1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wlad13 [49]
3 years ago
10

Service-oriented architecture (SOA) provides a way for apps on a network to talk to each other using all these ways, EXCEPT ____

____.
A. providing metadata about the page
B. the structure of the data that it will produce
C. the structure of the data that it expects to receive
D. standard protocols to publish a menu of services that the application provides
Computers and Technology
1 answer:
Ray Of Light [21]3 years ago
4 0

Answer:

The answer is "Option A".

Explanation:

This architecture is built upon an app feedback design model for sequential and concurrent systems, which is also known as an innovation for parallel programming, It also uses the networks for communication, and another option is not correct, that can be described as follows:

  • Option B and Option C both are wrong because they can't produce structures and receives its data.
  • In option D, It is wrong, because it can't publish the menus.
You might be interested in
What damage can a virus do to your computer?
Lostsunrise [7]

That depends on what it's programmed to do. Some common examples of damage are:

- Shutting down your computer

- Stealing information

- Decoding passwords


Hope it helped,


BioTeacher101

3 0
3 years ago
In the picture below
zhuklara [117]

Answer:

The answer is "It is a public method in the Car class".

Explanation:

In this question, the fourth choice is correct because the accessor method will be public, and the incorrect choice can be defined as follows:

  • The first and second choice was wrong because the class name is "Car".
  • In the third choice, it is wrong because the method will not be private.
  • In the fifth choice, it is wrong because the object name "mustang".
7 0
3 years ago
Under normal operations, cisco recommends that you configure switch ports on which vlan
larisa86 [58]

 

You can configure switch ports on default VLAN under normal operations. Cisco switches always have VLAN 1 as the default VLAN, which is required for many decorum communications between switches like spanning-tree protocol for example. It is obligatory not to delete or even change the default VLAN.

 

 





3 0
3 years ago
What is the point of having bullets points in a text box
Ludmilka [50]
You should have bullets in a text box in case you have a list of stuff. For example:

Computer Parts

.Tower

.Monitor

. Mouse

.Printer


3 0
4 years ago
What is the GCF of 48mn and 81mn??<br> O 3mn<br> O 3m?n<br> O 48mºn<br> O 129mn
vitfil [10]

Answer:

A. 3mn

Explanation:

48 divides by 2 48 = 24 x 2

then =2 x 2 x 12

then = 2 x 2 x 2 x 2 x 3

greatest factorization is 3 therefore,

3mn is the answer

8 0
3 years ago
Other questions:
  • A data structure used to bind an authenticated individual to a public key is the definition of ________.
    14·1 answer
  • As a safe driver, you cannot, __________
    13·1 answer
  • Which is true about POP3 and IMAP for incoming email?
    10·1 answer
  • Shawn works at the local electrical company in Nampa, ID, which provides electricity to the entire city of Boise. This area is p
    14·1 answer
  • __________ is a term used to indicate any unwanted event that takes place outside normal daily security operations. This type of
    11·1 answer
  • What is the full form of 'Rom<br>​
    7·2 answers
  • In what ways can you modify the location of the neutral point?
    12·1 answer
  • What is Data rate?<br> What is BAUD RATE?<br> What is bandwidth?
    8·1 answer
  • Which three statements are true of lossless compression?
    6·1 answer
  • How do you get a blank business card template in word?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!