1 Answer

0 votes
by
  • For Java programmers it provides familiar syntax
  • It has a rich stock of Java Libraries
  • It easily integrate with your existing infrastructure like Servlet Containers, App Servers, Loads of databases with JDBC drivers,
  • Completely Object Oriented
  • It possesses a reusable and assignable pieces of code
  • Operators can be overloaded
  • Literal declaration for maps, arrays, ranges and regular expressions
  • It has efficient object navigation

Related questions

0 votes
    How we can include a groovy script in another groovy?...
asked Sep 25, 2021 in Technology by JackTerrance
0 votes
    How can we build AST (Abstract Syntax Trees) in Groovy from string?...
asked Sep 25, 2021 in Technology by JackTerrance
0 votes
    How we can query in Groovy?...
asked Sep 25, 2021 in Technology by JackTerrance
0 votes
    How could we retrieve a single value from data base using Groovy?...
asked Sep 25, 2021 in Technology by JackTerrance
0 votes
    How Groovy string is expressed?...
asked Sep 25, 2021 in Technology by JackTerrance
0 votes
    What is ExpandoMetaClass in Groovy?...
asked Sep 25, 2021 in Technology by JackTerrance
0 votes
    What is the license for Groovy?...
asked Sep 25, 2021 in Technology by JackTerrance
0 votes
    How can we add stuff to the classpath when running things in groovy or groovysh?...
asked Sep 25, 2021 in Technology by JackTerrance
0 votes
    What is the role of closure and listeners in Groovy?...
asked Sep 25, 2021 in Technology by JackTerrance
0 votes
    What are some features does Groovy JDK offers?...
asked Sep 25, 2021 in Technology by JackTerrance
0 votes
    Explain how Scripts are run in Groovy?...
asked Sep 25, 2021 in Technology by JackTerrance
0 votes
    What is the limitation of Groovy?...
asked Sep 25, 2021 in Technology by JackTerrance
0 votes
0 votes
    Q.2 Which mode of IPsec should you use to assure the security and confidentiality of data within the same LAN? A. ESP ... AH transport mode C. AH tunnel mode D. ESP tunnel mode...
asked Mar 12, 2023 in Technology by JackTerrance
0 votes
    Threat hunters use __________. A. Automated tools B. Manual methods C. Both the options D. None of the options...
asked Feb 26, 2023 in Technology by JackTerrance
...