1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irakobra [83]
3 years ago
15

Users who are connecting to an NLB cluster have been complaining that after using the site for a few minutes they are prompted t

o log in using their username. What should you do to fix the problem and retain scalability and why
Computers and Technology
1 answer:
Yanka [14]3 years ago
8 0

Answer:

The answer is "Set the cluster affinity to Single"

Explanation:

The client connectivity to the data source, the user affinity is defined. If client affinity is specified, requests from either a given client link were spread in a data source set to a specified source. We must adjust the cluster affinity in single to solve this problem and maintain their scalability. Your customer does not have to authenticate repeatedly. This helps to send all transactions to a single node from an IP address.

You might be interested in
Describe the big data life cycle. Which step do you think is most useful and why?
Step2247 [10]

Answer:

Big data lifecycle consists of four phases: data collection, data storage, data analysis, and knowledge creation. Data collection phase consists of collecting data from different sources. In this phase, it is important to collect data from trusted data sources.

I think business cases analysis is the most useful step because (BCA) provides a best-value analysis that considers not only cost but other quantifiable and non-quantifiable factors supporting an investment decision. This can include but is not limited to, performance, producibility, reliability, maintainability, and supportability enhancements

Explanation:

mark me brainliest

7 0
3 years ago
How many nibbles are in 18 bytes??
IgorC [24]
36 Nibbles are in 18bytes.
7 0
4 years ago
Samantha was calculating a mathematical formula on an electronic spreadsheet. She used multiple values to recalculate the formul
Bezzdna [24]
<span>Random access memory. This problem requires you to know what the different types of memory are and their relative advantages and disadvantages. Let's look at them and see why 3 are wrong and one is correct. read-only memory: Otherwise known as ROM, this type of memory stores code that can't be over written. Used frequently for constant lookup values and boot code. Since it can't be written to by normal programs, it can't hold temporary values for Samantha. So this is the wrong choice. random-access memory: Otherwise known as RAM, this type of memory is used to store temporary values and program code. It is quite fast to access and most the immediately required variables and program code is stored here. It can both be written to and read from. This is the correct answer. hard disk: This is permanent long term readable and writable memory. It will retain its contents even while powered off. But accessing it is slow. Where the contents of RAM can be accessed in nanoseconds, hard disk takes milliseconds to seconds to access (millions to billions of times slower than RAM). Because it's slow, this is not the correct answer. But it's likely that Samantha will save her spreadsheet to hard disk when she's finished working with it so she can retrieve the spreadsheet later to work on again. compact disk: This is sort of the ROM equivalent to the hard disk. The data stored on a compact disk can not be over written. One way of describing the storage on a compact disk is "Write Once, Read many times". In most cases it's even slower than the hard disk. But can be useful for archiving information or making backups of the data on your computer.</span>
5 0
4 years ago
Read 2 more answers
For this lab, you will work on a simple GUI application. The starting point for your work consists of four files (TextCollage, D
Bad White [126]

The answer & explanation for this question is given in the attachment below.

Download docx
4 0
3 years ago
A file must be ________ before data can be written to or read from it. closed opened buffered initialized none of these
just olya [345]
Hello <span>Circe2633 </span><span>

Answer: A file must be opened before data can be written to or read from it. closed opened buffered initialized none of these

Hope this helps
-Chris</span>
5 0
3 years ago
Read 2 more answers
Other questions:
  • You are describing the boot process to a friend and get to the step where the device loads the operating files into RAM, includi
    7·1 answer
  • Pixels are small dots in columns and rows that allow an image to be seen on a display screen.
    6·1 answer
  • What makes us see continuously moving images when still images appear in rapid succession
    11·1 answer
  • Which of the following is a scam in which a perpetrator sends an official looking e-mail that attempts to obtain a user’s person
    7·2 answers
  • Design a class FileArray that has a static method named writeArray. The method should take two arguments: the name of a file and
    11·1 answer
  • Which of the following is not a valid SQL command? (Points : 2) UPDATE acctmanager SET amedate = SYSDATE WHERE amid = 'J500';
    11·1 answer
  • What is the advantage of using a translation look-aside buffer (TLB), also called associative memory, in the logical-physical ad
    15·1 answer
  • Describing Report Viewing
    5·1 answer
  • A compound Boolean expression created with the _________ operator is true if either of its subexpressions is true.
    11·1 answer
  • Which of the following factors is least likely to result in delivery delays?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!