Jvm Architecture Questionnaire_27 June

10 Questions | Total Attempts: 110

SettingsSettingsSettings
Please wait...
Java Quizzes & Trivia

Questions and Answers
  • 1. 
     One word should be sufficient enough to hold –
    • A. 

      Int

    • B. 

      Long

    • C. 

      ReturnAddress

    • D. 

      All of above

  • 2. 
    Which of the following run-time data areas are shared across threads?
    • A. 

      Method Area

    • B. 

      Heap

    • C. 

      Java Stack

    • D. 

      All of Above

  • 3. 
     In a memory rich JVM implementation, Method Tables would exist for –
    • A. 

      Interfaces

    • B. 

      Concrete Classes

    • C. 

      Abstract Classes

    • D. 

      All of Above

  • 4. 
     What would be the class name for a Double Dimensional Boolean array?
    • A. 

      [[B

    • B. 

      [[java.lang.Boolean

    • C. 

      [[Ljava.lang.Boolean

    • D. 

      None of these

  • 5. 
    Which of the following can be stored directly on Stack Frames?
    • A. 

      ReturnAddress

    • B. 

      Reference

    • C. 

      Int

    • D. 

      Short

  • 6. 
    Constants (static final variables) are stored in the method Area of –
    • A. 

      The Type that declares them

    • B. 

      The Types that uses them

    • C. 

      Both a & b

    • D. 

      None of these

  • 7. 
    By default the following Class Loader(s) is/are present in any running Java application version 1.2 onwards –
    • A. 

      BootStrap Class Loader

    • B. 

      Standard Extension Class Loader

    • C. 

      Class Path Class Loader

    • D. 

      All of the above

  • 8. 
     Which of the following are true about Class Loaders –
    • A. 

      Guards the border of trusted Class

    • B. 

      There is one namespace per ClassLoader Libraries.

    • C. 

      Works in Parent Delegation model from version 1.2 onwards.

    • D. 

      Classpath Classloader is allowed to load a class java.lang.Virus.

  • 9. 
    Code signing & authentication mechanism allow us to have fine grained security policies.
    • A. 

      True

    • B. 

      False

  • 10. 
     Which of the following are verified in the Pass Two of Class File Verifier?
    • A. 

      Method Descriptors

    • B. 

      Some of the Java language rules

    • C. 

      Data flow analysis

    • D. 

      Method’s bytecode verification.

Back to Top Back to top