SlideShare a Scribd company logo
1 of 1
Download to read offline
one of the main design goals for the java programming language is security. Explain, in detail
how java achieves this goal?
Solution
1.Security became an essential piece of a java language from the starting day itself.Additionally
it is an progressing design aim of the java community .An intrinsic security is observed ,hence
the java language is in much now-a-days which is the major cause.
2.Every action is possible through Java virtual machine(JVM) .it is mainly to establish the
attributes like trust,integrity,confidentiality..etc.
3.Java offers large compile perusal ,leads with secondary stage of examining .language attributes
motivates the programmers closely to good programming recurents. especially the memory
management representation is uncomplicated.it removes the total classes of programing mistakes
which causes a continous trouble to the C and C++ programmers.moreover the objects are
fabricated with a new operator.precised programmer defined pointer data types, pointer
arthematic and self-activated garbage collector is absent.
4.java language is manipulated in distributed domains that tells that the security is most
important including the security attributes which is intended in the java language and run time
system.
5.In case of network habitats ,the applications in java language are secured from interruption
with an unofficial code venturing to acheive alrady the scenes and occupy file systems.

More Related Content

Similar to one of the main design goals for the java programming language is se.pdf

Advantages of java development
Advantages of java developmentAdvantages of java development
Advantages of java development
webjohn52
 
TechSearchWeb.pdf
TechSearchWeb.pdfTechSearchWeb.pdf
TechSearchWeb.pdf
TechSearchWeb
 
Technology Tutorial.pdf
Technology Tutorial.pdfTechnology Tutorial.pdf
Technology Tutorial.pdf
TechSearchWeb
 
Java Basic.pdf
Java Basic.pdfJava Basic.pdf
Java Basic.pdf
TechSearchWeb
 

Similar to one of the main design goals for the java programming language is se.pdf (20)

Java Notes .pdf
Java Notes .pdfJava Notes .pdf
Java Notes .pdf
 
Advantages of java development
Advantages of java developmentAdvantages of java development
Advantages of java development
 
Features of java - javatportal
Features of java - javatportalFeatures of java - javatportal
Features of java - javatportal
 
Unit1 introduction to Java
Unit1 introduction to JavaUnit1 introduction to Java
Unit1 introduction to Java
 
Java: A Secure Programming Language for Today’s Market
Java: A Secure Programming Language for Today’s MarketJava: A Secure Programming Language for Today’s Market
Java: A Secure Programming Language for Today’s Market
 
Java: A Secure Programming Language for Today's Market
Java: A Secure Programming Language for Today's MarketJava: A Secure Programming Language for Today's Market
Java: A Secure Programming Language for Today's Market
 
Introduction to java
Introduction to javaIntroduction to java
Introduction to java
 
Java and its features
Java and its featuresJava and its features
Java and its features
 
TechSearchWeb.pdf
TechSearchWeb.pdfTechSearchWeb.pdf
TechSearchWeb.pdf
 
Technology Tutorial.pdf
Technology Tutorial.pdfTechnology Tutorial.pdf
Technology Tutorial.pdf
 
Hiring Java Developers A Comprehensive Guide for Success.pdf
Hiring Java Developers A Comprehensive Guide for Success.pdfHiring Java Developers A Comprehensive Guide for Success.pdf
Hiring Java Developers A Comprehensive Guide for Success.pdf
 
Java notes
Java notesJava notes
Java notes
 
Features of java Part - 3
Features of java Part - 3Features of java Part - 3
Features of java Part - 3
 
TechSearchWeb Tutorials.pdf
TechSearchWeb Tutorials.pdfTechSearchWeb Tutorials.pdf
TechSearchWeb Tutorials.pdf
 
Java Virtual Machine.pdf
Java Virtual Machine.pdfJava Virtual Machine.pdf
Java Virtual Machine.pdf
 
Dynamic Multi Levels Java Code Obfuscation Technique (DMLJCOT)
Dynamic Multi Levels Java Code Obfuscation Technique (DMLJCOT)Dynamic Multi Levels Java Code Obfuscation Technique (DMLJCOT)
Dynamic Multi Levels Java Code Obfuscation Technique (DMLJCOT)
 
Java Basic.pdf
Java Basic.pdfJava Basic.pdf
Java Basic.pdf
 
Java chapter 1
Java   chapter 1Java   chapter 1
Java chapter 1
 
Java 2 computer science.pptx
Java 2 computer science.pptxJava 2 computer science.pptx
Java 2 computer science.pptx
 
Professional-core-java-training
Professional-core-java-trainingProfessional-core-java-training
Professional-core-java-training
 

More from suhshbhosale

The article at those photos groups 20 amino acids into 6 groups acco.pdf
The article at those photos groups 20 amino acids into 6 groups acco.pdfThe article at those photos groups 20 amino acids into 6 groups acco.pdf
The article at those photos groups 20 amino acids into 6 groups acco.pdf
suhshbhosale
 
Studying Viruses can be important because they are often disease .pdf
Studying Viruses can be important because they are often disease .pdfStudying Viruses can be important because they are often disease .pdf
Studying Viruses can be important because they are often disease .pdf
suhshbhosale
 
send edited codeMain 2public class Main2 {   public static voi.pdf
send edited codeMain 2public class Main2 {   public static voi.pdfsend edited codeMain 2public class Main2 {   public static voi.pdf
send edited codeMain 2public class Main2 {   public static voi.pdf
suhshbhosale
 
Proteins fold. How WhySolutionANSProtein folding Protein.pdf
Proteins fold. How WhySolutionANSProtein folding Protein.pdfProteins fold. How WhySolutionANSProtein folding Protein.pdf
Proteins fold. How WhySolutionANSProtein folding Protein.pdf
suhshbhosale
 
PLN 360560 Environmental Impact Assessment Homework No. 4 1. An appl.pdf
PLN 360560 Environmental Impact Assessment Homework No. 4 1. An appl.pdfPLN 360560 Environmental Impact Assessment Homework No. 4 1. An appl.pdf
PLN 360560 Environmental Impact Assessment Homework No. 4 1. An appl.pdf
suhshbhosale
 
Meyer and colleagues performed three rounds of X-ray crystallography.pdf
Meyer and colleagues performed three rounds of X-ray crystallography.pdfMeyer and colleagues performed three rounds of X-ray crystallography.pdf
Meyer and colleagues performed three rounds of X-ray crystallography.pdf
suhshbhosale
 
Numerous diseases are caused by problems in DNA replication or repai.pdf
Numerous diseases are caused by problems in DNA replication or repai.pdfNumerous diseases are caused by problems in DNA replication or repai.pdf
Numerous diseases are caused by problems in DNA replication or repai.pdf
suhshbhosale
 
In the Mexican swordtail fish, the wild-type color is olive-green. Ot.pdf
In the Mexican swordtail fish, the wild-type color is olive-green. Ot.pdfIn the Mexican swordtail fish, the wild-type color is olive-green. Ot.pdf
In the Mexican swordtail fish, the wild-type color is olive-green. Ot.pdf
suhshbhosale
 

More from suhshbhosale (20)

What two kinds of secondary bonds hold polymer chains together Which.pdf
What two kinds of secondary bonds hold polymer chains together Which.pdfWhat two kinds of secondary bonds hold polymer chains together Which.pdf
What two kinds of secondary bonds hold polymer chains together Which.pdf
 
When hiking up most Stratovolcanoes, which rock composition(s) will .pdf
When hiking up most Stratovolcanoes, which rock composition(s) will .pdfWhen hiking up most Stratovolcanoes, which rock composition(s) will .pdf
When hiking up most Stratovolcanoes, which rock composition(s) will .pdf
 
What image of society is held by the three major theoretical approac.pdf
What image of society is held by the three major theoretical approac.pdfWhat image of society is held by the three major theoretical approac.pdf
What image of society is held by the three major theoretical approac.pdf
 
What are the major evolutionary trends that developedamong major v.pdf
What are the major evolutionary trends that developedamong major v.pdfWhat are the major evolutionary trends that developedamong major v.pdf
What are the major evolutionary trends that developedamong major v.pdf
 
True or falsea. List index values must be integers.b. Lists can.pdf
True or falsea. List index values must be integers.b. Lists can.pdfTrue or falsea. List index values must be integers.b. Lists can.pdf
True or falsea. List index values must be integers.b. Lists can.pdf
 
True false correction questions and fill in the blank. Same rules app.pdf
True false correction questions and fill in the blank. Same rules app.pdfTrue false correction questions and fill in the blank. Same rules app.pdf
True false correction questions and fill in the blank. Same rules app.pdf
 
Show that all the singular points of the following functions are pol.pdf
Show that all the singular points of the following functions are pol.pdfShow that all the singular points of the following functions are pol.pdf
Show that all the singular points of the following functions are pol.pdf
 
The article at those photos groups 20 amino acids into 6 groups acco.pdf
The article at those photos groups 20 amino acids into 6 groups acco.pdfThe article at those photos groups 20 amino acids into 6 groups acco.pdf
The article at those photos groups 20 amino acids into 6 groups acco.pdf
 
Studying Viruses can be important because they are often disease .pdf
Studying Viruses can be important because they are often disease .pdfStudying Viruses can be important because they are often disease .pdf
Studying Viruses can be important because they are often disease .pdf
 
State true or false with reason (all from Complex Analysis)-(a) P.pdf
State true or false with reason (all from Complex Analysis)-(a) P.pdfState true or false with reason (all from Complex Analysis)-(a) P.pdf
State true or false with reason (all from Complex Analysis)-(a) P.pdf
 
send edited codeMain 2public class Main2 {   public static voi.pdf
send edited codeMain 2public class Main2 {   public static voi.pdfsend edited codeMain 2public class Main2 {   public static voi.pdf
send edited codeMain 2public class Main2 {   public static voi.pdf
 
Question 16What is a common tactic hackers use to allow themselves.pdf
Question 16What is a common tactic hackers use to allow themselves.pdfQuestion 16What is a common tactic hackers use to allow themselves.pdf
Question 16What is a common tactic hackers use to allow themselves.pdf
 
Qualified plan documents can be written to accommodate plan forfeitu.pdf
Qualified plan documents can be written to accommodate plan forfeitu.pdfQualified plan documents can be written to accommodate plan forfeitu.pdf
Qualified plan documents can be written to accommodate plan forfeitu.pdf
 
Proteins fold. How WhySolutionANSProtein folding Protein.pdf
Proteins fold. How WhySolutionANSProtein folding Protein.pdfProteins fold. How WhySolutionANSProtein folding Protein.pdf
Proteins fold. How WhySolutionANSProtein folding Protein.pdf
 
PLN 360560 Environmental Impact Assessment Homework No. 4 1. An appl.pdf
PLN 360560 Environmental Impact Assessment Homework No. 4 1. An appl.pdfPLN 360560 Environmental Impact Assessment Homework No. 4 1. An appl.pdf
PLN 360560 Environmental Impact Assessment Homework No. 4 1. An appl.pdf
 
Meyer and colleagues performed three rounds of X-ray crystallography.pdf
Meyer and colleagues performed three rounds of X-ray crystallography.pdfMeyer and colleagues performed three rounds of X-ray crystallography.pdf
Meyer and colleagues performed three rounds of X-ray crystallography.pdf
 
Numerous diseases are caused by problems in DNA replication or repai.pdf
Numerous diseases are caused by problems in DNA replication or repai.pdfNumerous diseases are caused by problems in DNA replication or repai.pdf
Numerous diseases are caused by problems in DNA replication or repai.pdf
 
In the Mexican swordtail fish, the wild-type color is olive-green. Ot.pdf
In the Mexican swordtail fish, the wild-type color is olive-green. Ot.pdfIn the Mexican swordtail fish, the wild-type color is olive-green. Ot.pdf
In the Mexican swordtail fish, the wild-type color is olive-green. Ot.pdf
 
If we maintain a strict biological definition of “species”, H. sapie.pdf
If we maintain a strict biological definition of “species”, H. sapie.pdfIf we maintain a strict biological definition of “species”, H. sapie.pdf
If we maintain a strict biological definition of “species”, H. sapie.pdf
 
If taxpayers Monica, Traci , and Phillip are responsible persons in .pdf
If taxpayers Monica, Traci , and Phillip are responsible persons in .pdfIf taxpayers Monica, Traci , and Phillip are responsible persons in .pdf
If taxpayers Monica, Traci , and Phillip are responsible persons in .pdf
 

Recently uploaded

QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
httgc7rh9c
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 

Recently uploaded (20)

dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
Economic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesEconomic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food Additives
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 

one of the main design goals for the java programming language is se.pdf

  • 1. one of the main design goals for the java programming language is security. Explain, in detail how java achieves this goal? Solution 1.Security became an essential piece of a java language from the starting day itself.Additionally it is an progressing design aim of the java community .An intrinsic security is observed ,hence the java language is in much now-a-days which is the major cause. 2.Every action is possible through Java virtual machine(JVM) .it is mainly to establish the attributes like trust,integrity,confidentiality..etc. 3.Java offers large compile perusal ,leads with secondary stage of examining .language attributes motivates the programmers closely to good programming recurents. especially the memory management representation is uncomplicated.it removes the total classes of programing mistakes which causes a continous trouble to the C and C++ programmers.moreover the objects are fabricated with a new operator.precised programmer defined pointer data types, pointer arthematic and self-activated garbage collector is absent. 4.java language is manipulated in distributed domains that tells that the security is most important including the security attributes which is intended in the java language and run time system. 5.In case of network habitats ,the applications in java language are secured from interruption with an unofficial code venturing to acheive alrady the scenes and occupy file systems.