1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sophie [7]
3 years ago
14

You have been asked to decouple an application by utilizing SQS. The application dictates that messages on the queue can be deli

vered more than once, but must be delivered in the order that they have arrived, and also must allow for efficient, repeated polling of the queue. Which of the following options are most suitable?a. Configure a standard SQS queue and use long polling
b. Configure a FIFO SQS queue and enable long polling
c. Configure a FIFO SQS queue and enable short polling
d. Configure a standard SQS queue and use default polling
Computers and Technology
1 answer:
LuckyWell [14K]3 years ago
8 0

Answer:

Option B is the correct option.

Explanation:

When using SQS the user request to separate a query. The specification specifies that updates on the list may have been transmitted multiple times, but it must be transmitted throughout the sequence in which they appeared, and therefore should require secure, repetitive queue polling.

So, They configure a First In First Out SQS queue and allow long-polling which is suitable for AWS services.

You might be interested in
Many major employers routinely monitor the performance of their employees through the computers and telephones they use. Employe
STALIN [3.7K]

Answer:

Employers are allowed to check the number of keystrokes that word processors enter during the day.

Explanation:

An employer is authorized to monitor the activity of its employee when:

  • The employee authorizes it.
  • The employer owns the system to be used.
  • Surveillance is necessary for a strictly professional purpose.

By analyzing the keys pressed per day, the employer can determine the performance provided by its employees, and if they use the company's resources, for non-work purposes.

5 0
3 years ago
Jasmine plays a game on her computer screen. A moving balloon appears on the screen, and she has to pop the balloon by clicking
Elena-2011 [213]
Please find the answer as attachment.

4 0
2 years ago
Identifying what you will need to review takes place during?
marishachu [46]
It takes places during surveying.

For example, let's say you want to review your own produced game application software, and found out whether it satisfy your consumer or not

Before you conduct the survey, you have to identify what aspect you want to find out from your consumers , such as : Does it have any bug ? Is it challenging enough ? is the graphic good enough ? etc
7 0
3 years ago
Read 2 more answers
What is the advertising photographer’s main objective in creating an image?
iren2701 [21]
B. To sell it as a product
8 0
3 years ago
How to reload ingenuity when a pulsating blue thing is there
Hatshy [7]
Todo is very important
4 0
3 years ago
Other questions:
  • Use your own words to describe how IT/IS can support major functional areas in the business. Discuss at least two of these areas
    14·1 answer
  • Due to the absorption and scattering of shorter wavelengths by interstellar dust, distant stars appear A) bluer. B) brighter. C)
    9·1 answer
  • Schools are businesses that need to install software on a large number of computers can usually obtain a ______
    13·1 answer
  • Mica's creating his web page with a software that is free of charge for the first month. If he likes the program, he will have t
    8·2 answers
  • Describe how you center text.
    7·2 answers
  • Which piece of computer hardware was revised to run hypervisors natively?
    12·2 answers
  • Power delivered to the hitch of tractors is called
    12·1 answer
  • Create a spreadsheet that lists the ten currencies you chose. For each currency, enter an amount and create a
    12·1 answer
  • Mention any
    14·1 answer
  • A(n) ____________________ key is a key that is not reused, but rather is only used once, thus improving security by reducing the
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!