Describe the java.lang package, JAVA Programming

Assignment Help:

Describe the java.lang package ?

Each package describes a number of classes, exceptions, interfaces, and errors. For instance, in Java 1.1 the java.lang package holds these:

Interfaces in java.lang
• Cloneable
• Runnable
Classes in java.lang
• Boolean
• Byte
• Character
• Class
• ClassLoader
• Compiler
• Double
• Float
• Integer
• Long
• Math
• Number
• Object
• Process
• Runtime
• SecurityManager
• Short
• String
• StringBuffer
• System
• Thread
• ThreadGroup
• Throwable
• Void
Exceptions in java.lang
• ArithmeticException
• ArrayIndexOutOfBoundsException
• ArrayStoreException
• ClassCastException
• ClassNotFoundException
• CloneNotSupportedException
• Exception
• IllegalAccessException
• IllegalArgumentException
• IllegalMonitorStateException
• IllegalStateException
• IllegalThreadStateException
• IndexOutOfBoundsException
• InstantiationException
• InterruptedException
• NegativeArraySizeException
• NoSuchFieldException
• NoSuchMethodException
• NullPointerException
• NumberFormatException
• RuntimeException
• SecurityException
• StringIndexOutOfBoundsException
Errors in java.lang
• AbstractMethodError
• ClassCircularityError
• ClassFormatError
• Error
• ExceptionInInitializerError
• IllegalAccessError
• IncompatibleClassChangeError
• InstantiationError
• InternalError
• LinkageError
• NoClassDefFoundError
• NoSuchFieldError
• NoSuchMethodError
• OutOfMemoryError
• StackOverflowError
• ThreadDeath
• UnknownError
• UnsatisfiedLinkError
• VerifyError
• VirtualMachineError


Related Discussions:- Describe the java.lang package

Give an example of code using static and finalize, Give an example of code ...

Give an example of code using static and finalize Example Code: using static & finalize () We want to count exact number of objects in memory of a Student class the one de

Describe about user security issues and social engineering, Describe about ...

Describe about User Security Issues and Social Engineering ? Contrary to popular belief most computer break-ins through external hackers don't happen since of great knowledge

I want android app notes, I want Android App Notes Project Description: ...

I want Android App Notes Project Description: Seeking a developer to create a simple note application I don't need all the visualize features. I just want the user to t

Why we intrested studying social implications of creation, Why should we, a...

Why should we, as computing professionals, be interested within studying the social implications of our creations? This is important Because of remaining the track of money wis

Why do we call javascript an object-based language, Why do we call JavaScri...

Why do we call JavaScript an Object-based Language? In java language an JavaScript shares several similarities with object-oriented languages, and thus is known as an object-ba

Types of dependency injection spring supports, What are the types of Depend...

What are the types of Dependency Injection Spring supports? Ans) there are two types of Dependency Injection Spring a)  Setter Injection: b)  Constructor Injection:

What are the implicit objects in jsp, Implicit objects are formed by the we...

Implicit objects are formed by the web container and have information related to a particular request, page, or application. They are request, response, pageContext, session, appli

How dos attack is a cyber crime what cyber crime can be used, How DoS attac...

How DoS attack is a cyber crime? For what cyber crime can be used? DoS stands for Decline of Service and it is a cyber crime as it jams and within a few cases shut down the goa

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd