Answer: E. Use a RESTful architecture for both, send the ID through a POST, and ping the service with a GET until a response is available.
Explanation:
Since there are two microservices that need to communicate with each other without holding up a thread on either end, the communication framework should be used is a RESTful architecture for both, send the ID through a POST, and ping the service with a GET until a response is available.
REST is a software architectural style which is used in defining the set of rules that be used for the creation of web services. The REST architecture allows requesting systems to be able to access and manipulate web resources.
First, convert feet to inches. The ' denotes foot measurement while the " denotes inches. Since there are 12 inches in a foot,
5'10" = (5*12) + 10 = 70 inches
6'8" = (6*12) + 8 = 80 inches
a.) The lower limit is 70 inches while the upper limit is 80 inches.
b.) First, divide 78 inches by 12. That would 6.5 or 6 and a half feet. Since half foot is 6 inches, the length of the couch is 6'-6"
c.) Since the couch is between the limits, yes it would fit the space.
Answer: 10 students
Explanation:
Students younger than 10 = 50%
Students that are 10years old = 1/20 = 1/20 × 100 = 5%
Students that are older than 10 but younger than 12 = 1/10= 1/10 × 100 = 10%
Students that are 12 years or older
= 100% - (50% + 5% + 10%)
= 100% - 65%
= 35%
This means that 35% of the students are 12 years or older and we've been given the number as 70.
Let's say the total number of students is x. Therefore,
35% of x = 70
0.35 × x = 70
0.35x = 70
x = 70/0.35
x = 200
The total number of students is 200.
Therefore, the number of students that are 10years will be:
= 1/20 × 200
= 10 students
Therefore, 10 students are 10 years.
Answer:
Network scan
Explanation:
Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.
Some examples of cyber attacks are phishing, zero-day exploits, denial of service, man in the middle, cryptojacking, malware, SQL injection, spoofing etc.
Generally, a security assessment is carried out by network security experts on a regular basis to determine potential loopholes or vulnerabilities in the information and technology (IT) infrastructure. One of the techniques or approach used in security assessment is a network scan.
A network scan is a security assessment technique used for the automatic detection of host systems on a network. Although a network scan isn't capable of discovering or detecting all the weaknesses on a network, it avails users information about the computer systems that are active on the network and what services the computer systems offer or what ports are available on them.
The kind of material that is used for DRAM (dynamic random-access memory) is metal-oxide-semiconductor.
<h3>What is DRAM?</h3>
DRAM was invented in 1968. It is a type of RAM used in modern computers and laptops. It is a type of random access memory. Its name is dynamic random access memory.
Metal-oxide-semiconductor is used in making the transistors and capacitors of the DRAM, which are used to store the data. They hold a bit of the data in these capacitors and transistors.
Thus, the material that is used is metal-oxide-semiconductor to make DRAM (dynamic random-access memory).
To learn more about DRAM, refer to the link:
brainly.com/question/20216206
#SPJ1