Which of the following statements is false?

a. With a BufferedOutputStream each output operation is directed to a buffer large enough to hold the data of many output operations. Transfer to the output device is performed in one large physical output operation when the buffer fills.
b. With a BufferedOutputStream, a partially filled buffer can be forced out to the device at any time by invoking the stream object’s force method.
c. With a BufferedInputStream, many “logical” chunks of data from a file are read as one large physical input operation into a memory buffer.
d. With a BufferedInputStream, as a program requests data, it’s taken from the buffer. When the buffer is empty, the next actual physical input operation is performed.


b. With a BufferedOutputStream, a partially filled buffer can be forced out to the device at any time by invoking the stream object’s force method.

Computer Science & Information Technology

You might also like to view...

_______ is a construct that defines objects of the same type.

a. A class b. An object c. A method d. A data field

Computer Science & Information Technology

Which of the following is a web-based e-mail service that was built from the ground up to work within the browser rather than with client software installed on computers?

A) Scribd B) Gmail C) Lotus Notes D) GroupWise

Computer Science & Information Technology

_________ registers enable the machine or assembly language programmer to minimize main memory references by optimizing use of registers.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Suppose each of the base class and the derived class has a member function with the same signature. Suppose you have a base class pointer to a derived class object and call the common function member through the pointer. Discuss what determines which function is actually called, whether the one from the base class or the one from the derived class. Consider both the situations where the base class function is declared virtual and where it is not.

What will be an ideal response?

Computer Science & Information Technology