A company has a hybrid ASP.NET Web API application that is based on a software as a service (SaaS) offering.Users report general issues with the data. You advise the company to implement live monitoring and use ad hoc queries on stored JSON data. You also advise the company to set up smart alerting to detect anomalies in the data.You need to recommend a solution to set up smart alerting.What should you recommend?A. Azure Security Center and Azure Data Lake StoreB. Azure Data Lake Analytics and Azure Monitor LogsC. Azure Application Insights and Azure Monitor LogsD. Azure Site Recovery and Azure Monitor Logs

Answers

Answer 1

Answer: B. Azure Data Lake Analytics and Azure Monitor Logs

Explanation:

There is a feature on Azure Monitor called Application Insights. This feature offers clients the ability to implement live monitoring of applications as well as detect anomalies.

With its analytics tools, clients can diagnose the issues reported by users as well as follow and understand the activities of users.


Related Questions

What is computer virus?​

Answers

Answer:

A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.

Explanation:

A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. When this replication succeeds, the affected areas are then said to be "infected" with a computer virus.

Simply, a computer virus is a harmful multiplying code that harms your computer and makes it slower, harder to use, and more vulnerable to other harmful unsafe software, apps, downloads and more.

How to get it?

You can get computer viruses just from going to unsafe websites downloading harmful files downloading harmful images downloading harmful videos clicking unsafe advertisements

and thats just a couple of examples, there's many many more but you get the idea.

Something that really sucks about computer viruses is that its hard to tell if something online is dangerous or not.

That's why people make specific softwares to protect your computer but even those can be unsafe or people could be trying to trick you.

Sometimes the computer will already have some sort of app or software to protect it from these harmful files, but make sure to pay attention when your on websites and check the urls and make sure it doesn't say anything along the lines of "unsafe" if it says that just simply exit the website and dont do anything further.

If your experiencing slowness, files you don't remember saving on your computer or extra files and apps that dont seem to belong, im sure there are places you can call online or in your local area to help with these issues.

Hope this helped!!

Write a 200 word essay about how a computer is made.

Good luck.​

Answers

Answer:

Essay about how a computer is made is written below in detailed explanation.

Explanation:

After so many discoveries and inventions, Humans ultimately made the computer. And, today some personalities in the world can't exist a bit without a computer.

The computer is an electric device that is utilized for collecting and processing data. The hard work can be completed in a shorter time with the guidance of computers. With the assistance of the computer, we can do all the stuff in today's world.. Because of this, the computer performs a vital purpose in this contemporary life.

do you agree or disagree with the assertion that edutech transforms teachung and learning ​

Answers

Answer:I agree!

Explanation:

Agree

The challenge of preparing for ____________________ is in ensuring that employees do not feel that they are being prepared for termination.

Answers

Answer:

"Cross-training " seems to be the right response.

Explanation:

Cross-training seems to be the method of constructing a multi-professional workers staff with incentive plans to make sure that they must have the same tools to complete different occupational tasks throughout the organization. This will be a very broad approach besides randomized controlled training methods, both maximum and minimum frequency, for generations.

What is the last usable host IP address on the 192.168.32.9/30 network?

Answers

Answer:

192.168.32.10

Explanation:

HOPE THIS HELPS:)

Write a program that takes a String containing a text using the method signature

String useProperGrammar(String text)
Your method should replace the word ‘2’ with ‘to’ and return the updated text.

For example,

useProperGrammar("can you go 2 the store?")
should return

"can you go to the store?"
This method should also print out the number of grammatical errors that were fixed.

For example, for useProperGrammar("back 2 back 2 back"), the method would also print:

Fixed 2 grammatical errors:
In the main method, ask the user to input a String, and print the results of useProperGrammar using the user input.

Answers

import java.util.*;

public class MyClass {

   public static String useProperGrammar(String message){

       String newMessage = "";

       int count = 0;

       for (int i = 0; i < message.length(); i++){

           if(message.charAt(i) == '2'){

               newMessage = newMessage + "to";

               count ++;

           

           }

           else{

               newMessage = newMessage + message.charAt(i);

           }

       

       }

       System.out.println("Fixed "+count+" grammatical error(s):");

       return newMessage;

   }

   public static void main(String args[]) {

     Scanner scan = new Scanner(System.in);

     System.out.println("Enter a string: ");

     String text = scan.nextLine();

     System.out.println(useProperGrammar(text));

   }

}

I hope this helps.

If you wanted to divide an integer variable by 2, which of the following lines of code would you use? total = int + 2 total = int * N total int / 2 total = int. 2

Answers

Answer:

Yes

Explanation:

Because all answers are intotal (2)

Write a program that reads an integer and determines and prints whether it is odd or even.

Answers

num = int(input("Enter a number: "))

print(str(num)+" is even" if num % 2 == 0 else str(num)+" is odd")

I wrote my code in python 3.8. Best of luck.

Fill in the blanks, so the print statement displays the result of the function call in order.

1 # This function compares two numbers and returns them
2 # in increasing order.
3 - def order_numbers(number1, number2):
4. if number2 > number1:
5 return numberi, number2
6 else:
7 return number2, number1
8
9 Run # 1) Fill in the blanks so the print statement displays the result # of the function call
10 ---, --- = order_numbers(100, 99) print(smaller, bigger)

Answers

Answer:

Rep;ace the blank with

smaller, bigger

So, the complete line is:

smaller,bigger=order_numbers(100,99)

Explanation:

From the question, we understand that the program is to return the order of a number from least to highest

This has been well implemented in order_numbers function

Because the order function returns two values, the order_function must be called in order to accept two values and the syntax is:

value1,value2 = function(return-value1,return-value2)

In this case, the statement is:

smaller,bigger=order_numbers(100,99)

So, in the next line of the main, the values of smaller and bigger are printed:

print(smaller,bigger)

See attachment

The Chief Information Officer (CIO) has determined the company’s new PKI will not use OCSP. The purpose of OCSP still needs to be addressed. Which of the following should be implanted?A. Build an online intermediate CA.B. Implement a key escrow.C. Implement stapling.D. Install a CRL.

Answers

Answer:

B. Implement a key escrow.

Explanation:

A key escrow can be defined as a data security method of storing very essential cryptographic keys.

Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.

As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.

Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).

In this scenario, the Chief Information Officer (CIO) has determined the company's new public key infrastructure (PKI) will not use online certificate status protocol (OCSP). However, the purpose of online certificate status protocol (OCSP) still needs to be addressed. Thus, what should be implemented is a key escrow because the online certificate status protocol (OCSP) is an internet protocol used for maintaining the security of a server and obtaining a digital certificate that has been revoked.

A certain instructor assigns a 50-point problem and calculates an integer score 0-50 and assigns a letter grade according to the scale 40 - 50 is an A, 30 - 39 is a B, 20 - 29 is a C, 10 - 19 is a D and 0 - 9 is an F. Write a Python function called letter_grade which takes one argument, an integer, and RETURNS the appropriate letter grade.

Answers

Answer:

Following are the code to this question:

def letter_grade(x): #defining a method letter_grade that accepts one parameter

   if x>=50 and x<=40:#defining if block that check value of x greater than 50 and less than 40

       print("A")#print value

   if x>=30 and x<=39:#defining if block that check value of x greater than 30 and less than 39

       print("B")#print value

   if x>=20 and x<=29:#defining if block that check value of x greater than 20 and less than 29

       print("C")#print value

   if x>=10 and x<=19:#defining if block that check value of x greater than 10 and less than 19

       print("D")#print value

   if x>=0 and x<=9:#defining if block that check value of x greater than 0 and less than 9

       print("F")#print value

letter_grade(30) #calling the method letter_grade

Output:

B

Explanation:

In the above Python code, a method "letter_grade" is declared, that accepts an integer variable in its parameter, and defined the multiple if block to check the given value, which can be defined as follows:

In the first, if block, it checks the value of x greater than 50 and less than 40 , if the condition is true it will print the value "A".In the second, if block, it checks the value of x greater than 30 and less than 39,  if the condition is true it will print the value "B".In the third, if block, it checks the value of x greater than 20 and less than 29,  if the condition is true it will print the value "C".  In the fourth, if block, it checks the value of x greater than 10 and less than 19,  if the condition is true it will print the value "D".In the fifth, if block, it checks the value of x greater than 0 and less than 9,  if the condition is true it will print the value "F".

And at the last it call the method.

which data representation system is based on the digits 0-9 and is mostly easily interpreted In real wrold situations​

Answers

Answer:

Hexadecimal  data representation system is based on the digits 0-9 and is mostly easily interpreted In real word situations​ .

Explanation:

Hexadecimal manages sixteen different figures: most often the numbers 0–9 to describe values zero to nine, and (A–F) to describe values ten to fifteen. The modern hexadecimal system was first launched into the domain of computing by IBM in 1963. An older description, with 0-9 and u-z, was practiced in 1956 by the Bendix G-15 computer.

PLZ HELP THIS ENDS TODAY
During slide show mode, hitting the B key will do which of these?

End your presentation

Blank the screen with black screen

Move back one page

Move to the first page of your presentation

Answers

Answer:

B or Period. Pressing the B key or period key pauses the slideshow and displays a black screen, which you can write on. Press the B or period key again to resume the slideshow.

Answer: It blanks the screen black.

You should use the arrow keys.

Explanation:

I tried it.

Which interpersonal skill is the most important for a telecom technician to develop?

active listening

teamwork

conflict resolution

social awareness

Answers

Answer:

active listening is interpersonal

Answer:

active listening

Explanation:

edg2021

telecom technicians go to homes and officies to listen to the consumers demands to fix their internet and other telecommmunication issues. They mostly work alone and simply need to be aware of the issue and what they are doing to fix it.

Which of the following options allow you to access a computer remotely?

a. NTP
b. SSH
c. Server
d. VPN

Answers

Answer:

b. SSH

Explanation:

Secure Shell (SSH) is a protocol that allows you to access a computer remotely by providing safe network communications via an unsecured network.

Secure Shell (SSH) protocol can be used to perform essential functions such as protected file transfers, remote access to private network systems, devices, and applications.

Thus, option "B" is the right answer.

Your organization uses a federated identity provider to login to your Oracle Cloud Infrastructure (OCI) environment. As a developer, you are writing a script to automate some operation and want to use OCI CLI to do that. Your security team doesn't allow storing private keys on local machines. How can you authenticate with OCI CLI?

Answers

Answer:

Run OCI session authenticate and provide your credentials

Explanation:

The OCI CLI when in combination with a shell script can be fastly used in the creation of shareable scripts. It uses API keys, private and public scheme as it's default authentication. The command to use is the oci set up keys, to create these keys. Since you cannot store private keys, you run OCI authentication and then you give your credentials

A software is made from​

Answers

Answer:

Two or more languages are used for making one particular software.

Several key people were involved in programming-language development in the 1970s and 1980s

Answers

Answer:

Brian Kernighan and Dennis Ritchie created the C programming language, and Bjarne Stroustrup took it to the next level by creating C++ in the 80's.

Answer:

Bjarne Stroustrup released C++ programming language in the1980s.

Bill Gates and Paul Allen released the first programming language for a personal computer.

Niklaus Wirth developed Pascal to teach programming.

Explanation:

1,3,4

_______and ________ enables computers to communicate and it can pass information between two networks.

Answers

Answer:

Internet Protocol and Transmission Control Protocol        

Explanation:

Internet protocol, which is also known as IP and Transmission Control Protocol, which is also known as TCP are the two important protocols that enables the computers to communicate various information and data and allow it to pass between two networks. It allows computers to connect to each other.  They are developed by Bob Kahn and Vint Cerf.

Application software helps run the computer and coordinates instructions with the hardware.
A. True
B. False

Answers

Answer:

A. True

Explanation:

Ship, CruiseShip, and CargoShip ClassesDesign a Ship class that has the following members:a. a member variable for the name of the ship (a string)b. a member variable for the year that the ship was built (a string)c. A constructor and appropriate accessors and mutatorsd. A virtual print function that displays the ship's name and the year it was built.

Answers

Answer:

def shipvari(ship);

Cruiseship="" #defining a string

YearBuilt= ""

for i in range(ship);

if Cruiseship="";

print(CruiseShip)

Give the rest a try!

Suppose a webpage contains a single text field. We want to make the page such that a user can immediately start typing in the text field without clicking on it. What is correct way using?
1. .
2. .
3. .
4. Can't be done with only HTML5, need help of Javascript or something else.

Answers

Answer:

The answer is "Option 2".

Explanation:

In HTML5, text inputs use an autofocus attribute, which, when the page is loaded, uses a template to concentrate primarily on text fields. This attribute is a Boolean property that represents the HTML autofocus attribute, showing if the related <select> element will receive an output focus whenever the page loads if it is overruled by the user. An only form-associated entity can have this property specified in a text.

3. A year contains 365 days normally, so on
what number day does Christmas fall on?

Answers

Answer:

359 is December 25 in a 365 day year.

Explanation:

Answer:

For western christian churches, Christmas day always occurs on December 25, though some cultures observe the main celebration on the night prior, Christmas Eve.

Evaluate a career in the telecommunications industry that most interests you. What about the career appeals to you?
What qualifications do you already possess to make you successful in this career? Which skills do you still need to
develop to pursue this career?
Your answer should be at least 150 words in length.

Answers

Answer:

Network administrator and programmer.

Am still in A-level, am doing Physics, chemistry, Maths and ICT.

I have an A in physics, B in Chemistry and Maths and A† in ICT

The five types of personal computers are: desktops, laptops, tablets, smartphones, and ________.
a) microcomputers.
b) wearables.
c) macrocomputers.
d) midranges.

Answers

Answer:

B. Wearables.

Explanation:

These are tagged to be a category now in the technology as they are seen to make up the fifth type of personal computers in the question above. These are seen to be attached on the body or sometimes embedded to our outfit and also in other cases hung on a part of our body. They are counted to range from fitness trackers to smart watches, headsets etc. They are said to posses microprocessors which aid their functional ability through its use of the internet.

Answer:

Explanation:

B. Wearables.

Explanation:

These are tagged to be a category now in the technology as they are seen to make up the fifth type of personal computers in the question above. These are seen to be attached on the body or sometimes embedded to our outfit and also in other cases hung on a part of our body. They are counted to range from fitness trackers to smart watches, headsets etc. They are said to posses microprocessors which aid their functional ability through its use of the internet.

Anna is creating a digital portfolio, including her professional work showcasing the designs she created. What should she add to each work?

A. brief description of the work and project details
B. only title of the work
C. only date and title of the work
D. only project details of the work

Answers

A. Brief description of the work and project details.

As a sysadmin you will find yourself doing business with a variety of third party vendors which of these are likely to be rented or bought from a vendors

Answers

Answer:

Printing devices

Video, Audio devices

Communication machines

Explanation:

Printing devices - Sysadmin needs this type of devices for print important data and information.

Video, Audio devices - Sysadmin needs this type of devices for better communication and interaction.

Communication(fax) machines - Sysadmin needs this type of devices for written communication and interaction and deals.

A business owns a printer but the printer is used for cloud printing purposes. What type of resource is this?

Answers

I’m confused , what are the choices ?

A group of students is performing an investigation to measure how much liquid water is produced from a 10 L sample of snow. What must occur in order for the students to perform this investigation?

Answers

Answer:

the temperature of the sample must change

Explanation:

Sara would like to begin creating macros in Excel 2016. Where can she find the ability to launch the Macro dialog box?

Insert tab in the Macros group
Formulas tab in the Macros group
Developer tab in the Code group
Developer tab in the Add-ins group

Answers

Answer:

C) Developer tab in the Code group

Explanation:

Other Questions
which American woman has spent more hours in space than any other?1. Shannon Lucid 2. Geraldyn Cobb 3. Jeane Kirkpatrick 4. Wilma Mankiller please answer someone!! I need this asap!!!This is in similarity! I need to find the lengths marked by the letter Calculate the federal income taxes. In 1980, the federal income tax was 14 percent on incomes between $2,300 and $3,400 per year, 16 percenton incomes between $3,400 and $4,400 per year, and 21 percent on incomes between $8,500 and 10,800 per year. In 1980, you made $3,000.What was your income tax this year?O $42.00O $420$480$630 Read the excerpt from "The Gift of the Magi" by O. Henry. What is the tone of the opening passage?One dollar and eighty-seven cents. That was all. And sixty cents of it was in pennies. Pennies saved one and two at a time by bulldozing the grocer and the vegetable man and the butcher until one's cheeks burned with the silent imputation of parsimony that such close dealing implied. Three times Della counted it. One dollar and eighty- seven cents. And the next day would be Christmas.There was clearly nothing to do but flop down on the shabby little couch and howl. So Della did it. Which instigates the moral reflection that life is made up of sobs, sniffles, and smiles, with sniffles predominating.While the mistress of the home is gradually subsiding from the first stage to the second, take a look at the home. A furnished flat at $8 per week. It did not exactly beggar description, but it certainly had that word on the lookout for the mendicancy squad.In the vestibule below was a letter-box into which no letter would go, and an electric button from which no mortal finger could coax a ring. Also appertaining thereunto was a card bearing the name "Mr. James Dillingham Young."The "Dillingham" had been flung to the breeze during a former period of prosperity when its possessor was being paid $30 per week. Now, when the income was shrunk to $20, though, they were thinking seriously of contracting to a modest and unassuming D. But whenever Mr. James Dillingham Young came home and reached his flat above he was called "Jim" and greatly hugged by Mrs. James Dillingham Young, already introduced to you as Della. Which is all very good.A. dissatisfiedB. humorousC. sarcasticD. unhappy PLSSS HELPMr. and Mrs. Smith go to the doctor to see if there is a possibility that any future children they have will be born with a genetic disease. This is an example of the use of which of the following? "Oh, good, you're all here," said Pola as she walked into the community theater. She began handing out copies of her script to the assembled actors. "This is a lot to memorize," remarked Gerhardt, flipping through the pages. "Neville, your character's name is Rhombus Fairchild. Boy, I bet he was picked on as a kid." "You're Aceswhat kind of title is that?" Neville asked. "The play takes place in the 1920s, Neville," replied Pola irritably. "People used catchphrases like that back then. It means 'You're the best.' " "If the play takes place in the past, why are the main characters fighting giant evil robots in the third act?" asked Nadezhda. Gerhardt and Neville gasped in surprise and started reading the script with renewed interest. "Cool! I get to fire a laser gun," bragged Neville. "Oh, man!" Gerhardt groaned. "My character gets killed at the end of Act III. Death scenes are the worst." "Quit complaining, everyone," exclaimed Pola. "I had to write this by myself in two days while working a full-time job. It may not be Shakespeare, but it's good enough for community theater. I think we should just do the best we can with what we've got." "That's a terrible attitude," Nadezhda said. "The proceeds from this play will be donated to charity, and I think we should try our hardest to give people their money's worth. Why don't we all work together to write a new script?" "Fine!" Pola yelled. "I'll let you guys take over the play, and I'll save my efforts for people with better taste in entertainment." The three actors watched in amazement as Pola stomped out of the theater. "Whoops," said Nadezhda with an embarrassed smile. "I forgot that she hates for anyone to question her talent as a writer." "I'm just sad I won't get to wear a jet pack and use phrases like 'You're the bees' knees,' " Neville laughed. "I thought doing a death scene was bad," said Gerhardt. "If we don't get a script put together by tonight, we'll all be in serious trouble." Nadezhda grabbed a notebook from her purse. "This will be a snap," she said confidently. "What's a good topic for a play?" "I know!" declared Gerhardt. "Neville and I will be lawmen sent from the future who try to stop a giant monster from destroying Dubuque, Iowa." "Well, it is original," Nadezhda replied slowly. "But how would we create a giant monster on our $10 prop budget?" "Good point," admitted Gerhardt. "Here's an idea," said Neville. "What if Gerhardt and I play Elvis and Abraham Lincoln, who have been brought back to life by scientists. We use our skills to defend the president, played by Nadezhda, from the cast of the musical Cats, who have been turned into vicious zombies." Neville's voice trailed off as he realized that both Nadezhda and Gerhardt were staring at him with their mouths open. "That's very ambitious," Nadezhda finally said. "I think it would be a little difficult for three people to perform onstage, though." "You're probably right," said Neville. "I hate to say it, but our ideas are terrible," Gerhardt remarked. "What are we going to do?" The three actors dashed off the stage and hurried outside. "She's over by her car!" exclaimed Nadezhda. "Let's go get her. I'm not too proud to beg; are you guys?" "No way," replied Gerhardt. "As far as I'm concerned, death scenes are the bees' knees." 8. Which of the following contributes to the conflict in the passage? A. Pola's sensitivity about her writing skillsB. Neville's ambition to become the lead actor C. Nadezhda's jealousy over Pola's talentD. Gerhardt's lack of talent as an actor 9. Which of the following best explains the primary conflict in the passage? A. Three actors collaborate with a script writer to produce a play that will earn enough money to support a charity.B. Three actors struggle to pursue their childhood dream of becoming script writers for a community theater.C. After offending the script writer, three actors struggle to produce a new script in time for their first performance.D. After treating a script writer with disrespect, three actors find out that they have been fired from the community theater.10. What causes Pola to feel upset in the passage? A. She is unable to think of a new topic for the play.B. She doesn't get to participate in the play as an actress. C. She believes that her hard work is unappreciated. D. She is jealous of Nadezhda's talent as a writer. please help with this question i have 1 hour to finish this test Below is a punnett square showing a yellow lab with the genotype BBee being bred with a black labwith the genotype BbEe. Fill in the missing data in the header rows.please help Find the length of AC As result of increased immigration, northern cities became Indirect characterization requires readers to _____what a character is like.A. inferB. retellC. explainD. question A researcher wishes to determine whether the rate of water flow (in liters per second) over an experimental soil bed can be used to predict the amount of soil washed away (in kilograms). In this study, the explanatory variable is theA. amount of eroded soil.B. rate of water flow.C. depth of the soil bed.D. size of the soil bed.E. None of the above. If using the 3rd edition of the textbook, please contact your teacher to bypass this assignment. (2nd edition: Answer questions 15 on p. 269 of The Language of Composition.) PLEASE HELPPPPP!!!!!!!!!!!! Enter the sum in simplest form. pls answer I give brainliest Please help! I will give brainliest (or however you spell it) to whoever gives me the answer! Which of the following ratios are equivalent to 124:20? plsss anwer right asap plss im wasted all my points !!!!!!!!!!!!:( Write the equation of the line fully simplified slope intercept form Hey! Is there anyone that can be super nice and help me please? which aspect of writing helps create an authors tone