1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
puteri [66]
3 years ago
13

What is a strictly layered pattern, provide an example of its usage.

Computers and Technology
1 answer:
Nikitich [7]3 years ago
5 0

Answer and Explanation:

A strictly layered pattern can be defined as an approach that restricts the interaction of the components in a layer in the application.

It limits the interaction of the layer components to the adjacent layers or the layer that lies just below the the layer itself.

For Example:

If the application is layered as the Fig 1. shows

Then accordingly, Layer K will interact with the layer K - 1 and Layer K - 1 will interact only with the layer K - 2 and so on.    

You might be interested in
Transition words and phrase in a paragraph
balandron [24]

Answer:

Msms

Explanation:

8 0
3 years ago
Read 2 more answers
Select the correct answer.
galben [10]

Answer:

the RAM if i am not mistaking

8 0
3 years ago
Cybersecurity breaches in the workplace generally happen because _____. Select 3 options. people deliberately try to hack into t
Lady_Fox [76]

Cybersecurity breaches in the workplace generally happen because:

  • People deliberately try to hack into the network people.
  • People make unintentional mistakes.
  • People do not know about cybersecurity protocols

<h3>What are the three main causes of security breaches?</h3>

The major reasons for data breaches are:

  • Old, Unpatched Security Vulnerabilities.
  • Human Error
  • Malware, etc.

Therefore, Cybersecurity breaches in the workplace generally happen because:

  • People deliberately try to hack into the network people.
  • People make unintentional mistakes.
  • People do not know about cybersecurity protocols

Learn more about Cybersecurity from

brainly.com/question/12010892

#SPJ1

5 0
2 years ago
Before her shift as a cashier at the grocery store, Carla pulls her hair back into a ponytail and makes sure her fingernails are
Kobotan [32]

Answer:

is shows that the cashier has a good habit and has a good sense of hygiene

3 0
3 years ago
The next few questions will be based on interpretations of a topographic map from East Brownsville, TX. To answer these question
11111nata11111 [884]

Answer:

a. Youthful

Explanation:

The river gets its water from youth stage fluvial water. The river meanders from side to side. East Brownsville will be less stable in international boundary in terms of physical position on the landscape because its base level drops.

8 0
2 years ago
Other questions:
  • Look at the four schematic symbols shown in the figure above. Each of the symbols is labeled with a number. Which of the followi
    5·2 answers
  • Two or more computers that are linked together are called which of the following
    7·1 answer
  • What is blockchain? How it works? I heard bitcoin uses it.
    8·1 answer
  • Describe PROM, EPROM and EEPROM memories​
    7·1 answer
  • 2. What is the name for an action performed by the VR Robot?
    7·2 answers
  • Help with this please anyone
    15·2 answers
  • Put these operating systems in order according to the date they were released. (The first to be released would be
    10·1 answer
  • Please help me !!
    10·1 answer
  • 9. Which of the following is considered an interface? (1 point)
    11·1 answer
  • Which describes the Paradox of Automation?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!