1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
777dan777 [17]
3 years ago
5

According to shared security model, which two are a customer's responsibilities in Oracle Cloud Infrastructure (OCI)?

Computers and Technology
1 answer:
sashaice [31]3 years ago
8 0

Answer:

According to shared security model, a customer's responsibilities in Oracle Cloud Infrastructure (OCI) are:

1. Workloads security: The customer is responsible for protecting the work function or a distinct capacity, like a Hadoop node, a Web server, a database, or a container, that it puts on the cloud.

2. Services configuration:  The customer is also responsible for securing the specifications that describe the different aspects of its managed service.

Explanation:

Responsibilities are shared between Oracle and the customers using the Oracle Cloud Infrastructure (OCI).  Oracle is solely responsible for the security of the underlying cloud infrastructure (such as data-center facilities, hardware, and software systems), while the customer is responsible for securing the workloads and configuring their services to suit their individual needs.

You might be interested in
2 ways to assign a value to a variable
Art [367]
Assigning values at run time
Assigning values as command line argument, before execution of the program

4 0
3 years ago
By default, PowerPoint ends a slide show with a black slide. <br> a. True<br> b. False
Dmitry [639]
True . Because Press " ESC " To Exit Off Of Slide . 
5 0
4 years ago
Read 2 more answers
Write a program that asks the user to enter the amount that he or she has budgeted for a month. A loop should then prompt the us
Dominik [7]

Answer:

import java.util.*;

public class Main {

public static void main(String[] args)

{

Scanner scan = new Scanner();

double budget=0, num=0, total=0;

System.out.println("Your budget for the month? ");

budget=scan.nextDouble();

System.out.println("enter all expense, and after that type -9999 to quit: ");

while(num != -9999)

{

total+=num;

num=scan.nextDouble();

}

if(total<=budget)

{

System.out.println("under budget by ");

System.out.println(budget-total);

}

else

{

System.out.println("over budget by ");

System.out.println(total-budget);

}

}

}

Explanation:

  • Take the budget as an input from user and store it to the budget variable.
  • Loop until user has entered all his expenses and keep on adding them to the total variable.
  • Check If the total is less than or equal to budget or otherwise, and then print the relevant message accordingly.
4 0
4 years ago
Given the following code: public class Test { public static void main(String[] args) { Map map = new HashMap(); map.put("123", "
Phoenix [80]

Answer:

There are no statements in the question, so I explained the whole code.

Explanation:

A map consists of key - value pairs. The put method allows you to insert values in the map. The first parameter in the put method is the key, and the second one is the value. Also, the keys must be unique.

For example, map.put("123", "John Smith");   -> key = 123, value = John Smith

Even though the key 123 is set to John Smith at the beginning, it will have the updated value Steve Yao at the end. That is because the keys are unique.

Note that the key 222 also has Steve Yao for the value, that is totally acceptable.

5 0
3 years ago
Which of the following statements most accurately describes the strength of different types of accreditation?
tia_tia [17]

Answer:

C I believe but I'm not a hundred percent sure

8 0
3 years ago
Other questions:
  • A(n) ____ is a collection of one or more program statements combined to perform some action
    14·1 answer
  • Macy reviewed Steve's presentation. Images in the slides were distracting from the presentation. What advice should
    7·2 answers
  • which virtue you need to secure information by limiting computer access to authorized personnel only?
    10·1 answer
  • True or false questions:
    11·1 answer
  • Which statement is NOT CORRECT?
    11·1 answer
  • A __________ is typically stored in a JAR file and contains one or more packages that you want to make available to other projec
    15·1 answer
  • Explain the Decision making statement​
    15·1 answer
  • Write a method called removeHighPrice that will go through a provided ArrayList called prices and removes the first price that i
    6·1 answer
  • When importing data using the Get External Data tools on the Data tab, what wizard is automatically
    11·1 answer
  • Describe four traditional tehniques for collecting information during analysis.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!