Answer:
See explaination
Explanation:
CREATE TABLE CATEGORY
(
cid int NOT NULL,
description varchar2(1000),
PRIMARY KEY (cid)
);
CREATE TABLE PRODUCT
(
pid int NOT NULL,
description varchar2(1000),
cid int,
price int,
p_size varchar2(1),
CONSTRAINT chk_price CHECK (price>0),
CONSTRAINT chk_size CHECK (p_size in ('S','M','L')),
CONSTRAINT fk_cid FOREIGN KEY (cid) REFERENCES CATEGORY(cid)
);
Answer: There are many different types of application architectures, but the most prominent today, based on the relationships between the services are: monoliths and N-tier architecture, microservices, and event-driven architecture and service-oriented architecture.
Explanation: A layered or N-tier architecture is a traditional architecture often used to build on-premise and enterprise apps, and is frequently associated with legacy apps.
A monolith, another architecture type associated with legacy systems, is a single application stack that contains all functionality within that 1 application. This is tightly coupled, both in the interaction between the services and how they are developed and delivered.
Microservices are both an architecture and an approach to writing software. With microservices, apps are broken down into their smallest components, independent from each other. Each of these components, or processes, is a microservice.
With an event-driven system, the capture, communication, processing, and persistence of events are the core structure of the solution. This differs from a traditional request-driven model.
The service-oriented architecture (SOA) is a well-established style of software design, that is similar to the microservices architecture style.
Answer:open source
Explanation: what is's called
Answer:
IT security is a set of cyber security strategies that prevents unauthorized access to organizational assets such as computers, networks, and data.