Sign In
Ask Question
Computers & Technology
Hannah Simpson
1. Different algorithms are used to make decisions on load balancing. These include random allocation, round-robin, weighted round-robin, round-robin DNS load balancing, and others. Use the Internet to research load-balancing algorithms. Do any of these algorithms compromise security
Answer
Answers (1)
Computers & Technology
Henry Winters
How has the internet of things impacted buisness?
A. File sharin, conferencing, and TV video streaming are possible.
B. Buisness equipment can be continually adjusted based on analysis of data.
C. centralized administrative systems are no longer needed.
D. managers can monitor business from any location
Answer
Answers (1)
Computers & Technology
Cassandra Hamilton
Having network users login with a username and password is an example of: - authentication
-authorization
-accounting
-availability
Answer
Answers (1)
Computers & Technology
Dominique Ho
Copper metal conducts an electrical current Physical Change? Chemical Change? Both?
Answer
Answers (1)
Computers & Technology
Brenda Ochoa
What are two reasons for entering the ping 127.0.0.1 command on a windows pc?
Answer
Answers (1)
Computers & Technology
Reuben
In 1-2 sentences describe the purpose of comparison operators and give an example.
Answer
Answers (1)
Computers & Technology
Camden Riggs
What term below is used to describe an attack that sends unsolicited messages to bluetooth enabled devices?
Answer
Answers (1)
Computers & Technology
Meaghan
What are lexical errors?
and fi (a==b)
will it be a lexical error or a syntactical error?
Answer
Answers (1)
Computers & Technology
Peter Hebert
Which of the following are valid calls to Math. max? 1. Math. max (1,4) 2. Math. max (2.3, 5) 3. Math. max (1, 3, 5, 7) 4. Math. max (-1.5, - 2.8f) A. 1, 2 and 4 B. 2, 3 and 4 C. 1, 2 and 3 D. 3 and 4
Answer
Answers (1)
Computers & Technology
Iris Hanna
Lexi wants to buy a $300 painting. when she gets to the store, she finds that it is on sale for 40% off. how much does Lexi spend to buy the painting when it is on sale?
Answer
Answers (1)
Computers & Technology
Elwood
You manage a Ruby on Rails application that lives on a cluster of EC2 instances. Your website occasionally experiences brief, strong, and entirely unpredictable spikes in traffic that overwhelm your EC2 instances' resources and freeze the application. As a result, you're losing recently submitted requests from end users. You use Auto Scaling to deploy additional resources to handle the load during spikes, but the new instances don't spin-up fast enough to prevent the existing application servers from freezing. Which of the following will provide the most cost-effective solution in preventing the loss of recently submitted requests?
A. Keep a large EC2 instance on standby.
B. Increase the size of your existing EC2 instances.
C. Ask AWS support to pre-warm the Elastic Load Balancer.
D. Use Amazon SQS to decouple the application components and keep the requests in queue until the extra Auto-Scaling instances are available."
Answer
Answers (1)
Computers & Technology
Janessa
A company database consists of 10,000 sorted names, 40% of whom are known as good customers and who together account for 60% of the accesses to the database. There are two data structure options to consider for representing the database: Put all the names in a single array and use binary search. Put the good customers in one array and the rest of them in a second array. Only if we do not find the query name on a binary search of the first array do we do a binary search of the second array. Demonstrate which option gives better expected performance. Does this change if linear search on an unsorted array is used instead of binary search for both options
Answer
Answers (1)
Computers & Technology
Jaylon Williams
A user is reporting to you that they are unable to run a script named script1 within their home directory. The user has ownership of the file, and the modes on the file are "-rwxrw-rw-". What two commands could be used to set only the permissions necessary for the user to run the script?
Answer
Answers (1)
Computers & Technology
Kaitlyn Leach
Which of the following is an example of a logic bug?
A.
Multiplying strings together
B.
An infinite loop
C.
A missing parenthesis
D.
A string that has no quotation marks or apostrophes around it
Answer
Answers (1)
Computers & Technology
Lightning
You wish to share cases created and owned by your community users (Customer Community Plus) with the internal product support team, what is the best way to achieve this?
A. Custom Permission
B. Custom Sharing Rule
C. Custom Sharing Group
D. Custom Sharing Set
E. Records owned by community members are automatically shared with all internal users
Answer
Answers (1)
More
1
...
72
73
74
75
76
...
Home
»
Computers & Technology
» Page 74
Sign In
Sign Up
Forgot Password?