbspace.in, Web: asbspace.in, M:9879009551 27
28. Methods of InputStream Class
public int read()
Read the integer representation of the next available byte of
input. Returns -1 when the end of file is encountered.
public int read(byte[] b)
Attempt to read up to b.length bytes in the the b array.
Returns the number of actual bytes read. -1 is returned when
the end of file is encountered.
public int read(byte[] b, int offset, int len)
public long skip(long count)
count indicates number of bytes to be skipped and return the
number of byte skipped or -1 in case of end of file.
public int available()
Number of bytes available for reading.
public void mark(int readlimit)
Prof. AshishSingh Bhatia, ast.bhatia@gmail.com, ashish@asbspace.in, Web: asbspace.in, M:9879009551 28
29. Methods of InputStream Class
public int read()
Read the integer representation of the next available byte of
input. Returns -1 when the end of file is encountered.
public int read(byte[] b)
Attempt to read up to b.length bytes in the the b array.
Returns the number of actual bytes read. -1 is returned when
the end of file is encountered.
public int read(byte[] b, int offset, int len)
public long skip(long count)
count indicates number of bytes to be skipped and return the
number of byte skipped or -1 in case of end of file.
public int available()
Number of bytes available for reading.
public void mark(int readlimit)
public void reset()
Prof. AshishSingh Bhatia, ast.bhatia@gmail.com, ashish@asbspace.in, Web: asbspace.in, M:9879009551 29
30. Methods of InputStream Class
public int read()
Read the integer representation of the next available byte of
input. Returns -1 when the end of file is encountered.
public int read(byte[] b)
Attempt to read up to b.length bytes in the the b array.
Returns the number of actual bytes read. -1 is returned when
the end of file is encountered.
public int read(byte[] b, int offset, int len)
public long skip(long count)
count indicates number of bytes to be skipped and return the
number of byte skipped or -1 in case of end of file.
public int available()
Number of bytes available for reading.
public void mark(int readlimit)
public void reset()
public boolean markSupported()
Prof. AshishSingh Bhatia, ast.bhatia@gmail.com, ashish@asbspace.in, Web: asbspace.in, M:9879009551 30
31. Methods of InputStream Class
public int read()
Read the integer representation of the next available byte of
input. Returns -1 when the end of file is encountered.
public int read(byte[] b)
Attempt to read up to b.length bytes in the the b array.
Returns the number of actual bytes read. -1 is returned when
the end of file is encountered.
public int read(byte[] b, int offset, int len)
public long skip(long count)
count indicates number of bytes to be skipped and return the
number of byte skipped or -1 in case of end of file.
public int available()
Number of bytes available for reading.
public void mark(int readlimit)
public void reset()
public boolean markSupported()
public void close()
Prof. AshishSingh Bhatia, ast.bhatia@gmail.com, ashish@asbspace.in, Web: asbspace.in, M:9879009551 31
32. Methods of Reader Class
public int read()
Prof. AshishSingh Bhatia, ast.bhatia@gmail.com, ashish@asbspace.in, Web: asbspace.in, M:9879009551 32
33. Methods of Reader Class
public int read()
public int read(char[] b)
Prof. AshishSingh Bhatia, ast.bhatia@gmail.com, ashish@asbspace.in, Web: asbspace.in, M:9879009551 33
34. Methods of Reader Class
public int read()
public int read(char[] b)
public int read(char[] b, int offset, int len)
Prof. AshishSingh Bhatia, ast.bhatia@gmail.com, ashish@asbspace.in, Web: asbspace.in, M:9879009551 34
35. Methods of Reader Class
public int read()
public int read(char[] b)
public int read(char[] b, int offset, int len)
public long skip(long count)
Prof. AshishSingh Bhatia, ast.bhatia@gmail.com, ashish@asbspace.in, Web: asbspace.in, M:9879009551 35
36. Methods of Reader Class
public int read()
public int read(char[] b)
public int read(char[] b, int offset, int len)
public long skip(long count)
public boolean ready()
Prof. AshishSingh Bhatia, ast.bhatia@gmail.com, ashish@asbspace.in, Web: asbspace.in, M:9879009551 36
37. Methods of Reader Class
public int read()
public int read(char[] b)
public int read(char[] b, int offset, int len)
public long skip(long count)
public boolean ready()
public void mark(int readlimit)
Prof. AshishSingh Bhatia, ast.bhatia@gmail.com, ashish@asbspace.in, Web: asbspace.in, M:9879009551 37
38. Methods of Reader Class
public int read()
public int read(char[] b)
public int read(char[] b, int offset, int len)
public long skip(long count)
public boolean ready()
public void mark(int readlimit)
public void reset()
Prof. AshishSingh Bhatia, ast.bhatia@gmail.com, ashish@asbspace.in, Web: asbspace.in, M:9879009551 38
39. Methods of Reader Class
public int read()
public int read(char[] b)
public int read(char[] b, int offset, int len)
public long skip(long count)
public boolean ready()
public void mark(int readlimit)
public void reset()
public boolean markSupported()
Prof. AshishSingh Bhatia, ast.bhatia@gmail.com, ashish@asbspace.in, Web: asbspace.in, M:9879009551 39
40. Methods of Reader Class
public int read()
public int read(char[] b)
public int read(char[] b, int offset, int len)
public long skip(long count)
public boolean ready()
public void mark(int readlimit)
public void reset()
public boolean markSupported()
public void close()
Prof. AshishSingh Bhatia, ast.bhatia@gmail.com, ashish@asbspace.in, Web: asbspace.in, M:9879009551 40
43. Bridge Classes
OutputStreamWriter and InputStreamReader
Character Base Stream Classes which inturns work on bytes.
Handles unicode character and bytes both.
Encoding and Decoding of unicode character from and to
various character set.
java.nio.charset package has classes which handle
encoding and decoding.
class Charset represents different character set.
Prof. AshishSingh Bhatia, ast.bhatia@gmail.com, ashish@asbspace.in, Web: asbspace.in, M:9879009551 43
46. FileInput and FileOutput Stream
Output and input of binary files.
Prof. AshishSingh Bhatia, ast.bhatia@gmail.com, ashish@asbspace.in, Web: asbspace.in, M:9879009551 46
47. FileInput and FileOutput Stream
Output and input of binary files.
FileOutputStream create and write bytes in to physical file.
Prof. AshishSingh Bhatia, ast.bhatia@gmail.com, ashish@asbspace.in, Web: asbspace.in, M:9879009551 47
48. FileInput and FileOutput Stream
Output and input of binary files.
FileOutputStream create and write bytes in to physical file.
If file exists it overwrites it until append flag is used.
Prof. AshishSingh Bhatia, ast.bhatia@gmail.com, ashish@asbspace.in, Web: asbspace.in, M:9879009551 48
49. FileInput and FileOutput Stream
Output and input of binary files.
FileOutputStream create and write bytes in to physical file.
If file exists it overwrites it until append flag is used.
Inherits all the methods from the OutputStream.
Prof. AshishSingh Bhatia, ast.bhatia@gmail.com, ashish@asbspace.in, Web: asbspace.in, M:9879009551 49
50. FileInput and FileOutput Stream
Output and input of binary files.
FileOutputStream create and write bytes in to physical file.
If file exists it overwrites it until append flag is used.
Inherits all the methods from the OutputStream.
Additional methods are
public FileDescriptor getFD()
public FileChannel getChannel()
Prof. AshishSingh Bhatia, ast.bhatia@gmail.com, ashish@asbspace.in, Web: asbspace.in, M:9879009551 50
51. FileDescriptor
Whenever any file is opened for input or output, it uses a file
descriptor.
Prof. AshishSingh Bhatia, ast.bhatia@gmail.com, ashish@asbspace.in, Web: asbspace.in, M:9879009551 51
52. FileDescriptor
Whenever any file is opened for input or output, it uses a file
descriptor.
0=Standard Input
Prof. AshishSingh Bhatia, ast.bhatia@gmail.com, ashish@asbspace.in, Web: asbspace.in, M:9879009551 52
53. FileDescriptor
Whenever any file is opened for input or output, it uses a file
descriptor.
0=Standard Input
1=Standard Output
Prof. AshishSingh Bhatia, ast.bhatia@gmail.com, ashish@asbspace.in, Web: asbspace.in, M:9879009551 53
54. FileDescriptor
Whenever any file is opened for input or output, it uses a file
descriptor.
0=Standard Input
1=Standard Output
2=Standard Error
Prof. AshishSingh Bhatia, ast.bhatia@gmail.com, ashish@asbspace.in, Web: asbspace.in, M:9879009551 54