Briefly describe the Destroyable interface.

What will be an ideal response?


The javax.security.auth.Destroyable interface provides the content destroy capability of a credential. Again, only two methods are defined in the interface. The boolean isDestroyed() method determines whether or not the credential has been destroyed, and the void destroy() method destroys and clears the information associated with the credential.

Computer Science & Information Technology

You might also like to view...

A collection of statements that performs a specific task is a(n)

a. infinite loop b. variable c. constant d. function e. decision

Computer Science & Information Technology

The technique of immediate data validation and reporting of errors is known as _________.

A. online validation B. regular expression C. inline validation D. immediate validation

Computer Science & Information Technology

A(n) ________ is a large capital letter at the beginning of a paragraph

Fill in the blank(s) with correct word

Computer Science & Information Technology

?A dataset is data that has been verified and is now set so that it cannot be changed.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology