A. Byte code B. package C. JAR (Java Archive)
D. ASCII E. arrays F. import
G. private H. polymorphic I. CASE tool
J. Inheritance K. Interoperability L. heap
M. Protected
4.1 A ________ operation has same name but uses different methods depending on class.
4.2 ________ verifier confirms that all security and portability are valid and do not violate Java’s security restrictions.
4.3 Storage for objects is allocated in a designated part of the memory called the ________ which has a finite size.
4.4 ________ is defined as cooperation between object codes produced by different software
vendors and written in different programming languages.
4.5 A(n) ________ declaration is not required if you always refer to a class with its fully qualified class name.
4.6 In Java, ________ are objects.
4.7 Once algorithms are finalized, we convert them into a program using OOPL or using ________.
4.8 A ________ in Java is an encapsulation mechanism that can be used to group related classes, interfaces, enums, and sub packages.
4.9 The ________ utility provides a convenient way of bundling and deploying Java programs.
4.10 ________ in object-oriented modelling can be used to generalize and to specialize classes.