1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vagabundo [1.1K]
3 years ago
13

How are clustering and Network Load Balancing similar?

Computers and Technology
1 answer:
Elza [17]3 years ago
5 0

Answer:

Load balancing is the mechanism happening between the different components to achieve the aim independently in the server. They are not aware of the presence of the other resources with them.

Clustering is the process in which the components work to gain the desired results in the form of group.They work in group so that there are no chances of crash  in server.

The similarity arises between these two process are :

  • They have capability to work even after failure of system
  • Can have unnecessary access to the information
  • Scalable

You might be interested in
Alice just wrote a new app using Python. She tested her code and noticed some of her lines of code are out of order. Which princ
LenKa [72]

Answer:

This is Elijah from FLVS hihi :DDDDDDDDDDDDDDDDDDDDDDDDDDDDD CVS

Explanation:

6 0
3 years ago
Please help me to do this task
natima [27]

INPUT Num

While Counter > 12

       Num Num * Counter

       A[Counter] Num

End While

5 0
4 years ago
The process known as AAA (or “triple A”) security involves three components. _____________ means ensuring that an authenticated
kirill115 [55]

Answer:

The process known as AAA (or “triple A”) security involves three components. Authorization means ensuring that an authenticated user is allowed to perform the requested action.

7 0
4 years ago
How will you decide which browser security settings to allow and which ones to block?
Brums [2.3K]

One can decide which browser security settings to allow by reviewing them and using one's judgement.

Browsers like Chrome, Safari, Firefox all have innate personal browser security settings which can be altered according to users preferences.

  • Configuring of browsers setting is prominent for safeguarding sensitize information such as passwords, account details from getting accessed by a malicious third party.

In conclusion, one can decide these by reviewing each browser security setting and employ personal judgement to make decision.

Read more on this here

<em>brainly.com/question/13354554</em>

6 0
3 years ago
What are three ways science and technology are related and what are three ways they are different?
photoshop1234 [79]

Answer:

Science contributes to technology in at least six ways: (1) new knowledge which serves as a direct source of ideas for new technological possibilities; (2) source of tools and techniques for more efficient engineering design and a knowledge base for evaluation of feasibility of designs; (3) research instrumentation,

Explanation:

3 0
3 years ago
Other questions:
  • The ____ search feature allows you to look for words with extensions such as “ing,”“ed,” and so forth. .
    12·1 answer
  • Spreadsheet software creates a ____, composed of a grid of columns and rows
    6·1 answer
  • Write a Python program that creates a dictionary containing course numbers and the room numbers of the rooms where the course me
    7·1 answer
  • what is the goal of technology A. to understand how the natural world functions B. to study the natural world C. to improve the
    9·1 answer
  • A general-use dimmer switch is required to be counted as ? where installed in a single-gang box on a circuit wired with 12 awg c
    15·1 answer
  • Can you help me match the ships to the right number?​
    12·1 answer
  • Hurry i need help What would provide structured content that would indicate what the code is describing ?
    12·1 answer
  • Select the correct answer.
    10·1 answer
  • Which of the following makes Super Mario Run unique?
    6·1 answer
  • in which situation, a unicast session or a multicast session, can feedback received from an rtcp packet about the session be han
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!