--%>

Ways in which Java program is less likely to be compromised

Give two ways in which a Java program is less likely to be compromised than the same program written in C++.

E

Expert

Verified

In Java, Primitive and reference data types always passed by value while as in C++ referenced data types are passed by reference.

In Java, we have automatic garbage collection that doesn’t have the concept of Destructor and usage of finalize() is not recommended while have we have to explicitly rely upon destructors and deletete operator to free unused memory.

   Related Questions in Programming Languages

  • Q : What is the QuickTest Pro testing

    What is the QuickTest Pro testing process?

  • Q : Explain the relationship between XHTML

    Explain the relationship between XHTML and HTTP?

  • Q : Explain State State : The objects are

    State: The objects are said to possess state. The present state of an object is symbolized by the joint values of its attributes. Protecting the state of an object from unsuitable inspection or modification is a significant aspect of class design and

  • Q : Explain Decrement operator Decrement

    Decrement operator: It is an operator (--) which adds one to its operand. This has two forms: pre-decrement (--x) and post-decrement (x--). In its pre-decrement form, the outcome of the expression is the value of its argument subsequent to the decreme

  • Q : Depths of categories-subcategories

    Normal 0 false false

  • Q : Illustrates the parts of an XML

    Illustrates the parts of an XML document are case-sensitive.

  • Q : What is testing What is testing?

    What is testing?

  • Q : Describe Locale Locale : The details

    Locale: The details which are dependent on conventions and customs approved by a specific country or culture. Within programs, this influences issues like number and date formatting, for example. Designers of classes must be sensitive to the locale-sp

  • Q : Explain Mutator method Mutator method :

    Mutator method: It is a method specifically designed to permit controlled modification of a private attribute of a class. By convention, we name the mutators with a set prefix obeyed by the name of the attribute being transformed. For example, the mut

  • Q : Programming with C# QUESTION 1      

    QUESTION 1       The following UML diagram describes an abstract class Customer. This class is to be used as part of a Company's inventory system. The inventory system will contain many different types of customers.  A separate s