1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fiesta28 [93]
3 years ago
6

Ilya has been asked to recommend a federation system technology that is an open source federation framework that can support the

development of authorization protocols. Which of these technologies would he recommend?A. OAuth
B. Open ID Connect
C. Shibboleth
D. NTLM
Computers and Technology
1 answer:
Ira Lisetskai [31]3 years ago
8 0

Answer: A. OAuth

Explanation:

OAuth is one of the process by which different applications basically the third party applications can have access to account details of the end users. Here the process is completely governed by the principles of authorization protocols. Similarly in OAuth the access to the details of the end users are maintained by the process of a token. The third party upon access of the token is able to access the end users account information.

OAuth was established in 2007 and works on the framework of the open source federation.

So in this regard IIya would be recommended OAuth technology for her federal system technology.

You might be interested in
When a JSP page is compiled, what is it turned into?
77julia77 [94]

Answer: Servlet

Explanation: JSP page compilation is the process of compiling of the file before it can be turned towards the live server .There is a request that is made towards the JSP page  then is compiled into a JSP servlet. Before the execution of the JSP program, it is turned in to a JSP servlet .JSP is a program that work on the server side and reduce the work load of the developers.

5 0
2 years ago
Create the strAnalysis() function that takes 1 string argument and returns a string message. The message will be an analysis of
nydimaria [60]

Answer:

def str_analysis(s):

   if s.isdigit():

       s = int(s)

       if s > 99:

           message = str(s) + " is a pretty big number"

       else:

           message = str(s) + " is a smaller number than expected"

       

   elif s.isalpha():

       message = s + " is all alphabetical characters!"

   else:

           message = "There are multiple character types"

   

   return message;

   

s = input("enter word or integer: ")

while s != "":

   print(str_analysis(s))

   s = input("enter word or integer: ")

Explanation:

- Check if the string is digit, alphabetical, or mixed inside the function

- Ask the user for the input

- Call and print the result of the <em>str_analysis</em> function inside the while loop

- Keep asking for the input until the given string is empty

7 0
3 years ago
8.2 code practice edhesive?
Illusion [34]

Answer:

temperatures = []

i = 0

while i < 5:

   try:

       t = int(input('Enter a temperature: '))

       temperatures.append(t)

       i += 1

   except ValueError:

       print('Enter a number')

print(temperatures)

Explanation:

Hope this helps!

6 0
3 years ago
⇒PLEASE HELP ME!!!!!!!!∧_∧
saveliy_v [14]
I think it might be Heading & Border
6 0
2 years ago
Read 2 more answers
Which of the following information sources was not directly affected by the Telecommunications Act of 1996?
VMariaS [17]
Apparently, the answer is newspaper publishing.

Since telecommunication is defined to use wireless and electrical protocols to transmit data.
6 0
3 years ago
Other questions:
  • Jeremy Bridges is an executive for Green Web Designs, where his primary role is to ensure the security of business systems and d
    6·1 answer
  • 7.14 LAB: Word frequencies Write a program that reads a list of words. Then, the program outputs those words and their frequenci
    10·1 answer
  • Consists of a drive letter (preceded by a drive name when necessary) and colon, to identify the storage device, and one or more
    5·1 answer
  • You would like to search for information about storms but not tornadoes. What type of search strategy may be useful?
    10·2 answers
  • All of the nested folders you created will carry the same permissions as the __________ until you make changes.
    10·1 answer
  • How do you get the computer to stop opening randomly
    15·2 answers
  • Why is printer an output device​
    14·2 answers
  • Assume that sentence is a variable that has been associated with a string consisting of words separated by single space characte
    12·2 answers
  • Different search engines available on the internet​
    7·1 answer
  • Write a method named addCommas that accepts a string representing a number and returns a new string with a comma at every third
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!