Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix various typos in topics/certificates #10275

Merged
merged 1 commit into from
May 10, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Jump to
Jump to file
Failed to load files.
Diff view
Diff view
4 changes: 2 additions & 2 deletions certificates/aws-cloud-practitioner.md
Original file line number Diff line number Diff line change
Expand Up @@ -165,8 +165,8 @@ Read more about instance types [here](https://docs.aws.amazon.com/AWSEC2/latest/
<details>
<summary>True or False? The following are instance types available for a user in AWS:

* Compute optimizied
* Network optimizied
* Compute optimized
* Network optimized
* Web optimized</summary><br><b>

False. From the above list only compute optimized is available.
Expand Down
4 changes: 2 additions & 2 deletions certificates/aws-solutions-architect-associate.md
Original file line number Diff line number Diff line change
Expand Up @@ -188,8 +188,8 @@ Read more about instance types [here](https://docs.aws.amazon.com/AWSEC2/latest/
<details>
<summary>True or False? The following are instance types available for a user in AWS:

* Compute optimizied
* Network optimizied
* Compute optimized
* Network optimized
* Web optimized</summary><br><b>

False. From the above list only compute optimized is available.
Expand Down
2 changes: 1 addition & 1 deletion topics/aws/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -947,7 +947,7 @@ Launch configuration is a legacy form of Launch Template that must be recreated
In addition, launch template has the clear benefits of:
* Provision both On-Demand and Spot instances
* supporting multiple versions
* support creating parameters subsets (used for re-use and inheritance)
* support creating parameters subsets (used for reuse and inheritance)
</b></details>

#### ENI
Expand Down
2 changes: 1 addition & 1 deletion topics/kubernetes/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -2739,7 +2739,7 @@ Istio is an open source service mesh that helps organizations run distributed, m
<details>
<summary>Name two controllers you are familiar with</summary><br><b>

1. Node Contorller: manages the nodes of a cluster. Among other things, the controller is responsible for monitoring nodes' health - if the node is suddenly unreachable it will evacuate all the pods running on it and will mark the node status accordingly.
1. Node Controller: manages the nodes of a cluster. Among other things, the controller is responsible for monitoring nodes' health - if the node is suddenly unreachable it will evacuate all the pods running on it and will mark the node status accordingly.
2. Replication Controller - monitors the status of pod replicas based on what should be running. It makes sure the number of pods that should be running is actually running
</b></details>

Expand Down
2 changes: 1 addition & 1 deletion topics/linux/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -1649,7 +1649,7 @@ There are 2 configuration files, which stores users information
<details>
<summary>Which file stores users passwords? Is it visible for everyone?</summary><br>

`/etc/shadow` file holds the passwords of the users in encryted format. NO, it is only visible to the `root` user
`/etc/shadow` file holds the passwords of the users in encrypted format. NO, it is only visible to the `root` user
</details>

<details>
Expand Down
2 changes: 1 addition & 1 deletion topics/security/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -42,7 +42,7 @@ The principle of least privilege refers to the practice of providing minimal per
* Subject name
* Subject Public Key info

Every certificates must be signed by a trusted authority, a certificate chain is a concatenation of mutilple certificates signed by a more trusted authority from the one delivered by the website to the root Certificate Authority (CA). The root Certificate Authority is the top most trusted authority and every browsers embark their certificate natively.
Every certificates must be signed by a trusted authority, a certificate chain is a concatenation of multiple certificates signed by a more trusted authority from the one delivered by the website to the root Certificate Authority (CA). The root Certificate Authority is the top most trusted authority and every browsers embark their certificate natively.

</b></details>

Expand Down