题目内容

The Rational Unified Process (RUP) is a software engineering process, which captures many of best practices in modern software development. The notions of (21) and scenarios have been proven to be an excellent way to capture function requirements. RUP can be described in two dimensions - time and content. In the time dimension, the software lifecycle is broken into cycles. Each cycle is divided into four consecutive (22) which is concluded with a well-defined (23) and can be further broken down into (24) - a complete development loop resulting in a release of an executable product, a subset of the final product under development, which grows incrementally to become the final system. The content structure refers to the disciplines, which group (25) logically by nature.

A. functions
B. workflows
C. actions
D. activities

查看答案
更多问题

A typical (36) language contains an applicative sub-language which approximates the mathematical abstractions of "timeless" functions applied to’ "spaceless" values, where the actual operation sequences and use of storage space during expression evaluation are organized behind the (37) . In this setting, values are data structures of low volume, typically a few computer words or less, which means that an illusion of spacelessness can be realized by having (38) results during expression evaluation stored at the discretion of the language implementation, and effecting parameter (39) and (40) operations through value copying.

A. imperative
B. mandatory
C. compulsory
D. voluntary

用纱布、棉花蘸取后用于皮肤或口、喉粘膜的液体制剂

A. 洗剂
B. 含药灌肠剂
C. 涂剂
D. 灌洗剂
E. 泻下灌肠剂

Most computer systems are (26) to two different groups of attacks: Insider attacks and outsider attacks. A system that is known to be (27) to an outsider attack by preventing (28) from outside can still be vulnerable to the insider attacks accomplished by abusive usage of (29) users. Detecting such abusive usage as well as attacks by outsides not only provides information on damage assessment, but also helps to prevent future attacks. These attacks are usually (30) by tools referred to as Intrusion Detection Systems.

A. visit
B. access
C. I/O
D. read/write

The purpose of the requirements definition phase is to produce a clear, complete, consistent, and testable (16) of the technical requirements for the software product. During the requirements definition phase, the requirements definition team uses an iterative process to expand a broad statement of the system requirements into a complete and detailed specification of each function that the software must perform and each _( 17) that it must meet. The starting point is usually a set of high level requirements from the (18) that describe the project or problem. In either case, the requirements definition team formulates an overall concept for the system and then defines (19) showing how the system will be operated publishes the system and operations concept document and conducts a system concept review (SCR). Following the SCR, the team derives (20) requirements for the system from the high level requirements and the system and operations concept. Using structured or object-oriented analysis, the team specifies the software functions and algorithms needed to satisfy each detailed requirement.

A. rules
B. principles
C. scenarios
D. scenes

答案查题题库