1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Phoenix [80]
3 years ago
11

Wrtie down some containerization technology.

Computers and Technology
1 answer:
Rina8888 [55]3 years ago
5 0

Answer:

Some containerization technologies are listed as follows: Docker, Docker Enterprise, Amazon Elastic Container Service, Container Linux, Amazon's AWS, Microsoft's Azure Container, etc.

Explanation:

Containerization technology is a computer technology that packages software codes and their dependencies in isolated user spaces called containers so that the software can run uniformly and consistently on any infrastructure, using a shared operating system.  It is the modern alternative and companion to virtualization.  In simple terms, containerization is the process which packages an application with the required libraries, frameworks, and configuration files so that it can efficiently run in various computing environments.

You might be interested in
Which step is first in changing the proofing language of an entire document?
Genrish500 [490]
Select the whole document by pressing Ctrl+a.
7 0
3 years ago
Escribe dos diferencias entre las computadoras de la primera y la sexta generacion me pueden ayudar​
Hatshy [7]

Answer:

.N. Generación & Descripción

1

Primera Generación

El período de primera generación: 1946-1959. Base del tubo de vacío.

2

Segunda Generación

El período de la segunda generación: 1959-1965. Base del Transistor

3

Tercera generación

El período de tercera generación: 1965-1971. Circuito integrado de base.

4

Cuarta Generación

El período de cuarta generación: 1971-1980. Base del Microprocesador VLSI.

5

Quinta Generación

El período de la quinta generación: 1980 en adelante. Base del Microprocesador ULSI.

Explanation:

espero y esto te sirva de algo

3 0
3 years ago
When double quotes are used to assign values to string variables, the PHP interpreter must check the entire string to see if it
NikAS [45]

Answer:

Interpolation string.

Explanation:

The proces of adding the variable in middle the string.The interpolation  Replace the value of the Variable when the string data is processed .In the Interpolation process  the variable is permitted with string containing double quotes.In the interpolation string  the interpreter check the entirely string that  the variable in middle the string.

Following is the example of interpolation string in Php

$n1 = "RAM";

echo "hello $name"; // output

Output:

hello RAM

6 0
3 years ago
The Chief Information Officer (CIO) has determined the company’s new PKI will not use OCSP. The purpose of OCSP still needs to
Step2247 [10]

Answer:

B. Implement a key escrow.

Explanation:

A key escrow can be defined as a data security method of storing very essential cryptographic keys.

Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.

As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.

Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).

In this scenario, the Chief Information Officer (CIO) has determined the company's new public key infrastructure (PKI) will not use online certificate status protocol (OCSP). However, the purpose of online certificate status protocol (OCSP) still needs to be addressed. Thus, what should be implemented is a key escrow because the online certificate status protocol (OCSP) is an internet protocol used for maintaining the security of a server and obtaining a digital certificate that has been revoked.

8 0
2 years ago
Which is NOT an event associated with the beginning of the internet
sammy [17]

Answer:

when Gandhi was born he had nothing to do with the internet. nothing can connect Gandhi to the internet.

Explanation:

Gandhi was an Indian activist who was the leader of the Indian independence movement against British colonial rule. therefore, there is no connection.

8 0
3 years ago
Other questions:
  • System software falls into two categories: operating system software and ____ programs.â
    13·1 answer
  • Select the proper ergonomic keyboarding techniques.
    9·1 answer
  • The need to strike a<br>- among work, life, family, and other responsibilities is<br>universal.​
    15·1 answer
  • Which of the following lines of code is syntactically correct?
    14·1 answer
  • Kiara is using her software's graphic formats to create a line graph. As she
    13·2 answers
  • The conversion of decimal 0.0625 into its binary equivalent. Explain.
    7·1 answer
  • What is the Purpose and function of the Global Positioning System (GPS)?
    7·1 answer
  • An article explaining the uses of the parts of a computer​
    14·1 answer
  • The process of identifying and removing logical errors and runtime errors is called ..............
    5·2 answers
  • 10 sentences about computer parts.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!