The JVM relies on the platform and various software technologies to present a secure location where Java programs run. This secure location is called a(n) ____ in JVM terminology.

A. procedure domain
B. execution domain
C. callbox
D. sandbox


Answer: D

Computer Science & Information Technology

You might also like to view...

The cin object must be followed by

A) a single stream insertion (<<) operator. B) one or more stream insertion operators (<<). C) a single stream extraction (>>) operator. D) one or more stream extraction (>>) operators. E) no operators.

Computer Science & Information Technology

The basic concept of a ____ is to offset a copy of text, usually black, behind the main text.

A. gradient B. blended background C. drop shadow D. background shadow

Computer Science & Information Technology

________ is a physical capacity that requires no further intellectual effort

A) Speaking B) Talking C) Listening D) Hearing

Computer Science & Information Technology

When you select an item in Visual Studio and press the F1 key, you get_________.

a. properties window b. the solution explorer window c. context-sensitive help d. tool-tip for the item

Computer Science & Information Technology