Which two checks are made possible in the byte-code verification? (Choose two.)
A.
CPU usage is controlled.
B.
Access to files is checked.
C.
Digital signatures are verified.
D.
Data type conversions are checked/controlled.
E.
The language access restrictions (for example private, protected) are respected.