What makes Java platform independent?

Answers

Answer 1

Answer:

Java it is the use of Byte code that makes it platform independent.

Explanation:

Java platform independent language allows its the end users to access they source code and other language automatically,its a human readable language.

Java is created in the James Gosling at the sun micro systems,and java is an open source programming language, generally the people refer the java because its source connections.Java code may be use sequence of machine that can be use executed by the directly CPU,and all the program in java are compiled by java c.Java is an independent platform and variety of methods, its object oriented language, and java is study platform.Java program are compiled into byte code and that byte code is platform independent, and they machine execute the byte code the java virtual machine.Java is the platform independent because it does not depend on the type of platform,and the virtual machine also interpret the representations.Java compiler is the .class file or the byte code and the machine native code,java is that depend on java virtual machine.Java is does not required any licence to the run and they also reliable platform to work on.


Related Questions

The question is in the picture

Answers

Answer:

nordthaf

Explanation:

nofth

What is true about connectionless packet switched networks? a. each datagram must contain both source and destination addresses b. without a connection, datagrams may not arrive in sequential order at the destination c. establishment of a connection between communicating points is not required prior to exchanging datagrams, thus reducing overhead communications d. all of the above are true

Answers

Answer:

d. all of the above are true

Explanation:

Connectionless Packet Switching is a term that is used in computer networking operations to describe the breaking of information exchange path into a various packet of small sizes acquired and refined over network switches and routers, which is then transferred from one subsequent node to the other. It is sometimes referred to as Datagram Networks

However, during this operation, Connectionless Packet Switching must satisfy the following amongst others:

1.  each datagram must comprise both source and destination addresses

2.   without a connection, datagrams may not come in sequential order at the destination

3.  establishment of a connection between communicating points is not needed prior to exchanging datagrams, thus reducing overhead communications

Therefore, considering the available options, the correct answer is option D

A coach wants to divide the basketball team into two groups for a practice game. Which statistical measurement is the coach most likely to use?
A) percentile
B) mean
C) median
D) mode

Answers

Answer:

median

Explanation:

Answer:

C) Median

Explanation:

Which color indicates the private, trusted segment of a network?
A. Green.
B. Orange.
C. Red.
D. Blue.

Answers

Answer:

A. Green.

Explanation:

In order to distinguish or represent different levels of networks, SmoothWall open source firewall solution, made use of three distinct colors to indicate different meanings. These are:

1. The red color is used to reveal that, there is no connection or network

2. Orange color reveals the untrusted segment of the network but shares the Internet connection

3. Green color indicates the private, trusted segment of a network

Hence, in this case, the correct answer is option A. Which is GREEN

What do you think is the single greatest physical threat to information systems? Fire? Hurricanes? Sabotage? Terrorism? Something else? Discuss this question and provide support for your answer.

Answers

Answer:

The single greatest physical threat to information systems is:

Sabotage

Explanation:

Sabotage describes the efforts of internal persons to ensure that a system does not operate as intended or is destroyed.  Among the threats to information systems, this is the greatest.  The problem with sabotage is that the operators are internal, they know the system very well.  They understand the weak points and the strengths of the system.  They are internal terrorists to any information system.  These internal saboteurs are capable of using any means to achieve their purpose.  Therefore, it is necessary to scrutinize employees from time to time to discover internal risks.

Which example of IT lifelong learning is most likely to lead to a promotion

Answers

Answer:

A supervisor learns about personal finance.

Hope the above answer helps u...

If my answer helped u mark me as brainlist..!

Follow me...

Answer:

A supervisor learns about personal finance.

Explanation:

Write code that determines the number of full days represented by the number of hours stored in the variable hours and stores that value in the variable full_days. For example, the number of full days in 50 hours is 2. Ignore any leftover hours that don't contribute to a full day. Assume the value of hours has already been initialized. Solve It!

Answers

Answer:

hours = 50

full_days = int(hours / 24)

print("The number of full days in " + str(hours) + " hours is " + str(full_days))

Explanation:

Initialize the hours

Since there are 24 hours in a full day, divide the hours by 24. Note that you need to typecast it to the int, because the result is a decimal value by default

Print the values as requested

Which of the following could be defined as a general-purpose computing device that enables workers to create, manage, store, search for, and process information? MP3 player. Hard drive. Flash drive. Personal computer.

Answers

Hard drive is your answer

Answer:

It's personal computer

Explanation:

I got it right on my assignment

Which of the following statement about device formatting is FALSE?
A) Device manufacturers store the initial file-system data structures in the device.
B) Operating system can create multiple partitions with in a single device.
C) Volume creation is implicit when a file system is placed directly within a partition.
D) Not every partition contains a copy of the operating systems.

Answers

Answer:

The correct option is;

A) Device manufacturers store the initial file-system data structures in the device.

Explanation:

Before a storage device can be used for data storage, it is required to prepare the device for use and to make the device to become visible to the operating system by formatting of the device

New storage devices are not pre-formatted or come with a ready to use file system as there are different file systems specifically designed for particular  operating systems or operating environment.

Formatting creates partitions, makes the hard drive visible to the operating system and creates a file system that is new such that the storage device can be used for storing files.

_______tools enable people to connect and exchange ideas.A) Affective computing. B) Social media. C) Debugging D) Computer forensics.

Answers

Answer:

B) Social media.

Explanation:

Social media is well, a media, that allows you to share things with people and have discussions.

What are three things to consider in programming design?
the problem being addressed, the goals of the project, and the programming language that will be used
the problem being addressed, the goals of the project, and the age of the end users
the age of the end users, the programming language that will be used, and the programming style of the
programmers working on the project
the age of the end users, the goals of the project, and the programming style of the programmers working on the
project

Answers

The issue being solved, the project's objectives, and the users' ages. The project's programmers' programming styles, the programming language they will use, and the age of the intended customers.

What is programming language?

Programming language is defined as a computer language used to converse with computers by programmers (developers). Orthogonality or simplicity, available control structures, data types, and data structures, syntactic design, support for abstraction, expressiveness, type equivalence, strong versus weak type checking, exception handling, and limited aliasing are among the characteristics of a programming language.

Clarity, simplicity, and unity offer a way to express algorithms as well as a framework for thinking about them. Every possible feature combination has value thanks to orthogonality. Surprisingly, it may frequently be reduced to three basic programming constructs known as loops, selects, and sequences.

Thus, the issue being solved, the project's objectives, and the users' ages. The project's programmers' programming styles, the programming language they will use, and the age of the intended customers.

To learn more about programming language, refer to the link below:

https://brainly.com/question/12696037

#SPJ5

A workstation’s user prefers KDE over GNOME. Which login manager can this user run to ensure direct login to KDE?
a. XDM
b. KDM
c. GDM
d. Any of the above

Answers

Answer:

B. KDM

Explanation:

The KDE display manager (KDM) was developed for the KDE desktop environment, while the GDM is a display manager for the gnome desktop environment.

The XDM display manager is used by the Linux operating system when a specific desktop environment is not chosen.

_______ tools enable people to connect and exchange ideas.
A) Affective computing.
B) Social media.
C) Debugging
D) Computer forensics.

Answers

Social media is a tool that enables people to connect and exchange ideas. Thus the correct option is B.

What is communication?

Communication is referred to the exchange of information between two individuals in the form of conversation, opinion, suggestion, or advice with the help of medium or direct interaction.

Social media is referred to as a tool of communication that enables people to share their ideas, thoughts, and opinions with a wide network of people and helps them to get information about the events happening in the world.

An internet tool for interaction, information sharing, and social networking is social media. Networking software that connects people around the world is an internet-based technology, strictly understood.

Therefore, option B is appropriate.

Learn more about Communication, here:

https://brainly.com/question/22558440

#SPJ5

Social media is a tool that enables people to connect and exchange ideas. Therefore, the correct answer is option B.

The exchange of information between two people in the form of conversation, opinion, suggestion, or advice with the use of a medium or direct interaction is referred to as communication.

Social media is referred to as a communication tool that enables individuals to communicate their thoughts, ideas, and opinions with a large network of people and assists them in learning about global events.

Social media is an online medium for communication, sharing of knowledge, and social networking. According to the definition of the term, internet-based technology includes networking software that links individuals worldwide.

Therefore, the correct answer is option B.

Learn more about communication here:

brainly.com/question/22558440

#SPJ6

ethical issues of cyber bullying

Answers

Answer:

Explanation: As a student, I am aware of the existence of Cyber-bullying and the manner in which it can be carried out. I am also sensitive to the serious nature of the problem. However, I realise that I need to know more about the issue if I am to be effective in fostering a supportive learning environment in which students can grow as good digital citizens.

Cyber-bullying is similar to traditional psychological bullying in that-

There is an imbalance of power between the victim & perpetrator.

Victims draw negative attention & are isolated from their peer group.

Perpetrators are often encouraged & supported by their peer group.

The actions of the perpetrator are deliberate, repeated & relentless.

The negative attention is uninvited & unwanted by the victim.

The effects often cause depression, anxiety, low self-esteem, poorer mental & physical health and school avoidance.

Today technology is based in Science and engineering, earlier it was based on
__________ _____-_____.

Answers

Answer:

Technical know-how

Explanation:

The parameter passing mechanisn used in C is

Answers

Answer:

Hope you understand this answer

Pass by value is the answer

HELP FAST PLEASE!!! What is a glass tube containing electrodes used as a switch to produce on or off signals for the computer? First person to answer gets branliest. :3

Answers

Answer:

The answer is... Vaccum Tubes...

This is one which was used in computers before the Phenomenal invention of Transisitors.

A glass tube containing electrodes used as a switch to produce on or off signals for the computer is a Vacuum Tube.

What is a vacuum tube?

A vacuum tube is a tube that controls the transfer of electrons inside a tub. It is a valve. It is also called an electronic device used in television, amplifiers, radios, etc.

A vacuum tube contains a cathode and anode. The cathode is heated, and it emits or releases electrons. This emission is called thermionic emission. It controls the transfer of electrons, in a high-charge device. This is applied to the device where the electric potential difference is very high.

Vacuum tubes are used in old times, they are still used in some industries.

Thus, a vacuum tube is a glass tube with electrodes that serves as a switch to generate on or off signals for the computer.

To learn more about vacuum tubes, refer to the link:

https://brainly.com/question/14992264

#SPJ2

Clicking and double-clicking are two of the five

Answers

Answer:

The correct answer is events

1) You have a class called Sheep that wants to keep track of how many Sheep have ever been created. Where is a good place to put that variable? 2) When an h file mentions another class, what is that called? (When a cpp file needs to use a class, they include it. This is an h file just mentioning a class, like it has a pointer of that type. You are promising the compiler that the class is in another file.) 3) What is a good guideline for deciding you must write a copy constructor, an assignment operator, and a destructor? 4) void Rock::Func( const Rock & X){} What is that argument type called and what does it do? 5) We saw overloading the = sign. How do you declare a class wanting to override the parenthesis operator?

Answers

Answer:

The counter variable for the sheep count should be declared and initialized before the constructor in the class. The extern keyword should be used to declare the class in the receiving C source file. A constructor is defined when there is a need to instantiate an object with an argument and an assignment operator is used to initialize a variable. The const keyword is used to specify a variable whose value should not change during the course of the program execution.

Explanation:

The C programming language is an object-oriented programming language and has variable specifiers to define variable scopes in a program.

What term is used to describe an individual's money and personal property? budget income assets finances

Answers

Answer:

Pretty sure it's assests.

Explanation:

Income - Intake of money.

Budget - How much money you can spend.

Finances - Things you need to pay ort fund.

An asset is made up of the set of quantifiable goods and properties, which are owned by a person or a company.

What is an asset?

A right that has financial value is called an asset, which is a resource with value that someone owns.

Characteristics of an asset

The assets are recorded in the accounting balances, forming the credit.

The assets will receive a monetary value each, this valuation will depend on different criteria.

Therefore, we can conclude that the asset is the set of personal property, rights and other resources owned by a person.

Learn more about an asset here: https://brainly.com/question/16983188

cellular digestion associated by what organelles?​

Answers

Answer:

lysosomes

Explanation:

Cell Digestion and the Secretory Pathway. The primary sites of intracellular digestion are organelles known as the lysosomes, which are membrane-bounded compartments containing a variety of hydrolytic enzymes.

It it associated with lysosomes

A stop sign is a example of:
A. An advertisement
B. An animated text
C. An audio text
D. A visual text

Answers

Answer:

A visual text

Explanation:

This is because it is used to send information through something you can see. Visual text is an image, word or picture that doesn't move used to share information. So because a stop sign can't move and it uses words to share information it is an example of a visual text.

HOPE IT HELPED  

The person who Oversee the direct work of employees and is responsible for the day-to-day tasks the employees complete is likely

Answers

Answer: Operational Manager

Answer: operational manager

Explanation: APEX

What does an output allow a computer to do

Answers

Output devices allow the computer system to interact with the outside world by moving data into and out of the system.

Answer:

the previous answer belowed me  looked it up online LOL

but im taking this quiz rn and the answer is either  Display information or Recieve information thanks bye

Explanation:

true false) keybord has two shift keys.​

Answers

Answer:

True, looking at 'em right now!

Explanation:

Help me for this question

Answers

Answer:

Answer C

Explanation:

You are welcome

The __________ utility has the capability to manage users, create and administer user groups, and apply user rights to those users and groups. Active Directory Administrative Center Active Directory Domains and Trusts Active Directory Sites and Services Active Directory Users and Computers

Answers

Answer:

Active Directory Users and Computers

Explanation:

Active Directory Users and Computers is a term that describes Microsoft Management Console that is utilized in conducting and managing Active Directory, the objects; which comprises of the users and computers, the Organizational Units, together with their characteristics.

Hence, the Active Directory Users and Computers utility has the capability to manage users, create and administer user groups, and apply user rights to those users and groups.

People convicted of cyberbullying in most states
face no punishment for their actions.
face varying degrees of punishment.
are taught how to use technology positively.
are forced to do community service.

Answers

Answer: The Answer is B. face varying degrees of punishment.

Hope this helps! ^^ (also i know this is the right answer because i got it correct)

Answer:

b

Explanation: the punishment depends on the severeness , so we dont know the exact punishment

what are the earliest invention in human history​

Answers

Answer: Tools, Boats, Hand made bricks.

Explanation: The tools were the first technological advancement, the boats were the next, them hand made bricks for construction.

1605:newspapers
1608:telescope
1620:Compound microscope
1630:Slide rule
1642:mechanical calculator 1643:barometer
1650:vacuum pump
1656:pendulum clock

Hope this is enough

Write a MATLAB function named average_of_scores_with_drops The function will have two inputs and two return values. The first input will be a list of scores. The second input will be a postive integer representing the number of scores to drop. It will not be larger than the length of the list. Your function should determine the average of the scores after dropping the specified number of lowest scores. The first return value must be a real number equal to the average score. The second return value must be the number of items that were averaged. Notes: Example Test Case: SCORES

Answers

Answer:

-%Define the function.

function [avg, ele_left] = average_of_scores_with_drops(input_list, drop_element)

%Sort the list.

input_list = sort(input_list);

%Compute the length of the list.

len_list = length(input_list);

%Declare and initialize the variable.

sum = 0;

%Increase the element to be drop by 1.

i = drop_element + 1;

%begin the for loop.

for k = i : length(input_list)

%Add the elements.

sum = sum + input_list(k);

%End of the for loop.  

end

%Compute the elements left after dropping the dropped element.

ele_left = length(input_list) - drop_element;

%Compute the average of the elements left.

avg = sum/ele_left;

%End of the function defined.

end

%Run the following code in the command prompt.

%Call the function and return the average

%score and the number of elements

%whose average is computed.

[average_score , number_of_items] = average_of_scores_with_drops([8 6 1 2 3 5 10], 2)

SAMPLE OF OUTPUT

average_score = 6.40000000000000

number_of_items = 5

Other Questions
Matter is all around us and is made of atoms. How are atoms of different elements different from each other? How do these differences relate to their properties? Please Help Me Which letter represents Chinese dynasties? Which letter represents the birthplace of Hinduism? Which letter represents the beginning of the Hebrew culture? Name a number greater than 1 that is both a perfect square and a perfect cube. Explain how you know this. a bin contains 26 markers four students each choose the same number of markers if they choose as many markers as possible how many markers are left in the bin please help me with this question fast with the work shown What ratios are equivalent to 7:3|. 12:9, 14:6, 11:7, 4:2,| PLZ HELP The typical starting point of any firm's marketing mix is the:____________A) analysis of what production equipment is available and owned by the companyB) design of the promotion campaign to be used for the productC) selection of the places through which the good or service will be soldD) determination of the product's price, enabling future revenues and budgets to be estimatedE) development of the good or service to be sold Write the missing number 1. uno,______,_______, cuatro. 2. dos,______, seis,_______ diez 3. tres,_______ nueve 4. _______,cinco,________, nueve Strength and weakness of each open/flexible business organization forms What is a "military coup? And how have they figured prominently in Nigeria's history? Will give brainliest answer 4 to the second power is the same as 4 squared. True or false ? Before Bradstreet began writing poetry, the pilgrims sailed the ocean blue to escape ? why does paush talk about a football what volcano in the U.S. poses a significant threat to air travel between North America and East Asia? the length of a rectangle is 3 inches m ore that its width. if the perimeter is 42 inches, what are the dimensions of the rectangle Round the following numbers to 2 decimal places 3526.48502 12.6433 0.2099 I need Help Asap Please Please The Southeastern Native Americans dwellings were permanent structures, while the Gulf Native Americans homes were portable. True or False? whats the final answer?