1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elis [28]
3 years ago
11

You have an application that for legal reasons must be hosted in the United States when U.S. citizens access it. The application

must be hosted in the European Union when citizens of the EU access it. For all other citizens of the world, the application must be hosted in Sydney. Which routing policy should you choose in order to achieve this
Computers and Technology
1 answer:
shepuryov [24]3 years ago
3 0

Question options:

A. Latency-based routing

B. Simple routing

C. Geolocation routing

D. Failover routing

Answer:

C. Geolocation routing

Explanation:

Geolocation routing is used in allocating resources for different traffic sources originating from different geographical locations. Consequently you are allocating a different resource to handle a different DNS query based on the location/origination of the DNS query. In the above example, you will need to for example to route all queries from any other place in the world that is not US or Europe to a load balancer for Sydney. Your application in their different locations using geolocation routing would have to be adapted and localized to the region so as to serve the audience there

You might be interested in
Martha has a large data list and wants to sort it quickly and efficiently. Which algorithm should Martha use
Elena-2011 [213]

Answer:

quicksort

Explanation:

There are many types of asymptotically efficient sorting algorithms that can be used but one of the more commonly used for large data lists would be quicksort. This is a sorting algorithm that focuses on choosing a value from the list and working around that value in order to sort the data piece by piece. For larger data sets this method is widely used due to its speed and efficiency which is exactly what Martha needs in this scenario.

4 0
3 years ago
A(n) ________________ takes place when an unauthorized person gains access to a digital device by using an internet connection a
nordsb [41]
It's called an attack
4 0
3 years ago
How can you tell if a website is biased?
Leona [35]

Answer:

the author has not considered other points of view.

7 0
1 year ago
Which of the following is generally true about Open Source Software?
JulijaS [17]
<span>Open source software is usually free to download and install, and it can be studied, changed, and distributed according to the rights of the software. I don't believe there is any copyright laws on this type of software. The most known open source software is Linux and it's available for most operating systems right now. Typically, open source owners just ask for donations for their work.</span>
3 0
3 years ago
Alice is an investor who has created a device controlled by an app that will water plants automatically. Alice has no experience
oksian1 [2.3K]

Answer:

3rd one

Explanation:

took test

5 0
2 years ago
Other questions:
  • You have informed your users that you need to bring the machine down at the end of the day to perform routine maintenance. Howev
    14·1 answer
  • Deon is required to provide the citation information for his sources. What type of information should he collect from his source
    10·2 answers
  • 4. How can you select non-adjacent cells (i.e. cells that are not all together in one block)?
    5·2 answers
  • Advatages and disadvantages of power-concentrated train​
    6·1 answer
  • How can you crop a photo in PowerPoint?
    15·2 answers
  • What is one reason that writing effective messages is so important
    11·2 answers
  • What is the best programing language to use for building video games?
    10·1 answer
  • What is the difference between a computer’s RAM and its hard disk?
    13·2 answers
  • Software that communicates with the hardware and allows other programs to run. It is comprised of system software, or the fundam
    9·1 answer
  • Unscramble the given word and identify the correct statement about it. ATTEPLSR
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!