in Education by

Master Slave and Sharding are examples of the _________ approach.

1 Answer

0 votes
by

Horizontal Scaling

Horizontal scaling is called as adding more machines into your pool of resources whereas Vertical scaling means that you scale by adding more power (CPU, RAM) to an existing machine.

Master Slave and Sharding are examples of the Horizontal Scaling approach

Related questions

0 votes
    Master Slave and Sharding are examples of the _________ approach. (1)Horizontal Scaling (2)Vertical Scaling (3)Hybrid Scaling...
asked Apr 22, 2021 in Technology by JackTerrance
0 votes
    In Master-Slave databases, all writes are written to the ____________. (1)Master (2)Replicated Slaves...
asked Apr 22, 2021 in Technology by JackTerrance
+1 vote
    In Master-Slave databases, all writes are written to the ____________....
asked Oct 11, 2020 in Education by anonymous
+1 vote
    In Master-Slave databases, all reads are performed against the ___________....
asked Oct 11, 2020 in Education by anonymous
0 votes
    _ is the number of sentinels that need to agree the fact that the master is not reachable and make a failover procedure promoting slave to master....
asked Apr 12, 2021 in Technology by JackTerrance
0 votes
    I want have a setup of redis where I write to master and read from slave, without any sentinel. I ... JavaScript Questions for Interview, JavaScript MCQ (Multiple Choice Questions)...
asked Apr 16, 2022 in Education by JackTerrance
0 votes
    Explain the master-slave architecture of Jenkins....
asked Oct 4, 2020 in Technology by Editorial Staff
0 votes
    _________ services are examples of anonymity services that conceal the location and usage of any user. a) Tor b) Encrypted router c) Firewall d) HTTPS...
asked Dec 29, 2020 in Technology by JackTerrance
0 votes
    _________ is an organized approach to addressing and managing the aftermath of a security breach ... remediation Incident Response Continous Detection Incident investigation...
asked Oct 25, 2020 in Technology by JackTerrance
0 votes
    _________ is the hacking approach where cyber-criminals design fake websites or pages for tricking or gaining additional traffic ... and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    In _________ approach, the code is analyzed for security vulnerabilities, while the application is run either manually or by an automated test. 1. RASP 2. IAST 3. SAST 4. DAST...
asked Oct 28, 2020 in Technology by JackTerrance
0 votes
    _________ approach aims to include security in each phase of the development cycle. 1. Shift Left security 2. Continuous Security 3. Shift Right Security 4.Consistent Security...
asked Oct 28, 2020 in Technology by JackTerrance
0 votes
    What is sharding in IoT?...
asked Jan 19, 2023 in Technology by JackTerrance
0 votes
    The scalability of the Key-Value database is achieved through Sharding. (1)True (2)False...
asked Apr 23, 2021 in Technology by JackTerrance
0 votes
    I have a Jenkins Slave (A Windows PC) which has the JAVA_HOME environment variable. I updated the Java ... Questions for Interview, JavaScript MCQ (Multiple Choice Questions)...
asked Feb 19, 2022 in Education by JackTerrance
...