Passage OneQuestions 26 to 28 are based on the passage you have just heard.
A. Graduate students.
B. Undergraduate students.
C. Professors.
D. Library employees.
查看答案
对象是面向对象开发模式的 (20) 。每个对象可用它自己的一组 (21) 和它可执行的一组 (22) 来表征。应用执行对象的 (22) 可以改变该对象的 (21) 。 (22)处填()。
A. 属性
B. 功能
C. 操作
D. 数据
在UML提供的图中,可以采用 (30) 对逻辑数据厍的建模; (31) 用于接口、类和协作的行为建模,并强调对象行为的事件顺序; (32) 用于系统的功能建模,并强调对象之间的控制流。 (30)处填()。
A. 用例图
B. 构件图
C. 活动图
D. 类图
Most computer systems are (71) to two different groups of attacks:insider attacks and outsider attacks.A system that is known to be (72) to an outsider attack by preventing (73) from outside can still be vulnerable to the insider attacks accomplished by abusive usage of (74) users.Detecting such abusive usage as well as attacks by outsides not only provides information on damage assessment,but also helps to prevent future attacks.These attacks are usually (75) by tools referred to as Intrusion Detection Systems. (73)处填()。
A. visit
B. access
C. I/O
D. read/write
一个数据库系统必须能表示实体和关系。关系可与 (5) 实体有关。实体与实体之间的关系有一对一、一对多和多对多,其中 (6) 不能描述多对多的联系。 (5)处填()。
A. 0个
B. 1个
C. 0个或0个以上
D. 1个或1个以上