Which of the following is considered the core set and focuses on the overall planning of the intended IT services?
Which of the following is used when the CPU sends data to an I/O device and then works on another process’s request until the I/O device is ready for more data?
Which of the following refers to a method in which an interface defines how communication can take place between two processes and no process can interact with the other’s internal programming code?
Which security architecture model defines how to securely develop access rights between subjects and objects?