Match each item with a statement below:

A. compiles Java program into Java byte codes
B. allows Java byte codes to execute
C. presents a bounded environment for a Java program to run within
D. the gatekeeper of the JVM
E. allows you to associate permissions based upon the source of a loaded class
F. monitors references to dynamic memory and releases the memory when there are no longer any references to it
G. memory pools holding objects of different ages
H. class that allows applications to implement a code-level security policy
I. a set of Java objects


A. javac
B. JVM
C. Sandbox
D. ClassLoader
E. SecureClassLoader
F. Garbage collector
G. Generations
H. SecurityManager
I. Domain

Computer Science & Information Technology

You might also like to view...

This cable can support a data rate up to 10 Gbps.

What will be an ideal response?

Computer Science & Information Technology

When you send an email to your professor, a server holds on to that email until the professor requests it

Indicate whether the statement is true or false

Computer Science & Information Technology

The page number can be prevented from appearing on the ________ slide

Fill in the blank(s) with correct word

Computer Science & Information Technology

The first line of a JavaScript function that provides the function name is the ________

Fill in the blank(s) with correct word

Computer Science & Information Technology