1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
givi [52]
3 years ago
14

Some programming languages permit arbitrary flow of control from any place in a program to any other place in the program. Not J

ava. What is the rationale for Java not allowing that?
Computers and Technology
1 answer:
liraira [26]3 years ago
4 0
Besides portability, another of Java's key advantages is its set of security features which protect a PC running a Java program not only from problems caused by erroneous code but also from malicious programs (such as viruses). You can safely run a Java applet downloaded from the Internet, because Java's security features prevent these types of applets from accessing a PC's hard drive or network connections. An applet is typically a small Java program that is embedded within an HTML page.
You might be interested in
What is the name of the feature that can be enabled on slower-speed WAN links to prevent a large data transfer from affecting th
Lelu [443]

Answer:

Link fragmentation and interleaving

Explanation:

Link fragmentation and interleaving is a factor that prevent the delay of sensitive packets to transmission. It is used to minimized the delay by fragmenting packets & interleaving delay packets that are very sensitive.

it is used to delay the serialization on links. serialization is refer to the duration of sending frame to any link

6 0
3 years ago
?Which programmer designs programs for applications executed on the Internet?
fomenos
Web programmer hoped that helped and good luck (:
3 0
3 years ago
Read 2 more answers
The maximum number of characters that a cell can contain is
lina2011 [118]
The answer is:

32,767
6 0
3 years ago
Read 2 more answers
dash is a set of communication standard using for transferring file information between computers in a network​
8090 [49]

Answer:

protocol

Explanation:

hope this helps.

4 0
3 years ago
Cindy tried to delete a customer but the customer still had open invoices so the system would not allow her to delete the custom
Verdich [7]

Answer:

The answer is "Referential integrity".

Explanation:

This relates to one aspect of data integrity. Data across multiple tables are linked via relationships. In view of the distinct customer & invoice tables, each invoice table should have the primary key specified throughout the Customer table, for instance. Whenever the invoice table contains a customer ID reference. This ID including its customer will be only a table of the customer.

8 0
3 years ago
Other questions:
  • give two main reasons that should be considered when preparing and deploying a functional restoral scenario.
    5·1 answer
  • How can a student manage time and stress for better results in school? Check all that apply. by taking breaks while studying by
    8·2 answers
  • Sarah's Texas location has a server that is starting to give her trouble. It is needing to be restarted frequently and seems to
    15·1 answer
  • The picture that graphically represents the items you use in Windows is called a/an <br> ___?
    14·1 answer
  • Give a recursive algorithm that takes as input a string s, removes the blank characters and reverses the string. For example, on
    7·1 answer
  • Write a function named reverse_list that takes as a parameter a list and and reverses the order of the elements in that list. It
    12·1 answer
  • Interstate highway numbers Primary U.S. interstate highways are numbered 1-99. Odd numbers (like the 5 of 95) go north/south, an
    8·1 answer
  • Can you move it like this? I can shake it like that
    6·1 answer
  • Which situations are the most likely to use telehealth? Select 3 options.
    7·1 answer
  • (a) What is the meaning of word 'computer (b) Cive a reason for the evolution of computer (c) Write a weakness of a computer (d)
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!