1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elina [12.6K]
3 years ago
7

An organization is using Amazon CloudWatch Logs with agents deployed on its Linux Amazon EC2 instances.

Computers and Technology
1 answer:
Bumek [7]3 years ago
4 0

Answer:

A and B

Explanation:

EC2 run command gives a management output to review various instances and servers. Here, the logging files, collecting metrics and patches, running script installations can be achieved.

Verify the user permission and the run command, confirms if whether or not the problem of missing logging files is from the settings.

There are several AWS and customer managed policies for cloudwatch logs to give users certain levels for permission. Verifying this determines if there is full access, group logs and creation of group log events, or even a read only access.

You might be interested in
you are a new lenovo service provider and need to use the recovery utility information on the lenovo support website. this infor
yawa3891 [41]

Based on the above, the person that  you  should contact to request a service provider user id and password is Regional leads

<h3>Who is a Regional leads?</h3>

The stores, merchandise, and general presence of the company in a given region are managed by region leaders. They make sure the objectives are achieved. If not, they come up with plans to achieve the goals. Leaders in a region are expected to comprehend both the local economy and its historical context.

A regional lead is a manager, educator, or administrator who is in charge of finding and supporting workforce champions within organizations within their assigned region. Hence, he or she is the best person for you to contact.

Learn more about Region from

brainly.com/question/2001834
#SPJ1

8 0
2 years ago
Need some help with this one chief​
Molodets [167]

Answer:

i have no clue dude sorry thanks for the points tho.

Explanation:

8 0
3 years ago
Where could page numbers appear in a properly formatted business document?
Stels [109]
At the bottom right is the perfect place
6 0
4 years ago
Read 2 more answers
British mathematician Alan M. Turing wrote a number of papers on theoretical computer science. In one paper, written in 1936 bef
9966 [12]

Answer: D. Turing conceived the structure of a programmable computer.

Explanation: The passage describes how Alan M. Turing described the theoretical aspect of a programmable computer. There is no reference to a physical machine or Turing working on an actual (physical) computer.

The Turing machine, although it does sound like a physical computer was an abstract idea, conceived in mathematical form of what a programmable machine would be like. Alan Turing is considered one of the founding fathers of theoretical computer science.

4 0
3 years ago
Will web browser cannot open any web page what should will do first
Delicious77 [7]

Answer:

The solution to this question is given below in the explanation section.

Explanation:

If a web page is not open in a web browser, the first step that will be performing is to check if the internet is connected or not. Because we need to connect to the internet to access any web page. For this, you need to see the wifi or LAN icon and see the status of the connection. If this step is shown the internet is connected. Then diagnose the problem in the browser click on "Running Windows Network Diagnostics".

The diagnosis will get started in your browser, the solution will be suggested by this step if the problem exist. Mostly these problems are internet disconnectivity, router shutdown, browser issues, and internet connection and DNS issues.

5 0
3 years ago
Other questions:
  • 9. In Electronic Codebook (ECB): a. The message is broken into independent blocks which are encrypted b. The message is broken i
    6·1 answer
  • ___ are limited computers because they are placed inside devices which require specific computing functions
    11·1 answer
  • Briley has all the hardware she needs to construct a fully functional personal computer. She connects the various components and
    7·1 answer
  • Write a class declaration named Circle with a private member variable named radius. Write set and get functions to access the ra
    10·1 answer
  • highlight the possible risks and problems that should be address during the implementation of information system process
    5·1 answer
  • Sptr is a pointer pointing to the beginning of an array called sarray. To access the value in sarray[3] by using the pointer, yo
    11·1 answer
  • To view the Picture tools tab, a user must first _____.
    10·2 answers
  • What are the benefits of writing functions that use parameters and return List 2 please and explain what is return
    12·1 answer
  • What is the advantage of taking notes in a digital format? The technology protects digital notes from being copied. Digital note
    7·2 answers
  • What stipulates that the source code of any software published under its license must be freely available.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!