From 9318b9bd686dc86d2e6d6530178764e58b9bcbe0 Mon Sep 17 00:00:00 2001 From: Chris Schindlbeck Date: Fri, 10 May 2024 13:33:30 +0200 Subject: [PATCH] Fix various typos in topics/certificates (#10275) --- certificates/aws-cloud-practitioner.md | 4 ++-- certificates/aws-solutions-architect-associate.md | 4 ++-- topics/aws/README.md | 2 +- topics/kubernetes/README.md | 2 +- topics/linux/README.md | 2 +- topics/security/README.md | 2 +- 6 files changed, 8 insertions(+), 8 deletions(-) diff --git a/certificates/aws-cloud-practitioner.md b/certificates/aws-cloud-practitioner.md index b98bf25..7e72b63 100644 --- a/certificates/aws-cloud-practitioner.md +++ b/certificates/aws-cloud-practitioner.md @@ -165,8 +165,8 @@ Read more about instance types [here](https://docs.aws.amazon.com/AWSEC2/latest/
True or False? The following are instance types available for a user in AWS: - * Compute optimizied - * Network optimizied + * Compute optimized + * Network optimized * Web optimized
False. From the above list only compute optimized is available. diff --git a/certificates/aws-solutions-architect-associate.md b/certificates/aws-solutions-architect-associate.md index 2ee9bb3..044a749 100644 --- a/certificates/aws-solutions-architect-associate.md +++ b/certificates/aws-solutions-architect-associate.md @@ -188,8 +188,8 @@ Read more about instance types [here](https://docs.aws.amazon.com/AWSEC2/latest/
True or False? The following are instance types available for a user in AWS: - * Compute optimizied - * Network optimizied + * Compute optimized + * Network optimized * Web optimized
False. From the above list only compute optimized is available. diff --git a/topics/aws/README.md b/topics/aws/README.md index 49cbd68..c17d493 100644 --- a/topics/aws/README.md +++ b/topics/aws/README.md @@ -947,7 +947,7 @@ Launch configuration is a legacy form of Launch Template that must be recreated In addition, launch template has the clear benefits of: * Provision both On-Demand and Spot instances * supporting multiple versions - * support creating parameters subsets (used for re-use and inheritance) + * support creating parameters subsets (used for reuse and inheritance)
#### ENI diff --git a/topics/kubernetes/README.md b/topics/kubernetes/README.md index 982a13f..6a40432 100644 --- a/topics/kubernetes/README.md +++ b/topics/kubernetes/README.md @@ -2739,7 +2739,7 @@ Istio is an open source service mesh that helps organizations run distributed, m
Name two controllers you are familiar with
-1. Node Contorller: manages the nodes of a cluster. Among other things, the controller is responsible for monitoring nodes' health - if the node is suddenly unreachable it will evacuate all the pods running on it and will mark the node status accordingly. +1. Node Controller: manages the nodes of a cluster. Among other things, the controller is responsible for monitoring nodes' health - if the node is suddenly unreachable it will evacuate all the pods running on it and will mark the node status accordingly. 2. Replication Controller - monitors the status of pod replicas based on what should be running. It makes sure the number of pods that should be running is actually running
diff --git a/topics/linux/README.md b/topics/linux/README.md index 80a750c..92e3cac 100644 --- a/topics/linux/README.md +++ b/topics/linux/README.md @@ -1649,7 +1649,7 @@ There are 2 configuration files, which stores users information
Which file stores users passwords? Is it visible for everyone?
-`/etc/shadow` file holds the passwords of the users in encryted format. NO, it is only visible to the `root` user +`/etc/shadow` file holds the passwords of the users in encrypted format. NO, it is only visible to the `root` user
diff --git a/topics/security/README.md b/topics/security/README.md index 8bb4973..a4eb9fb 100644 --- a/topics/security/README.md +++ b/topics/security/README.md @@ -42,7 +42,7 @@ The principle of least privilege refers to the practice of providing minimal per * Subject name * Subject Public Key info -Every certificates must be signed by a trusted authority, a certificate chain is a concatenation of mutilple certificates signed by a more trusted authority from the one delivered by the website to the root Certificate Authority (CA). The root Certificate Authority is the top most trusted authority and every browsers embark their certificate natively. +Every certificates must be signed by a trusted authority, a certificate chain is a concatenation of multiple certificates signed by a more trusted authority from the one delivered by the website to the root Certificate Authority (CA). The root Certificate Authority is the top most trusted authority and every browsers embark their certificate natively.