1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irakobra [83]
3 years ago
15

Users who are connecting to an NLB cluster have been complaining that after using the site for a few minutes they are prompted t

o log in using their username. What should you do to fix the problem and retain scalability and why
Computers and Technology
1 answer:
Yanka [14]3 years ago
8 0

Answer:

The answer is "Set the cluster affinity to Single"

Explanation:

The client connectivity to the data source, the user affinity is defined. If client affinity is specified, requests from either a given client link were spread in a data source set to a specified source. We must adjust the cluster affinity in single to solve this problem and maintain their scalability. Your customer does not have to authenticate repeatedly. This helps to send all transactions to a single node from an IP address.

You might be interested in
What is the name of the most expensive car and how much is it and what are its features
11Alexandr11 [23.1K]

Answer:

Bugatti La Voiture Noire: $18.68 million or Rs 132 crore

Explanation:

Transmission: 7-Speed Dual-Clutch.

Horsepower: 1,500 hp.

Torque: 1,180 lb-ft.

0-60: Under 3 Seconds.

1/4 Mile: Under 10 Seconds.

Top Speed: TBD.

7 0
3 years ago
Your organization uses a type of cryptography that provides good security but uses smaller key sizes and utilizes logarithms tha
Marianna [84]

Answer:

Elliptic curve

Explanation:

Elliptical curve cryptography known with the acronym ECC is a known to be a technique used for public key encryption based on elliptic curve theory that can be utilized for the creation of faster, smaller, but highly efficient cryptographic keys. Elliptical curve cryptography utilizes logarithms that are calculated against a finite field.

5 0
3 years ago
In this problem we consider sending real-time voice from Host A to Host B over a packet-switched network (VoIP). Host A converts
Minchanka [31]

Answer:

<u>The total time elapsed from the time a bit is created (from the original analog signal at Host A) until the bit is decoded (as part of the analog signal at Host B is </u><u>25.11 ms</u>

Explanation:

Host A first converts the analog signal to a digital 64kbps stream and then groups it into 56-byte packets. The time taken for this can be calculated as:

time taken 1= \frac{Packet Size in Bits}{Bit Rate}

                 = (56 x 8) bits / 64 x 10³ bits/s

                 = 7 x 10⁻³s

time taken 1= 7 ms

The transmission rate of the packet from Host A to Host B is 4 Mbps. The time taken to transfer the packets can be calculated as:

time taken 2= (56 x 8) bits / 4 x 10⁶ bits/s

                    = 1.12 x 10⁻⁴ s

time taken 2= 112 μs

The propagation delay is 18 ms.

To calculate the total time elapsed, we need to add up all the time taken at each individual stage.

<u />Time_{total}<u> = Time taken 1 + Time taken 2 + Propagation Delay</u>

                 = 7 ms + 112 μs + 18 ms

                 = 0.025112 s

Time_{total} = 25.11 ms

5 0
3 years ago
Write JavaScript code to declare a variable of the name favoriteColor
Zinaida [17]

Answer:

Variables are used to store values (name = "John") or expressions (sum = x + y).

Declare Variables in JavaScript

Before using a variable, you first need to declare it. You have to use the keyword var to declare a variable like this:

var name;

Assign a Value to the Variable

You can assign a value to the variable either while declaring the variable or after declaring the variable.

var name = "John";

OR

var name;

name = "John";

Explanation:

thats what i found sorry if it wrong

:D

8 0
3 years ago
In a system using the fixed partitions memory allocation scheme, given the following situation (and using a decimal form): After
MariettaO [177]

Answer:

I think its B

Explanation:

7 0
3 years ago
Other questions:
  • Your bank contacts you asking you to phone a number supplied in the email.What do you?
    13·2 answers
  • Plz help ASAP
    10·1 answer
  • Which online resource is usually not free?
    10·2 answers
  • Using a cell phone while operating a motor vehicle is considered distraction because
    8·1 answer
  • If cell G7 contains the function ________, it states that if the value in cell C3 is 9, the number 7 will be assigned to cell G7
    6·1 answer
  • Use the function random.randint to write a program that rolls a 6-sided die 100 times, and prints out all of the rolls.
    8·1 answer
  • 9. "मेरे तो गिरधर गोपाल, दूसरो ना कोई
    5·1 answer
  • Consider the following code.
    7·2 answers
  • What is are the most efficient ways to make a slide presentation?
    12·2 answers
  • Which of the following is typiacally the last step of the mail merge process
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!