Which two checks are made possible in the byte-code verification?

Which two checks are made possible in the byte-code verification? (Choose two.)

Which two checks are made possible in the byte-code verification? (Choose two.)

A.
CPU usage is controlled.

B.
Access to files is checked.

C.
Digital signatures are verified.

D.
Data type conversions are checked/controlled.

E.
The language access restrictions (for example private, protected) are respected.



Leave a Reply 0

Your email address will not be published. Required fields are marked *