1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
777dan777 [17]
3 years ago
5

According to shared security model, which two are a customer's responsibilities in Oracle Cloud Infrastructure (OCI)?

Computers and Technology
1 answer:
sashaice [31]3 years ago
8 0

Answer:

According to shared security model, a customer's responsibilities in Oracle Cloud Infrastructure (OCI) are:

1. Workloads security: The customer is responsible for protecting the work function or a distinct capacity, like a Hadoop node, a Web server, a database, or a container, that it puts on the cloud.

2. Services configuration:  The customer is also responsible for securing the specifications that describe the different aspects of its managed service.

Explanation:

Responsibilities are shared between Oracle and the customers using the Oracle Cloud Infrastructure (OCI).  Oracle is solely responsible for the security of the underlying cloud infrastructure (such as data-center facilities, hardware, and software systems), while the customer is responsible for securing the workloads and configuring their services to suit their individual needs.

You might be interested in
What are the two most popular applications of theInternet?
fiasKO [112]

Answer:

1) Electronic mailing

2) Web browsing

Explanation:

Electronic mail: For hundreds of millions of individuals, e-mail has become an significant component of private communications, many of whom have substituted it with letters or phone calls. E-mail has become an significant advertising medium in company, especially in cases where time-sensitive demand for products and services.Tickets for an upcoming sporting event, for instance, are sold by sending fans an e-mail message with ticket availability data and prices.

Web browsing: The web browsing is another critically important Internet application. The world of internet is filled with the immense of knowledge, subjects, and solutions. The user browse the internet to look out for the related queries, researches and lot other things.

8 0
3 years ago
About n processes are time-sharing the CPU, each requiring T ms of CPU time to complete. The context switching overhead is S ms.
Genrish500 [490]

Answer:

(a) Q = (M-(1-n)S)/n

(b)    

When M = 450,

       Q = 82

       % CPU time wasted = 8.889%

When M = 90,

       Q = 10

       % CPU time wasted = 44.44%

When M = 50,

       Q = 2

       % CPU time wasted = 80%

Explanation:

Given  Data:

n = process

T = ms time

Context switch time overhead = S

and M is total overhead

See attached file for the calculation.

8 0
3 years ago
Which of the following statements is FALSE?
irina1246 [14]

Answer:

d. Should be lower case?

7 0
3 years ago
You don't have policies that force settings for the look of users' computer desktops. Each user's chosen desktop settings are ap
tiny-mole [99]

Answer:

Option b is correct

Explanation:

For example, setting user config. Per user on a Microsoft computer

Go to config. Setting in the group management policy

Locate admin template, click group policy and enable the loop back policy.

This policy helps the computer to use set of GPO for users who log on to computers affected by this policy and this application is supported only in environment with active directory.

8 0
3 years ago
Read 2 more answers
Given the strings s1 and s2 that are of the same length, create a new string consisting of the first character of s1 followed by
LiRa [457]

Answer:

s1='abc'

s2='wxyz'

length=len(s1)

s3=''

for i in range(length):

   s3+=s1[i]+s2[i]

print(s3)

3 0
4 years ago
Other questions:
  • A patent facilitates a government-approved technological monopoly by
    5·1 answer
  • A Narrative Statement illustrates how your life will look when you reach a goal.
    15·2 answers
  • Suppose the information content of a packet is the bit pattern 1110 0110 1001 1101 and an even parity scheme is being used. What
    15·1 answer
  • I need someone who knows HTML to finish the code.
    12·2 answers
  • Write a program that asks the user to enter a student's name and 8 numeric tests scores (out of 100 for each test). The name wil
    13·1 answer
  • Given n ropes of different lengths, we need to connect these ropes into one rope. We can connect only 2 ropes at a time. The cos
    9·1 answer
  • What is TSM Hamlinz’s discord
    6·2 answers
  • What blockchain implementation resulted from bitcoin’s rejection of a recommendation to enhance its scripting language support?
    9·1 answer
  • (Reverse number) Write a program that prompts the user to enter a four-digit inte- ger and displays the number in reverse order.
    9·1 answer
  • Which of the following uses the proper syntax for creating an HTML comment?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!