1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anzhelika [568]
3 years ago
6

John is runnig his Database application on a single server with 24 Gigabytes of memory and 4 processors. The system is running s

low during peak hours and the diagnostic logs indicated that the system is running low on memory. John requested for additional memory of 8 Gigabytes to be added to the server to address the problem. What is the resultant type of scaling that John is expecting?
Computers and Technology
1 answer:
spayn [35]3 years ago
3 0

Answer:

Vertical Scaling

Explanation:

Vertical scaling means the ability to increase the capacity of existing hardware or software by adding resources. In this case, more GB is added (8GB) to the server to address the problem. So vertical scaling is the resultant type john is expecting.

You might be interested in
Convert 128 GB into KB​
goblinko [34]

Answer:

1,073,741,274  KB

Explanation:

Use an unit convertor or an calculator.

8 0
4 years ago
Read 2 more answers
Determine the distance between point (x1, y1) and point (x2, y2), and assign the result to points Distance. The calculation is:
Nadusha1986 [10]

<u>Question:</u>

Snapshot of the question has been attached to this response.

<u>Answer:</u>

<u></u>

import java.util.Scanner;

import java.lang.Math;

public class CoordinateGeometry{

    public static void main(String []args){

       double x1 = 1.0;

       double y1 = 2.0;

       double x2 = 1.0;

       double y2 = 5.0;

       double pointsDistance = 0.0;

       

       //Declare a variable to hold the result of (x2 - x1)²

       double x;

       

       //Solve (x2 - x1)^2 and store result in the variable x

       x = Math.pow(x2 - x1, 2);

       

       //Declare a variable to hold the result of (y2 - y1)²

       double y;

       

       //Solve (y2 - y1)^2 and store result in the variable y

       y = Math.pow(y2 - y1, 2);

       

       //Now pointsDistance = SquareRootOf(x + y)

       pointsDistance = Math.sqrt(x + y);

       

       System.out.println("Points distance: ");

       System.out.println(pointsDistance);

       

       return;

    }

}

<u>Sample Output:</u>

Points distance:  

3.0

<u>Explanation:</u>

The above code has been written in Java and it contains comments explaining important lines of the code. Please go through the comments.

The snapshots of the program and a sample output have been attached to this response.

4 0
4 years ago
What is the norm that psychoanalysis of Freud deviates?<br>​
liq [111]

Answer:

Freud deviates from the norm of current mainstream psychology which has more or less lost its way - if it ever had one - under the influence of the same pressures which produce our dysfunctional politics and our troubled societies at large (technological change, globalisation, and so on).

Explanation:

Creds to Quora

4 0
3 years ago
What are the two types of programming languages?
ddd [48]

Answer:

High level language.

Low level language

Explanation:

please give brainliest

3 0
3 years ago
How can chess computers be programmed so that it can be so accurately adjusted to a skill level ranging from a beginner to a gra
Elis [28]
They are artificially intelligent. They watch thousands of hours of videos of the game they are going to play. After they learn, they challenge themselves against themselves and save all the moves it used that time, they play another game against the saved game and if they best it then they save the new and repeat. I am not sure about this because I am just a 15 yr old but the early ones brute forced the game and one. Brute Forcing is a way to try out every possible move and pick the most like to succeed or the most efficient one, brute force is also used in hacking or cracking passwords that have something in common. Like let's say ur password is Jakeis35. I would make a list that would be:
Jake
jake
Is
is
35
34

and with a software it will put together every possible pair and will stop when it matches the password on the server or if the password let it login.
5 0
3 years ago
Other questions:
  • Dom is a software developer who likes to tweak his computer's OS to make it work the way he wants it to. The OS he is most likel
    14·1 answer
  • PLEASE HELP!!!!!!!!!!!!!!!!!!
    6·1 answer
  • Assume that x is a char variable that has been declared and already given a value . write an expression whose value is true if a
    8·1 answer
  • At what point in a vulnerability assessment would an attack tree be utilized?
    9·1 answer
  • Most of us have been using elements of Web 2.0 without even realizing it.<br> True<br> False
    6·1 answer
  • DigitalHealth Electronics Inc. is a company that builds diagnostic devices. It was the first company to develop a compact MRI sc
    13·1 answer
  • The ____ object can trigger a selectedindexchanged event when a selection is made
    5·1 answer
  • 1.printer is an example of......... device.<br><br>​
    11·2 answers
  • What do you do when you have computer problems? Check all that apply.
    12·2 answers
  • You have been trying all day to check your direct messages on social media. The site is really slow to load and sometimes you ca
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!