题目内容

乳剂型软膏剂的W/O型乳化剂

A. 羟苯乙酯
B. 丙二醇
C. 氟氯烷烃
D. 月桂醇硫酸钠
E. 司盘

查看答案
更多问题

The Rational Unified Process (RUP) is a software engineering process, which captures many of best practices in modern software development. The notions of (21) and scenarios have been proven to be an excellent way to capture function requirements. RUP can be described in two dimensions - time and content. In the time dimension, the software lifecycle is broken into cycles. Each cycle is divided into four consecutive (22) which is concluded with a well-defined (23) and can be further broken down into (24) - a complete development loop resulting in a release of an executable product, a subset of the final product under development, which grows incrementally to become the final system. The content structure refers to the disciplines, which group (25) logically by nature.

A. functions
B. workflows
C. actions
D. activities

A typical (36) language contains an applicative sub-language which approximates the mathematical abstractions of "timeless" functions applied to’ "spaceless" values, where the actual operation sequences and use of storage space during expression evaluation are organized behind the (37) . In this setting, values are data structures of low volume, typically a few computer words or less, which means that an illusion of spacelessness can be realized by having (38) results during expression evaluation stored at the discretion of the language implementation, and effecting parameter (39) and (40) operations through value copying.

A. imperative
B. mandatory
C. compulsory
D. voluntary

用纱布、棉花蘸取后用于皮肤或口、喉粘膜的液体制剂

A. 洗剂
B. 含药灌肠剂
C. 涂剂
D. 灌洗剂
E. 泻下灌肠剂

Most computer systems are (26) to two different groups of attacks: Insider attacks and outsider attacks. A system that is known to be (27) to an outsider attack by preventing (28) from outside can still be vulnerable to the insider attacks accomplished by abusive usage of (29) users. Detecting such abusive usage as well as attacks by outsides not only provides information on damage assessment, but also helps to prevent future attacks. These attacks are usually (30) by tools referred to as Intrusion Detection Systems.

A. visit
B. access
C. I/O
D. read/write

答案查题题库