1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dsp73
3 years ago
14

A(n) __________ is a set of technologies used for exchanging data between applications and for connecting processes with other s

ystems across the organization, and with business partners. Select one:
a. ERP
b. mashup
c. SOA
d. Web service
Computers and Technology
2 answers:
Harrizon [31]3 years ago
5 0

Answer:

The answer is "Option ".

Explanation:

The SOA stands for "Service-Oriented Architecture", which is primarily known as a service set and these services enable you to communicate with each other. In the communication, it may require simple data to transfer to two or more services, which can be organized by those operations, and other options were incorrect, that can be explained as follows:

  • In option a, It is a business software, which is used to organized data, that's why it is wrong.
  • Option b and Option d both are wrong because the mashup process is used only on web services, which is not a part of SOA , that's why it is wrong.
cupoosta [38]3 years ago
5 0

Answer:

The correct answer is letter "C": SOA.

Explanation:

Service-oriented architecture (<em>SOA</em>) is a type of software structure oriented to the integration of applications that share the same network or between different software systems that are part of different domains. SOA has the objective of aligning users with all the Information Technology (IT) of their organization.

You might be interested in
100 POINTS!!!!!!
Veronika [31]

Answer:

The fundamental limitation of symmetric (secret key) encryption is ... how do two parties (we may as well assume they are Alice and Bob) agree on a key? In order for Alice and Bob to communicate securely they need to agree on a secret key. In order to agree on a secret key, they need to be able to communicate securely. In terms of the pillars of IA, To provide CONFIDENTIALITY, a secret key must first be shared. But to initially share the key, you must already have CONFIDENTIALITY. It's a whole chicken-and-egg problem.

This problem is especially common in the digital age. We constantly end up at websites with whom we decide we want to communicate securely (like online stores) but with whom we there is not really an option to communicate "offline" to agree on some kind of secret key. In fact, it's usually all done automatically browser-to-server, and for the browser and server there's not even a concept of "offline" — they only exist online. We need to be able to establish secure communications over an insecure channel. Symmetric (secret key) encryption can't do this for us.

Asymmetric (Public-key) Encryption

Yet one more reason I'm barred from speaking at crypto conferences.

xkcd.com/177/In asymmetric (public key) cryptography, both communicating parties (i.e. both Alice and Bob) have two keys of their own — just to be clear, that's four keys total. Each party has their own public key, which they share with the world, and their own private key which they ... well, which they keep private, of course but, more than that, which they keep as a closely guarded secret. The magic of public key cryptography is that a message encrypted with the public key can only be decrypted with the private key. Alice will encrypt her message with Bob's public key, and even though Eve knows she used Bob's public key, and even though Eve knows Bob's public key herself, she is unable to decrypt the message. Only Bob, using his secret key, can decrypt the message ... assuming he's kept it secret, of course.

Explanation:

3 0
2 years ago
Illustrate that the system is in a safe state by demonstrating an order in which the threads may complete.If a request from thre
Kamila [148]

Answer:

a. safe sequence is T2 , T3, T0, T1, T4.

b. As request(T4) = Available, so the request can be granted immediately

c. As request(T2) < Available, so the request can be granted immediately

d. As request(T3) < Available, so the request can be granted immediately.

Explanation:

It will require matrix

[i, j] = Max [i, j] – Allocation [i, j]

A B C D

T0 3 3 3 2

T1 2 1 3 0

T2 0 1 2 0

T3 2 2 2 2

T4 3 4 5 4

Available = (2 2 2 4)

1. Need(T2) < Available so, T2 can take all resources

Available = (2 2 2 4) + (2 4 1 3) (Allocation of T2) = (4 6 3 7)

2. Need(T3)<Available so, T3 will go next

Available = (4 6 3 7) + (4 1 1 0) = (8 7 4 7)

Like wise next T0, T1, T4 will get resources.

So safe sequence is T2 , T3, T0, T1, T4.

(Note, there may be more than one safe sequence).

Solution b.

Request from T4 is (2 2 2 4) and Available is (2 2 2 4)

As request(T4) = Available, so the request can be granted immediately.

Solution c.

Request from T2 is (0 1 1 0) and Available is (2 2 2 4)

As request(T2) < Available, so the request can be granted immediately.

Solution d.

Request from T3 is (2 2 1 2) and Available is (2 2 2 4)

As request(T3) < Available, so the request can be granted immediately.

5 0
3 years ago
The ____________ is an interest inventory that classifies people according to six different types: Realistic, Investigative, Art
Kamila [148]
1) C) Campbell Interest Inventory.

Also known as the Strong Interest Inventory, this was developed based on the Holland Codes (6 traits listed in the question), it was developed by psychiatrist Edward Strong and later revised by David Campbell. 

2) C) FOCUS2

The FOCUS2 test is a test that matches students with study programs based on their assessed aptitudes and interests. <span />
7 0
3 years ago
Read 2 more answers
Which of the following is the largest measurement for the weight of a bag of dog food?
jasenka [17]

Answer:

approximately 5 lbs but no sure weight.

6 0
3 years ago
Read 2 more answers
Francis works in the human resources division of a large oil and gas company in Texas. Francis' tasks include maintaining payrol
Maru [420]

Answer:

A. Information MIS infrastructure

Explanation:

An Information MIS infrastructure supports how important information is maintained and secured in an organization. It also supports the day to day operations of an organization, in this case, which includes maintaining payroll and vacation records, employment histories, and benefits information. Information MIS infrastructure also provides measures for backup and disaster recovery plans and the business continuity plan. On the other hand, Agile MIS infrastructure supports change within an organization's business processes while sustainable MIS infrastructure refers to the sustainable use and disposal of technology in an environmentally friendly manner.

6 0
4 years ago
Other questions:
  • The point at coordinates (2, -18) is in what direction from the origin?
    7·1 answer
  • Databases can have various objects some of which are tables, queries, forms or views, and reports objects. Each of these has fie
    14·1 answer
  • In Windows Vista, the Run command can be found in which application?
    6·1 answer
  • /*
    8·1 answer
  • Help me out with this .....
    10·1 answer
  • It is impossible to use a computer without a mouse. Is this statement true or false?
    10·1 answer
  • I need a explanation for this 02 question for a test I will have .
    11·1 answer
  • Which one you choosing? PS5 OR THE XBOX SERIES X???
    14·2 answers
  • How many skins are in fortnite
    9·2 answers
  • What is the name of the function below?<br><br> function go(){<br> alert("hello everybody");<br> }
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!