1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
makkiz [27]
3 years ago
6

A Solutions Architect must review an application deployed on EC2 instances that currently stores multiple 5-GB files on attached

instance store volumes. The company recently experienced a significant data loss after stopping and starting their instances and wants to prevent the data loss from happening again. The solution should minimize performance impact and the number of code changes required. What should the Solutions Architect recommend?
Computers and Technology
1 answer:
forsale [732]3 years ago
6 0

Answer:

Store the application data in an EBS volume

Explanation:

EC2 Instance types determines the hardware of the host computer used for the instance.

Each instance type offers different compute, memory, and storage capabilities and are grouped in instance families based on these capabilities

EC2 provides each instance with a consistent and predictable amount of CPU capacity, regardless of its underlying hardware.

EC2 dedicates some resources of the host computer, such as CPU, memory, and instance storage, to a particular instance.

EC2 shares other resources of the host computer, such as the network and the disk subsystem, among instances. If each instance on a host computer tries to use as much of one of these shared resources as possible, each receives an equal share of that resource. However, when a resource is under-utilized, an instance can consume a higher share of that resource while it’s available

You might be interested in
assume a class named window has an accessor method named getwidth that accepts no parameters and returns an int. assume further
worty [1.4K]

The set and get functions are analogous to the accessor and mutator functions of C++. They are used in place of modifying a class member directly inside an object and making it public. An accessor function must be invoked in order to gain access to a private object member.

int mVal = winarr[0].getWidth();

for(int i = 1; i < winarrsize; i++)

{

  if(winarr[i].getWidth() > mxVal)

     mVal = winarr[i].getWidth();

}

cout << "The widest width is: "

<< mVal << endl;

By using encapsulation, a programmer can specify the labels for the data members and functions as well as whether or not other classes can access them. When data members are marked as "private," member functions of other classes cannot access or modify them which allows members access to these private data.

For a member such as Level, a function like GetLevel() returns the value of the member, while a function like SetLevel() gives it a value.

To learn more about Accessor Function click here:

brainly.com/question/13098886

#SPJ4

5 0
1 year ago
How can aspiring illustrators hone their skills?
user100 [1]

Answer:

Adobe Premiere

Reason: Adobe offers a range of software to practice and master the craft

6 0
3 years ago
When should you update your Transaction Register? Every time you make a transaction Daily Weekly Monthly
Veronika [31]
Do it weekly so it up to date
8 0
3 years ago
What is an example of a one-to-many relationship?
jok3333 [9.3K]
Last option o si employee is
8 0
3 years ago
Read 2 more answers
QUIZLET Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer networ
anastassius [24]

Answer:Screening

Explanation:Packet screening is the process in which whenever a packet is received at the destination port, there is the examining of the packet.The examination of the packet rote from source to destination takes place. The screening takes place for evaluating that the data in the packet is adequate and carries no error that can risk in the security, tracks the routes  of the packet path etc.

5 0
3 years ago
Other questions:
  • In a clustered column chart, the names of each column are part of the ____ series. select one:
    11·1 answer
  • Which of the following mountain ranges stretches from Alabama to Canada?
    10·1 answer
  • 3.24 LAB: Seasons
    13·1 answer
  • What car Is this because I want it for my daughters sweet 16th birthday
    13·1 answer
  • A user has connected a USB 3.0 device to a computer using a 3 ft (1m) USB 3.0 cable. However, instead of an expected data transf
    9·1 answer
  • Symbic Foods, a chain of fast food restaurants, has included a drop-down menu on its main Web site. With this drop-down menu, pe
    13·1 answer
  • When would it be beneficial to make a copy of a document
    10·1 answer
  • How do even do anything on Rblx Creator?? Will give branliest for whoever gives me the most info.
    13·1 answer
  • What was the most surprising thing you learned this term? Why did it surprise you? ​
    9·1 answer
  • Creating a website is called web ________.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!