in Technology by

Master Slave and Sharding are examples of the _________ approach.

(1)Horizontal Scaling

(2)Vertical Scaling

(3)Hybrid Scaling

1 Answer

0 votes
by
Answer:-(1)Horizontal Scaling

Related questions

0 votes
    Master Slave and Sharding are examples of the _________ approach....
asked Oct 11, 2020 in Education by anonymous
0 votes
    In Master-Slave databases, all writes are written to the ____________. (1)Master (2)Replicated Slaves...
asked Apr 22, 2021 in Technology by JackTerrance
+1 vote
    In Master-Slave databases, all writes are written to the ____________....
asked Oct 11, 2020 in Education by anonymous
+1 vote
    In Master-Slave databases, all reads are performed against the ___________....
asked Oct 11, 2020 in Education by anonymous
0 votes
    _ is the number of sentinels that need to agree the fact that the master is not reachable and make a failover procedure promoting slave to master....
asked Apr 12, 2021 in Technology by JackTerrance
0 votes
    Explain the master-slave architecture of Jenkins....
asked Oct 4, 2020 in Technology by Editorial Staff
0 votes
    I want have a setup of redis where I write to master and read from slave, without any sentinel. I ... JavaScript Questions for Interview, JavaScript MCQ (Multiple Choice Questions)...
asked Apr 16, 2022 in Education by JackTerrance
0 votes
    _________ services are examples of anonymity services that conceal the location and usage of any user. a) Tor b) Encrypted router c) Firewall d) HTTPS...
asked Dec 29, 2020 in Technology by JackTerrance
0 votes
    _________ is an organized approach to addressing and managing the aftermath of a security breach ... remediation Incident Response Continous Detection Incident investigation...
asked Oct 25, 2020 in Technology by JackTerrance
0 votes
    In _________ approach, the code is analyzed for security vulnerabilities, while the application is run either manually or by an automated test. 1. RASP 2. IAST 3. SAST 4. DAST...
asked Oct 28, 2020 in Technology by JackTerrance
0 votes
    _________ approach aims to include security in each phase of the development cycle. 1. Shift Left security 2. Continuous Security 3. Shift Right Security 4.Consistent Security...
asked Oct 28, 2020 in Technology by JackTerrance
0 votes
    What is sharding in IoT?...
asked Jan 19, 2023 in Technology by JackTerrance
0 votes
    The scalability of the Key-Value database is achieved through Sharding. (1)True (2)False...
asked Apr 23, 2021 in Technology by JackTerrance
0 votes
    I have a Jenkins Slave (A Windows PC) which has the JAVA_HOME environment variable. I updated the Java ... Questions for Interview, JavaScript MCQ (Multiple Choice Questions)...
asked Feb 19, 2022 in Education by JackTerrance
...