Answer: Java Virtual Machine(JVM)
Explanation: In java,there is the process of the management of the memory by own self or automation , this is known as the garbage collection .The program in it compile to be executed by the java virtual machine(JVM).During this process , object get together in a sort of heap and then unnecessary object are detected which are of no use and delete them to make space for the memory . Therefore, garbage collection is carried out by java virtual machine(JVM).
Answer: True
Explanation:Orthogonal instruction set is the set of instruction that can use can use all addressing mode. They have independent working and so instruction can use any register the prefer and this leads to overlapping in instruction and complexity.
When RISC architecture got introduced ,it got more preference due to reduced instruction and less complexity as compared to orthogonal instruction.So it not considered elegant to have more orthogonal instruction.
Answer:
The answer is "Option D".
Explanation:
Trojan program is a malicious code that is also known as a virus. It is a rootkit, that aims to infect the computer to hide or obscure an object. These programs are mainly used to download additional content, such as additional pieces of malware, to the infected computer, and other options are wrong that can be defined as follows:
- In option A, It is not correct, this option infects the system.
- In option B, It is used for infects another computer that's why it is incorrect.
- In option C, It is incorrect because it is used in cybersecurity.
Answer:
D.
Explanation:
Typically represented by a capital A (or sometimes Av, short for Aperture Value) on the camera mode dial, aperture priority allows the photographer to dial in this specific exposure setting—the ƒ-stop—and asks the camera to calculate the correct corresponding shutter speed in the instant before the shutter is released.
<u>Explanation:</u>
Cloud Computing is the use of hardware and software to deliver a service over a network means on the internet. With cloud computing, users can access files and use applications from any device that can access the Internet. An example of a Cloud Computing provider is Email.
When you have a lot of data you can upload on the cloud server. To upload your data on cloud you must have a account and permission to save and upload your data.
<u>Example is:</u> data storage sites