1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lorico [155]
3 years ago
12

Your company runs several databases on a single MySQL instance. They need to take backups of a specific database at regular inte

rvals. The backup activity needs to complete as quickly as possible and cannot be allowed to impact disk performance. How should you configure the storage?
Computers and Technology
1 answer:
Umnica [9.8K]3 years ago
8 0

Answer:

A gcloud tool can be used to take regular backups using persistent disk snapshots

Explanation:

As the company runs several databases on a single MySQL instance, they need to take backups of a specific database at regular intervals. The backup activity needs to complete as quickly as possible and cannot be allowed to impact disk performance. For this, a gcloud tool can be used to take regular backups using persistent disk snapshots or backups that can be written to the mounting location using mysqldump.

You might be interested in
Understanding the link between education and your desired career is an integral part of your career _______.
34kurt
I'm not 100% sure about my answer but based on articles I read online it makes the most sense to me.

Understanding the link between education and your desired career is an integral part of your career EXPLORATION.

The first step in career exploration is that you need to ask yourself this question "What can I do with this major?". If you have your answer, it is best to start exploring the connections that links your academic and professional interest.
7 0
3 years ago
Read 2 more answers
You need to perform maintenance on a router and need to temporarily reroute traffic through another office. which would be the b
Whitepunk [10]
<span>In order to perform maintenance on a router and need to temporarily reroute traffic through another office  the best way to perform this action would be to configure a static route on the router.
</span>By doing this, the router will use the manually-<span>configured routing entry to send the packets.</span>
3 0
3 years ago
Is recursion ever required to solve a problem? What other approach can you use to solve a problem that is repetitive in nature?
Setler79 [48]

Answer:

No you can not tell that recursion is ever required to solve a problem.

Recursion is required when in the problem, the solution of the input depends on the solution of the subsets of the input.

Iteration is also another form of repetitive approach we follow to solve that kind of problems.

But the difference between recursion and iteration is :

  • In recursion we call the function repeatedly to return the result to next level.
  • In iteration certain bunch of instructions in a loop are executed until certain conditions met.

Explanation:

For example in the Fibonacci sequence problem, to find f_{n}, we need to compute f_{n-1} and f_{n-2} before that.

  • In case of recursion we just call the method Fibonacci(n) repeatedly only changing the parameter Fibonacci(n-1), that calculates the value and return it.

                           Fibonacci(n)

                           1. if(n==0 or n==1)

                           2.       return 1.

                           3.else

                           4.      return( Fibonacci(n-1)+Fibonacci(n-1) )

  • But in case of iteration we run a loop for i=2 to n, within which we add the value of current f_{i-1} and f_{i-2} to find the value of f_{i}

                           Fibonacci(n)

                           1. if(n<=2)

                           2.    result = 1

                           3.     else

                           4. result1 =1 and result2=1.

                           5.      {  result = result1 +result2.

                           6.         result1= result2.

                           7.         result2 = result.

                           8.      }

                           9.  output result.

8 0
3 years ago
Consider an airport security system. Determine the system model considering that there are two classes of customers – regular an
kykrilka [37]

The answer & explanation for this question is given in the attachment below.

4 0
3 years ago
What type of dns servers field dns queries, send iterative queries to upstream dns servers, or send requests to forwarders and t
photoshop1234 [79]

Answer:

catching only server to send iterative queries to upstream DNS servers, or send requests to forwarders

<h3>what DNS server normally sends iterative questions with another DNS server?</h3>
  • The DNS server sends an iterative query to a root server.
  • The root server responds with a referral to the top-level domain server address. a. Client's DNS server, with the top-level domain server address, generates a new iterative query and sends it to the top-level domain server.

To learn more about DNS servers, refer

to brainly.com/question/2051280

#SPJ4

6 0
2 years ago
Other questions:
  • What is after Windows 8.1
    11·2 answers
  • A customer contacts the help disk stating a laptop does not remain charged for more than 30 minutes and will not charge more tha
    10·1 answer
  • This is pixlr
    6·1 answer
  • A workstation with a static IP (Internet Protocol) address can print and authenticate to a server, but cannot browse to www.comp
    14·1 answer
  • 4.15 LAB: Password modifier
    14·1 answer
  • Which of the following is not an advantage of e-commerce for consumers?
    13·2 answers
  • Which of the expressions is false? when a = 10 and b = 4
    8·1 answer
  • When you run your Windows Form application, what is the lifespan of a global variable (also known as a "field" or "class" variab
    13·1 answer
  • What are the main differences between openldap and microsoft's active directory (ad)? check all that apply
    13·1 answer
  • A(n) __________ is a computer that presents itself as a sweet, tempting target to a hacker but, in reality, is a decoy
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!