1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arturiano [62]
2 years ago
6

Horizontal and vertical scaling usually refer to increasing the capacity of

Computers and Technology
1 answer:
salantis [7]2 years ago
3 0

Answer:

I think servers and networks.

You might be interested in
When was technology created?
ANEK [815]

Answer:

two million years ago

Thomas Edison, American inventor who, singly or jointly, held a world-record 1,093 patents. In addition, he created the world's first industrial research laboratory.

3 0
1 year ago
What's wrong with the coding worksheet syntax and how would you fix it?
Alex777 [14]

Answer:

start with what you know

Explanation:

3 0
2 years ago
How can you block attackers, who are performing reconnaissance and probing, with nmap and nessus port scanning and vulnerability
Tresset [83]
<span> You can block attackers, who are performing reconnaissance and probing, with NMAP and Nessus port scanning and vulnerability assessment scanning tools by i</span>dentifying the digital signatures of common reconnaissance and probing tools such PING, scans performed by Nmap, Nessus®, etc. The IDS and IPS devices should be programmed to specifically alert and block reconnaissance and probing IP packets that are commonly used by these attack tools. 
7 0
3 years ago
!PLEASE HELP! My business office specialist class, this is about Access.
Over [174]

Answer:

b

Explanation:

6 0
3 years ago
Read 2 more answers
Generally, information is extracted from __ for communication.
denis-greek [22]
Extracting information from the message.  It i<span>s exclusive to the "interpreting the message" step in a business communication process.</span>
7 0
3 years ago
Other questions:
  • Which task manager tab provides details about how a program uses system resources?
    14·1 answer
  • ____________________deals with syntax and semantics ofinformation exchange.
    12·1 answer
  • The phrase has become an Internet buzz word. It refers to a top-level domain name for communications organizations.TrueFalse
    12·1 answer
  • Part 1 Given 3 integers, output their average and their product, using integer arithmetic. Ex: If the input is 10 20 5, the outp
    6·1 answer
  • What are some benefits of 3-D printing?
    9·1 answer
  • Owners of individual domains get to decide what content is published on their websites. Why might this autonomy be important to
    12·1 answer
  • Question 2 of 3
    7·2 answers
  • Assuming dataFile is an ofstream object associated with a disk file named payroll.dat, which of the following statements would w
    9·1 answer
  • Which software development method uses highly skilled programmers to shorten the development process while producing quality sof
    9·1 answer
  • How would you explain how a password generator program works
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!