A. Identifying the purpose of the proposed system
B. Identifying the technology stack of the proposed system
C. Identifying the development methodology
D. Identifying the users of the proposed system
A. mkfs
B. mount
C. umount
D. fsck
A. Full Control
B. Least Privilege
C. Mandatory Access Control
D. Discretionary Access Control
A. dual architectureB microkernel architecture
B. monolithic architecture
C. hybrid microkernel architecture
A. Dockerfile
B. ImageFile
C. BuildFile
D. DockerBuild
A. HMAC Cryptography (hash based message authentication]
B. Public Key Cryptography (asymmetric cryptography)
C. Key Pair Encryption (symmetric cryptography)
D. DPE (dual-phased hybrid encryption]