1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
chubhunter [2.5K]
3 years ago
15

A local bank has an in-house application which handles sensitive financial data in a private subnet. After the data is processed

by the EC2 worker instances, they will be delivered to S3 for ingestion by other services. How should you design this solution so that the data does not pass through the public Internet?
Computers and Technology
1 answer:
grin007 [14]3 years ago
8 0

Answer:

Explanation:

Based on the scenario being described within the question it can be said that the best way to accomplish this would be to configure a VPC Gateway Endpoint along with a corresponding route entry that directs the data to S3. This gateway will allow the different resources within your VPC to access the internet as well as allow incoming resources in.

You might be interested in
What do you call the spreadsheet cell that is in effect and has a heavier black border around it?
valina [46]
The right answer is A<span>.Active cell </span>
4 0
3 years ago
Read 2 more answers
You have decided to use relative links for your Website's local pages instead of specifying absolute URLs. Your supervisor has a
marin [14]

Answer:

C. The site can be moved from one server to another with minimal disruption.

Explanation:

The perfect reason is the option C.The site can be moved from one server to another with minimal disruption. with relative links you don't need to change the host name for the local page because the browser assumes the address that is in the browser and creates a path relative to it as specified by the file.

4 0
3 years ago
Where does append add the new elements?
ZanzabumX [31]

Answer:

"Option 1: To the end of an array." is the correct answer.

Explanation:

The word "Append" means adding to the end of a document.

Appending means whatever new content is added, it is added at the end of the document or data structure.

Similarly,

Appending an array means adding new elements to the end of the array.

Hence,

"Option 1: To the end of an array." is the correct answer.

7 0
3 years ago
Which of the following BEST describes Information Technology (IT)?
netineya [11]

Answer:

The correct option is;

IT refers to everything that involves computers

Explanation:

Information technology (IT) are technology related to computing or computing systems

Information technology (IT) is the creation, processing, securing, exchanging, and storing of electronic data through the use of network, storage, computing, and other physical devices. Information technology refers to operations performed within enterprises and business organizations and includes telephone and computer technologies (all of which involves computing) as opposed to entertainment or personal usage of the technology.

3 0
3 years ago
Su now wants to modify the text box that contains her numbered list. She accesses the Format Shape pane. In what ways can Su mod
Naya [18.7K]

Answer:

She can add color to the text box.

She can add a border to the text box.

Explanation:

3 0
3 years ago
Read 2 more answers
Other questions:
  • 1. A video card on a modem motherboard would run best in which type of slot?
    10·1 answer
  • Which one of the following is an example of hacktivism according to you and why?
    11·1 answer
  • Basic engine operation can be divided into four stages. These stages are
    13·1 answer
  • Which image format is good for compressing large, complex images like photos into smaller file sizes?
    5·1 answer
  • When a defendant pleads guilty to one offense just to have another offense dropped, this is what type of plea bargain
    12·2 answers
  • in python Write a loop that counts the number of lowercase characters that appear in the string referenced by mystring.
    11·1 answer
  • Which of the following actions has no impact on your credit score
    9·1 answer
  • Which XXX will prompt the user to enter a value greater than 10, until a value that is greater than 10 is actually input?
    14·1 answer
  • . Is it conceivable to design a secure operating system for these computer systems? Give arguments for and against.
    6·1 answer
  • Alice is watching a speech over the internet. what type of message is alice attending to?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!