题目内容

部门(部门号,部门名,负责人,电话)职工(部门号,职工号,性名,性别,出生日期) 可以正确查询每个部门年龄最长者的信息(要求得到的信息包括部门名和最长者的出生日期)的SQLSELECT命令是()。

A. SELECT部门名,MAX(出生日期)FROM部门JOIN职工; ON部门.部门号=职工.部门号GROUP BY部门名
B. SELECT部门名,MIN(出生日期)FROM部门JOIN职工;ON部门.部门号=职工.部门号GROUP BY部门名
C. SELECT部门名,MIN(出生日期)FROM部门JOIN职工; WHERE部门.部门号=职工.部门号GROUP BY部门名
D. SELECT部门名,MAX(出生日期)FROM部门JOIN职工;WHERE部门.部门号=职工.部门号GROUP BY部门名

查看答案
更多问题

系统测试由若干个不同的测试类型组成,其中 (42) 检查系统能力的最高实际限度,即软件在一些超负荷情况下的运行情况; (43) 主要是检查系统的容错能力。 (43)处填()。

A. 强度测试
B. 性能测试
C. 恢复测试
D. 可靠性测试

基于软件架构的设计(Architecture Based Software Development,ABSD)强调由商业、质量和功能需求的组合驱动软件架构设计。它强调采用 (46) 来描述软件架构,采用 (47) 来描述需求。 (46)处填()。

A. 类图和序列图
B. 视角与视图
C. 构件和类图
D. 构件与功能

特定领域软件架构(DSSA)是在一个特定应用领域为一组应用提供组织结构参考的标准软件架构。实施DSSA的过程中包括一系列基本的活动,其中 (53) 活动的主要目的是为了获得DSSA。该活动参加人员中, (54) 的主要任务是提供关于领域中系统的需求规约和实现的知识。 (54)处填()。

A. 领域专家
B. 领域分析者
C. 领域设计者
D. 领域实现者

To compete in today’s fast-paced competitive environment, organizations are increasingly allowing contractors, partners, visitors and guests to access their internal enterprise network. These users may connect to the network through wired ports in conference rooms or offices, or via wireless access points. In allowing this open access for third parties, LANs become(1). Third parties can introduce risk in a variety of ways from connecting with an infected laptop to unauthorized access of network resources to (2) activity. For many organizations, however, the operational complexity and costs to ensure safe third party network access has been prohibitive. Fifty-two percent of surveyed CISOs stated that they currently use a moat and castle" security approach, and admit that defenses inside the perimeter are weak. Threats from internal users are also increasingly a cause for security concerns. Employees with malicious intent can launch(3) of service attacks or steal (4) information by snooping the network. As they access the corporate network, mobile and remote users inadvertently can infect the network with (5) and worms acquired from unprotected public networks. Hackers masquerading as internal users can take advantage of weak internal security to gain access to confidential information. 1()

A. damageable
B. susceptible
C. vulnerable
D. changeable

答案查题题库