1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anzhelika [568]
3 years ago
6

John is runnig his Database application on a single server with 24 Gigabytes of memory and 4 processors. The system is running s

low during peak hours and the diagnostic logs indicated that the system is running low on memory. John requested for additional memory of 8 Gigabytes to be added to the server to address the problem. What is the resultant type of scaling that John is expecting?
Computers and Technology
1 answer:
spayn [35]3 years ago
3 0

Answer:

Vertical Scaling

Explanation:

Vertical scaling means the ability to increase the capacity of existing hardware or software by adding resources. In this case, more GB is added (8GB) to the server to address the problem. So vertical scaling is the resultant type john is expecting.

You might be interested in
From the standpoint of the governing bodies of .com, why is it important that owners of individual domains maintain authoritativ
mixer [17]

Answer:

Explanation:

A subdomain is really important on the internet, we can categorize our blog, e-commerce or simple informative website, for example, if we want to have a blog and e.commerce of the same topic, we can have a subdomain for each website, if we separate our website, and we administrate our content is a good signal for SEO, we could have more promotion in search engine.

4 0
4 years ago
If you want a relatively broad, unbiased overview of a subject you should consult a/an ?
tekilochka [14]

To find a relatively broad unbiased overview of a subject in a specific field of study, it would be best to consult a: encyclopedia.
8 0
3 years ago
Read 2 more answers
Which step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs? maintain access gain a
jenyasd209 [6]

The step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs is option a: maintain access.

<h3>What is maintaining access in penetration testing?</h3>

“Maintaining Access” is a stage of the  penetration testing life cycle and it is said to have a real purpose.

It is one that tends to allow the pentester to stay in the set systems until he get the information he need that is  valuable and then manages to take it successfully from the system.

Hence, The step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs is option a: maintain access.

Learn more about penetration testing  from

brainly.com/question/26555003

#SPJ1

7 0
2 years ago
Which security procedure is being demonstrated if an administrator is using Wireshark to watch for specific inbound and outbound
defon

Answer:

The correct answer to the following question will be Option C (Firewall monitoring).

Explanation:

Firewall monitoring would be the analysis of essential firewall parameters that play a key role throughout the effective operation of firewalls.

Usually, management of the firewalls should include:

  • Monitoring the firewall file.
  • Management of the firewall statute.
  • Monitoring the design of the firewall.

Firewall security control is shown if the user uses Wire-shark to track relevant incoming and outgoing traffic.

Therefore, Option C is the right answer.

4 0
3 years ago
In every programming language, when you access data stored in an array, it is important to use a ____ containing a value that ac
Stells [14]
Subscript

Reference: Chapter 5 of 'An Object-Oriented Approach to Programming Logic and Design's by Joyce Farrell
4 0
3 years ago
Other questions:
  • Why are some constraints automatically applied by the software
    9·1 answer
  • Voice and fingerprint _______ can significantly improve the security of physical devices and provide stronger authentication for
    14·1 answer
  • What is a catalyst? a chemical found in leaves a chemical which promotes a chemical reaction a chemical which reacts with sunlig
    10·1 answer
  • A laptop computer communicates with a router wirelessly, by means of radio signals. the router is connected by cable directly to
    10·1 answer
  • Need help ASAP??? Pick the best answers
    10·1 answer
  • Why are computer manufacture constantly releases fast computer and do user benefit from ths speed
    9·1 answer
  • Sixteen stations, numbered 1 through 16, are contending for the use of a shared channel by using the adaptive tree walk protocol
    7·1 answer
  • Which is not and input device , keyboard , joystick, Monitor, Microphone​
    10·2 answers
  • Lonnie needs to use a special kind of block in his game that will tell him whether an object has slammed into his car true or no
    13·1 answer
  • Computers that communicate over a network must follow certain ___ to ensure that the transmission is sent properly and understoo
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!