1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
damaskus [11]
2 years ago
8

your application is using kinesis to ingest data from a number of environmental sensors which continuously monitor for pollution

within a 1 mile radius of a local primary school. an ec2 instance consumes the data from the stream using the kinesis client library. you have recently increased the number of shards in your stream to 6 and your project manager is now suggesting that you need to add at least 6 additional ec2 instances to cope with the new shards. what would be your response to this suggestion?
Computers and Technology
1 answer:
Lilit [14]2 years ago
5 0

My response to this suggestion would be that the number of shards exceeds the number of instances because a single worker can process an infinite number of shards.

<h3>What is AWS?</h3>

AWS is an acronym for Amazon Web Service and it can be defined as a web-based service that is saddled with the responsibility of providing on-demand cloud computing and application programming interface (API) to individuals, governments, and business firms on a metered basis.

<h3>What is Amazon Kinesis?</h3>

Amazon Kinesis can be defined as an Amazon Web Service (AWS) which is designed and developed to enable an end user to ingest, buffer, and process large-scale data streams from multiple services in real-time.

In this scenario, my response to this suggestion would be that the number of shards exceeds the number of instances because a single worker can process an infinite number of shards.

Read more on Amazon Kinesis here: brainly.com/question/28115685

#SPJ4

You might be interested in
What is the purpose of the operating system's processor management function?
Sloan [31]
The purpose of the operating system's processor management function is that it allows you to run multiple programs on your computer simultaneously. 
5 0
3 years ago
This form of analysis is an extension of what-if analysis and is the study of the impact on other variables when one variable is
Elenna [48]

Answer: (C) Sensitivity analysis

Explanation:

 The sensitivity analysis is also known as simulation analysis or "What-if" analysis as, it is basically used for the outcome prediction of the decision making in various range of the given variable.

It is used by making a given arrangement of factors, an investigator can decide that how changing in a single variable influence the final result.

The sensitivity analysis is the process for investigation of how the vulnerability in the yield of a scientific model or framework can be isolated in the system.  

Theretofore, Option (C) is correct as all the other options does not involve in the study of variable and also others are not the extension of what-if analysis.

3 0
3 years ago
Preliminaries
Ratling [72]

Answer:

okahsb

Explanation:

8 0
3 years ago
Relieved to have survived ,henry rolled off the rink________.giving alex a grateful look
Marina86 [1]

Answer:

simultaneously might be the answer

8 0
3 years ago
Which layer of the OSI model do network administrators typically check first when issues arise?
bazaltina [42]

Answer:

B

Explanation:

Typically I check the physical layer to ensure that the nodes are plugged accordingly.

4 0
2 years ago
Other questions:
  • Google Slides saves your work to Google Drive. PowerPoint has the option to save to OneDrive. Both of these solutions are in the
    9·1 answer
  • Managing your calendar and emails can be easily accomplished through ___ software
    8·1 answer
  • IN THE MOVIE BACK TO THE FUTURE 1985 IS 1985 THE PUBLICATION DATE?WHERE CAN I FIND THE MOVIE?
    6·1 answer
  • C++ CODE
    6·1 answer
  • True or false that computers that are joined together are able to share hardware and software, but not data
    11·1 answer
  • Which is NOT a benefit of using visual aids?
    9·2 answers
  • The students of a college have to create their assignment reports using a word processing program. Some of the questions in thei
    9·1 answer
  • Test if the word mold is stored in the variable word.
    5·1 answer
  • __________, a level beyond vulnerability testing, is a set of security tests and evaluations that simulate attacks by a maliciou
    10·1 answer
  • Type the correct answer in each box. Spell all words correctly, and use numerals instead of words for numbers. If necessary, use
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!