It should go without saying that the focus of UML is modeling. However, what that means, exactly, can be an open-ended question. (101) is a means to capture ideas, relationships, decisions, and requirements in a well-defined notation that can be applied to many different domains. Modeling not only means different things to different people, but also it can use different pieces of UML depending on what you are trying to convey. In general, a UML model is made up of one or more (102) . A diagram graphically represents things, and the relationships between these things. These (103) can be representations of real-world objects, pure software constructs, or a description of the behavior of some other objects. It is common for an individual thing to show up on multiple diagrams; each diagram represents a particular interest, or view, of the thing being modeled. UML 2.0 divides diagrams into two categories: structural diagrams and behavioral diagrams. (104) are used to capture the physical organization of the things in your system, i. e. , how one object relates to another. (105) focus on the behavior of elements in a system. For example, you can use behavioral diagrams to capture requirements, operations, and internal state changes for elements. (103)是()
Activity diagrams
B. Use-case diagrams
C. Structural diagrams
D. Behavioral diagrams
查看答案
(31) data effectively is crucial for success in today’s competitive environment. Managers must know how to use a variety of tools. Integrated data takes information from different sources and puts it together in a meaningful and useful way. One of the difficulties of this is the (32) in hardware and software. (33) integration uses a base document that contains copies of other objects. (34) integration uses a base document that contains the current or most recent version of the source document it contains. (35) provides an overview of the program written in "plain" English, without the computer syntax. (33)是()
A. Simulated
B. Duplicated
C. Dynamic
D. Static
Most computer systems are (16) to two different groups of attacks: Insider attacks and outsider attacks. A system that is known to be (17) to an outsider attack by preventing.(18) from outside can still be vulnerable to the insider attacks accomplished by abusive usage of (19) users. Detecting such abusive usage as well as attacks by outsides not only provides information on damage assessment, but also helps to prevent future attacks. These attacks are usually (20) by tools referred to as Intrusion Detection Systems. (17)是()
A. reliable
B. secure
C. indestructible
D. steady
A Web browser is simply a terminal emulator, designed to display text on a screen. The two essential differences between an ordinary terminal emulator and a Web browser are that the browser knows how to deal with (26) , and that it has a mechanism for (27) graphical files. Display text, display graphics, and (28) hyperlinks-there’s 99 percent of the (29) value. That’s not to say that the manufacturers didn’t go all-out to attach a hyperactive efflorescence of useless capabilities onto their browsers. Remember when media channels in the browser were a big deal, instead of the clutter you can’t wait to delete from your favorites of bookmarks menu Remember when client-side Java applets were supposed to become the preferred (30) for application development Remember frames and all their nasty side effects (27)处是()
A. displaying
B. illustrating
C. drawing
D. writing
简答题 准确定义下列经济学概念:(1)固定成本。(2)可变成本。(3)总成本。(4)平均成本。(5)边际成本。