1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gemiola [76]
3 years ago
14

Your users are reporting latency in your services. Traditionally with on premise architecture, you would have to page your admin

so she could launch another server to balance the load on your servers. How can you automate this with AWS
Computers and Technology
1 answer:
liq [111]3 years ago
6 0

Answer:

You have to enable the Amazon CloudWatch alarm that would trigger the scaling policy.

Explanation:

Amazon web service is a cloud-based service company that provides network and database solutions to its customers. Network administrations used these services to enhance productivity and automate their cloud tasks.

The Amazon CloudWatch alarm is a service used by administrators to trigger scaling policies for their deployed applications and tasks.

You might be interested in
Which of the following statements applies to a proprietary software license? a. Purchased from a vendor and gives you the right
Semmy [17]

Answer: a)Purchased from a vendor and gives you the right to use the software but is not yours to own.

Explanation: Proprietary software is the software that can be used by the user but it has  copyright of the vendor/holder in any case.There are some certain condition under which the user can use this software.The distribution of the software is not permitted in this case. No modification or manipulation can be done by the user.

Other options are incorrect because it is not free as its purchased from vendor ,not freely available rather guided by owner and can be used over certain period of time.Thus , the correct option is option(a).

3 0
3 years ago
Image files are grouped into two categories: _____.
EleoNora [17]
It is grouped according to raster and vector format. Raster format are images used in a computer or printed. Vector format stores data and is compressed. 

Examples of common raster formats usually used in a computer are; jpeg, png, bitmap, and gif. Vector formats are; CGM, SVG and 3D vector.
4 0
4 years ago
A benefit of flashcards is that they are
Natalka [10]
Flashcards are re-writable so they can be used over and over again. they also have very large capacity to hold a lot of things.
6 0
3 years ago
Read 2 more answers
Bullets in a text box will do which of the following?
svetlana [45]

Answer:

Option B is the correct answer to this question.

Explanation:

Bullets play very important role in presenting the data with concise statements:

  • As the bullets make the statements more clear and effective.
  • Bullets make the statements/data more easy,clear, and simple for the readers to understand.
  • They make the document more appealing to the user or the reader and makes the document to be presented in a proper and specific order.
  • Bullets make the writers to organise and emphasize their information quickly and effectively.
  • Bullets make the text more beautiful,effective and easy to learn or understand.

All other options are incorrect because they do not relate from this question.

7 0
4 years ago
Design a class named Complex for representing complex numbers and the methods add, subtract, multiply, divide, abs for performin
Tanzania [10]

Answer:

Explanation:

The following code is written in Java, it creates the entire complex class as requested so that it works with the main method that has been provided in the question without having to change anything in the main method. Proof of output can be seen in the attached picture below

import java.util.Scanner;

class Test implements Cloneable{

   public static void main(String[] args) {

       Scanner input = new Scanner(System.in);

       System.out.print("Enter the first complex number: ");

       double a = input.nextDouble();

       double b = input.nextDouble();

       Complex c1 = new Complex(a, b);

       System.out.print("Enter the second complex number: ");

       double c = input.nextDouble();

       double d = input.nextDouble();

       Complex c2 = new Complex(c, d);

       System.out.println("(" + c1 + ")" + " + " + "(" + c2 + ")" + " = " + c1.add(c2));

       System.out.println("(" + c1 + ")" + " - " + "(" + c2 + ")" + " = " + c1.subtract(c2));

       System.out.println("(" + c1 + ")" + " * " + "(" + c2 + ")" + " = " + c1.multiply(c2));

       System.out.println("(" + c1 + ")" + " / " + "(" + c2 + ")" + " = " + c1.divide(c2));

       System.out.println("|" + c1 + "| = " + c1.abs());

       Complex c3 = c1;

       System.out.println(c1 == c3);

       System.out.println(c3.getRealPart());

       System.out.println(c3.getImaginaryPart());

   }

}

class Complex implements Cloneable {

   public interface Cloneable { }

   private double realPart;

   public double getRealPart() {

       return realPart;

   }

   public void setReal(double real) {

       this.realPart = real;

   }

   private double imaginaryPart;

   public double getImaginaryPart() {

       return imaginaryPart;

   }

   public void setImaginary(double imaginary) {

       this.imaginaryPart = imaginary;

   }

   public Complex(double a, double b) {

       realPart = a;

       imaginaryPart = b;

   }

   public Complex(double a) {

       realPart = a;

       imaginaryPart = 0;

   }

   public Complex() { }

   public Complex add(Complex comp2) {

       double real1 = this.getRealPart();

       double real2 = comp2.getRealPart();

       double imaginary1 = this.getImaginaryPart();

       double imaginary2 = comp2.getImaginaryPart();

       return new Complex(real1 + real2, imaginary1 + imaginary2);

   }

   public Complex abs() {

       double real1 = Math.abs(this.getRealPart());

       double imaginary1 = Math.abs(this.getImaginaryPart());

       return new Complex(real1, imaginary1);

   }

   public Complex subtract(Complex comp2) {

       double real1 = this.getRealPart();

       double real2 = comp2.getRealPart();

       double imaginary1 = this.getRealPart();

       double imaginary2 = comp2.getRealPart();

       return new Complex(real1 - real2, imaginary1 - imaginary2);

   }

   public Complex multiply(Complex comp2) {

       double real1 = this.getRealPart();

       double real2 = comp2.getRealPart();

       double imaginary1 = this.getRealPart();

       double imaginary2 = comp2.getRealPart();

       return new Complex(real1 * real2, imaginary1 * imaginary2);

   }

   public Complex divide(Complex comp2) {

       double real1 = this.getRealPart();

       double real2 = comp2.getRealPart();

       double imaginary1 = this.getRealPart();

       double imaginary2 = comp2.getRealPart();

       return new Complex(real1 / real2, imaginary1 / imaginary2);

   }

   public String toString() {

       String result;

       result = realPart + " + " + imaginaryPart + "i";

       return result;

   }

}

3 0
3 years ago
Other questions:
  • To delete a note, select the note reference mark in the footnote text by dragging through the note reference mark, and then clic
    6·1 answer
  • How does the browser display the same webpage whether you enter the URL or the IP address in the address bar? what system transl
    11·1 answer
  • You work as the Network Administrator for Perfect solutions Inc. The company has a Linux- based Network. You are a root user on
    15·1 answer
  • Which software application should be used to communicate in writing about an upcoming event?
    12·2 answers
  • Before a story can be published, it goes to ralph. ralph reads the story and may make changes based on spelling or the rules of
    12·2 answers
  • ________ is an encryption standard used for secure transactions such as credit card processing and online banking. TLS DMZ White
    14·1 answer
  • Which of the following defines code?
    7·1 answer
  • The program 4 should first tell users that this is a word analysis file. For any user-given text file, the program will read, an
    6·1 answer
  • Function of an actuator
    8·2 answers
  • A _____ consists of horizontal bars, connected with arrows that indicate task dependencies.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!