1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rzqust [24]
2 years ago
9

Kelley is managing a project to deploy the company's new application offering by using a cloud service provider for the platform

. This will ensure that she has the elasticity and scalability necessary to deliver the application to what is hoped to be a large number of customers. Which of the following should be done at every step of the project?
a. Create baselines
b. Documentation
c. Analyze performance
d. Testing
Computers and Technology
1 answer:
Lapatulllka [165]2 years ago
3 0

Answer:

Analyse performance

Explanation:

During the deployment of new services to a certain Platform such as the cloud which is geared towards enhancing scalability which is the ability of platforms to accommodate larger load level are serve an increased number of consumers. These will require these platforms to be Analysed as per performance in other to evaluate them . Through performance analysis, elasticity may need to be tweaked by dynamic rearrangement of the different modules, hardwares in other to ensure that the platform delivers at the required level to serve the increased number of consumers.

You might be interested in
PLEASE HELP!!! History abounds with instances in which the work of scientists and artists were affected by the political, religi
Masteriza [31]
Social Media affects them
7 0
3 years ago
Consider a relation BOOKS that holds information about the inventory of books (used or new) in a bookstore with attributes (titl
Yuri [45]

Answer:

See explaination

Explanation:

Somehing is considered functional dependent (FD) if a relationship between two attributes, typically between the PK and other non-key attributes within a table. For any relation R, attribute Y is functionally dependent on attribute X (usually the PK), if for every valid instance of X, that value of X uniquely determines the value of Y.

Please kindly check attachment for the other details.

5 0
2 years ago
Scenario: As you walk into an empty class, you see a bag on the floor under the desk what will you do next
Keith_Richards [23]
I'm not sure on what you mean by this however lets say that it may contain a device, when entering DO NOT TOUCH ANYTHING, there are different methods on how a device could be triggered either from light switches or by trip wire which its best to leave the facility over all however lets say you cannot then stop listen for any ticking if not then have a flash light, if the room lights are turned off leave them off use a flash light but be careful where you shine it there could be light sensors on the device that trigger when a light hits it hence why the lights are off. when having a flash light you could be able to see a glare of a wire which could be a trip wire. there are many possibilities in how the device was made from timers, trip wire, sound,light,pressure, switches, electronic waves from phones may effect the device and could activate it as well. But anyways this is all a factor and its best to be careful and if able evacuate if the device is in a weird location at a odd time you know its not suppose to be there, and or items moved that are never moved and if it is never moved then there is dust that could have a odd shape like a hand print. Anyways im not sure if your looking for this type of answer but its good to know!
5 0
2 years ago
True or False: Cracking a Vigenère cipher with brute force takes longer than a Caesar cipher, but it is still a reliable method
iragen [17]

Answer:

False

Explanation:

The Vigenere cipher is an encryption method that uses a series of interwoven Ceaser ciphers and a keyword to encrypt text. The difference between this cipher and the Ceaser cipher is the tabular interwoven Ceaser cipher and the keyword.

Multiple keywords can be used in the Vigenere cipher. The use of this keyword makes the brute-force decipher algorithm unreliable for decoding text encrypted with it.

7 0
2 years ago
Write a complete c++ program using function and array.​
lana66690 [7]

Answer:

Index Value Hash

0 1 $

1 2 $$

2 3 $$$

3 4 $$$$

4 5 $$$$$

Explanation:

8 0
3 years ago
Other questions:
  • A. experiment by purposely misconfiguring the gateway address on pc-a to 10.0.0.1. what happens when you try and ping from pc-b
    14·1 answer
  • __________%of the users have left websites in frustration due to poor navigation.
    13·1 answer
  • A vehicle fails an HC emission test at idle and 2,500 rpm, and the engine has an acceleration stumble. The heated oxygen sensor
    15·1 answer
  • Choose the best technology device for the
    12·1 answer
  • C++ CODE
    6·1 answer
  • What are the primary benefits of relying on systems development standards?
    7·1 answer
  • Write down 5 tips that an office can use to be more sustainable and reduce wastage? Write a description of each one and how it r
    12·1 answer
  • What are basic types of touch screen
    15·2 answers
  • Guidewords for the word “serpent” may be
    8·2 answers
  • what option can be used to create vpn connections that can be distributed to users' computers so that vpn clients do not have to
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!