We learned that "war-driving" refers to the creation of a software application that seems useful and desirable to end users but actually contains malware inside of it. the practice of driving traffic from many different sources toward a target host in order to overwhelm it and disable it. the practice of malicious actors driving by buildings or parking outside and trying to intercept wireless network traffic and gain unauthorized network access. the practice of eavesdroppers driving by buildings to listen to conversations captured by bugs they planted inside the building at an earlier opportunity. In this context, a bug is a tiny electronic device with a microphone and a radio transmitter. the practice of pinging a firewall relentlessly, varying parameters like TCP port number, in an attempt to gain unauthorized access to the systems beyond the firewall. Granularity refers to how interchangeable modules are in an architecture. well documented an architecture is. variations in the number and relative size of the subsystems in a system's architecture. how standardized interfaces are in an architecture. XYZ University is looking to open for business next year. The staff realizes that they will need to store student records electronically. Multiple applications will need to access these records, including the applications used by the billing department, the financial aide department, and by the faculty. Which of the following software products would provide this capability? TCP DBMS OS Data warehouse StichFix ... relied on human "stylists", aided by a machine-learning based recommender system, to select items to ship to their customers. relied solely on automated methods, based on machine learning, to select items to ship to their customers. required customers to select the items they wished to purchase from a menu of options. relied solely on human "stylists" to select items to ship to their customers..