1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
OlgaM077 [116]
3 years ago
10

An organization is using Amazon CloudWatch Logs with agents deployed on its Linux Amazon EC2 instances.

Computers and Technology
1 answer:
Dahasolnce [82]3 years ago
3 0

Answer:

A and B

Explanation:

EC2 run command gives a management output to review various instances and servers. Here, the logging files, collecting metrics and patches, running script installations can be achieved.

Verify the user permission and the run command, confirms if whether or not the problem of missing logging files is from the settings.

There are several AWS and customer managed policies for cloudwatch logs to give users certain levels for permission. Verifying this determines if there is full access, group logs and creation of group log events, or even a read only access.

You might be interested in
Which of the following describes the operating system
Marianna [84]

Answer:

Explanation:

you added no options

5 0
3 years ago
Consider two different implementations of the same instruction set architecture (ISA). The instructions can be divided into four
PSYCHO15rus [73]

Answer: Find answers in the attachments

Explanation:

3 0
3 years ago
What impact does unemployment have on the economy?
Kazeer [188]

Answer:

<h2>A negative impact.</h2>

Explanation:

The unemployed are also unable to purchase as many goods, so will contribute to lower spending and lower output. A rise in unemployment can cause a negative multiplier effect.

8 0
3 years ago
Read 2 more answers
I need help, thank you
BabaBlast [244]

Answer:

umm I think it's C it's between that one and d so the 1st and 4th but leaning more towards C

6 0
2 years ago
The term ____ refers to a wide variety of different database technologies that were developed in order to overcome some of the l
ella [17]
Database management systems are used to store and to access information.
In <span>the Relational Database Management System </span>(RDBMS), all the data is in the form of simple columns and rows in a table. Structured Query Language (SQL) is is the standard query language for RDBMS. Some of the disadvantages of RDBMS are: not enough storage area to handle data such as images, digital and audio/video, do not provide good support for nested structures,not much efficient and effective integrated support.
<span>The term object oriented database management systems (OODBMS)  refers to a wide variety of different database technologies that were developed in order to overcome some of the limitations of relational databases.</span>





5 0
3 years ago
Other questions:
  • 1. Write a program to prompt the user to enter a single character and respond back whether or not the character is valid dna. 2.
    12·1 answer
  • Write a program that accepts a number as input, and prints just the decimal portion.
    6·2 answers
  • Given numRows and numColumns, print a list of all seats in a theater. Rows are numbered, columns lettered, as in 1A or 3E. Print
    14·1 answer
  • Chunking is a good strategy for completing large assignments because it makes the work
    7·2 answers
  • What are registers in ICT used for?
    5·1 answer
  • Fill in the blanks Pasaline could ----- and ------- very easily.​
    8·1 answer
  • Explain why the program did not print "clap", and how to fix it.
    13·1 answer
  • WILL MARK BRAIN LIST!
    5·2 answers
  • 4. When working at the CLI in Linux, you specify the exact location of a file, which is the ____________________ to it, by begin
    13·1 answer
  • A ________ is a device used to illegally capture the data stored on the magnetic stripe of an ATM card, credit card, or debit ca
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!