1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sveta_85 [38]
3 years ago
7

You are a developer for a company that is planning on using the AWS RDS service. Your Database administrator spins up a new MySQ

L RDS Instance in AWS. You now need to connect to that instance. How can you achieve this
Computers and Technology
1 answer:
defon3 years ago
6 0

Answer:

The answer is "use database instances API, get the endpoint for its instance, and request to admin for the instance via AWS console".

Explanation:

It is an instance, which must create links to a database instance, which runs in the MySQL server. It provided the links to one of the standard utilities.

  • It defines the DNS address for DB instance as the host argument on both the link sequence or enter the address code as in the port variable.
  • It uses AWS console, that describes the instance, action, and API lists, which specifics in database instance and its endpoints, and other options were incorrect which can't be described in the given scenario.
You might be interested in
The _____ class can be used to get user input using dialog boxes.
Ber [7]

Answer:

JOptionPane

Explanation:

  • The class "JOptionPane" are used to pop / create dialogue boxes for the user to enter the input for a question.
  • JOptionPane contains methods to create input dialogue boxes, message dialogue boxes, option dialogue boxes and confirm dialogue boxes.
  • The dialogue boxes can be just message dialogue boxes which gives some message to the user. It doesn't require anything to be input from the user. It is just a message box.
  • Where as input dialogue box requires the user to input something.
  • Confirm dialogue box asks the user to answer a question yes / no / cancel.
  • Option dialogue box asks the user to select the options.
  • So, option (d) JOptionPane is the answer for the question.
  • Option (a), (b) and (c) are used for different purposes but not to create dialogue boxes. So, options (a), (b) and (c) are not the correct answers for the question.
4 0
3 years ago
To be useful for most household applications, DC voltage is?please <br>​
satela [25.4K]

Answer: To be useful for most household applications, DC voltage is passed through a step-down transformer.

Explanation: Voltage coming through AC or DC outlets is typically far too high for most household appliances to handle, so the current is passed through a step-down transformer to reduce the voltage to a usable level.

3 0
2 years ago
The variable points stores data that the user has input. what is the data type of this variable?
kvasek [131]

Answer:

Each variable has a name, a value, and a type. The value might change over time, and that's why its “variable.” Many variables store numbers and strings, like the ones above. Variables can also store other types of data, like lists, dictionaries, and Boolean values

Explanation:

8 0
2 years ago
Why is making a model, or prototype, important in the design process?
seropon [69]

Explanation:

to size up and define your works organize and having a creative thoughts and imaginations in it to properly execute the measurement of the clothes.

8 0
3 years ago
An attacker has obtained the logon credentials for a regular user on your network. Which type of security threat exists if this
jarptica [38.1K]

Answer:

privilege escalation.

Explanation:

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Hence, an access control list (ACL) primarily is composed of a set of permissions and operations associated with a user account or new technology file system (NTFS) file such as full control, read only, write, read and execute and modify.

In this scenario, an attacker or hacker was able to obtain the logon credentials for a regular user on your network. Thus, the type of security threat which exists if this user account is used by the attacker or hacker to perform administrative functions is privilege escalation.

Privilege escalation can be defined as a network or security threat which involves the exploitation of a design flaw, bug or unsecured configuration settings in a software program (application), operating system (OS), computer system, etc., so as to have an unauthorized access and gain more permissions, elevated rights or privileges that are normally protected from a user account or software program.

Hence, when an attacker or malicious user such as a hacker gains an unauthorized access to the privileges of another user account beyond what is intended or entitled to a user, it is known as privilege escalation.

6 0
3 years ago
Other questions:
  • If you have a windows 8, but want the features of windows 8 pro, purchase and install _______.
    7·1 answer
  • Help what is a computer made from (computer class question)!!
    9·1 answer
  • Which of the following information is most important to include in a timeline
    14·2 answers
  • Your company has a wireless network for its small office network. The wireless network does not broadcast its service set identi
    11·1 answer
  • The need to strike a<br>- among work, life, family, and other responsibilities is<br>universal.​
    15·1 answer
  • Tom and his brother caught 100 finish on a weeklong fishing trip. The total way of the fish was 235 pounds. What is the weight o
    9·1 answer
  • WILL GIVE BRAINLIEST!!!!!! 10 POINTS!!!!
    14·2 answers
  • Help pweeze this is due today :(<br><br> I will give u brainliest just pweeze, I need this answer :(
    8·1 answer
  • Which graphic file format would you choose if you needed to make an animated graphic for a website?
    5·1 answer
  • WHATS YALL FAVORITE GAME WHOEVER GIVES THE BEST ANSWER WINS 200
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!