1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elena-s [515]
3 years ago
14

The architecture that the large paper company Mohawk adopted enables the company to scale technology services up and down instan

taneously according to its needs. The architecture is called:
a) Centralized
b) Decentralized
c) Service-oriented
d) Internet-based
e) Mainframe
Computers and Technology
1 answer:
arlik [135]3 years ago
6 0

Answer: (C) Service-oriented

Explanation:

 The service-oriented architecture is the one of the type of software design which provide various types of service and application over the network by using different type of communication protocols.

  • The service oriented architecture is basically based on the distributed computing on the different types of platform.

 This architecture design is mainly based upon the reply and request service from client to the server and vice versa. The service oriented architecture works on the basic principle is that the technology and the products should be independent.

Therefore, Option (C) is correct.

You might be interested in
Design a software system for a bookstore that keeps an inventory of two types of books: Traditional books and books on CD. Books
Sophie [7]

Answer:

Explanation:

a. In this scenario, the best solution would have an Object of Traditional Books, CD, Music, Bookstore and Customer.

b. All five objects would be able to be called by the main program loop and the Customer Object would call upon and use either the Books or CD object, While the Bookstore object would call upon all of the other objects.

c. Both the Bookstore object and Customer object will "have" other objects as the Bookstore needs to hold information on every Book or CD in the Inventory. While the Customer object would call upon the Book and CD object that they are purchasing.

d. The Music Object will extend the CD object and use information on the CD object as its parent class.

e. Since the Music Object extends the CD object it is also considered a CD since it is in CD format like the Books on CD and therefore is both objects.

8 0
3 years ago
Assume a program requires the execution of 50 x 106 (50e6) FP instructions, 110 x 106 (110e6) INT instructions, 80 x 106 (80e6)
tresset_1 [31]

Answer:I really don’t know

Explanation:

Um You can look it up though

7 0
3 years ago
Which of the following is not one of the goals of technical recovery team members during the recovery phase of a BCP? Normalize
Zanzabum

Answer:

Repair damage done to original systems

Explanation:

It is imperative that businesses brace up for moments or period of challenges whereby normal operation is impeded due to disruption in standard system condition. The ability of businesses to thrive and continue to deliver in these circumstances is catered for by the business continuity plan. The recovery team ensures that important processes critical to the business are restored in other to ensure that business operation isn't crippled. Once normalcy ahs been restored, the team ensures recoverabke day in the original system are taken care of. The repair of damage done is not a goal of the recovery ohase in the business continuity plan as repairsvare catered for after recovery event has been finalized.

3 0
3 years ago
You work as a Network Administrator for wwwpany Inc. You have suspected a bad driver or perhaps malware. Which of the following
vichka [17]

Answer:

Explanation:

There is a solution called ETA (Encrypted Traffic Analytics) this is a security advanced network that helps us to identify malware between the encrypted data, but with this tool is no necessary to break any protection and privacy chain.

This technology use machine learning to read all the traffic without deciphering it, in this way we can detect a difference between reliable and malicious traffic.

En windows we can use Microsoft Security Essentials like antivirus and detect virus, we can use Process Explorer, analyze the traffic, we can use Microsoft Network Monitor.

8 0
3 years ago
A technician who is managing a secure B2B connection noticed the connection broke last night. All networking equipment and media
pashok25 [27]

Answer:

<u>d. CRL</u>

<u>e. OCSP</u>

Explanation:

Note, the term PKI stands for Public Key Infrastructure.

Among all the PKI components, the CRL (CERTIFICATE REVOCATION LISTS), which contains a list of issued certificates that were later revoked by a given Certification Authority, and the PFX format used for storing server certificates should be examined by the technician use to validate his assumption.

7 0
3 years ago
Other questions:
  • Bunch of points!!!!!!! help pls
    11·2 answers
  • When looking to ensure your website is easily accessible by mobile users, what should you focus on doing first
    8·1 answer
  • Which statement is NOT a rule for the data source for the mail merge?
    13·2 answers
  • Which of the following could be a constructor for the public class MyClass? a. public MyClass() b. public void MyClass() c. publ
    7·1 answer
  • When replacing a thermostat or water pump, coolant drained from the cooling system should be ________.
    9·1 answer
  • Why would a programmer use a flow chart? (Edge2020 Coding Critical Thinking Questions)
    9·1 answer
  • What happens when you apply a theme to a form?
    14·1 answer
  • In QBasic, create a number guessing challenge. Your program should generate a random number from 1-
    9·1 answer
  • You are a software engineer at a company where management routinely encourages you and your colleagues to use pirated software.
    5·1 answer
  • You work part-time at a computer repair store. You're building a new computer. The customer has requested two serial ATA (SATA)
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!