1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
EastWind [94]
3 years ago
9

InJava garbage collection is done by_______________JVM (Java VirtualMachine)ProgrammerBoth JVM (Java Virtual Machine)and Program

merOS (Operating System)None of given
Computers and Technology
1 answer:
lozanna [386]3 years ago
7 0

Answer: Java Virtual Machine(JVM)

Explanation: In java,there is the process of the management of the memory by own self or automation , this is known as the garbage collection .The program in it compile to be executed by the java virtual machine(JVM).During this process , object get together in a sort of heap and then unnecessary object are detected which are of no use and delete them to make space for the memory  . Therefore, garbage collection is carried out by java virtual machine(JVM).

You might be interested in
When looking at security standard and compliance, which three (3) are characteristics of best practices, baselines and framework
Brilliant_brown [7]

Answer:

In order to observe best practices, and to meet with technical and other requirements, organizations often use frameworks for cybersecurity compliance and regulatory compliance. These frameworks provide best practices and guidelines to assist in improving security, optimizing business processes, meeting regulatory requirements, and performing other tasks necessary to achieve specific business objectives such as breaking into a particular market niche or selling to government agencies.

Many such frameworks exist, and the recommendations set out in them can impose difficult and often expensive demands on enterprise resources – especially in situations where an organization is subject to a number of regulatory compliance regimes, whose requirements it has to meet while maintaining its own strong cybersecurity status.

Explanation:

4 0
3 years ago
Help! What is this graph and what does it represent?
Lunna [17]

Answer:

Explanation:

how much something had in each month in this graph

7 0
3 years ago
Guidelines on how to write a report on how technology has affected office duties
UNO [17]

Answer:

weweweweweewewwewweewewweeew

Explanation:

weweweweewweweweewweewweewewew

5 0
3 years ago
How to clear cache in Internet Explorer Version 11
Paladinen [302]
Clear the browser history and accept everything
7 0
4 years ago
Read 2 more answers
Types of antivirus explain them
Veronika [31]

Answer: an antivirus is a type of program designed  to protect computers from  viruses, spyware, botnets, rootkits, keyloggers and such. There are many versions and types of anti-virus programs which can be very helpful.

Such as:

Norton.

Kaspersky.

Ad Aware.

AVG

Mc Afee

Hope this helps u...

Explanation:

3 0
4 years ago
Other questions:
  • Which of the following were input devices for early portable computers?
    6·1 answer
  • Chunking is a good strategy for completing large assignments because it makes the work
    15·1 answer
  • A _____ attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in
    9·1 answer
  • While adding information to the employee information database, Neil's computer crashed, and the entire database was erased. Whic
    12·1 answer
  • A user calls to report that she is experiencing intermittent problems while accessing the wireless network form her laptop compu
    9·1 answer
  • Dots (or periods) in a Java statement are used to separate the names of the components that make up the statement.
    8·1 answer
  • The frame header at the Data Link layer includes hardware addresses of the source and destination NICs. What is another name for
    11·1 answer
  • Write a half page summary on how to clean a Gaming PC properly.
    14·1 answer
  • Select the correct answer.
    10·1 answer
  • Medical assistant, Jackie, was downloading some patient information on cerebral palsy from the Internet. While downloading, Jack
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!