1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kryger [21]
3 years ago
6

You are an IT network administrator at XYZ Limited. Your company has critical applications running of its Ubuntu Linux server. C

anonical, the company that owns and maintains Ubuntu just releases an update to patch a security vulnerability in the system.
Required:
What BEST action you should take?
Computers and Technology
1 answer:
Mnenie [13.5K]3 years ago
8 0

Answer:

Explanation:

I believe that the best course of action would be to divide the companies computers and run the critical applications on half of the systems while the other half update to the latest Ubuntu release. Once that half is done updating, you run the applications on the updated systems and update the other half of the systems. This will allow the company to continue its operations without any downtime, while also updating to the latest Ubuntu release on all systems and making sure that all systems do not have any security vulnerabilities due to outdated software.

You might be interested in
In this exercise, use the following variables : i,lo, hi, and result. Assume that lo and hi each are associated with an int and
Assoli18 [71]

Answer:

result = 0

i = lo

while i <= hi:

       result = result + i

       i += 1

Explanation:

Initialize the <em>result</em> as 0 to hold the summation value.

Since we are asked not to change the value of <em>lo</em> and <em>hi</em>, our loop control variable is <em>i</em> and initially it starts from <em>lo.</em>

Since we are asked to add the number from <em>lo</em> to <em>hi, </em>while loop condition checks it.

While the condition satisfies (during each iteration), the value of <em>i</em> is added to the result and the value of <em>i</em> is incremented by one.

7 0
3 years ago
Sabiendo que z1 = 10, z2 = 20, z3 =10 , z4 = 20, n1 = 1200 rpm.
romanna [79]

Answer:

a. engranaje 1 → engranaje 2 → engranaje 3 → engranaje 4

     z1 = 10            z2 = 20              z3 =10            z4 = 20

b. n2 = 600 rpm, n3 = 1200 rpm, n4 = 600 rpm

   la relacion de transmision = 2

Explanation:

where z1 = 10, z2 = 20, z3 = 10, z4 = 20

and n1 = 1200 rpm

n2 = n1 * z1/z2 = (1200 * 10)/ 20 = 600 rpm

n3 = n2 * z2/z3 = (600 * 20)/ 10 = 1200 rpm

n4 = n3 * z3/z4 = (1200 * 10)/ 20 = 600 rpm

la relacion de transmision = z2/z1 * z3/z2 * z4/z3

= 20/10 * 10/20 * 20/10 = 2 * 0.5 * 2 = 2

7 0
3 years ago
Who is the primary audience for demonstrations of game prototypes made by the developer?
padilas [110]

Answer:

the tester

Explanation:

When a video game is playable the first audience to test these prototypes are the tester, these people have to test all the game, and they have say all the information about errors, issues, bugs, and any difficulty to resolve these problems in a final video game's version, in this way the complete game arrives to the final audience.

5 0
3 years ago
When choosing a new computer to buy, you need to be aware of what operating _____ a0 it uses.
Alla [95]

System?

ddfdfdfdfdfdddddddddddddddddddddddddddddddddddd

8 0
3 years ago
What do you think of my profile picture
Gnom [1K]

ayo it's pretty sweet lma.o.

8 0
3 years ago
Read 2 more answers
Other questions:
  • Hard drives are usually self-contained, sealed devices. Why must the case for the hard drive remain sealed closed?
    8·1 answer
  • Gina works in an SDLC team. When Gina makes changes to a file, no one else is allowed to acess it. Which type of version control
    10·1 answer
  • Edie wants to visit her university's website. What software application should she use?
    9·2 answers
  • The Daily Trumpet newspaper accepts classified advertisements in 15 categories such as Apartments for Rent and Pets for Sale. De
    9·1 answer
  • According to the stage-gate process developed by Robert G. Cooper, _____ are the results of the previous stage and are the input
    15·1 answer
  • What is a command-line program?
    8·2 answers
  • List the operating system you recommend, and write a sentence explaining why.
    8·1 answer
  • Code Problem 3 in Python 2.
    5·1 answer
  • Explain information technology ?
    10·1 answer
  • What are the characteristics of calendar sharing options in Outlook 2016? Check all that apply.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!