1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
chubhunter [2.5K]
3 years ago
11

Point out the wrong statement: SOA eliminates the use of application boundaries, the traditional methods where security is at th

e application level aren't likely to be effective An atomic service cannot be decomposed into smaller services that provide a useful function XML security service may be found in retail application communication. None of the mentioned
Computers and Technology
1 answer:
love history [14]3 years ago
7 0

Answer:

All the three statements given are true so the correct option is option 4 which is none of the above.

Explanation:

The options are given in a jumbled up form the options are sorted which are as follows:

  1. SOA eliminates the use of application boundaries, the traditional methods where security is at the application level aren't likely to be effective
  2. An atomic service cannot be decomposed into smaller services that provide a useful function
  3. XML security service may be found in retail application communication.
  4. None of the mentioned

SOA stands for Service Oriented Architecture. This eliminates the application boundaries so option 1 is true.

An atomic service is defined as the smallest service which cannot be divided further. So this is true as well

The XML security service is incorporated in all retail applications. so this is true as well.

So the remaining option is just None of the mentioned.

You might be interested in
Three broad categories of cryptographic algorithms are commonly used to create PRNGs: symmetric block ciphers, asymmetric cipher
RideAnS [48]

Answer:

True.

Explanation:

In generating PRNGs, several specific types of crypto algorithms will be widely will use: linear cipher block, nonlinear ciphers, as well as hash methods and authorization instructions in messages. So, that's why the following scenario is true about the cryptographic algorithms because this is a collection of several excellently defined however complicated mathematics techniques for encoding or decoding information.

7 0
3 years ago
Homework 8 Matlab Write a function called fibonacciMatrix. It should have three inputs, col1, col2, and n. col1 and col2 are ver
Amiraneli [1.4K]

In this exercise we have to use the knowledge in computational language in python to write the following code:

We have the code can be found in the attached image.

So in an easier way we have that the code is:

<em>function v = myfib(n,v)</em>

<em>if nargin==1</em>

<em>    v = myfib(n-1,[0,1]);</em>

<em>elseif n>1</em>

<em>    v = myfib(n-1,[v,v(end-1)+v(end)]);</em>

<em>end</em>

<em>end</em>

<em>function v = myfib(n,v)</em>

<em>if nargin==1</em>

<em>    v = myfib(n-1,[0,1]);</em>

<em>elseif n>1</em>

<em>    v = myfib(n-1,[v,v(end-1)+v(end)]);</em>

<em>elseif n<1</em>

<em>    v = 0;</em>

<em>end</em>

<em>function [n] = abcd(x)</em>

<em>if (x == 1 || x==0)</em>

<em>    n = x; </em>

<em>    return</em>

<em>else</em>

<em>    n = abcd(x-1) + abcd(x-2);</em>

<em>end</em>

<em>end</em>

<em>fibonacci = [0 1];</em>

<em>for i = 1:n-2</em>

<em>    fibonacci = [fibonacci fibonacci(end)+fibonacci(end-1)];</em>

<em>end</em>

<em>>> myfib(8)</em>

<em>ans =</em>

<em>    0    1    1    2    3    5    8   13</em>

<em>>> myfib(10)</em>

<em>ans =</em>

<em>    0    1    1    2    3    5    8   13   21   34</em>

See more about python at  brainly.com/question/18502436

8 0
2 years ago
If you created a variable called name, what data type would that value be?
NNADVOKAT [17]
<h2>Answer:</h2>

<h2>A float</h2>

Hope it helps

6 0
3 years ago
Read 2 more answers
To ensure that the original value of an argument passed to a method remains unchanged after returning from the method, you shoul
lakkis [162]

Answer:

false

Explanation:

A reference parameter passed into the method can be changed by the method, when the method changes all of a parameter's variables, the parameter will keep the changes after the method is returned.

4 0
3 years ago
You areYou are a member of the application development organization for a small but rapidly growing software company that produc
bija089 [108]

Answer:

Following are the solution to this question:

Explanation:

Please find the complete question in the attached file.

It will obtain as much information about this matter as necessary even before the conference. It includes its gravity or probability of risk, various cases in the entire event, the possible solutions to the issues, as well as the consequences for parties involved in each potential answer, and Only at conferences, it may clarify to my boss that the explanation for the problem and also in details. It will be doing everything possible and try not to conceal the details but highlight the problem.

3 0
3 years ago
Other questions:
  • How to remove duplicates from list in python?
    8·2 answers
  • I have an LG phone. Since I just bought my phone, my bill to text message isn't paid yet. I texted a couple of things playfully
    5·2 answers
  • 2. What is the layout of the modern keyboard known as?
    13·1 answer
  • Which of the following is true of how packets are sent through the internet?
    10·2 answers
  • (a) Store last 7 digits of your student ID in a vector (7 element row or column vector). Write a MATLAB code which creates a 7x7
    11·1 answer
  • Plz can someone tell me the answers ?
    13·2 answers
  • Kevin needs to get his data from a database into a text file to send to another group. He needs to _____.
    12·2 answers
  • Read the following scenario:
    7·2 answers
  • Complete the statement by entering the appropriate term in the space below.
    13·2 answers
  • What is the type of data in the list [103, 405, 527, 396, 503]?
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!