1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tju [1.3M]
3 years ago
7

Brandon has configured one of the applications hosted on his cloud service provider to increase the number of resources as neede

d. Which of the following describes this capability?
a. Continuity
b. Adaptability
c. Vertical scaling
d. Horizontal scaling
Computers and Technology
1 answer:
goldenfox [79]3 years ago
8 0

Answer:

The description of this capability is:

d. Horizontal scaling

Explanation:

The capability that Brandon has achieved is horizontal scaling, which involves the increasing of the resources of cloud applications to meet his increasing demand for cloud services.  Vertical scaling involves the addition or subtraction of power to a cloud server, which practically upgrades the memory, storage, or processing power.  But to scale horizontally, more resources are added or subtracted.  The purpose of horizontal scaling is to spread out or in the workload of existing resources and either increase or decrease overall performance and capacity.

You might be interested in
What is the difference between images and pictures
julia-pushkina [17]
An image is a representation of a person or thing but a picture is a painting or drawing
6 0
3 years ago
in a typical e-mail address, the "host" is A. an account designated by a user name B. CPU processor 2500 C. the receiver of an e
NISA [10]
The correct answer is A! :)
5 0
3 years ago
Read 2 more answers
Why authentication processes and features important
vladimir2022 [97]

Answer:

<u>Authentication processes</u> are extremely important because they are an extra layer of security. These processes can help keep networks secure by only permitting authorised users to access them. <u>Authentication processes</u> can be used on things such as networks, databases, websites and other network based services/platforms.

Explanation:

3 0
3 years ago
Which of the following is NOT one of the MOST common uses of Twitter?
I am Lyosha [343]
Which of the following is NOT one of the MOST common uses of Twitter? b . Making a business contact.
5 0
3 years ago
A computer with a single cpu has 4gb ram, with the operating system taking up 512mb and each user program also taking up 256mb.
lutik1710 [3]

Let's assume a condition where ram is 256 MB and the program size is more than 256 MB

in that case, CPU has to wait for I/O to load the remaining part of the program..in this case  

CPU utilization is much poorer.

So adding gives benefit only when your CPU is fast enough to take advantage like if a process waiting for I/O

it can put the current process in the run queue and take another process from the ready queue.

This way a better CPU utilization can be achieved.  

So by adding ram we can load more programs while waiting for I/O . CPU utilisation will be better.

here by adding 2GB ram we can load 2048/256 = 8 new process into ram at the same time.

2. if cpu have to execute the cpu bound process that wait for I/O cpu will be idle most of the time while  

waiting for I/O to be done..this way CPU utilization will be  poorer as compare to earlier.

3 0
3 years ago
Other questions:
  • Samuel is working on decimal and binary conversion for his college project.He is using the binary number 111011 and wants to exp
    8·1 answer
  • Online companies typically have a(n) _________ on their websites that clearly states what information is collected from users an
    7·1 answer
  • True or false: its okay to sometimes compromise our values in order to resolve a conflict
    15·1 answer
  • What are the long-term consequences for John’s health and wellness if he continues to use this technique
    15·1 answer
  • If you can name this you get 15 points: ↑↑↓↓←→←→βα
    10·1 answer
  • I need help 50 points and brainiest if you answer
    10·2 answers
  • Spark is electrical discharge in air, while air is mix of variety of gases what particles conduct electricity in gas
    12·1 answer
  • an attacker is attempting to crack a system's password by matching the password hash to a hash in a large table of hashes he or
    9·1 answer
  • Vhat is the result when you run the following program?
    6·1 answer
  • What is the hack of the cookie clicker
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!