1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sophie [7]
3 years ago
14

You have been asked to decouple an application by utilizing SQS. The application dictates that messages on the queue can be deli

vered more than once, but must be delivered in the order that they have arrived, and also must allow for efficient, repeated polling of the queue. Which of the following options are most suitable?a. Configure a standard SQS queue and use long polling
b. Configure a FIFO SQS queue and enable long polling
c. Configure a FIFO SQS queue and enable short polling
d. Configure a standard SQS queue and use default polling
Computers and Technology
1 answer:
LuckyWell [14K]3 years ago
8 0

Answer:

Option B is the correct option.

Explanation:

When using SQS the user request to separate a query. The specification specifies that updates on the list may have been transmitted multiple times, but it must be transmitted throughout the sequence in which they appeared, and therefore should require secure, repetitive queue polling.

So, They configure a First In First Out SQS queue and allow long-polling which is suitable for AWS services.

You might be interested in
ABC Manufacturing Company is located in Hiroshima, Japan. Being prone to earthquakes, the company decided to implement a backup
maxonik [38]

The command interface protocol that I would suggest to the IT administrator is Secure Shell (SSH).

<h3>What is a command interface protocol?</h3>

A command interface protocol can be defined as a standard protocol that is designed and developed to processes commands in the form of lines of text to a software program that is installed on a computer system.

<h3>The types of command interface protocol.</h3>

In Computer technology, there are different types of command interface protocol and these include:

  • SSL
  • TLS
  • SSH

SSH is an acronym for Secure Shell and it is a standard network protocol that gives a IT administrator a secure way to access data over an unsecured network, especially when backing up data.

Read more on SSH here: brainly.com/question/17147683

7 0
2 years ago
. In the select algorithm that finds the median we divide the input elements into groups of 5. Will the algorithm work in linear
8090 [49]

Answer:

we have that it grows more quickly than linear.

Explanation:

It will still work if they are divided into groups of 77, because we will still know that the median of medians is less than at least 44 elements from half of the \lceil n / 7 \rceil⌈n/7⌉ groups, so, it is greater than roughly 4n / 144n/14 of the elements.

Similarly, it is less than roughly 4n / 144n/14 of the elements. So, we are never calling it recursively on more than 10n / 1410n/14 elements. T(n) \le T(n / 7) + T(10n / 14) + O(n)T(n)≤T(n/7)+T(10n/14)+O(n). So, we can show by substitution this is linear.

We guess T(n) < cnT(n)<cn for n < kn<k. Then, for m \ge km≥k,

\begin{aligned} T(m) & \le T(m / 7) + T(10m / 14) + O(m) \\ & \le cm(1 / 7 + 10 / 14) + O(m), \end{aligned}

T(m)

​

 

≤T(m/7)+T(10m/14)+O(m)

≤cm(1/7+10/14)+O(m),

​

therefore, as long as we have that the constant hidden in the big-Oh notation is less than c / 7c/7, we have the desired result.

Suppose now that we use groups of size 33 instead. So, For similar reasons, we have that the recurrence we are able to get is T(n) = T(\lceil n / 3 \rceil) + T(4n / 6) + O(n) \ge T(n / 3) + T(2n / 3) + O(n)T(n)=T(⌈n/3⌉)+T(4n/6)+O(n)≥T(n/3)+T(2n/3)+O(n) So, we will show it is \ge cn \lg n≥cnlgn.

\begin{aligned} T(m) & \ge c(m / 3)\lg (m / 3) + c(2m / 3) \lg (2m / 3) + O(m) \\ & \ge cm\lg m + O(m), \end{aligned}

T(m)

​

 

≥c(m/3)lg(m/3)+c(2m/3)lg(2m/3)+O(m)

≥cmlgm+O(m),

​

therefore, we have that it grows more quickly than linear.

5 0
3 years ago
Somebody supplied me with a file that was edited on a Windows machine. The file contains carriage returns in addition to the new
maria [59]

Answer:

It is  tr.

Explanation:

For removing all the carriage returns you can make use tr like

tr '\r\n' ' '

However, you cannot make use of the diff which finds the difference between the two files.

Onl is definitely not an option and cut holds different meaning that we know, Hence the above answer, tr can definitely help as shown above,

3 0
3 years ago
In which type of situation would it make sense to use edge computing?
ZanzabumX [31]

A type of situation in which it would make sense to use edge computing is: b. where critical decisions must be made on a split-second basis.

<h3>What is edge computing?</h3>

Edge computing can be defined as a distributed computing system that involves the deployment of computing and storage resources closer to the sources of data, so as to save time and enhance the decision-making process.

This ultimately implies that, a type of situation in which it would make sense to use edge computing is a scenario where critical decisions must be made on a split-second basis.

Read more on edge computing here: brainly.com/question/23858023

#SPJ1

<u>Complete Question:</u>

In which type of situation would it make sense to use edge computing?

a. where data is uploaded to a server at a scheduled time each week

b. where critical decisions must be made on a split-second basis

c. where users are in close proximity to the central data server

d. where there are few or no digital devices to capture

e. i don't know this yet

4 0
2 years ago
What is the database used for
ELEN [110]
Sometimes referred to as database management systems<span>, database software tools are primarily used for storing, modifying, extracting, and searching for information within a database. </span>
7 0
3 years ago
Other questions:
  • Ascending and descending are examples of
    5·2 answers
  • What is an extrinsic value? A. something that is valuable in and of itself B. something that is valuable because it leads to ano
    12·1 answer
  • All of these are required categories on a safety data sheet except
    14·2 answers
  • In python:
    8·1 answer
  • How do particles move at higher temperatures compared to how they move at lower temperatures?
    10·1 answer
  • In the Mouse Properties window, you can?
    8·1 answer
  • Computing is the provision of IT services on demand.
    9·1 answer
  • What are two best practices for creating ads? (Choose two.) Select All Correct Responses Implement one ad per ad group per keywo
    12·1 answer
  • Write an SQL query to list all the records from the member and branch tables.
    6·1 answer
  • Given a list of integers. find the size of the list
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!