Answer:
Extreme programming is a software development technique which is used to enhance software quality and it's response to ever changing customer requirements.
Testing
Testing is main focus in extreme programming.Extreme programming addresses testing in a way that if a minute testing can eliminate a bit of flaws, extensive testing can terminate a lot of flaws.
Evolution in Extreme programming is like this:-
Coding:-First programmers will code the problem.
Testing :- Testing is done to remove flaws.
Listening:- Programmers must listen to the customers to what they need.
Designing:-Then design according to the customer needs.
Answer:
Incremental method.
Explanation:
Software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications.
An incremental model refers to the process in which the requirements or criteria of the software development is divided into many standalone modules until the program is completed.
Hence, an incremental method typically involves developing a system through repeated cycles and smaller portions at a time, enhancing and evolving the system over time.
In SDLC, a waterfall model can be defined as a process which involves sequentially breaking the software development into linear phases. Thus, the development phase takes a downward flow like a waterfall and as such each phase must be completed before starting another without any overlap in the process.
Also, a spiral model can be defined as an evolutionary SDLC that is risk-driven in nature and typically comprises of both an iterative and a waterfall model. Spiral model of SDLC consist of these phases; planning, risk analysis, engineering and evaluation.
Answer:
Check the explanation
Explanation:
223.1.17/24 indicates that out of 32-bits of IP address 24 bits have been assigned as subnet part and 8 bits for host id.
The binary representation of 223.1.17 is 11011111 00000001 00010001 00000000
Given that, subnet 1 has 63 interfaces. To represent 63 interfaces, we need 6 bits (64 = 26)
So its addresses can be from 223.1.17.0/26 to 223.1.17.62/26
Subnet 2 has 95 interfaces. 95 interfaces can be accommodated using 7 bits up to 127 host addresses can represented using 7 bits (127 = 27)
and hence, the addresses may be from 223.1.17.63/25 to 223.1.17.157/25
Subnet 3 has 16 interfaces. 4 bits are needed for 16 interfaces (16 = 24)
So the network addresses may range from 223.1.17.158/28 to 223.1.17.173/28
Answer:
To protect the computer network of a large organization, network engineers monitor network traffic. Malware detection method of data mining best being used to protect the network.
Explanation:
Data mining has excellent potential as a malware detection tool. It allows us to analyze vast sets of information and gives an opportunity to extract new data from it. It also provides the ability to identify both known and zero-day attacks.