___________ is the process of extracting the main features of a problem (and ignoring the details).

a. Problem abstraction
b. desk check
c. Problem specification
d. Program engineering
e. Implementation


a. Problem abstraction

Computer Science & Information Technology

You might also like to view...

Why is it impractical to use a virtual machine for a hard real-time system?

What will be an ideal response?

Computer Science & Information Technology

Provide steps to normalize timestamps in an apache log file.

Similar to what was done with the applicationX_in_epoch.log file, Apache log files can also be normal- ized. Follow the steps below to convert Unix Epoch to Human Readable timestamps. Consider the fol- lowing Apache log file, apache_in_epoch.log:

[analyst@secOps lab.support.files]$ cat apache_in_epoch.log
198.51.100.213 - - [1219071600] "GET /twiki/bin/edit/Main/Double_bounce_
sender?topicparent=Main.ConfigurationVariables HTTP/1.1" 401 12846
198.51.100.213 - - [1219158000] "GET /twiki/bin/rdiff/TWiki/NewUserTemplate?rev1=1.3
&rev2=1.2 HTTP/1.1" 200 4523
198.51.100.213 - - [1220799600] "GET /mailman/listinfo/hsdivision HTTP/1.1" 200 6291
198.51.100.213 - - [1220886000] "GET /twiki/bin/view/TWiki/WikiSyntax HTTP/1.1" 200
7352
198.51.100.213 - - [1220972400] "GET /twiki/bin/view/Main/DCCAndPostFix HTTP/1.1"
200 5253
198.51.100.213 - - [1221058800] "GET /twiki/bin/oops/TWiki/AppendixFileSystem?templa
te=oopsmore&m1=1.12&m2=1.12 HTTP/1.1" 200 11382

Computer Science & Information Technology

The term __________ expresses that we now have huge amounts of data available.

A. data warehouse B. data store C. big data D. large data

Computer Science & Information Technology

A(n) ____ can be used to address a computer uniquely and consists of the host name and the name of the domain.

A. IP address B. hostname C. domain name D. FQDN

Computer Science & Information Technology