Viewing each layer of abstraction as an independent black box is useful because it allows you to work with the layers __________.

a. one at a time
b. in sets of two or more
c. interactively
d. The premise of this question is false.


a. one at a time

Computer Science & Information Technology

You might also like to view...

Redefining a member function is the same as overloading the member function.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Pleading paper contains a(n) ____________________ ruling from top to bottom at the left margin.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A systems administrator has made several unauthorized changes to the server cluster that resulted in a major outage. This event has been brought to the attention of the Chief Information Office (CIO) and he has requested immediately implement a risk mitigation strategy to prevent this type of event from reoccurring. Which of the following would be the BEST risk mitigation strategy to implement in order to meet this request?

A. Asset Management B. Change Management C. Configuration Management D. Incident Management

Computer Science & Information Technology

Which of the following would be used before a technician crimps a connector to a UTP/STP cable?

A. Multimeter B. Punch down tool C. Cable tester D. Cable stripper

Computer Science & Information Technology