1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gemiola [76]
3 years ago
14

Your users are reporting latency in your services. Traditionally with on premise architecture, you would have to page your admin

so she could launch another server to balance the load on your servers. How can you automate this with AWS
Computers and Technology
1 answer:
liq [111]3 years ago
6 0

Answer:

You have to enable the Amazon CloudWatch alarm that would trigger the scaling policy.

Explanation:

Amazon web service is a cloud-based service company that provides network and database solutions to its customers. Network administrations used these services to enhance productivity and automate their cloud tasks.

The Amazon CloudWatch alarm is a service used by administrators to trigger scaling policies for their deployed applications and tasks.

You might be interested in
Assume you're running a query on your orders in the past year. You want to see how many orders were placed after May. What type
vitfil [10]

Your answer is A. Because a query is a question about a an organization to check how it's going


6 0
3 years ago
5 examples on technology identification
dusya [7]

\huge \color{pink} \boxed{ \colorbox{y}{reffer \: the \: attachement}}

6 0
3 years ago
Estan clasificadas como piezas alargadas y dentada<br>​
hodyreva [135]

Answer:

Estan clasificadas como piezas alargadas y dentada

when you turn the setence above me to english it means

They are classified as elongated and toothed pieces

Explanation:

7 0
3 years ago
WHAT DOES THE SCRATCH CODE BELOW DO?
Vinil7 [7]
I think it’s b vertically
7 0
3 years ago
A DDos attack _____________.
melomori [17]

Answer:

Option (1) the is correct answer for the above question.

Explanation:

"DDos" stands for distributed denial-of-service. It is a type of attack which affects the network route. It disturbs the normal route like a traffic Jam. It operators from some hosts point and act after getting access to the system in an unauthorized way.

It attacks to disturb the service provided by the other system. It authorized the hosts' system and entered into the system to get disturb the routine of the system.

  • Option 1 also suggests the same hence it is a correct option.
  • While option 2 suggests that it is a software, but it is a concept that means to disturb the normal routine of the system and he can get that information access which is transmitted over the signals. hence option 2 is not fit for the question.

4 0
3 years ago
Other questions:
  • Which of the following is a useful policy to minimize waste and mistakes?
    6·1 answer
  • What is a alt key and how does it work
    14·2 answers
  • Write a Java program that generates a random number between 0 and 50. Then, the program prompts for guesses until the user is co
    14·1 answer
  • What is needed to create a good problem statement?
    10·1 answer
  • Examples of language translator
    12·2 answers
  • Which of the following is a school-to-work program that provides the student with paid employment, school credit, and school gra
    7·2 answers
  • You have a workstation running windows vista business that you would like to upgrade to windows 7 ultimate. you want to perform
    11·1 answer
  • Grading on the curve is a method of grading that is based on the belief that letter grades for any given class should be distrib
    8·1 answer
  • How can you tell the difference between subnet addresses and interface addresses?
    13·1 answer
  • What is the result when you run the following program?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!