题目内容

共用题干题在UML2.0中,(1)强调消息跨越不同对象或参与者的实际时间,而不仅仅关心消息的相对顺序;它能够(2)。 空白(1)处应选择()

A. 定时图
B. 通信图
C. 顺序图
D. 交互概览图

查看答案
更多问题

共用题干题A requirement is simply a statement of what the system must do or what characteristics it needs to have. Requirements written from the perspective of user and focus on user needs are called (1). Requirements written from the developer's perspective and describe how the system will be implemented are called (2). Requirements evolve from detailed statements of the business capabilities that a system should have to detailed statements of the technical way in wluch the capabilities will be implemented in the new system. Requirements can be either functional or nonfunctional in nature. For example, during the analysis phase of travel vehicles sales system, the system that must have the ability to search for available inventory is (3). The requirement that the system should be able to work on any Web browser belongs to (4). That customer personal information is protected in compliance with the Data Protection Act is a requirement of (5). 空白(5)处应选择()

A. system constraint
B. system performance
C. security and control
D. cultural and political

光盘驱动器与主机的接口总线常采用()总线。

A. ISA
B. CETRONIC
C. EIDE(ATA.
D. PCI

2014年1月,由于DNS根服务器被攻击,国内许多互联网用户无法访问.com域名网站,这种恶意攻击可能造成的危害是()

A. 创造条件,攻击相应的服务器
B. 快速入侵互联网用户的计算机
C. 将正常网站的域名解析到错误的地址
D. 以上都是

SpyWare and other fonns of malware afe the biggest online threat to your computer's (1) nowadays. There malicious (2) which get to your PC through freeware, shareware, commercial sites, deceptive pop-ups or in any other way, can record your surfing habits and sites you visit, share your personal information with their partners. Any personal (3), when in wrong hands, can leave you a victim of an"identity theft"by steeling your credit (4) details, birth records and other (5) information. 空白(4)处应选择()

A. reputation
B. password
C. address
D. card

答案查题题库