Prior to the UML, there was no clear leading(1)language. Users had to choose. from among many similar modeling languages with minor differences in overall(2)power. Most of the modeling languages shared a set of commonly accepted concepts that are expressed slightly differently in various languages. This lack of(3)discouraged new users from entering the OO market and from doing OO modeling, without greatly expanding the power of modeling. Users longed for the industry to it adopt one, or a very few, broadly supported modeling languages suitable for(4)usage.
Some vendors were discouraged from entering the OO modeling area because of the need to support many similar, but slightly different, modeling languages. In particular, the supply of add-on tools has been depressed because small vendors cannot afford to support many different formats from many different(5)modeling tools. It is important to the entire OO industry to encourage broadly based tools and vendors, as well as niche products that cater to the needs of specialized groups.
第1题
??Electronic mail, or mail, as it is known to its many fans, has been around for over two decades. Typically, email systems support five basic functions, as described below.(1)refers to the process of creating messages and answers.(2)refers to moving messages from the originator to the recipient.(3)has to do with telling the originator what happened to the message. Was it rejected? Was it lost?(4)incoming message is needed. So people can read their email.(5)is the final step and concerns what the recipient does with the message after receiving it。
??供选择的答案:
??(1) Communication??(2) Coruposition??(3) Displaying??(4) Disposition
??(5) Network??(6) Protocol??(7) Reporting??(8) Serving
??(9) Terminating??(10) Transfer
第2题
??The approach we propose is a system-oriented methodology for knowledge acquisition, this orientation emphasizes ongoing documentation throughout each cycle and technique applied. Program-wide documentation is suggested, both for the purpose ofinternal(1)and for later verification and(2)efforts. The documentation system we propose includes a central "knowledge acquisition(3)" which is(4)to reflect knowledge acquisition plans, session nodes, and domain expert participation. Specifically,(5)within the database system include knowledge acquisition forms, which document plans for, and notes from, knowledge acquisition session, domain expert file, and rule content forms.
第3题
??OOP language that create object, such as(1)and(2),are beginning to take hold as viable tools for programmers.To effectively reuse object, programmers need a place to store them such as an ODBMS or a RDBMS with object oriented extensions.
??Databases that handle object data not only let user store and retrieve(3)data, but also let them store objects created by OOP languages, to facilitate rapid software development and reuse, and let them(4)new multimedia applications combining multiple data types.
??RDBMS vendors have developed new extensions to exiting DB technology to accommodate the most common forms of(5)data.
??(1) PASCAL??(2) BASIC??(3)C??(4)C++
??(5) FORTRAN??(6) SMALLTALK??(7) numeric??(8) nonalphanumeric
??(9) structured??(10) unstructured??(11) to build??(12) build
??(13) to be build??(14) built
第4题
Activity Based Costing (ABC) is an(1)technique that allows an organization to determine the actual(2)associated with each product and service produced by the organization without regard to the organizational structure. This chapter explains some of the uses and benefits of Activity Based Costing. We use IDEFO(3)modeling in conjunction with ABC to enable more effective business(4)design decisions.
In order to achieve the major goals ofbusiness process improvement, process simplification and improvement, FAA manages need to fully understand the cost, time and quality of activities performed by employees or machines throughout an entire organization. ABC methods enable(5)to cost out measurements to business simplification and process improvement.
第5题
Developing reliable software on time and within(1)represents a difficult endeavor for many organizations.
Usually business solutions have three main aspects: people,(2), and technology. The main reason for failing software projects has little to do with technology and tools, and much to do with lack ofprocess(3). Experience has shown that introducing new technology and tools in an immature or undisciplined environment is likely to increase the chaos. CASE tools are not enough."Afool with a tool is still a fool!"
Structured method was the first wave of the software industry. This was the beginning of transforming software development from a "(4)industry" to mass production. Software process movement is the second wave in the software industry. The process maturity movement prepares the way for the third wave of the software industry:‘‘software industrialization”. Software development will become like an assembly and manufacturing process.A critical enabling factor is a disciplined software engineering process with predictable quality,(5)and functionality.
第6题
The primary advantages of a Client/Server system arise from splitting the processing between the client system and the database server. Since the bulk of the database processing is done on the back-end, the speed ofthe DBMS isn't tied to the speed ofthe(1).
The major disadvantage of Client/Server system is the increased cost of(2)and support personnel who maintain the database server. There is also the issue of(3)with so many parts comprising the entire C/S system; Murphy's Law can kick in-the more pieces that compose the system, the more pieces that can fail. It's also harder to track down problems when the system(4). And it can initially take longer to get all the components set up and working together. All this is compounded by the general lack of experience and expertise of potential support personnel and programmers, due to the relative newness of the technology. As C/S system become more common, this problem should abate.
Therefore the C/S systemis more(5).
第7题
TCP functions at the Open System Interconnection (OSl)(1)layer, or Layer 4. Its chief responsibility is to ensure(2)end-to-end connectivity. IP, located one layer down, at the OSI network layer, or Layer 3,communicates the addresses of each(3)sender and receiver to the routers along the way. Routers and Layer 3 switches can read IP and other Layer 3(4). This information, combined with routing tables and other network intelligence, is all it takes to get(5)the room or around the world via TCP/IP.
第8题
Rapid application development (RAD) systems purport to lighten the developer's(1)by making it easy to program an application with simple intuitive steps.
RAD tools(2)the developer everything needed to construct afully functional application quickly and easily. They make short work of modifying the developed with product to(3)changes after the program is finished. Applications developed with RAD tools are constructed as they are envisioned. As an application's real usefulness(4), the developer armed with a RAD tools should be able to(5)on new features with little fuss.
第9题
Public Key Infrastructure (PKI) service providers offer organizations fully integrated PKI-managed services designed to secure Intranet, Extranet, Virtual Private Network (VPN), and e-commerce applications. PKI solutions can enable a number of security services, including strong authentication and non-repudiation oftransaction.
eToken enables the users of PKI systems to generate and store(1)and digital certifications inside the token, creating a secure environment and allowing full portability and maximum ease of use. eToken Pro can also perfonn sensitive on-chip(2)operations, ensuring that users' keys are never exposed to PC environment, eToken eliminates the need to store(3)and keys on a hard disk or browser file, or to transmit them across the Internet/Extranet, assuring peace-of-mind and confidence during online communications.
A digital signature is created using the private key of an individual to ensure the validity of his request. This technology can be used to guarantee(4)of various transactions. The strength of either the authentication level or the digital signature relies on the level of protection offered to the private key. eToken PRO offers the maximum level of security, since it enables the use of the private key for signing and authenticating inside the eToken.
The most secure use of authentication involves enclosing at least one certificate with every signed message. The message(5)verifies the certificate using the CA's public key. If the sender's public key is legitimate, the recipient verifies the message's signature. Digital signatures created with a private key are verified with the digital certificate containing the public key.
第10题
SOX is an alternative(1)for XML. It is useful for reading and creating XML content in a(2)editor. It is then easily transformed into proper XML. SOX was created because developers can spend a great deal of time with raw XML. For many of us, the popular XML(3)have not reached a point where their tree views, tables and forms can completely substitute for the underlying(4)language. This is not surprising when one considers that developers still use a text view, albeit enhanced, for editing other languages such as Java. SOX uses(5)to represent the structure of an XML document, which eliminates the need for closing tags and a number of quoting devices. The result is surprisingly clear.
为了保护您的账号安全,请在“上学吧”公众号进行验证,点击“官网服务”-“账号验证”后输入验证码“”完成验证,验证成功后方可继续查看答案!