You have just been hired by a large organization which uses many different AWS services in their environment. Some of the services which handle data include: RDS, Redshift, ElastiCache, DynamoDB, S3, and Glacier. You have been instructed to configure a web application using stateless web servers. Which services can you use to handle session state data

Answers

Answer 1

Answer:

Elasticache and DynamoDB

Explanation:

The session data can be stored on Elasticache and DynamoDB

ElastiCache is the best fit for front end data stores thereby ensuring a high performance with extremely high request rates and/or low latency requirements


Related Questions

Drag each tile to the correct box.
Albert has some software on his system. Help him identify the software based on its functions.

database software
word processor
spreadsheet software
multimedia software
can be used to create tables with embedded calculations
arrowRight
can be used to edit .doc files
arrowRight
can be used to store data in ordered form
arrowRight
can play .mpg and .mp3 files
arrowRight

Answers

Answer:

1. Spreadsheet software.

2. Word processor.

3. Database software.

4. Multimedia software.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.

Simply stated, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.

Basically, the various type of softwares used on computers to perform specific functions include the following;

1. Spreadsheet software: it can be used to create tables with embedded calculations. A spreadsheet can be defined as a file or document which comprises of cells in a tabulated format (rows and columns) typically used for formatting, arranging, analyzing, storing, calculating and sorting data on computer systems.

2. Word processor: it can be used to format or edit .doc files. Some examples of word processors are Notepad, Microsoft Word, Sublime text, etc.

3. Database software: it can be used to store data in ordered form. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security. These records are stored and communicated to other data user when required or needed.

4. Multimedia software: it can play .mpg and .mp3 files. A multimedia software refers to a software that is designed and developed to accept, utilize and combine various file formats such as audio, video, text, animation effects, etc.

When visiting or learning about other places, what new things have you experienced? Choose all that apply.
food and drink
music and art
languages
values and ideas
technology

Answers

This is a question that’s has no wrong or right answer, basically you just click whatever you’ve experienced.

Answer:

All of these answers

Explanation:

5.2
Explain ONE reason why the special equipment is used when
testing eyesight for a driver's licence.
(2)​

Answers

Answer:

In order to reduce the risk of accidents on the roads.

Explanation:

The special equipment is used when  testing eyesight for a driver's license in order to reduce the risk of accidents on the roads. Good eyesight is very important for good and safe driving so to find out the eyesight of the driver, the license officer used special equipment in order to check driver's eyes. If the eyesight is good, the officer provide license to the person otherwise not so that no accidents happen on the road.

what do you understand by the terms:
I)input
ii)process
iii)storage
iv)output

Answers

an output device translate information processed by the computer into a form which you can understand.

input device are used to enter information such as letters, numbers, sounds or picture into a computer.

Have you searched Buzz Ch.at on playstore​

Answers

Answer:

Reorder terms.

y=52x−1

Cancel the common factor of 22.Factor 22 out of −2-2.

y−4=5x2+52⋅(2(−1))y-4=5x2+52⋅(2(-1))

Cancel the common factor.

y−4=5x2+52⋅(2⋅−1)y-4=5x2+52⋅(2⋅-1)

Rewrite the expression.

y−4=5x2+5⋅−1y-4=5x2+5⋅-1

Multiply 55 by −1-1.

y−4=5x2−5

How did Avery and Garth most likely create their
diagrams?

O Avery used SmartArt and added a shape, whereas
Garth used four shapes.

O Avery used four shapes, whereas Garth used
SmartArt and added a shape.

O Both Avery and Garth used SmartArt and added a
shape.

O Both Avery and Garth used four shapes.

Help!!!

Answers

Avery used smartart and added shake

Identify the error and write correct HTML program 5 Cyber Bullying Tips<\head>Don't Respond Talk to a trusted adult <|html>

Answers

Answer:

<html>

<head> Cyber Bullying Tips </head>

<body>

Don't Respond, Talk to a trusted adult

</body>

</html>

1 punto
María tiene una empresa de mercancia
seca, dicha empresa brinda su servicio de
ventas de estas mercancías al por mayor y
menor para su clientela. ¿De qué tipo de
Comercio hablamos en este ejemplo?: *

Answers

Answer:

Retailing.

Explanation:

La venta al por menor o retailing es el suministro de bienes físicos a los consumidores para uso personal, sea en pequeña o grandes cantidades, siempre que esté destinado a consumidores finales. Es un sector que consta de diferentes ramas (como la industria alimentaria, la industria de la moda, la industria del mobiliario para el hogar, etc.). El comercio minorista es el último eslabón de la cadena de suministro que va desde el fabricante hasta el consumidor.

Describa las etapas del arranque de viruta

Answers

Answer:

Las virutas son partículas que se eliminan mecánicamente de una pieza de trabajo mecanizada. En el contexto de la tecnología de fabricación, especialmente el mecanizado, el término se refiere principalmente a virutas de metal; En principio, sin embargo, las virutas se crean en todo tipo de mecanizado de cuerpos sólidos. Las astillas de madera son el resultado de la carpintería. Cuando se mecanizan plásticos, se crean virutas, así como cuando se mecanizan materiales minerales, cristalinos o amorfos como el vidrio, que a menudo se realiza mediante esmerilado.

What do you call a commercial transaction beyween a buisness and buisness thatis transactedd online?
A.B2B - commerce
B.B2.B commerce
C. B2b digital transaction
D.B2B e - commerce

E. Non of the above

Answers

Answer:

c.B2b digital transaction

Explanation:

yan lang po sana makatulong

Choose the word that matches each definition. 1. IP Address 2. Server 3. Port Each term is only used once._____________ a number used within a computer to identify a specific process ____________ a numerical reference to a particular device in a network ___________ a computer that handles requests and returns data to other computers in a network

Answers

Answer:

  Port      a number used within a computer to identify a specific process.

   IP Address     a numerical reference to a particular device in a network.

   Server           a computer that handles requests and returns data to other computers in a network.

Explanation:

A port number is a number used to uniquely identify a particular process, application or program on a computer. From the networking parlance, it is a logical address that uniquely identifies a process, protocol or application communicating with other process, protocol or application over a network. For example;

i. a file transfer protocol (FTP) could use a port number of 20 or 21.

ii. a simple mail transfer protocol (SMTP) could use a port number of 25

Internet Protocol (IP) address is a numerical reference or label assigned to a particular device in a network which helps to uniquely identify the device on the network. IP addresses (version 4) are expressed as a group of four numbers separated by a dot. For example, an IP address may look like this: 192.168.0.90

A server is a computer that receives requests from other computers, processes these requests and returns some data to the other computers  in a network. In reality, these servers and the computers they serve can actually be some applications or programs. Servers provide resources, data, services or programs to other computers over a network.

Answer:

IP address: an Internet Protocol (IP) address is a numerical reference to a particular device in a network

port: a number used within a computer to identify a specific process

server: a computer that handles requests and returns data to other computers in a network

Explanation:

edge 2022

Select the three reasons that the gaming industry is set to grow.

A) more colleges offering jobs in game design

B) a decrease in the average age of gamers

C) an expanding market on mobile phones

D) expanding markets in Asia

E) new accessories that will attract more players

Answers

The answers are A, C, E

Answer:

expanding markets in Asia, new accessories that will attract more players, an expanding market on mobile phones

Explanation:

Full from of Computer
: )​

Answers

Answer:

COMPUTER full form or meaning is Common Operating Machine Purposely used for Technological and Educational research.

Explanation:

In you question, it isn't from! it is form(;

Some people think that Computer's full form is Common Operating Machine Purposely Used for Technological and Educational Research.

But actually computer is not a full form type word. It is made from the word "compute" which means "calculate". Computer means something that computes or calculates, because initial computers were used for calculating only.

Diana has created a graphic design portfolio for a major project. What kind of portfolio would increase Dlana's chances of getting selected?
OA
a portfolio with some case studies of her graphic design work
OB.
a portfolio with graphic designs in her favorite theme
Ос.
a portfolio containing contact numbers of references
OD.
a portfolio that emphasizes large images and many colors
OE. a portfolio that emphasizes her qualifications and experience

Answers

Answer:

Hello There!!

Explanation:

I believe the answer is O A. a portfolio with some case studies of her graphic design work.

hope this helps,have a great day!!

~Pinky~

The smallest piece of information a computer can store is

Answers

Answer:

bit

Explanation:

confia

A bit is the smallest piece of information in a computer, a single value storing either 0start text, 0, end text or 1start text, 1, end text. A byte is a unit of digital information that consists of 8 of those bits.

How Many types of application Software are there?​

Answers

Answer:

there are 2 types of application software

what is the most improved Android robot​

Answers

Answer:

They are the humanoid robots.

define client and.server​

Answers

Answer:

Client-server model is a model is a distributed application structure that partitions

tasks or workloads between the providers of a resource or service, called servers, and service requesters, called clients.

A folder has been shared with other users and set to read-only. What does this mean for users?
Users can only read the name of the shared folder.
Users cannot add new folders or files.
Users can read and edit files.
Users can add new files but not new folders.

Answers

Answer:

It means that users can only read or, depending on that platform, read and edit files in the folder

¿Por qué es importante usar adecuadamente el celular?

Answers

Answer:

to stop it from breaking

Explanation:

Edhesive lesson practice 8.3, question 5

Answers

Answer:

3

Explanation:

Following are the correct python code to find the length of the given parameter value.

Python code to find length:

print(len("stuff"))#printing length

Output:

please find the attached file.

Program Explanation:

In the given python code a print method is used inside this a "len" method is used that accepts a string value in the parameter.Python has a built-in function called len(). It determines an object's length. A character length of a text string is returned by LEN.

Find out more about the length method here:

brainly.com/question/13527881

Select the correct answer.
Carter, a graphic artist, is trying to apply color and tonal adjustments to an image without permanently changing pixel values. Which Image
editing tool or technique should Carter use?
OA the Color Replacement tool
ОВ.
an Adjustment layer
c. a vector Mask
OD.
a Curve adjustment
OE the Dodge tool

Answers

Answer: Adjustment layer

Explanation:

The image editing tool or technique that should be used by Carter use is an adjustment layer.

The adjustment layer that can be seen in Photoshop refers to an editing tool that's non-destructive image which can be used in adding color and tonal adjustments to a particular image without the pixels changing permanently.

By using the adjustment layers, one can be able to edit and then discard the adjustments. One can also be bake to restore the original image anytime that the person wants.

Answer: B: an Adjustment Layer

Explanation: Correct for Edmentum/Plato

who established computer​

Answers

Answer:

Charles Babbage

Explanation:

I studied abt him

Please help me with my question ​

Answers

Answer:

1. Template

2. Name of the website

3. Signature of the instructor

How are sensors and microprocessors used to control a central heating system which uses an oil burner as the source of heat

Answers

Answer:

sensors are used to measure physical quantities such as temperature, light, pressure, sound, and humidity. They send signals to the processor . a security alarm system may have an infrared sensor which sends a signal when the beam is broken.

Explanation:

im just smart lol

todas las computadoras son controladas por hardware?

Answers

Answer:

"La placa base está compuesta de más partes que alimenten y controlen el equipo. A diferencia del software, el hardware es una entidad física. ... Sin embargo, sin la creación de hardware para realizar tareas dirigidas por software a través de la unidad central de procesamiento, el software sería inútil."

Explanation:

(Sorry, I don't know much Spanish, so there might be mistakes. I hope this helps you.)

In terms of technology, wich of the four devices is the most recent?

a. keyboard
b. joystick
c. scanner
d. camera​

Answers

Joystick (1972)

They consider the typewriter a keyboard…late 1800’s
Scanner (1957)
Camera (late 1800)

Why did Stephen Hawking stop playing hide and seek?

Answers

Answer:

because she keeps using a metal detector.

What is the next line?
>>>
tupleB = (5, 7, 5, 10, 2,5)
tupleB.index(5,3)
>>>
A. 0
B. 5
C. 3
D. 1

Answers

The right answer is option 4: 2

Explanation:

Lists are used in Python to store elements of same or different data types.

Different functions are used in Python on List. One of them is count.

Count is used to count how many times a specific value occurs in a list.

The syntax for count is:

listname.count(value)

In the given code,

The output will be 2

Hence,

The right answer is option 4: 2

Kiko loves to surf the internet and check on different websites. One day he received an email from unknown source. When he opens it, he was directed to a site and logged using his credit card number. After a few days,he learned that his card was use by someone in purchasing an expensive item. What internet threat did Kiko experience and what can you do to avoid it.​

Answers

He experienced phishing

Phishing is a method of trying to gather personal information using deceptive e-mails and websites.

Here are some measures to avoid phishing. You can pick up the one you liked the most

Always check the spelling of the URLs in email links before you click or enter sensitive informationWatch out for URL redirects, where you're subtly sent to a different website with identical designIf you receive an email from a source you know but it seems suspicious, contact that source with a new email, rather than just hitting reply. Don't post personal data, like your birthday, vacation plans, or your address or phone number, publicly on social media
Other Questions
Christian Robbie are construction arytenoids stained glass window whose length is 7.3 inches longer than its width if the area of the window is 596.9 in. find the width and the length Vinegar, which contains acetic acid, is used in foods and has few safety concerns. Hydrochloric acid is used in chemistry labs and requires the use of safety goggles and gloves. Why do the safety concerns for these two acids differ? 2 ... Acetic acid is a weak acid, and hydrochloric acid is a strong acid. Find x. Round to the nearest degree. You arrive on scene to find a four-year-old boy with a fresh burn on his back in the approximate shape of a triangle with curved sides. The child is not crying and accepts your examination passively. During your examination, you notice yellow bruises and several healed scars. The father stands in the background with his arms folded, not looking at you. The mother tells you a detailed story about how the child pulled the iron onto himself by pulling on the cord.Based on your scene size-up and primary assessment of the young boy with a large burn on his back, what do you suspect?Select one:A. Head traumaB. Physical and psychological child abuseC. Hypoxia and shockD. Developmental disability 14.Find the domain ofx -2 / x + 1 What do you know about carbon HELP PLEASE giving out brainilest What is the solution of StartRoot x + 2 EndRoot minus 15 = negative 3? What is the role of the alcohol component in a tincture?a. to limit the growth of bacteriab. to make the drug insolublec. to allow for allow release of the drugd. to avoid stomach irritation What has been an effect of globalization?a decrease in U.S. service sector jobsa decrease in U.S. service sector jobsa decrease in air, water, and soil pollutiona decrease in air, water, and soil pollutionan increase in deforestation worldwidean increase in deforestation worldwidea decrease in unique regional cuisine Who sparked the independence movement in Mexico?peninsulares and mestizoscriollos and peninsularescriollos and American Indiansmestizos and American Indians Using the periodic table, choose the more reactive nonmetal.Br or As A sphere of diameter 3.0cm is mounted into a thin uniform wire of diameter 0.2mm calculate the length of the wire in meters As Courtney switches on the TV set to watch her favorite cartoon, the electron beam in the TV tube is steered across the screen by the field between two charged plates. If the electron experiences a force of 3.0 * 10^6 N, how large is the field between the deflection plates? Pablo deposits $5000 into an account that pays simple interest at a rate of 3% per year. How much interest will he be paid in the first 6years? cules son las caractersticas de la luz y en qu consisten No files just type it in please and thank you What is the radius of each semicircle in this composite figure? CANTAR to singyonosotrostvosotroslellosellaellasustedustedes 44%adults favor the use of unmanned drones by police agencies. Twelve U.S. adults are randomly selected. Find the probability that the number of U.S. adults who favor the use of unmanned drones by police agencies is (a) exactly three, (b) at least four, (c) less than eight.