What is the use of out in System.out.println()?

1 Answer

Answer :

A: ‘out’ is an object of the ‘PrintStream class and a static data member of the’System’ class which is calling the println() function.

Related questions

Description : Why is the ‘S’ of System.out.println() function capital?

Last Answer : A: System is the name of a class present in java,lang package and hence it begins with a capital letter as is the convention for class names.

Description : What is the difference between print() and println() methods?

Last Answer : A: The print() functions prints a line and the control remains on the same line, whereas, the println() function prints a line and the control moves on to the next line.

Description : Write the output for the following: System.out.println(“Incredible” + “\n” + “world”);

Last Answer : Incredible world

Description : System.out.print(“BEST “); System.out.println(“OF LUCK”); Choose the correct option for the output of the above statements: (i) BEST OF LUCK (ii) BEST OF LUCK

Last Answer : Ans. (i) is the correct output. System.out.print() does not add a new line at the end because of which ‘OF LUCK’ gets printed on the same line as ‘BEST’.

Description : The out object is an object encapsulated inside the ................. class, and represents the standard output device. A) standard B) local C) globlal D) system

Last Answer : D) system

Description : System.in.read() is being used, the program must specify the .................. clause. A) throws.java.out.IOException B) throws.java.in.IOException C) throws.java.io.IOException D) throws.java.io.InException

Last Answer : C) throws.java.io.IOException

Description : break statement is used to i) get out of method ii) end aprogram iii) get out of a loop iv) get out of the system A) 1 & 2 B) 1,2 & 3 C) 1 & 3 D) 3

Last Answer : D) 3

Description : Adaptive maintenance is a maintenance which ............. (A) Correct errors that were not discovered till testing phase. (B) is carried out to port the existing software to a new environment. (C) improves the system performance. (D) both (B) and (C)

Last Answer : (B) is carried out to port the existing software to a new environment.

Description : Consider the following JAVA program: public class First { public static int CBSE (int x) { if (x < 100) x = CBSE (x +10); return (x - 1); } public static void main (String[] args){ System.out.print(First.CBSE(60)); } } What does this program print? (1) 59 (2) 95 (3) 69 (4) 99

Last Answer : (2) 95 

Description : The first batch operating system was developed in the ................. by General Motors for use on an IBM 701. A) mid 1940's B) mid 1950's C) mid 1960's D) mid 1970's

Last Answer : B) mid 1950's

Description : Use the new system as the same time as the old system to compare the results. This is known as … A) Procedure Writing B) Simultaneous processing C) Parallel Operation D) File Conversion

Last Answer : C) Parallel Operation

Description : What are the tasks performed by operating system? 

Last Answer :  It loads programs into memory and executes them.  It controls the operation of input/output and storage devices.  It manages files and folders.  It allows creating a password to protect computers from unauthorized use.   It detects hardware failures and displays messages to fix them. 

Description : ____________is the delivery of on-demand computing services, from applications to storage and processing power, typically over the internet and on a pay-as-you-go basis. a) Cloud computing b) Cloud Infrastructure c) Distributed system d) None of these

Last Answer : Cloud computing

Description : What does System.in.read() return?

Last Answer : A: It returns the number of bytes read from the Input Stream as an integer.

Description : The agency that sits between the user and the UNIX system is called the A. logic B. profile C. shell D. erxc E. None of the above

Last Answer : C. shell

Description : Java Servlet i) is key component of server side java development ii) is a small pluggable extension to a server that enhances functionality iii) runs only in Windows Operating System iv) allows developers to customize any java ... & iv are true C) ii, iii & iv are true D) i, ii & iv are true

Last Answer : D) i, ii & iv are true

Description : C programs are converted into machine language with the help of A) An Editor B) A complier C) An operating system D) None of the above

Last Answer : B) A complier

Description : C can be used on A) Only MS-Dos operating System B) Only Linux operating system C) Only Windows operating system D) All of the above

Last Answer : D) All of the above

Description : In …………….., the virus places an identical copy of itself into other programs or into certain system areas on the disk. A) Dormant phase B) Propagation phase C) Triggering phase D) Execution phase

Last Answer : B) Propagation phase

Description : State whether true of false. i) A worm mails a copy of itself to other systems. ii) A worm executes a copy of itself on another system. A) True, False B) False, True C) True, True D) False, False

Last Answer : C) True, True

Description : The type of threats on the security of a computer system or network are …………………….. i) Interruption ii) Interception iii) Modification iv) Creation v) Fabrication A) i, ii, iii and iv only B) ii, iii, iv and v only C) i, ii, iii and v only D) All i, ii, iii, iv and v

Last Answer : C) i, ii, iii and v only

Description : In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities. A) Confidentiality B) Integrity C) Availability D) Authenticity

Last Answer : A) Confidentiality

Description : In computer security, ……………………. means that computer system assets can be modified only by authorized parities. A) Confidentiality B) Integrity C) Availability D) Authenticity

Last Answer : B) Integrity

Description : File management function of the operating system includes i) File creation and deletion ii) Disk scheduling iii) Directory creation iv) Mapping file in secondary storage. A) i, ii and iii only B) i, iii and iv only C) ii, iii and iv only D) All i, ii, iii and iv

Last Answer : B) i, iii and iv only

Description : Which of the following are the functions of operating system? i) recovering from errors ii) facilitating input/output iii) facilitating parallel operation iv) sharing hardware among users v) implementing user interface A) i, ii, ... only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : In process scheduling, …………………… determines when new processes are admitted to the system. A) long term scheduling B) medium term scheduling C) short term scheduling D) none of the above

Last Answer : A) long term scheduling

Description : ……………. Can be defined as the permanent blocking of a set of processed that either complete for system resources or communicate with each other. A) Deadlock B) Permanent lock C) Starvation D) Mutual exclusion

Last Answer : A) Deadlock

Description : State true or false. i) Unix, support multiple user process but only support one thread per process. ii) A java run time environment is an example of a system of one process with multiple threads. A) True, False B) True, True C) False, True D) False, False

Last Answer : B) True, True

Description : ……………….. is a example of an operating system that support single user process and single thread. A) UNIX B) MS-DOS C) OS/2 D) Windows 2000

Last Answer : B) MS-DOS

Description : Match the following mechanisms for interrupting the execution of a process and their uses. i) Interrupt a) Call to an operating system function ii) Trap b) Reaction to an asynchronous external event iii) Supervisor Call c) Handling of a error ... -a, iii-b C) i-b, ii-c, iii-a D) i-a, ii-c, iii-b

Last Answer : C) i-b, ii-c, iii-a

Description : The typical elements of process image are ..................... i) User data ii) System Data iii) User program iv) System stack A) i, iii and iv only B) i, ii, and iv only C) ii, iii, and iv only D) All i, ii, iii, and iv

Last Answer : A) i, iii and iv only

Description : Process Management function of an operating system kernel includes. A) Process creation and termination. B) Process scheduling and dispatching C) Process switching D) All of the above

Last Answer : D) All of the above

Description : The different types of tables maintained by the operating system are ............. A) memory, logical , I/O file B) memory, I/O, file, physical C) memory, I/O, file, process D) memory, logical, I/O, physical

Last Answer : C) memory, I/O, file, process

Description : The two central themes of modern operating system are ............... A) Multiprogramming and Distributed processing B) Multiprogramming and Central Processing C) Single Programming and Distributed processing D) None of above

Last Answer : A) Multiprogramming and Distributed processing

Description : ........... is a large kernel, including scheduling file system, networking, device drivers, memory management and more. A) Monolithic kernel B) Micro kernel C) Macro kernel D) Mini kernel

Last Answer : A) Monolithic kernel

Description : .................. refers to the ability of an operating system to support multiple threads of execution with a single process. A) Multithreading B) Multiprocessing C) Multiexecuting D) Bi-threading

Last Answer : A) Multithreading

Description : The methods or algorithms which are used to increase the performance of disk storage sub-system is called ............. A) Disk performing B) Disk scheduling C) Disk storing D) Disk extending

Last Answer : B) Disk scheduling

Description : ............... is a large operating system core provides a wide range of services. A) Multilithic kernel B) Monolithic kernel C) Micro kernel D) Macro kernel

Last Answer : D) Macro kernel

Description : ........... is a large kernel containing virtually the complete operating system, including, scheduling, file system, device drivers and memory management. A) Multilithic kernel B) Monolithic kernel C) Micro kernel D) Macro kernel

Last Answer : B) Monolithic kernel

Description : Which of the following is/are the functions of operating system? i) Sharing hardware among users. ii) Allowing users to share data among themselves. iii) Recovering from errors. iv) Preventing users from interfering with one another. ... only C) i, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : In ............. generation of operating system, operating system designers develop the concept of multiprogramming in which several jobs are in main memory at once. A) First B) Second C) Third D) Fourth

Last Answer : C) Third

Description : State True or False. 1. Term of reference is the final output of Feasibility Study 2. Design specification report is the final output of System Analysis A) 1-true, 2-true B) 1-false, 2-true C) 1-true, 2-false D) 1-false, 2-false

Last Answer : A) 1-true, 2-true

Description : In ……………… system the interaction between various subsystems cannot be defined with certainty A) Open System B) Closed System C) Deterministic System D) Probabilistic System

Last Answer : D) Probabilistic System

Description : ………………. is responsible for all aspects of data processing, operation research, organization and method, system analysis and design investments. A) Management Services Director B) Data Processing Manager C) Computer Manager D) Both B and C

Last Answer : A) Management Services Director

Description : DDS stands for ………………… A) Data Data Systems B) Data Digital System C) Data Dictionary Systems D) Digital Data Service

Last Answer : C) Data Dictionary Systems

Description : Which of the following is/are the sources for project requests? A) Request from Department managers B) Request from senior executives C) Request from system Analyst D) All of the above

Last Answer : D) All of the above

Description : A context diagram is used A) as the first step in developing a detailed DFD of a system B) in systems analysis of very complex systems C) as an aid to system design D) as an aid to programmer

Last Answer : A) as the first step in developing a detailed DFD of a system

Description : Based on the identification of objectives, input, output and file content, the vital document is called … A) System Definition B) System Document C) System Requirement Document D) System Subject

Last Answer : B) System Document