Answer:
FileOutputStream out = new FileOutputStream("ObjectData.dat");
ObjectOutputStream ostream = new ObjectOutputStream(out);
ostream.writeObject(r);
Explanation:
For object serialization, we can use the writeObject method of java.io.ObjectOutputStream class.
The complete code fragment is as follows:
import java.io.*;
class Demo{
public static void main(String args[]){
try{
r = <Reference to Object to be serialized> ;
FileOutputStream out = new FileOutputStream("ObjectData.dat");
ObjectOutputStream ostream = new ObjectOutputStream(out);
ostream.writeObject(r);
ostream.close();
} catch(Exception e){
e.printStackTrace();
}
}
}
Answer:
False.
Explanation:
Index addressing is not for only traversing the arrays but to also access the element,manipulate them.Though indexing is also used in traversing but it is not solely for that.Indexing in an array starts from 0 to size-1.
for example:-
We have an array a of size 10.So to access the element at position 6.We have to write.
a[5];
Manipulating it
a[5]=6;
A. by combining similar instructions into groups, which will then execute in parallel
Introduction: There are many rules schools should follow when it comes to cell phone use during school hours. Technology can be very distracting and durning school is when kids need to pay attention. Most people see cell phone rules un fair or bad, however it's not like that. The school just wants what's best for the students and so they can learn, which will ultimately help them on later in life.
Body paragraphs (wont write the rest of the paragraphs but heres some ideas) Only using the phone when needed like if it's an emergency, phones have to stay on silent to not disrupt others, during free period you can choose whether to be on your phone
then you write your conclusion based on what you wrote
Answer: Collision is defined as the event that takes place when the clash appear due to the information persisting the same hash value get in contact. This mechanism occurring in the hash table is called collision and is dependent on the type of application.
Collision becomes difficult to be avoided in a large set of the hash table as the data set is difficult to be found while in small hash table it is still detectable but cannot be avoided completely.