verifier confirms that all security and portability are valid and do not violate Java’s security restrictions.

A. Byte code B. package C. JAR (Java Archive)
D. ASCII E. arrays F. import
G. private H. polymorphic I. CASE tool
J. Inheritance K. Interoperability L. heap
M. Protected

4.1 A ________ operation has same name but uses different methods depending on class.
4.2 ________ verifier confirms that all security and portability are valid and do not violate Java’s security restrictions.
4.3 Storage for objects is allocated in a designated part of the memory called the ________ which has a finite size.
4.4 ________ is defined as cooperation between object codes produced by different software
vendors and written in different programming languages.
4.5 A(n) ________ declaration is not required if you always refer to a class with its fully qualified class name.
4.6 In Java, ________ are objects.
4.7 Once algorithms are finalized, we convert them into a program using OOPL or using ________.
4.8 A ________ in Java is an encapsulation mechanism that can be used to group related classes, interfaces, enums, and sub packages.
4.9 The ________ utility provides a convenient way of bundling and deploying Java programs.
4.10 ________ in object-oriented modelling can be used to generalize and to specialize classes.

Leave a Reply