Most computer systems are (71) to two different groups of attacks:insider attacks and outsider attacks.A system that is known to be (72) to an outsider attack by preventing (73) from outside can still be vulnerable to the insider attacks accomplished by abusive usage of (74) users.Detecting such abusive usage as well as attacks by outsides not only provides information on damage assessment,but also helps to prevent future attacks.These attacks are usually (75) by tools referred to as Intrusion Detection Systems. (72)处填()。
A. reliable
B. secure
C. indestructible
D. steady
查看答案
类的实例化过程是一种实例的合成过程,而不仅仅是根据单个类型进行的空间分配、初始化和绑定。指导编译程序进行这种合成的是 (47) 。重置的基本思想是通过 (48) 机制的支持,使得子类在继承父类界面定义的前提下,用适用于自己要求的实现去置换父类中的相应实现。 (48)处填()。
A. 静态绑定
B. 对象应用
C. 类型匹配
D. 动态绑定
设有关系模式只(C,P,S,G,T,W),各属性含义为:C课程,P老师,S学生,G成绩,T时间,W教室,其函数依赖集为:F=C→P,(S,C)→G,(T,W)→C,(T,P)→W,(T,S)→W则关系模式的关键字为 (35) ,R的规范化程度最高可达到 (59) 。若将R分解为关系模式组R1 (C,P),R2(S,C,G),R3(S,T,W,C),则R1,R2,R3的规范化程度最高分别可达到 (60) , (61) , (62) 。 (61)处填()。
A. 2NF
B. 3NF
C. BCNF
D. 4NF
假定有K个关键字互为同义词,若用线性探测再散列法把这K个关键字存入散列表中,至少要进行()次探测。
A. K-1
B. K
C. K(K-1)/2
D. K(K+1)/2
OMT定义了三种模型来描述系统。 (9) 可以用状态图来表示, (10) 可以用数据流图来表示, (11) 是上述两种模型提供了基本的框架。 (11)处填()。
A. 对缘模型
B. 功能模型
C. 动态模型
D. 类模型