1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lidiya [134]
4 years ago
12

Choosing a High-Availability Solution You have been hired to set up the network and servers for a new company, using Windows Ser

ver 2012 R2. The company is investing in an application critical to the company’s business that all employees will use daily. This application uses a back-end database and is highly transaction oriented, so data is read and written frequently. To simplify maintenance of the front-end application, users will run it on remote desktop servers. The owner has explained that the back-end database must be highly available, and the remote desktop servers must be highly scalable to handle hundreds of simultaneous sessions. What high-availability technologies do you recommend for the back-end database server and the remote desktop servers? Explain your answer.

Computers and Technology
1 answer:
katovenus [111]4 years ago
4 0

Answer:

We have following high availability solutions available in sql server:-

Logshiping:It is the process of automating backup of database and transaction logfiles on a server and then restoring on standby server.Through diagram below,logshipping can be understood properly.

Primary database is the database which needs to be available.It is available on primary server as the name says.Secondary database is available on secondary server where the all the transaction logfile will be restored to make the database in sync.This ca be chosen for high availability solution in OLTP environment.

It is very easy to setup.Just by using GUI,it can be established.

We have norecovery mode and stand by mode.Database on secondary server is not available if chosen no recovery mode.Stand by mode is chosen to use database for reading purpose when it is not being restored.

We can have multiple secondary server.On one server database can be used for reporting purpose and can be used for other purpose on another server.

It requires low maintance.

Mirroring:It is also a high availability solution which makes database available on secondary server.Below is the diagram showing mirroring:-

It increases availability of a database.

It increases data protection

It increases availability of database on production server during upgrades.

We have two modes high performance and high safety.In hgh performance mode, database mirroring session operates asynchronously and uses only the principal server and mirror server. The only form of role switching is forced service (with possible data loss).

In high safety mode,the database mirroring session operates synchronously and, optionally, uses a witness, as well as the principal server and mirror server.

Replication:It is also a high availability solution.It can copy database from one server and transfer the data on another server and keep the database in sync.We have different type of replication like snapshot,transaction,merge,peer to peer.Below diagram can be used to understand replication:-

In replication,we can transfer various database objects like table,views,sp's etc.Even we can transfer database object from sql server to oracle.

Transaction replication is used when data changes very frequently and we want database to be transferred immediately. Snapshot is used when database changes less frequently and it requires to be replicated periodically.Merge is used when changes on publisher as well as subscriber can be replicated.

Other than that,we have alwaysOn and clustering.In alwaysOn, we have primary replica and secondary replicas.Clustering setup is required in alwaysOn but storage is not required on SAN.It is really good,if we want to restrict one server to take backup and other for reporting purpose.

In clustering,we have common storage which is shared by all nodes in cluster.So if a node fails,other nodes are available and there would not be much impact as database files are available on separate server.

Explanation:

See attached picture.  

You might be interested in
1. Encrypt this binary string into cipher text: 110000. Include in your answer the formula the
puteri [66]

Answer:

Encrypt this binary string into ciphertext: 110000. Include

in your answer the formula the decoder would use to decrypt your cipher text in the format (coded answer) x N mod (m) = Y

-Decrypt this ciphertext into a binary string: 106

Now that you can see how public and private keys work in a real-world scenario, please explains how it works for computers and internet communications in relation to cybersecurity.

Explanation: ……………..

6 0
3 years ago
The use of encryption and authentication protocols is the standard method of countering attempts to alter or insert transmission
enyata [817]

Answer:

a) true.

Explanation:

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

On the other hand, authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification.

Digital certificates, smart cards, picture passwords, and biometrics are used to perform an authentication.

<em>Hence, in cybersecurity the use of encryption and authentication protocols is the standard method of countering attempts to alter or insert transmissions. </em>

5 0
3 years ago
Question 3 of 10
kvv77 [185]

Answer:

B. Sometimes, seeing a picture of the process is more helpful than  reading about it.

Explanation:

Video tutorials are a form of communication in which the instructions are given through video instructions. The users drive more information from video tutorials than written or audio. The visual and the auditory aids together helps in creating a better impact on the users. The video tutorial is more user friendly and can easily be controlled by the user. This helps in better understanding and analyzing the information.

8 0
3 years ago
Write a program that prompts the user to enter a date, using integer values for the month, day, and year, and then prints out th
attashe74 [19]

Answer:

import datetime

user = input("Enter date in yyyy,m,d: ").split(",")

int_date = tuple([int(x) for x in user])

year, month, day =int_date

mydate = datetime.datetime(year, month, day)

print(mydate)

x = mydate.strftime("%B %d, %Y was a %A")

print(x)

Explanation:

The datetime python module is used to create date and time objects which makes it easy working with date-time values. The user input is converted to a tuple of integer items, then they are converted to date time objects and parsed to string with the strftime method.

5 0
3 years ago
Package Newton’s method for approximating square roots (Case Study: Approximating Square Roots) in a function named newton. This
lutik1710 [3]
I’m confused what are you asking
7 0
3 years ago
Other questions:
  • True or false? You can test your marketing emails in different email clients from within the email editor.
    10·1 answer
  • Why are computer programs so much longer now than they were in the late 1980?
    8·1 answer
  • You use the _____ sheet in the format cells dialog box to position data in a cell by centering it, for example.​
    8·1 answer
  • A virus has attacked your hard drive and now when you start up Windows, instead of seeing a Windows desktop, the system freezes
    9·2 answers
  • True or false: a cover letter accompanies a resume to showcase a job-seeker’s personal life
    6·2 answers
  • How does emotional awareness help you with non-verbal communication?
    13·2 answers
  • Different video files and ______ can cause compatibility issues to arise between computer systems.
    8·1 answer
  • Information systems include all of these
    5·1 answer
  • Leslie works in an SDLC team. When Leslie edits a file, it gets saved as an altered version. Later all the altered versions are
    9·1 answer
  • In _________, the process requests permission to access and modify variables shared with others. a) entry section b) critical se
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!