1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wolverine [178]
2 years ago
5

What are the different types of application architecture

Computers and Technology
1 answer:
ivann1987 [24]2 years ago
3 0

Answer: There are many different types of application architectures, but the most prominent today, based on the relationships between the services are: monoliths and N-tier architecture, microservices, and event-driven architecture and service-oriented architecture.

Explanation: A layered or N-tier architecture is a traditional architecture often used to build on-premise and enterprise apps, and is frequently associated with legacy apps.

A monolith, another architecture type associated with legacy systems, is a single application stack that contains all functionality within that 1 application. This is tightly coupled, both in the interaction between the services and how they are developed and delivered.

Microservices are both an architecture and an approach to writing software. With microservices, apps are broken down into their smallest components, independent from each other. Each of these components, or processes, is a microservice.

With an event-driven system, the capture, communication, processing, and persistence of events are the core structure of the solution. This differs from a traditional request-driven model.

The service-oriented architecture (SOA) is a well-established style of software design, that is similar to the microservices architecture style.

You might be interested in
When using bits to represent fractions of a number, can you make all possible fractions?
saw5 [17]
This is your perfect answer

8 0
3 years ago
Which document lists the planned dates for performing tasks and meeting goals identified in the project plan?
Mnenie [13.5K]
<span>The document is called as Project schedule. this document contains the tasks that needs to be performed, the time that is given to the perform the task, the target dates. It also contains the budget of the project and the budget can be represented task wise. This helps in performing the project in a more organized way.</span>
5 0
3 years ago
A curb of this color means you may stop only to pick up or drop offs passengers or male
Delicious77 [7]
I believe it is a white curb!
7 0
3 years ago
How do you see the recent IT evolution (e.g. platforms, big data, Internet of Things, etc.) affect Internet security and privacy
torisob [31]

Answer:

Answered below

Explanation:

With the evolution and growth of technology, and as we are increasingly having our everyday lives dependent on technology, there arise problems that shouldn't be ignored.

Security of people's personal data and information is of paramount importance. Access to personal information and the sale of these information to companies without the owner's permission is a breach of privacy and one of the challenges we face today.

With the growth of data, there are newer threats and attacks on software security systems to steal these data and therefore there's a need for everyday assessment and improvement in security of data.

3 0
2 years ago
Write a program that gets five integer test scores from the user, calculates their average, and prints it on the screen. Test yo
Alex

Answer:

total = 0

for i in range(5):

   score = int(input("Enter a score: "))

   total += score

average = total / 5

print("The average is " + str(average))

Explanation:

*The code is in Python.

Initialize the total as 0

Create a for loop that iterates five times. Inside the loop, ask the user to enter a score. Add the score to the total (cumulative sum)

After the loop, calculate the average, divide the total by 5

Print the average

5 0
3 years ago
Other questions:
  • Pros and cons of Processor Throttling or Scaling?
    13·1 answer
  • Identify the false statement.
    8·1 answer
  • Which speaker port should you use when connecting a single speaker to a pc?
    6·1 answer
  • What is the name for the type of flash memory that is used by mobile devices to store their apps and data?
    6·1 answer
  • Which party controlled the White House and politics in the late 1800s, except for Grover
    6·2 answers
  • Which principle of design indicates that the elements that represent the same idea or category should be placed together
    8·2 answers
  • There are two main advantages to using multiple threads in a process: 1) Less work involved in creating a new thread rather than
    7·1 answer
  • in java how do i Write a Java program that takes ten numbers as input to calculate and print the average of the numbers.
    11·1 answer
  • What is the full from of CPU?​
    5·2 answers
  • I dont know how to put the negative sigh on my computer
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!