A programmer can exam the byte codes by disassembling a class file using the command ____.

A. java -c class_name
B. javap -c class_name
C. javac -c class_name
D. java -p class_name


Answer: B

Computer Science & Information Technology

You might also like to view...

A(n) ________ informs the user that invalid data has been entered in a cell

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which VLSM subnet will NOT overlap?

A) 172.31.1.46 /30 B) 172.31.1.33 /28 C) 172.31.1.129 /32 D) 172.31.1.66 /25

Computer Science & Information Technology

What part of http://www.nps.gov/history/preserve-places.html is the protocol?

A. http:// B. www.nps.gov C. history D. preserve-places.html

Computer Science & Information Technology

Using a dot at the beginning of a file name makes the file more secure.

Answer the following statement(s) true (T) or false (F)

Computer Science & Information Technology