___________ is the process of extracting the main features of a problem (and ignoring the details).
a. Problem abstraction
b. desk check
c. Problem specification
d. Program engineering
e. Implementation
a. Problem abstraction
You might also like to view...
Why is it impractical to use a virtual machine for a hard real-time system?
What will be an ideal response?
Provide steps to normalize timestamps in an apache log file.
Similar to what was done with the applicationX_in_epoch.log file, Apache log files can also be normal- ized. Follow the steps below to convert Unix Epoch to Human Readable timestamps. Consider the fol- lowing Apache log file, apache_in_epoch.log:
[analyst@secOps lab.support.files]$ cat apache_in_epoch.log 198.51.100.213 - - [1219071600] "GET /twiki/bin/edit/Main/Double_bounce_ sender?topicparent=Main.ConfigurationVariables HTTP/1.1" 401 12846 198.51.100.213 - - [1219158000] "GET /twiki/bin/rdiff/TWiki/NewUserTemplate?rev1=1.3 &rev2=1.2 HTTP/1.1" 200 4523 198.51.100.213 - - [1220799600] "GET /mailman/listinfo/hsdivision HTTP/1.1" 200 6291 198.51.100.213 - - [1220886000] "GET /twiki/bin/view/TWiki/WikiSyntax HTTP/1.1" 200 7352 198.51.100.213 - - [1220972400] "GET /twiki/bin/view/Main/DCCAndPostFix HTTP/1.1" 200 5253 198.51.100.213 - - [1221058800] "GET /twiki/bin/oops/TWiki/AppendixFileSystem?templa te=oopsmore&m1=1.12&m2=1.12 HTTP/1.1" 200 11382
The term __________ expresses that we now have huge amounts of data available.
A. data warehouse B. data store C. big data D. large data
A(n) ____ can be used to address a computer uniquely and consists of the host name and the name of the domain.
A. IP address B. hostname C. domain name D. FQDN