You have upgraded your aws support plan to the business support level. what is true of the business support plan?

Answers

Answer 1

The business support plan for AWS is one hour support on production system failure. AWS is stand for Amazon Web Services, Inc.

Governments, companies, and individuals can access on-demand cloud computing platforms and APIs through AWS, an Amazon corporation, on a metered pay-per-use basis. These cloud computing web services provide software tools and distributed computer processing power through AWS server farms.

One of these services is called Amazon Elastic Compute Cloud (EC2), which gives consumers access to a virtual computer cluster that is always reachable online. AWS services are delivered to customers through a global network of AWS server farms.

Learn more about AWS https://brainly.com/question/28145530?

#SPJ4


Related Questions

Describe the changing role of the computer user

Answers

The changing role of the computer user is that they are involved in the

The Development of SoftwareMaintenance of system as well as software, etc.

What is the role of user in system development process?

User involvement can be a tool that can help lower  or even remove the clash that tend to exist between users and system developers in the any system function.

Note that by working with users, system developers are able to find data as well as information direct from the users; know the needs of the users and help the said users to have a good understanding of the new system.

Therefore, The changing role of the computer user is that they are involved in the

The Development of SoftwareMaintenance of system as well as software, etc.

Learn more about computer user from

https://brainly.com/question/21474169
#SPJ1

One of the main applications of database and database systems is database marketing. True or false?.

Answers

True, One of the main applications of database and database systems is database marketing.

Database marketing is a powerful tool that can help businesses target and track customers more effectively. By collecting and storing customer data, businesses can create targeted marketing campaigns and track the results. Additionally, database systems can help businesses manage customer relationships more efficiently.

Database marketing can be used for a variety of purposes, including customer segmentation, campaign management, and lead generation. By collecting customer data, businesses can more effectively target their marketing efforts.

Additionally, database systems can help businesses track the results of their marketing campaigns. By understanding which marketing strategies are working, businesses can optimize their campaigns and improve their ROI.

Database marketing can be a powerful tool for businesses of all sizes. By collecting and storing customer data, businesses can create targeted marketing campaigns and track the results. Additionally, database systems can help businesses manage customer relationships more efficiently.

Learn more on database marketing here:

https://brainly.com/question/28156685

#SPJ4

Write a program that prompts the user to enter a social security number in the format ddd-dd-dddd, where d is a digit. your program should check whether the input is valid.

Answers

A program written by using Java that prompts an end user to enter a Social Security Number in the format "ddd-dd-dddd" is as follows:

import java.util.Scanner;public class CheckSocialSecurityNumber_09_22 {    public static void main(String[ ] args) {        Scanner input = new Scanner(System.in);        System.out.print("Enter a SSN: "); //Creates Social Security Number (SSN) variable boolean isValid = ssn.length() == 11 &&               ssn.charAt(0) <= '9' && ssn.charAt(0) >= '0' &&    Character.isDigit(ssn.charAt(1)) && Character.isDigit(ssn.charAt(2)) && ssn.charAt(3) == '-' && Character.isDigit(ssn.charAt(4)) && Character.isDigit(ssn.charAt(5)) && ssn.charAt(6) == '-' &&Character.isDigit(ssn.charAt(7)) && Character.isDigit(ssn.charAt(8)) && Character.isDigit(ssn.charAt(9)) && Character.isDigit(ssn.charAt(10));//Creates if-else statement to notify user whether the input (Social Security Number) is valid.     if (isValid)          System.out.println(ssn + " is a valid Social Security Number");     else          System.out.println(ssn + " is an invalid Social Security Number");      }}

What is JavaScript

JavaScript can be defined as an object-oriented computer programming language that is typically designed and developed for creating interactive effects within a software application such as web browsers.

What is an if-else statement?

An if-else statement can be defined as a conditional statement that is written by a computer programmer to handle decisions by running a different set of statements, depending on whether an expression is either true or false.

Note: The indentation may change due to Brainly's text editor.

Read more on JavaScript here: https://brainly.com/question/13266367

#SPJ1

The linux/unix command __________ can be used to search for files or contents of files.

Answers

The `grep` command is used for this. https://man7.org/linux/man-pages/man1/grep.1.html

The ____ language was used to write utilities and operating systems, including unix and windows.

Answers

The "Basic" language was used to write utilities and operating systems, including Unix and Windows.

When it comes to programming languages, there are a few that stand out above the rest. One of those languages is "Basic."

Basic was originally designed to be a simple, easy-to-use language for writing utilities and operating systems. That includes some of the most popular operating systems today, such as Unix and Windows.

Despite its simplicity, Basic is a powerful language that is still used by many programmers today. In fact, it's one of the most popular languages on GitHub.

If you're looking for a language that is easy to learn and use, Basic is a great choice. And if you're already familiar with other languages, learning Basic will be a breeze.

Learn more here:

https://brainly.com/question/16936315

#SPJ4

Humans are known for their communication skills. ________ is the symbolic form of communication based on productivity and displacement that is mutually intelligible by other users.

Answers

The term  language is the symbolic form of communication based on productivity and displacement that is mutually intelligible by other users.

What is human language linguistics?

Human language is known to have a distinct forms of communication as it is known to be  compositional.

Note that  Human language gives room for speakers to tell more about their thoughts in sentences making up by  subjects, verbs and objects. The use of the human language is one that is acceptable to all as a means of communication.

Note also that  language is seen as a system of communication that is said to make use of symbols for example words, sounds, as well as  to convey meaning.

Therefore, The term  language is the symbolic form of communication based on productivity and displacement that is mutually intelligible by other users.

Learn more about language  from

https://brainly.com/question/10585737
#SPJ1

If a program contains an error that divides a number by zero at the execution time. this error is a:_________

Answers

If a program contains an error that divides a number by zero at the execution time. this error is a Semantic error.

Text that is grammatically correct but makes no sense is a semantic mistake. In the case of the C# programming language, an illustration would be "int x = 12.3;" - This sentence is illogical since 12.3 is not an integer literal and there is no implicit conversion from 12.3 to int. However, it is grammatically sound.

The disruption of access to semantics or lexical representations leads to semantic mistakes. Examining the understanding of words that cause name semantic problems is one technique to identify their causes.

A semantic error is flawed logic that results in the incorrect behaviour when applied, as opposed to a syntax error, which is an incorrect construction of the source code.

Learn more about error:

https://brainly.com/question/25671653

#SPJ4

Collaboration software is designed to increase collaboration and productivity primarily by enabling team members to?

Answers

Collaboration software is designed to increase collaboration and productivity primarily by enabling team members to: view, edit and add shared information in real time from anywhere.

What is a software?

A software can be defined as a set of executable instructions that is typically used to instruct a computer system on how to perform a specific task (function) and proffer solutions to a particular problem.

What is a collaboration software?

A collaboration software can be defined as a type of software that is typically designed and developed to avail all authorized team members an opportunity and ability to remotely view, edit, share, and add shared information in real-time.

Read more on collaboration software here: https://brainly.com/question/28112823

#SPJ1

Complete Question:

Collaboration software is designed to increase collaboration and productivity primarily by enabling team members to?

Multiple Choice

be given access to each other's workspaces and files, for micro-management.

complete their work using personal devices such as smartphones or tablets.

view, edit and add shared information in real time from anywhere.

hold virtual meetings online via teleconferencing or video conferencing features

Explain the impact of the continuing evolution of computer hardware and the accompanying evolution of operating systems software.

Answers

As computer hardware continues to evolve, so too does the software that runs on it. Operating systems are constantly being updated to take advantage of new hardware capabilities and to address security concerns. This continuing evolution has a major impact on the way we use computers.

For example, new hardware developments have led to the creation of new types of devices, such as touchscreen laptops and tablets.

Operating systems have been adapted to make use of these new devices, and the way we interact with computers has changed as a result. Similarly, the way we store and access data has also evolved, thanks to advances in storage devices and networking technology.

The ongoing evolution of computer hardware and software is thus having a major impact on the way we live and work. As new capabilities are introduced, we find new ways to use computers to improve our lives.

Learn more on computer hardware here:

https://brainly.com/question/24370161

#SPJ4

How are computer generation classified.​

Answers

Answer:

The classification and time periods are given below:

Second Generation Computer (1957-1963)
Third Generation Computer (1964-1971)
Fourth Generation Computer (1972 onward)
Fifth Generation Computer (Present and future)

With the database approach, data descriptions are stored in a central location known as a:_____.

Answers

With the database approach, data descriptions are stored in a central location known as a repository.

What is repository in computer?

In regards to the use of  information technology, a repository is known to be a term that connote the central region where all work regarding the aggregation of data is known to be kept.

It is known to be the point at which data are said to be maintained in an way that is known to be organized in computer storage.

Therefore, With the database approach, data descriptions are stored in a central location known as a repository.

Learn more about repository from

https://brainly.com/question/20351998

#SPJ1

A(n) ____ is a set of independent computer systems connected by telecommunication links for the purpose of sharing information and resources.

Answers

A computer network is a set of independent computer systems connected by telecommunication links for the purpose of sharing information and resources.

What are computer networks?

Computer networking is known to be a kind of an  interconnected layer of computing devices that is known to help in the function of exchange of  data as well as share resources with one another.

Note that these said networked devices are said to be a kind of  a system of rules known to be called the communications protocols.

They are said to help in regards  to transmission of information over physical and wireless technologies.

Therefore, A computer network is a set of independent computer systems connected by telecommunication links for the purpose of sharing information and resources.

Learn more about computer network from

https://brainly.com/question/1167985

#SPJ1

____ is concerned with the security of computers or devices that are part of a network infrastructure.

Answers

Network security is concerned with the security of computers or devices that are part of a network infrastructure.

Network security can be defined as a broad term that includes many technologies, devices and processes. In the simplest terms, network security is a set of rules and configurations designed to protect the integrity, confidentiality, and accessibility of computer networks and data using software and hardware technologies. Every organization, regardless of size, industry, infrastructure or structure needs a level of network security solution to protect it from the ever-evolving cyber threat landscape in today's wild.

There are many avenues to consider when addressing network security across an organization. Attacks can occur at any path in the network security layer model, so hardware, software, and network security policies must be designed to address each area. Network security usually consists of three distinct controls: physical, technical and administrative.

You can learn more about network security here https://brainly.com/question/14407522

#SPJ4

The pointer in a node points to? the data part of a node. the count part of a node. the pointer part of the node. the whole node.

Answers

The pointer in a node points to: D. the whole node.

What is a variable?

A variable can be defined as a specific name which refers to a location in computer memory and it is typically used for storing a value such as an integer.

What is a node?

A node can be defined as a self-referential object and it typically comprises a pointer to a variable which point to a variable of the same data type. Also, the pointer in a node primarily points to the next node.

In this context, we can reasonably infer and logically deduce that the pointer in a node always points to the whole node.

Read more on node here: https://brainly.com/question/24068343

#SPJ1

Social networking technologies can help a company create communities of practice that:_________

Answers

Social networking technologies can help a company create communities of practice that: D) link employees to others with similar professional interests throughout the organization.

What is a social network?

A social network can be defined as a collection of Internet software applications and websites which are designed and developed so as to avail end users with similar interests, an ability to add, share, and discuss different information, as well as enhance connection, collaboration and debates (discussions) between community members over the Internet such as:

Ti-kT-okInst-agr-amHangoutTwi-tterFace-bookYou-tube

In this context, we can reasonably infer and logically deduce that social networking technologies can help link employees (staffs) to other employees (staffs) with similar professional interests throughout a business organization.

Read more on social networks here: brainly.com/question/28072110

#SPJ1

Complete Question:

Social networking technologies can help a company create communities of practice that: ________

A) allow employees to develop new workplace skills.

B) give disgruntled employees a forum for venting their frustrations.

C) discourage socializing so that individual employees can get their work done.

D) link employees to others with similar professional interests throughout the organization.

If 200.123.4.6 is a classful internet protocol (ip) address, what class is it in?

Answers

200.123.4.6 is a classful internet protocol (ip) address located in class C.

An IP address (internet protocol address) is a numeric representation. This numerical representation uniquely identifies a particular interface on the network.

Address in IPv4 that has a length of 32 bits. This allows a maximum of 4,294,967,296 (232) unique addresses. Addresses in IPv6 are 128-bits long, which allows for 3.4 x 1038 (2128) unique addresses.

The total usable address pools of both versions are subtracted by the various reserved addresses and other considerations.

IP addresses can also be defined as binary numbers but are usually expressed in decimal form (IPv4) or hexadecimal form (IPv6) to make it easier for humans to read and use them.

You can learn more about IP addresses here https://brainly.com/question/18722788

#SPJ4

____________ is a principle that limits access to certain parts of a program to public methods.

Answers

Encapsulation is a principle that limits access to certain parts of a program to public methods.

What is the principle of least privilege (POLP)?

The principle of least privilege (POLP) is  known to be an idea  in computer security that helps to lower or limits users' access rights to a only what are known to be  needed to do in their jobs.

Note that Users are said to be granted permission to be able to  read, write or execute  the thing that  the files or resources is needed to do their jobs.

Therefore, Encapsulation is a principle that limits access to certain parts of a program to public methods.

Learn more about Encapsulation from

https://brainly.com/question/13147634

#SPJ1

Digital literacy involves having a current knowledge and understanding of computers, mobile devices, the internet, and related technologies. group of answer choices
a. true
b. false

Answers

Digital literacy involves having a current knowledge and understanding of computers, mobile devices, the internet, and related technologies is option b: false statement.

What is meant by digital literacy?

Digital literacy is known to be a term that connote when a person is said to be having the skills that they need to live, learn, as well as work in a society where communication as well as access to information is known to be  increasingly via the use of digital technologies such as internet platforms, social media, and others.

Therefore, Digital literacy involves having a current knowledge and understanding of computers, mobile devices, the internet, and related technologies is option b: false statement.

Learn more about Digital literacy from

https://brainly.com/question/11983600

#SPJ1

You are servicing a dell inspiron 22 3265/3263 aio desktop and determine that the lcd panel is faulty. what troubleshooting steps will you follow before replacing the lcd assembly?

Answers

The steps for the troubleshooting  is given below

1.) First you need to Run ePSA, then  click on esc to stop testing and then get back control of the cursor. You have to Double click on the screen to see if the cursor will moves to your given location. That will help you to know if hardware is required  in terms of been replaced or it is the software that have the problem.

2.)If system boots into windows, you have to check your device manager for the tool call the USB Input device which is known to have a white circle as well as a down arrow, then right click and enable it so that you can be able to test its functionality.

What it means to troubleshooting?

Troubleshooting is known to be a systematic method that is used in  problem-solving that is often seen or used to know  and correct issues with regards to complex machines, computers and also software system.

Therefore, The steps for the troubleshooting  are;

1.) First you need to Run ePSA, then  click on esc to stop testing and then get back control of the cursor. You have to Double click on the screen to see if the cursor will moves to your given location. That will help you to know if hardware is required  in terms of been replaced or it is the software that have the problem.

2.)If system boots into windows, you have to check your device manager for the tool call the USB Input device which is known to have a white circle as well as a down arrow, then right click and enable it so that you can be able to test its functionality.

Learn more about troubleshooting  from

https://brainly.com/question/26875099

#SPJ1

What are the three broad categories of analytics techniques designed to extract value from data?

Answers

The three broad categories of analytics techniques designed to extract value from data are:

DescriptivePredictivePrescriptive

What is an analysis technique?

Analytical technique is known to be a kind of a method that is said to be used to tell or know about a chemical or any form of physical property of a chemical substance.

Note that the  Analytical Techniques are also known as the ways that are used for the qualitative and quantitative telling of concentration of a compound by the use of a lot of  techniques such as titrations, spectroscopies, and others.

Therefore, The three broad categories of analytics techniques designed to extract value from data are:

DescriptivePredictivePrescriptive

Learn more about analytics techniques from

https://brainly.com/question/27883100

#SPJ1

You are working on a home office network. Recently, you added a cable modem to the network so the computer named home-pc could connect to the internet. You also added the computer named home-pc2 to your network, but your networking configuration only allows home-pc to connect to the internet. To save on cost, you want to add a hub to the network so that both computers can communicate with each other and connect to the internet. The computers do not need to have guaranteed bandwidth for their network connections

Answers

Answer:

connect the ethernet

Explanation:

Which layer of the osi reference model handles logical addressing (ip addresses) and routing traffic?

Answers

The data link layer of the osi reference model handles logical addressing (ip addresses) and routing traffic.

A model reference is a Model block reference to another model. Model hierarchy is created by these references. The characteristics of each referenced model's defined interface's inputs and outputs are specified.

For instance, an actual outside wall may have dimensions and materials when describing the architecture of a specific house (which is a specific environment of a certain kind), but the idea of a wall (kind of entity) is included in the reference model.

A useful foundation for networking ideas is the OSI reference model. In essence, a sender injects data into a network. The data are supplied to a receiver after being relayed across a communication link. A variety of networking gear and software must collaborate in order to do this.

Learn more about reference model:

https://brainly.com/question/28192091

#SPJ4

Which type of social engineering attack attempts to discover personal information through the use of email?

Answers

Answer:

A phishing attack

Explanation:

Phishing is a form of social engineering. Phishing attacks use email or malicious websites to solicit personal information by posing as a trustworthy organization

Maintaining a detailed study log that identifies the interviews making phones calls. True or false

Answers

Maintaining a detailed study log that identifies the interviews making phones calls is a false statement.

What are the interviews?

An interview is known to be a kind of a structured form of a conversation and it is seen as the one where one participant is known to be asking the questions, and the other is said to be providing the answers.

In carrying out an interview, there is no need keeping tab  of the phone calls made because it is irrelevant.

Note that this is seen in common parlance as a word called "interview" and as such it can be called a one-on-one conversation that tends to exist between an interviewer and that of an interviewee.

Maintaining a detailed study log that identifies the interviews making phones calls is a false statement as it is not necessary.

Learn more about interviews from

https://brainly.com/question/8846894

#SPJ1

Which command prompt command will enable you to see all the files in the c:\fred folder with the extension exe?

Answers

DIR C:\FRED\*.EXE command prompt command will enable you see all the files in the c:\fred folder with the extension exe.

If you want to see all the files in a specific folder that have a certain file extension, you can use the DIR command in the Command Prompt.

To use the DIR command, you need to specify the path of the folder you want to list the contents of, and then add the file extension you're looking for. So, if you want to see all the files in the c:\fred folder that have the .exe extension, you would use the following command:

dir c:\fred\*.exe

This will list all the files in the c:\fred folder that have the .exe extension.

Learn more on command prompt here:

https://brainly.com/question/25808182

#SPJ4

The big data v that defines the fact users expect their data to be accurate and trustworthy is?

Answers

Veracity is the big data term that describes the reality that people want their data to be reliable and accurate.

What is big data?Big data refers to data collections that are too large or complex for software used for traditional data processing to manage. Despite having greater statistical power, data with more fields may also have a higher probability of false discovery than data with fewer fields.Big data is characterized as data that is more diverse, arrives more quickly, and comes in bigger amounts.Another term for this is the three Vs. Big data is just a word for larger, more complicated data collections, particularly from new data sources.One example of the numerous sources of big data is transaction processing systems, customer databases, documents, emails, medical records, internet clickstream logs, mobile apps, and social networks.

To learn more about big data, refer to:

https://brainly.com/question/19049345

#SPJ4

A _____ (sometimes called an epic) is a simple, high-level statement of a requirement.

Answers

A Feature (sometimes called an epic) is a simple, high-level statement of a requirement.

Check more about features below.

What do you mean by feature?

A feature is known to be a kind of a distinctive attribute or a special attraction of a person or any thing. It is that which is  unique to a person or thing.

Note that the term Feature can also imply for one to give special attention to any thing.

Therefore,  A Feature (sometimes called an epic) is a simple, high-level statement of a requirement.

Learn more about Feature from

https://brainly.com/question/24416657
#SPJ1

Which of the following is NOT a possible result of personal information being located on an unsecure network?

Answers

The option that is not a possible result of personal information being located on an unsecure network is a computer virus is downloaded to the network.

What is an unsecure network?

An unsecured network is known to be a term that connote that a given network can be compromise at any time.

Note that this is said to be one that is refers to as a free Wi-Fi (wireless) network and it is one that tells that there is no form of special login or screening process to be able to get on the network, and as such you and anyone else can use it.

Therefore, based on the above, The option that is not a possible result of personal information being located on an unsecure network is a computer virus is downloaded to the network.

Learn more about unsecure network  from

https://brainly.com/question/14806619

#SPJ1

Q.

Which of the following is NOT a possible result of personal information being located on an unsecure network?

answer choices

A computer virus is downloaded to the network

A persons financial information is downloaded to social media

A persons identity is stolen

A computer hacker breaks into the network and downloads information

A device or component that allows information to be given to a computer is called? question 1 options:
a. algorithm
b. output
c. computer
d. input

Answers

A device or component that allows information to be given to a computer is called option d. input.

What is a device that allows information to be given to a computer?

In regards to computing, an input device is known to be a kind of equipment that is known to be used to give data as well as control signals to an information processing system, for example computer or information appliance.

The Examples of input devices are keyboards, mouse, cameras, joysticks, and others.

Therefore, based on the above, A device or component that allows information to be given to a computer is called option d. input.

Learn more about input device from

https://brainly.com/question/28384322
#SPJ1

The total requests for a web page and are used as a measure of internet traffic are called ______. multiple choice question.

Answers

Answer:

hits

Explanation:

Other Questions
Mention and explain skills required for the promotion of tradition and belief The phrase "...dancing away from her rage..." is an example of what figurative language?A.imagery B.symbolism C.Personification D.Metaphor A powerful motorcycle can accelerate from rest to 29.2 m/s in only 3.9 s. What is its average acceleration in meters per second squared? Court reporters must produce an accurate, word-for-word transcript of a trial. What is the modern way to dothat?O Writing notes by hand.O Using shorthandO Using a stenotype machine.O With audio recordings. In 2006, the number of federal hazardous waste sites in California was 3 less than twice the number of sites in Washington. How many hazardous waste sites were there in Washington if there were 19 such sites in California? Ch. 1. Problems 6, 7 & 96. The only swimmng pool at a motel is outdoors. It is 5.0 m wide and 12.0 m long. If the weeklyevaporation is 2.35 inches how many gallons of water must be added to the pool if it does not rain? If during the next week the pool still loses two. 35 inches of water to evaporation, even with 20 mm of rainfall, how many liters of water must be added? A client is being admitted for a total hip replacement. when is it necessary for the nurse to ensure that a medication reconciliation is completed? select all that apply. Helppppp plsssss!!!!!! What is one way that archaeologists influence the interpretation of history?by deciphering written recordsby evaluating genetic informationby supplying evidence about how people livedby establishing rules about how civilizations developed Which choice is a term in this expression? 3x 7(x + 4) What does the phrase ""no taxation without representation"" mean? is it still relevant today?. A scale that allows one to determine only if there is more, less, or an equal amount of the attribute in comparison to another observation is called a(n) _____ scale. Which interventions would the nurse perform while caring for an actively dying client? select all that apply. one, some, or all responses may be correct. Exercise 1 Underline each pronoun. In the blank, write int. if the pronoun is interrogative, rel. if it is relative, dem. if it is demonstrative, and ind. if it is indefinite. Many literary critics believe that Huckleberry Finn is the finest American novel. Exercise 1 Underline each pronoun. I myself will perform the leading role in the play. Two sets of solid double yellow lines that are two or more feet apart ______________. How to I do part (ii)? Exercise 1 Underline the correct pronoun.The most important subject for (their, them) was how to plant. Exercise 2 Circle the infinitives and infinitive phrases in each sentence below. Then change each infinitive to a gerund and write the gerund form on the line at the left. To sleep late is a treat for Don, who has a paper route. A person of weight 80 kg jumped off a platform of height 1 m and safely landed on their feet. what is the magnitude of the momentum change during the collision? give answer in si units.