Mark works as a Programmer for InfoTech Inc. He creates a program that uses the following code.1. class Book2. {3. Short f1= 15;4. Book GetDetails(Book b1)5. {6. b1=null;7. return b1;8. }9. public static void main(String args[])10. {11. Book b1 = new Book();12. Book b2 = new Book();13. Book b3 = b1.GetDetails(b2);14. b1=null;15. //code16. }17. }How many objects will be eligible for garbage collection when line 15 is reached?
Which of the following elements contains the <filter> element in the deployment descriptor?
DRAG DROP -Drag and drop the appropriate authentication types from the given options to match their properties.
You work as programmer for PassGuide.Inc. You have purchased a Web application namedSecureProgrammer that uses the programmatic authorization, and the security roles that are not used in your organization. Which of the following deployment descriptor elements must you use so that the SecureProgrammer application can work with your organization?
Which of the following init() method calls initializes a cipher object with a key in the SECRET_MODE?
Mark works as a Programmer for InfoTech Inc. He creates a method named roomBooking() and this method throws IndexOutOfBoundsException. Which of the following roles will automatically handle the exception?