RESOURCE MONITOR
CPU23%
MEMORY67%
DISK I/O45%
NETWORK89%
SYSTEM MONITOR
|
SECURITY LOG
[14:23:45]INFOUser authentication successful
[14:23:47]WARNSuspicious network activity detected
[14:23:50]INFOFirewall rule updated
NETWORK SCAN
Scanning ports: 22, 80, 443, 3389
192.168.1.100 - OPEN
192.168.1.101 - FILTERED
Scan completed: 4/4 ports

Pattern Matching Practice

Pattern Matching - Lesson 6 (Final)

22 min
Progress0/5

Email Validation Patterns

Concept

Build robust email validation patterns using character classes, quantifiers, and boundaries.

Example

\b[A-Za-z0-9._%+-]+@[A-Za-z0-9.-]+\.[A-Z|a-z]{2,}\b
Breakdown: username + @ + domain + . + extension

Practical Application

Real email validation requires balancing strictness with usability