T Flashcards

1
Q

table

A

A collection of data. Similar to other database systems, DynamoDB stores data in tables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

tag

A

Metadata that you can define and assign to AWS resources, such as an EC2 instance. Not all AWS resources can be tagged.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

tagging

A

Tagging resources: Applying a tag to an AWS resource.

Amazon SES: Also called labeling. A way to format return path email addresses so that you can specify a different return path for each recipient of a message. Tagging enables you to support VERP. For example, if Andrew manages a mailing list, he can use the return paths andrew+recipient1@example.net and andrew+recipient2@example.net so that he can determine which email bounced.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

target attribute

A

Amazon Machine Learning (Amazon ML ): The attribute in the input data that contains the “correct” answers. Amazon ML uses the target attribute to learn how to make predictions on new data. For example, if you were building a model for predicting the sale price of a house, the target attribute would be “target sale price in USD.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

target revision

A

AWS CodeDeploy: The most recent version of the application revision that has been uploaded to the repository and will be deployed to the instances in a deployment group. In other words, the application revision currently targeted for deployment. This is also the revision that will be pulled for automatic deployments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

task

A

An instantiation of a task definition that is running on a container instance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

task definition

A

The blueprint for your task. Specifies the name of the task, revisions, container definitions, and volume information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

task node

A

An EC2 instance that runs Hadoop map and reduce tasks, but does not store data. Task nodes are managed by the master node, which assigns Hadoop tasks to nodes and monitors their status. While a job flow is running you can increase and decrease the number of task nodes. Because they don’t store data and can be added and removed from a job flow, you can use task nodes to manage the EC2 instance capacity your job flow uses, increasing capacity to handle peak loads and decreasing it later.

Task nodes only run a TaskTracker Hadoop daemon.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

tebibyte

A

(TiB)

A contraction of tera binary byte, a tebibyte is 2^40 or 1,099,511,627,776 bytes. A terabyte (TB) is 10^12 or 1,000,000,000,000 bytes. 1,024 TiB is a pebibyte.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

template format version

A

The version of an AWS CloudFormation template design that determines the available features. If you omit the AWSTemplateFormatVersion section from your template, AWS CloudFormation assumes the most recent format version.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

template validation

A

The process of confirming the use of JSON code in an AWS CloudFormation template. You can validate any AWS CloudFormation template using the cfn-validate-template command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

temporary security credentials

A

Authentication information that is provided by AWS STS when you call an STS API action. Includes an access key ID, a secret access key, a session token, and an expiration time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

throttling

A

The automatic restricting or slowing down of a process based on one or more limits. Examples: Amazon Kinesis Data Streams throttles operations if an application (or group of applications operating on the same stream) attempts to get data from a shard at a rate faster than the shard limit. Amazon API Gateway uses throttling to limit the steady-state request rates for a single account. Amazon SES uses throttling to reject attempts to send email that exceeds the sending limits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

time series data

A

Data provided as part of a metric. The time value is assumed to be when the value occurred. A metric is the fundamental concept for Amazon CloudWatch and represents a time-ordered set of data points. You publish metric data points into CloudWatch and later retrieve statistics about those data points as a time-series ordered data set.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

time stamp

A

A date/time string in ISO 8601 format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

TLS

A

See Transport Layer Security.

17
Q

tokenization

A

The process of splitting a stream of text into separate tokens on detectable boundaries such as whitespace and hyphens.

18
Q

topic

A

A communication channel to send messages and subscribe to notifications. It provides an access point for publishers and subscribers to communicate with each other.

19
Q

training datasource

A

A datasource that contains the data that Amazon Machine Learning uses to train the machine learning model to make predictions.

20
Q

transition

A

AWS CodePipeline: The act of a revision in a pipeline continuing from one stage to the next in a workflow.

21
Q

Transport Layer Security

A

(TLS)

A cryptographic protocol that provides security for communication over the internet. Its predecessor is Secure Sockets Layer (SSL).

22
Q

trust policy

A

An IAM policy that is an inherent part of an IAM role. The trust policy specifies which principals are allowed to use the role.

23
Q

trusted signers

A

AWS accounts that the CloudFront distribution owner has given permission to create signed URLs for a distribution’s content.

24
Q

tuning

A

Selecting the number and type of AMIs to run a Hadoop job flow most efficiently.

25
Q

tunnel

A

A route for transmission of private network traffic that uses the internet to connect nodes in the private network. The tunnel uses encryption and secure protocols such as PPTP to prevent the traffic from being intercepted as it passes through public routing nodes.