Normally you depend on the JVM to perform garbage collection automatically. However, you can explicitly use ________ to request garbage collection.

Answers

Answer 1

Answer:

System.gc()

Explanation:

System.gc() can be defined as the method which can be used to effectively request for garbage collection because they runs the garbage collector, which in turn enables JMV which is fully known as JAVA VIRTUAL MACHINE to claim back the already unused memory space of the objects that was discarded for quick reuse of the memory space , although Java virtual machine often perform garbage collection automatically.


Related Questions

What is a what if analysis in Excel example?

Answers

Answer:

What-If Analysis in Excel allows you to try out different values (scenarios) for formulas. The following example helps you master what-if analysis quickly and easily.

Assume you own a book store and have 100 books in storage. You sell a certain % for the highest price of $50 and a certain % for the lower price of $20.

(i really hope this is what u needed)

A program is considered portable if it . . . can be rewritten in a different programming language without losing its meaning. can be quickly copied from conventional RAM into high-speed RAM. can be executed on multiple platforms. none of the above

Answers

Answer:

Can be executed on multiple platforms.

Explanation:

A program is portable if it is not platform dependent. In other words, if the program is not tightly coupled to a particular platform, then it is said to be portable. Portable programs can run on multiple platforms without having to do much work. By platform, we essentially mean the operating system and hardware configuration of the machine's CPU.

Examples of portable programs are those written in;

i. Java

ii. C++

iii. C

What is the absolute pathname of the YUM configuration file? REMEMBER: An absolute pathname begins with a forward slash

Answers

Answer:

/etc/yum.conf

Explanation:

The absolute pathname for YUM is /etc/yum.conf. The configuration file For yum and related utilities can be found there. The file has one compulsory section, and this section can be used to place Yum options with global effect, it could also have one or more sections, that can enable you to set repository-specific options.

Programming Challenge: Test Average CalculatorUsing a variable length array, write a C program that asks the user to enter test scores.Then, the program should calculate the average, determine the lowest test score, determine the letter grade, and display all three.

Answers

Answer:

well you could use variables in C and display them

Explanation:

You are a project manager for Laredo Pioneer's Traveling Rodeo Show. You're heading up a project to promote a new line of souvenirs to be sold at the shows. You are getting ready to write the project management plan and know you need to consider elements such as policies, rules, systems, relationships, and norms in the organization. Which of the following is not true? A These describe the authority level of workers, fair payment practices, communication channels, and the like. B This describes organizational governance framework. C This describes management elements. D This is part of the EEF input to this process.

Answers

Answer:

A. These describe the authority level of workers, fair payment practices, communication channels, and the like.  

Explanation:

As seen in the question above, you have been asked to write the project management plan and know that you need to consider elements such as policies, rules, systems, relationships and standards in the organization. These elements are part of EEF's entry into this process, in addition they are fundamental and indispensable for the description not only of the organizational governance structure, but also describe the management elements that will be adopted and used.

However, there is no way to use them to describe the level of authority of workers, fair payment practices, communication channels and the like, as this is not the function of this.

A hotel salesperson enters sales in a text file. Each line contains the following, separated by semicolons: The name of the client, the service sold (such as Dinner, Conference, Lodging, and so on), the amount of the sale, and the date of that event. Write a program that reads such a file and displays the total amount for each service category. Display an error if the file does not exist or the format is incorrect.

Answers

Answer:

Life can get busy and hectic, but relationships matter. What is an effective way of mending relationships that may have had been neglected?Life can get busy and hectic, but relationships matter. What is an effective way of mending relationships that may have had been neglected?

Explanation:

Life can get busy and hectic, but relationships matter. What is an effective way of mending relationships that may have had been neglected?Life can get busy and hectic, but relationships matter. What is an effective way of mending relationships that may have had been neglected?Life can get busy and hectic, but relationships matter. What is an effective way of mending relationships that may have had been neglected?Life can get busy and hectic, but relationships matter. What is an effective way of mending relationships that may have had been neglected?Life can get busy and hectic, but relationships matter. What is an effective way of mending relationships that may have had been neglected?

A security administrator is investigating a report that a user is receiving suspicious emails. The user's machine has an old functioning modem installed. Which of the following security concerns need to be identified and mitigated? (Select TWO).
a) Vishing
b) Whaling
c) Spear phishing
d) Pharming
e) War dialing
f) Hoaxing

Answers

Answer:

Spear Phishing and War Dialing

Explanation:

So let's tackle these one at a time.

Vishing is simply any type of message (i.e., email, text, phone call, etc.) that appears to be from a trusted source but is not.

Whaling is simply a spear phishing attack of a high-value target such as a CEO or someone with high-level access at a company.

Spear phishing is simply a targeted phishing attack, usually towards a specific person or group of people.  (Phishing attack is simply a social attack to try and gain unauthorized access to a resource).

Pharming is an attack that attempts to redirect website traffic to a fake site.

War dialing is a technique to automatically scan a list of numbers in an area in attempt to search for exposed modems, computers, board systems, or fax machines, in order to breach the network.

Hoaxing is simply a social attack that describes a serious threat in attempts to retrieve unauthorized access or money from a victim.  (Think microsoft tech support scams)

Now that we have defined these things, let's identify the possible threats that need to be reported.

(a) Vishing?  The sec admin report doesn't mention the source of the message so we cannot associate this one

(b) Whaling? The sec admin report says a user, implying someone not high up in the company, but doesn't say it's not someone high up.  This is possible.

(c) Spear phishing?  The sec admin report says a user, implying that only this user is being targeted so this is definitely valid.

(d) Pharming?  The sec admin report says nothing about site redirection.

(e) War dialing? The sec admin report doesn't say anything about unauthorized scanning; however, it mentions the user has an old functioning modem, so this is possible.

(f) Hoaxing?  The sec admin report doesn't mention a pop up in the email or the content of the email so we are uncertain.

Thus with these considerations, the two threats that are identified and need mitigation are Spear phishing and War Dialing/Whaling.  Note that we aren't positive of the war dialing or whaling, but a case could be made for either; however, given the modem information, the question seems to indicate war dialing.

3.16 (Gas Mileage) Drivers are concerned with the mileage obtained by their automobiles. One driver has kept track of several tankfuls of gasoline by recording miles driven and gallons used for each tankful. Develop a program that will input the miles driven and gallons used for each tankful. The program should calculate and display the miles per gallon obtained for each tankful. After processing all input information, the program should calculate and print the combined miles per gallon obtained for all tankfuls. Here is a sample input/output dialog:

Answers

Answer:

I am writing a C program.

#include <stdio.h> // for using input output functions

#include <stdbool.h> // for using a bool value as data type

int main() { // start of the main() function body

 int count=0; //count the number of entries

 double gallons, miles, MilesperGallon, combined_avg, sum; //declare variables

 while(true) {// takes input gallons and miles value from user and computes avg miles per gallon

      printf( "Enter the gallons used (-1 to stop): \n" ); //prompts user to enter value of gallons or enter -1 to stop

      scanf( "%lf", &gallons );//reads the value of gallons from user

   if ( gallons == -1 ) {// if user enters -1

     combined_avg = sum / count; //displays the combined average by dividing total of miles per drives to no of entries

     printf( "Combined miles per gallon for all tankfuls:  %lf\n", combined_avg ); //displays overall average value  

     break;} //ends the loop

     printf( "Enter the miles driven: \n" ); //if user does not enter -1 then prompts the user to enter value of miles

     scanf( "%lf", &miles ); //read the value of miles from user

MilesperGallon = miles / gallons; //compute the miles per gallon

printf( "The miles per gallon for tankful:  %lf\n", MilesperGallon ); //display the computed value of miles per gallon

  sum += MilesperGallon; //adds all the computed miles per gallons values

   count += 1;  } } //counts number of tankfuls (input entries)

Explanation:

The program takes as input the miles driven and gallons used for each tankful. These values are stored in miles and gallons variables. The program calculates and displays the miles per gallon MilesperGallon obtained for each tankful by dividing the miles driven with the gallons used. The while loop continues to execute until the user enters -1. After user enters -1, the program calculates and prints the combined miles per gallon obtained for all tankful. At the computation of MilesperGallon for each tankful, the value of MilesperGallon are added and stored in sum variable. The count variable works as a counter which is incremented to 1 after each entry. For example if user enters values for miles and gallons and the program displays MilesperGallon then at the end of this iteration the value of count is incremented to 1. This value of incremented for each tankful and then these values are added. The program's output is attached.

Identify five key technologies/innovations and discuss their advantages and disadvantages to developing countries like Ghana.​

Answers

Answer:

The key technology/ innovation advantage and disadvantage can be defined as follows:

Explanation:

Following are the 5 innovations and technology, which promote the other development goals, like renewable energy, quality of jobs, and growth of economic with the good health and very well-being:

1) The use of crop monitoring drone technology promotes sustainable farming.  

2) The production of plastic brick including highways, floors, and houses.  

3) The new banking market or digital banking.  

4) E-commerce site.    

5) Renewable energy deployment such as solar panels.  

Advantage:

It simple insect control, disease, fertilizer, etc.   It helps in aid in environmental purification and job formation.It is also fast and easy,  Funds are transferred extremely easily through one account to another.  Minimal prices, quick customer developments, and competition in the industry.  It saves them money in the medium-haul, less servicing.

Disadvantage:

The drones are too expensive to use, so poor farmers can be cut off.  Specialist technicians and gaining popularity are required.  The financial services data can be distributed through many devices and therefore become more fragile.  The personal contact loss, theft, security problems, etc. The higher operating costs, geographical limitations, and so on.

Steve wants to take charge of his finances. To do so, he must track his income and expenditures. To accurately calculate his take-home pay, Steve must use his __________.

Answers

Answer:brain

Explanation:

to think

Other Questions
FIRST GETS BRAINLLEST If the rectangle below is enlarged by a scale factor of 1.2, what will be the area of the new rectangle? 62 square units 66 square units 72 square units 76 square units Solve x is less than or equal to 0 and x is greater than or equal to -4 Given the variable ip, already declared as a pointer to an integer, write the code to dynamically allocate memory for a single integer value, assign the resulting pointer to ip, and initialize the integer value to 27. Bogart Company is considering two alternatives. Alternative A will have revenues of $147,400 and costs of $103,400. Alternative B will have revenues of $188,200 and costs of $121,600. Compare Alternative A to Alternative B showing incremental revenues, costs, and net income. Cell phone bills for residents of have a mean of $47/line with a standard deviation of $9/line. Find the probability that the average cost/line for the Math HELP ME PLZ NEED ANSWER Which relation is a function? A coordinate grid containing a U shape with arrows on both ends that opens to the right. The bottom portion of the U passes through the origin. A coordinate grid with the graph of a circle centered at the origin and passing through the point begin ordered pair 2 comma 1 end ordered pair. A coordinate grid containing a U shaped graph with arrows on its ends. The U shape opens upwards and the bottom of the U shape is located at the origin. Coordinate grid with graph of a vertical line at x equals 3. Which paragraph in the excerpt from Amy Tans Rules of the Game best shows a conflict between two cultures?My mother patted the flour off her hands. "Let me see book," she said quietly. She scanned the pages quickly, not reading the foreign English symbols, seeming to search deliberately for nothing in particular."This American rules," she concluded at last. "Every time people come out from foreign country, must know rules. You not know, judge say, Too bad, go back. They not telling you why so you can use their way go forward. They say, Don't know why, you find out yourself. But they knowing all the time. Better you take it, find out why yourself." She tossed her head back with a satisfied smile.I found out about all the whys later. I read the rules and looked up all the big words in a dictionary. I borrowed books from the Chinatown library. I studied each chess piece, trying to absorb the power each contained.I learned about opening moves and why it's important to control the center early on; the shortest distance between two points is straight down the middle. I learned about the middle game and why tactics between two adversaries are like clashing ideas; the one who plays better has the clearest plans for both attacking and getting out of traps. Is your prediction supported by the membrane potential chart? Which of the following quotes from the novel supports the idea that the soldiers feel like they aren't getting a lot of official information from the military? a. "Most of what we learned was from the television news." b. "CENTCOM is trying to figure out what happened to the 507th." c. "The sergeant repeated what Ahmed said into his radio." d. "We weren't at the front of the action and I was glad of that." A circle has a radius of 21 inches. What is the length of the arc intercepted by a central angle that measures 4/7 radians? Express the answer in terms of . BP measuring machine is an example of __________ A)Computing deviceB)Medical device C)Embedded machine D)None of these Question 1 of 10What is a neutronA. A particle inside the nucleus that has no chargeB. A positive particle inside the nucleusO C. A negative particle outside the nucleusO D. A negative particle inside the nucleus how did countries prepare their militaries for world war 1 ? A 30 year $1,000 par 4 3/4% Treasury Bond is quoted at 95-11 - 95-15. The note pays interest on Jan 1st and Jul 1st. A customer buys 1 bond at the ask price. What is the current yield, disregarding commissions Please answer this in two minutes Given the unity feedback system G(s)= K(s+4)/s(s+1.2)(s+2) Find:a. The range of K that keeps the system stableb. The value of K that makes the system oscillatec. The frequency of oscillation when K is set to the value that makes the system oscillate What is the circumference of a circle with a diameter of 100m. A 100m B 157m C 300 m D 314m A number is 30% of 20% of the number x. sin theta = x , sec theta =y . find cot theta pls answer fast i need to verify my answer . you can directly write the answer no issues I NEED HELP PLEASE ANSWER QUICK (SAT Prep) In the given figure, a b. Find the value of z. A. 50 B. 90 C. 45 D. 75