1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bingel [31]
4 years ago
10

When a communication exchange that does not verify the identity of the endpoints of a communication and accepts any properly for

med response as valid, a non-authenticating query service is in use.
Computers and Technology
1 answer:
ELEN [110]4 years ago
3 0

Answer:

True

Explanation:

When communication exchange that does not verify the identity of endpoints of communication is true

You might be interested in
Write code that prints: usernum ... 2 1 blastoff! your code should contain a for loop. print a newline after each number and aft
Svetradugi [14.3K]

You never said what language so I used C

#include <stdio.h>

<span>int main () { </span>

<span>  int a;  </span>

<span>  for( a = 3; a > 0; a-- ){ </span>

<span>      printf("%i \n", a); }</span>

<span>  printf(" Blast OFF !!!\n");   </span>

<span>return 0; </span>

<span>}</span>

4 0
3 years ago
Examine the efficiency the various recovery algorithms used in deadlock handling
sineoko [7]

Solution:

The process of transaction can guarantee the reliability of business applications. Locking resources is widely used in distributed transaction management (e.g; two phase commit, 2PC) to keep the system consistent. The locking mechanism, however, potentially results in various deadlocks. In service oriented architecture, the deadlock problem becomes even worse because multiple transactions try to lock shared resources in the unexpectable way due to the more randomicity of transaction requests, which has not been solved by existing research results. In this paper, we investigate how to prevent local deadlocks, caused by the resource competition among multiple sub-transactions of a gl obal transaction, and global deadlocks from the competition among different global transactions. We propose a replication based approach to avoid the local deadlocks, and a timestamp based approach to significantly mitigate the global deadlocks. A general algorithm is designed for both local and global deadlock prevention. The experimental results demonstrate the effectiveness and efficiency of our deadlock prevention approach. Further, it is also proved that our approach provides higher system performance than traditional resource allocation schemes.

This is the required answer.

4 0
3 years ago
What are the five types of docs you can create an share with google docs
Mademuasel [1]

Answer:

Documents: For composing letters, flyers, essays, and other text-based files (similar to Microsoft Word documents)

google sheets logo Spreadsheets: For storing and organizing information (similar to Microsoft Excel workbooks)

google slides logo Presentations: For creating slideshows (similar to Microsoft PowerPoint presentations)

google forms logo Forms: For collecting and organizing data

google drawings logo Drawings: For creating simple vector graphics or diagrams

Explanation:

8 0
3 years ago
Read 2 more answers
I need help with this question. asap please
marissa [1.9K]

Answer:

what are you talking about

Explanation:

can you help me with my question

8 0
2 years ago
You are being hired as the director of IT for a small firm that does retail trade business, and you will be the source of knowle
Orlov [11]

Director of IT role is major decision maker or any IT related issue such as network security, database, network issues etc. As policy to one to one end user and it department, which should cover as follows.

1. End-user is not allowed to share files or media files to any user through email or social media.

2. Login password should not be changed without IT approval of pc or   workstation or laptop.  Once changes password should be shared to IT department.

3. Sharing password Wi-Fi or access point to outsiders to be avoided.

4. Connecting usb drive or flash drive to workstation or laptop,

5. Own laptop or smartphone should not be connected to office network.

6. If workstation or desktop or laptop is effected with virus immediately to be reported to IT department.

5 0
3 years ago
Other questions:
  • An important piece of a project is past due date.
    9·2 answers
  • Research at least two articles on the topic of managerial issues of a networked organization. Write a brief synthesis and summar
    8·1 answer
  • A page with no meaningful content that is full of ads and the webmaster makes money from if someone clicks on them is called____
    7·1 answer
  • What are the ASE special certifications?
    14·2 answers
  • What are listed in the vertical columns across the top of the Event Editor?
    5·2 answers
  • You work in an office that uses Linux servers and Windows servers. The network uses both the TCP/IP protocol. The Linux server i
    11·1 answer
  • What is a fire wall and how does it work
    14·1 answer
  • Consider the following correct implementation of the selection sort algorithm.
    5·1 answer
  • A small network that consists of devices connected by Bluetooth, such as a smartphone and a computer, is referred to as a ______
    14·1 answer
  • 1.Which of the serves as the basis for determining whether an object has moved or not?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!