Mark works as a Programmer for InfoTech Inc. He creates a program that uses the following code.1. class Book2. {3. Short f1= 15;4. Book GetDetails(Book b1)5. {6. b1=null;7. return b1;8. }9. public static void main(String args[])10. {11. Book b1 = new Book();12. Book b2 = new Book();13. Book b3 = b1.GetDetails(b2);14. b1=null;15. //code16. }17. }How many objects will be eligible for garbage collection when line 15 is reached?
Which of the following elements are the subelements of the mime-mapping element in a deployment descriptor file?Each correct answer represents a complete solution. Choose all that apply.
In which of the following cases is the GET method used to retrieve information?Each correct answer represents a complete solution. Choose all that apply.
Which of the following code is used to create an object of security manager?
Which of the following methods returns a Cipher object that implements the specified transformation?
Mark works as a Programmer for InfoTech Inc. He develops the following code snippet.1. public class Header2. {3. //code//4. {5. System.out.println("Print the code.");6. super.finalize();7. }8. }Which of the following header statements should be placed at line 3 to execute the program successfully?