1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
OlgaM077 [116]
3 years ago
10

An organization is using Amazon CloudWatch Logs with agents deployed on its Linux Amazon EC2 instances.

Computers and Technology
1 answer:
Dahasolnce [82]3 years ago
3 0

Answer:

A and B

Explanation:

EC2 run command gives a management output to review various instances and servers. Here, the logging files, collecting metrics and patches, running script installations can be achieved.

Verify the user permission and the run command, confirms if whether or not the problem of missing logging files is from the settings.

There are several AWS and customer managed policies for cloudwatch logs to give users certain levels for permission. Verifying this determines if there is full access, group logs and creation of group log events, or even a read only access.

You might be interested in
5. A Disk defragmenter tool does what to a computer HDD?
Ivenika [448]

Answer:It rearranges the files on a hard drive to get quicker access to them.

5 0
2 years ago
Im bored, any anime recommendations? i probably watched whatever youre gonna say
Alex777 [14]

Answer:

Hi..

Explanation:

i have seen a lot of anime shows XD hunter x hunter, dbz, black clover, 7 deadly sins

3 0
3 years ago
Read 2 more answers
You are building a computer from spare parts in the office. You build the computer and realize you have several different types
san4es73 [151]

Answer:

The pin count is the same

Explanation:

5 0
3 years ago
Java Eclipse homework. I need help coding this
olganol [36]

Answer:

I can't just do your project but use this as a head start.

Explanation:

public class TableOfBases

{

   public static void main(String[] args)

   {

       // print out "Decimal    Binary   Octal   Hex    Character";

       //  write a for loop from 65 to 90

       for (int i ...  ) {

         // get a string for integer i with base 2

           String binary = Integer.toString (i,2);

         // get a string for integer i with base 8

           String octal = Integer.toString( ...   );

         // get a string for integer i with base 16

           String hex =  ...

        // get a char for a chararater that has ASCII code i

           char ch = (char) i ;

         // print out binary, octal and hex, and ch

       }

   }

}

/*

Project... Basically Speaking

Create a project called TableOfBases with class Tester.

The main method should have a for loop that cycles through the integer values

65 <= j <= 90 (These are the ASCII codes for characters A – Z).

Use the methods learned in this lesson to produce a line of this table on each pass

through the loop. Display the equivalent of the decimal number in the various bases

just learned (binary, octal, and hex) as well as the character itself:

Decimal Binary Octal Hex Character

65 1000001 101 41 A

66 1000010 102 42 B

67 1000011 103 43 C

68 1000100 104 44 D

69 1000101 105 45 E

70 1000110 106 46 F

....

71 1000111 107 47 G 72 1001000 110 48 H 73 1001001 111 49 I 74 1001010 112 4a J 75 1001011 113 4b K 76 1001100 114 4c L 77 1001101 115 4d M 78 1001110 116 4e N 79 1001111 117 4f O 80 1010000 120 50 P 81 1010001 121 51 Q 82 1010010 122 52 R 83 1010011 123 53 S 84 1010100 124 54 T 85 1010101 125 55 U 86 1010110 126 56 V 87 1010111 127 57 W 88 1011000 130 58 X 89 1011001 131 59 Y 90 1011010 132 5a Z

*/

7 0
2 years ago
Business application software programs make it possible to
Daniel [21]
Business application software programs make it possible to: increase productivity in the office setting.
Please give me Brainless if this help!!
6 0
3 years ago
Other questions:
  • ​What file system below does not support encryption, file based compression, and disk quotas, but does support extremely large v
    10·1 answer
  • What are the main types of computer software?
    5·2 answers
  • CNG and gasoline-powered vehicles use the same internal combustion engine, but different fuel types. A) True B) False
    8·2 answers
  • 14. Convert 11110111 from binary to denary<br> (1 Point)
    12·2 answers
  • How many cells does the organism have?\
    5·2 answers
  • To build a user interface that contains graphical components, the components ____. must each be added to a separate panel. must
    7·1 answer
  • 1. in terms of technology, we often said to be living in the _____ age.???
    15·2 answers
  • What is the role of the federal government in regulating the media and the internet?
    6·2 answers
  • Which list shows a correct order of mathematical operations that would be used by a spreadsheet formula?
    5·2 answers
  • PLEASE HELP WILL GIVE BRAINLIEST!!!’
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!