You have production infrastructure sitting behind one DNS domain, and for disaster recovery purposes, you have parallel infrastructure on standby behind a second domain hosted in a second AWS region. Which routing policy will automate the switchover in the event of a failure in the production system

Answers

Answer 1

Answer:

Failover

Explanation:

A failover is required when one set of infrastructure fails then traffic is redirected to the second set of backup infrastructure.


Related Questions

1. How many 5mb pictures can be stored in a 300 mb micro sd card?

2. How many 1000 mb videos can be stored in a memory card with 4gb capacity?


Help​

Answers

#1

Total pics:-

[tex]\\ \sf\longmapsto \dfrac{300}{5}=60pictures[/tex]

#2

1GB=1025MB4GB=4100MB

Total videos

[tex]\\ \sf\longmapsto \dfrac{4100}{1000}\approx 4[/tex]

1. How many 5mb pictures can be stored in a 300 mb micro sd card?

60 Pictures

2. How many 1000 mb videos can be stored in a memory card with 4gb capacity?

4100/1000 ≈ 4

_____ is the process of returning a database that has encountered a problem to a state known to be correct.

Answers

Based on computer studies, Recovery is the process of returning a database that has encountered a problem to a state known to be correct.

What is Recovery in Computer?

Recovery in Computer is restoring a computer to its usual working condition. It could be restoration from hardware or software issues.

Recovery is usually carried out on a computer after the following situation:

Computer crashFile corruptionTechnical error, etc.

Hence, in this case, it is concluded that the correct answer is Recovery.

Learn more about Computer Recovery here: https://brainly.com/question/25644005

oogle Wallet software utilizes Android phones with near field communication technology, such as _____, to allow shoppers to swipe their phones at checkout to pay for items.

Answers

Answer:

card

Explanation:

you can do all the same things you used to do with these apps ,like pay on stores or check out the items

TRUE or FALSE: The open() function does not actually print anything.
(Python)

Answers

Answer:

False

Explanation:

Brainliest please

Why is the GDD useful for game artists?
a.
because it contains specific directions for exactly what the artist must
create and exactly how to go about creating it


B. because it allows artists to see the big picture into which their individual
pieces of artwork will fit, which usually results in more unified artistic content for the game

c. because it lists the different subtasks of a game development project for
artists, along with their estimated time and progression

D. because it provides artists with the underlying structure of a game level
or mission in terms of layout, presentation of obstacles and options for
movement


pls answer fast

Answers

Answer:

i think ur answer would be either D, or B

Explanation:

Copyright is applied to a new piece of work:

A.
after agent approval.

B.
after being registered with the patent office.

C.
automatically after publication.

D.
if publishers decide it is needed.

Answers

Answer:

I say C. Automatically after publication.

Explanation:

Srry if im wrong

how do you open a program when there are no icons on the desktop?

Answers

Answer:

Press the windows button, then search for the program you wish to open. Then just left click on the program

When you open a program, If there are no icons on the desktop we need to double click on the desktop to reveal the hidden icons.

What is a desktop?Desktop icons are mainly designed for quick access to often used programs, files, and folders.some times your desktop icons may be hidden.To view them, we need to right-click the desktop, select the View option, and then select Show desktop icons. To add icons to your desktop such as This PC, Recycle Bin, and more we need to follow the steps given below.Select the Start button->and then select Settings->Personalization->Themes->Under Themes->Related Settings, select Desktop icon settings.Choose the icons you would like to have on your desktop and then select Apply and OK.

To learn more about the desktop refer to:

https://brainly.com/question/27029280

#SPJ

in a network operating system, this computer coordinates all communication between computers.

Answers

Answer:

Explanation:

In a network environment, the network server computer coordinates all communications between the other computers. Smartphones generally include a network operating system. The operating system is often referred to as the software platform.

is it bad to leave your laptop plugged in all the time

Answers

Answer:

no, its not bad. the only way its bad is if your computer has something wrong with it.

Explanation:

A program unit is said to contain ____ when it includes references to database objects that in turn references other database objects.

Answers

When a program unit include references to database objects that serves as references other database objects, the program unit is considered to contain: indirect dependencies.

A program unit can be defined as a computer subprogram with executable algorithms and packages that references a larger (main) computer program.

This ultimately implies that, a program unit is a constituent part or subunit of a larger (main) computer program.

In database management system (DBMS), there exist some form of relationship between a database object with respect to other database objects such as:

Direct dependencies.Remote dependencies.User dependencies.Indirect dependencies.

For indirect dependencies, the program unit references database objects that in turn serves as references other database objects.

Read more: https://brainly.com/question/19089364

Binary Number Inquiry
Term Description
1. Bit

2. Byte

3. Kilobyte

4. Megabyte

5. Gigabyte

6. Terabyte

7. Petabyte

8. Exabyte

Answers

Answer:

Byte should be the correct answer.

Please explain what steps you will take to prevent hackers from getting access to your personal information.
I need the sentences longer

can you do a longer a paragraph
I will get the Brainly Pts

Answers

Answer:

I would do these steps

Explanation:

I would make sure i have strong passwords on every account i have, then i would setup 2FA (Two Factor Authentication) it would make it to where i have tp confirm any logins which will protect my information. Then i would get a VPN (Virtual Private Network) which encrypts everything i do and protects my location.

Your welcome and have a good day <3

Computers infected by a virus, worm, or Trojan horse that allows them to be remotely controlled for malicious purposes are called

Answers

Blaster Worm., the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely. A Trojan horse is not a virus. It is a destructive program that looks as a genuine application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive.

The Interpreter reads the code you have written and executes it line-by-line. A. True B. False

Answers

Answer:

A, True

Explanation:

Got it right on my test

Answer:

True

Explanation:

I got it right on the test

Thank you person above me

Which option is an accurate description of the key characteristics of a project?


predefined goals, carried out in phases

fixed goals, limited risks

fixed goals, unlimited budget

predefined goals, access to unlimited resources

Answers

The option which is an accurate description of the key characteristics of a project is: A. predefined goals, carried out in phases.

Project management refers to a strategic process which involves the following:

Designing a project plan.Planning a project.Developing a project plan.Leading a project.The execution of a project plan.

Hence, project management involves using a set of skills, tools, knowledge, techniques and experience to achieve predefined (set) goals and objectives in a project, which is typically carried out in phases.

In conclusion, the accurate description of the key characteristics of a project are:

1. It comprises predefined goals.

2. It is carried out in phases.

Read more: https://brainly.com/question/19863574

A(n) ________ is a class that stores data and organizes it in some fashion. Group of answer choices iterator

Answers

Answer:

Container

Explanation:

In computer science, a container is a class or a data structure whose instances are collections of other objects.

what does hide alerts mean on text messages on iphone

Answers

Answer:

it means like when tha text show up no words will show only tha message thing will it will jus say imessage

Explanation:

Answer:

Hide alerts mutes the notifications.

Explanation:

how are packets sent through the internet

Answers

Explanation:

When we send data across the internet, it is usually converted into smaller chunks called packets. The computer sends each packet to the nearest router, and this router checks the packet's IP header which contains the destination IP (an IP number is like an address, it lets the computer know where the packet wants to go) or the "address where the packet wants to end up". This router has multiple pathways it can send the packet through, but its goal is to send it to a router that is closer to its final destination. Then, this router can send it to its final destination. Once all packets have reached this final destination, they can be put back together, recreating the original piece of data.

Hope this helps and feel free to ask any questions!

Erin is planning to develop an online app that users can access using any type of Apple device, including iPads and iPhones. Which app development trend should Eric learn about before she starts

Answers

A lot of good educational apps are been developed. The app development trend that Erin should learn about before she starts is  Cross platform development.

There are lots of mobile app development where one can have different device platforms that a person have to build for such as Apple vs Android.

Cross-platform development is simply known to be the act of developing software products or services for more than one platforms or software environments.

It is known to helps give an individual a lot of flexibility to build your app through the use of a universal language such as a Javascript.

Learn more about Cross platform development from:

https://brainly.com/question/24902217

how do you get the regis in pokemon alpha sapphire

Answers


The legendary trio Regirock, Regice, and Registeel are well hidden in Pokemon Omega Ruby and Alpha Sapphire, but they can be found before completing the main story. A few steps must be done before their chambers can be opened. First, you must capture a Relicanth and Wailord.

Which component is likely to be a performance bottleneck on a workstation used to edit digital movies

Answers

Explanation:

The disk subsystem - the files will be too large to be stored completely in system memory and so must be streamed from the disk, which will need to be both large and fast.

what is another term used for next generation firewalls

Answers

Another term used for next generation firewalls is New Generation Layer 7 firewalls

Layer 7 firewall / next generation firewall are the latest type of firewall created to be able to perform  network protocols functions than those of layer 4 and 3(traditional firewall).

They are created to improve the network security from the stateful packet inspection and access control rules,to a more  sophisticated and advanced network security to curb the activities and attacks from cyber hackers.

Features of next generation firewalls/ Layer 7 firewalls

SSL decryption and inspectionContext-based application controlNetwork based malware protection inspection of  HTTP and  HTTPS protocols.

See more here:https://brainly.com/question/14717375

When a user connects to a Windows system remotely, the user has complete access to the system virtually.

Answers

Answer:

True

Explanation:

when designing a security-in-depth strategy, firewalls and vpns would be examples of what type of control?

Answers

When a security-in-depth strategy is being designed for an information system (IS), firewalls and virtual private networks (VPNs) are classified as examples of: network access.

What is a security-in-depth strategy?

A security-in-depth strategy is also referred to as a defense-in-depth strategy and it can be defined as an approach (technique) in cybersecurity that typically involves the use of multiple layers of security in order to holistically protect a network.

Hence, a security-in-depth strategy is designed and developed with similarity to an onion and as such if one security layer fails to protect a network from an attack, another layer would definitely protect it.

In a security-in-depth strategy, network access determine the authenticity of a user credentials and then decides whether or not to grant access to the user. Some examples of network access control include:

FirewallsVirtual private networks (VPNs)

Read more on cybersecurity here: https://brainly.com/question/24112967

From the View tab you can display _______ in the Slide pane, giving you visual markers for aligning placeholders and images.

Answers

From the view tab of the Microsoft PowerPoint, you can display correct gridlines which serves as visual markers.  

The interface of the view tab of the Microsoft PowerPoint application is shown in the image attached below.

As we can see, from the view tab, the correct gridlines can be displayed, which serves as visual markers that can be used to ensure placeholders and images are properly aligned.

In summary, from the view tab of the Microsoft PowerPoint, you can display correct gridlines which serves as visual markers.  

Learn more here:

https://brainly.com/question/3366661

A data __________ is trained in both computer science and statistics and knows how to effectively process and analyze large amounts of data.

Answers

Answer: data scientist

Explanation:

A data scientist is trained in both computer science and statistics and knows how to effectively process and analyze large amounts of data.

What is Statistics?

Statistics may be defined as a branch of scientific mathematics that significantly deals with the collection, analysis, interpretation, and presentation of masses of numerical data. It is a methodology of gathering, analyzing, and summarizing the data.

A data scientist may be characterized as a person who is employed in order to analyze and interpret complicated digital data in form of websites and assist in business and decision-making.

Therefore, a data scientist is trained in both computer science and statistics and knows how to effectively process and analyze large amounts of data.

To learn more about Data scientists, refer to the link:

https://brainly.com/question/21031963

#SPJ2

What is the correct number to dial to report an incident to the program manager via the emergency pager line

Answers

Answer:

Call 911 immediatley.

Explanation:

This is the emergency contact. It will get you in contact with police officers firefighters and medics.

You use your computer to type documents in Portuguese that will be sent to Brazil. You purchase a second keyboard designed specifically for Portuguese. Which Windows setting would you use to configure your computer for the new keyboard so you can switch between the Portuguese and English keyboards

Answers

To add a new keyboard layout on Windows 10, use these steps:

Open Settings.
Click on Time & Language.
Click on Language.
Under the "Preferred languages" section, select the default language.
Click the Options button.

Under the "Keyboards" section, click the Add a keyboard button.
Select the new keyboard layout you want to use. Repeat steps No. 6 and 7 to add more layouts.
Once you complete the steps, the new keyboard layout will be added to the device.

Answer for 3.4.8 rectangle code HS

Answers

The code segment is meant to print the area and the perimeter of a rectangle

The main program

The rectangle program written in Python, where comments are used to explain each line is as follows:

#This gets input for the length

length = floaf(input("Length: "))

#This gets input for the width

width = floaf(input("Width: "))

#This calculates the area of the rectangle

area = length*width

#This calculates the perimeter of the rectangle

perimeter = 2*(length+width)

#This prints the area of the rectangle

print(area)

#This prints the perimeter of the rectangle

print(perimeter)

Read more about Python programs at:

https://brainly.com/question/21774450

how do i ask a question for less points

Answers

On the bottom left there should be a number that you can change.

Other Questions
What are the differences between united and integrated? The maximum weight that a circular column can hold is inversely proportional to the square of its height. If an 8 foot column can hold 2 tons, find how much weight a 10 foot column can hold. When did the Mayans think the world would end? please help!!!!!!!!!!!! how much did phil mickelson win today on the champions tour Find the slope of the line that passes Through (1-3) (5,5).Please help asap (IWasNotTheImposter's Poem)..Someday you will cry for meLike I cried for you.Someday you'll miss meLike I missed you.Tiny little secretsGet buried in the dirt,And if they were dug up,Someone would probably get hurt,Nature's first green is gold,Her hardest hue to hold.Her early leaf's a flower,But only so an hour. In the middle school debate club, 30% of the members are in sixth grade. If there are 12 sixth graders in the debate club, how many total members are there in 100%? Write 4 sentences with a gerund phrase, 4 with participles, and 4 with an infinitive phrase. circle the adjecttives in the sentence The small car is red. Which group was unsure which side to support in the American Revolution? No one did more to strengthen the ____ than Andrew Jackson. Pre college need help This type of unemployment occurs because employers need their type of human capital during only one part of the year What is wrong with writing the electron configuration of a ground state atom as 1s2 2s2 2p6 3s2 3p6 3d10 4s2 ? issued 17-year bonds 2 years ago at a coupon rate of 9.8 percent. The bonds make semiannual payments. If these bonds currently sell for 102 percent of par value, what is the YTM HELLO HOW ARE YOU? I HOPE THAT VERY GOOD. Today I want to ask you a questionWhy was September 28 precisely chosen for abortion day? (I hope they know, please don't answer if you don't know.) (HAVE A BEAUTIFUL NIGHT!)(PLEASE DO NOT ANSWER AS FOOL.) :( a survey of 80 people in the grocery store showed that 24 people were buying frozen pizza for dinner. what percent of the people surveyed were buying pizza for dinner ? percent is out of 100 Sonia's check at Aubrey's Kitchen is $14.25. In order to leave a 10% tip, how much should she pay? Round to the nearest cent. Being able to ride a bike is an example of an implicit long-term memory. Please select the best answer from the choices provided T F