网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Documentation of a software package is normally produced for two purposes. One is to explain the (1) ofthe software and describe how to use them. This is known as (2) because it is designed to be read by the user of the software. The other purpose of documentation is to describe the software's internal composition so that the system can be maintained later in its life cycle. Documentation ofthis type is known as ( 3 ) 空白(2)处填()

  • A、systemdocu mentation
  • B、userdocu mentation
  • C、venderdocu mentation
  • D、productdocu mentation.

参考答案

更多 “ Documentation of a software package is normally produced for two purposes. One is to explain the (1) ofthe software and describe how to use them. This is known as (2) because it is designed to be read by the user of the software. The other purpose of documentation is to describe the software's internal composition so that the system can be maintained later in its life cycle. Documentation ofthis type is known as ( 3 ) 空白(2)处填()A、systemdocu mentationB、userdocu mentationC、venderdocu mentationD、productdocu mentation.” 相关考题
考题 Software is divided into two categories,system software and application software.Please choose one which is differ from other threeA.WindOws 98B.Word 2000C.C++compilerD.FoxBase DBMS

考题 data effectively is crucial for success in today's competitive environment. Managers must know how to use a variety of tools. Integrated data takes information from different sources and puts it together in a meaningful and useful way. One of the difficulties of this is the(2)in hardware and software.(3)integration uses a base document that contains copies of other objects.(4)integration uses a base document that contains the current or most recent version of the source document it contains.(5)provides an overview of the program written in "plain" English, without the computer syntax.A.GeneralizingB.SharingC.General-usingD.Globalizing

考题 A user can receive email but cannot send email with the email client software. Which of the following protocols is incorrectly configured?() A.FTPB.SMTPC.POPD.SNMP

考题 Following a competitive tender, your audit firm Cal Co has just gained a new audit client Tirrol Co. You are the manager in charge of planning the audit work. Tirrol Co’s year end is 30 June 2009 with a scheduled date to complete the audit of 15 August 2009. The date now is 3 June 2009.Tirrol Co provides repair services to motor vehicles from 25 different locations. All inventory, sales and purchasing systems are computerised, with each location maintaining its own computer system. The software in each location isthe same because the programs were written specifically for Tirrol Co by a reputable software house. Data from each location is amalgamated on a monthly basis at Tirrol Co’s head office to produce management and financial accounts.You are currently planning your audit approach for Tirrol Co. One option being considered is to re-write Cal Co’s audit software to interrogate the computerised inventory systems in each location of Tirrol Co (except for head office)as part of inventory valuation testing. However, you have also been informed that any computer testing will have to be on a live basis and you are aware that July is a major holiday period for your audit firm.Required:(a) (i) Explain the benefits of using audit software in the audit of Tirrol Co; (4 marks)(ii) Explain the problems that may be encountered in the audit of Tirrol Co and for each problem, explainhow that problem could be overcome. (10 marks)(b) Following a discussion with the management at Tirrol Co you now understand that the internal audit department are prepared to assist with the statutory audit. Specifically, the chief internal auditor is prepared to provide you with documentation on the computerised inventory systems at Tirrol Co. The documentation provides details of the software and shows diagrammatically how transactions are processed through the inventory system. This documentation can be used to significantly decrease the time needed to understand the computer systems and enable audit software to be written for this year’s audit.Required:Explain how you will evaluate the computer systems documentation produced by the internal auditdepartment in order to place reliance on it during your audit. (6 marks)

考题 ● Documentation of a software package is normally produced for two purposes. One is to explain the __(71)__ of the software and describe how to use them. This is known as __(72)__ because it is designed to be read by the user of the software. The other purpose of documentation is to describe the software,s internal composition so that the system can be maintained later in its life cycle. Documentation of this type is known as __(73)__.(71)A.plansB.costC.featuresD.schedules(72)A.system documentationB.user documentationC.vender documentationD.product documentation(73)A.system documentationB.user documentationC.vender documentationD.license documentation

考题 ●Generally software can be divided into two types: (73) software and application software.(73)A. databaseB. systemC. operatingD. text

考题 Software entities are more complex for their size than perhaps any other human construct,because no two parts are alike(at least above the statement level).If they are,we make the two similar parts into one,a(1),open or closed.In this respect software systems differ profoundly from computers,buildings,or automobiles,where repeated elements abound.Digital computers are themselves more complex than most things people build;they have very large numbers of states.This makes conceiving,describing,and testing them hard.Software systems have orders of magnitude more(2)than computers do.Likewise,a scaling-up of a software entity is not merely a repetition of the same elements in larger size;it is necessarily an increase in the number of different elements.In most cases,the elements interact with each other in some(3)fashion,and the complexity of the whole increases much more than linearly.The complexity of software is a(an)(4)property,not an accidental one.Hence descriptions of a software entity that abstract away its complexity often abstract away its essence.Mathematics and the physical sciences made great strides for three centuries by constructing simplified models of complex phenomena,deriving,properties from the models,and verifying those properties experimentally.This worked because the complexities(5)in the models were not the essential properties of the phenomena.It does not work when the complexities are the essence.Many of the classical problems of developing software products derive from this essential complexity and its nonlinear increases with size.Not only technical problems but management problems as well come from the complexity. 1、____A.task B.job C.subroutine D.program

考题 Software entities are more complex for their size than perhaps any other human construct,because no two parts are alike(at least above the statement level).If they are,we make the two similar parts into one,a(1),open or closed.In this respect software systems differ profoundly from computers,buildings,or automobiles,where repeated elements abound.Digital computers are themselves more complex than most things people build;they have very large numbers of states.This makes conceiving,describing,and testing them hard.Software systems have orders of magnitude more(2)than computers do.Likewise,a scaling-up of a software entity is not merely a repetition of the same elements in larger size;it is necessarily an increase in the number of different elements.In most cases,the elements interact with each other in some(3)fashion,and the complexity of the whole increases much more than linearly.The complexity of software is a(an)(4)property,not an accidental one.Hence descriptions of a software entity that abstract away its complexity often abstract away its essence.Mathematics and the physical sciences made great strides for three centuries by constructing simplified models of complex phenomena,deriving,properties from the models,and verifying those properties experimentally.This worked because the complexities(5)in the models were not the essential properties of the phenomena.It does not work when the complexities are the essence.Many of the classical problems of developing software products derive from this essential complexity and its nonlinear increases with size.Not only technical problems but management problems as well come from the complexity. 2、____A.states B.parts C.conditions D.expressions

考题 Documentation of a software package is normally produced for two purposes.The other purpose of documentation is to describe the software's internal composition so that the system can be maintained later in its life cycle. Documentation of this type is known as ( ) . A.system documentation B.user documentation C.vender documentation D.license documentation

考题 The Unified Modeling Language is a standard graphical language for modeling object-oriented software. ( ) can show the behavior of systems in terms of how objects interact with each other. A.Class diagram B.Component diagram C.Sequence diagram D.Use case diagram

考题 Documentation of a software package is normally produced for two purposes. One is to explain the ( ) of the software and describe how to use them. A.plans B.cost C.features D.schedules

考题 Documentation of a software package is normally produced for two purposes. One is to explain the (1) ofthe software and describe how to use them. This is known as (2) because it is designed to be read by the user of the software. The other purpose of documentation is to describe the software's internal composition so that the system can be maintained later in its life cycle. Documentation ofthis type is known as ( 3 ) 空白(1)处填()A、plansB、costC、featuresD、schedules

考题 Documentation of a software package is normally produced for two purposes. One is to explain the (1) ofthe software and describe how to use them. This is known as (2) because it is designed to be read by the user of the software. The other purpose of documentation is to describe the software's internal composition so that the system can be maintained later in its life cycle. Documentation ofthis type is known as ( 3 ) 空白(3)处填()A、system documentationB、user documentationC、vender documentationD、license documentation

考题 The Unified Modeling Language is a standard graphical language for modeling object-oriented software()can show the behavior of systems in terms of how objects interact with each other.A、ClassdiagramB、ComponentdiagramC、SequencediagramD、Use case diagram

考题 Which two design goals describe the Junos OS design?()A、clean separation of security and routing policiesB、clean separation of control and forwarding planesC、modularization of multiple software processesD、a single hardware platform for all software applications

考题 You have a single Active Directory directory service domain. All users in the IT department are  placed into an organizational unit (OU) named IT Users. A Group Policy object (GPO) is linked to the IT  Users OU. The GPO assigns a software installation package to install the Windows Server 2003  Administration Tools Pack. You select the Install this application at logon option in the software installation  package. A user has been removed from the IT Users OU, but she still has the Windows Server  Administration Tools Pack on her computer. You need to ensure that the Windows Server 2003  Administration Tools Pack is removed from a users computer when the user is moved from the IT Users  OU.  What should you do?()A、 Modify the software installation package to use the Published deployment method. Clear the Auto-install this application by file extension activation check box. Redeploy the software installation package.B、 Modify the software installation package to clear the Install this application at logon option. Redeploy the software installation package.C、 Modify the software installation package to select the Uninstall this application when it falls out of the scope of management option. Retain the software installation package in the GPO.D、 Modify the software installation package to select the Uninstall this application when it falls out of the scope of management option. Delete the software installation package from the GPO.

考题 A user can receive email but cannot send email with the email client software. Which of the following protocols is incorrectly configured?()A、FTPB、SMTPC、POPD、SNMP

考题 A user reports that they are unable to open any audio files. Yesterday, the user uninstalled third party music software. Which of the following is the MOST likely cause of the user’s error?()A、The file associations were not returned after the software was uninstalled.B、The user is not opening the files correctly.C、The uninstalled software has corrupted all the audio files on the computer.D、The sound card is not properly configured.

考题 After a successful recovery, the system administrator wishes to remove the fileset bos.net.tcp.server and all dependent software. After running an lslpp command, it is verified that the fileset is in the BROKEN state. What is the correct method for deinstallation?()A、Use installp -u command with -g to remove the fileset and all dependent software.B、Use installp -c command to commit fileset; use installp command with -g to remove the fileset and all dependent software.C、Use installp -C command to perform cleanup of fileset; use install command with -g to remove the fileset and all dependent software.D、Use installp -a command to apply fileset; use installp command with -g to remove the fileset and all dependent software.

考题 Which of the following options indicates why it is important to talk to the user and ask appropriate questions about a software problem? ()A、Software problems don't generate errors. B、The user is more knowledgeable about software. C、The system logs will provide useful information alone. D、Key information pertaining to the software may be uncovered.

考题 You need to design the deployment of antivirus software. What should you do?()A、Install the antivirus software on each mailbox storage serverB、Install the antivirus software on each Outlook Web Access serverC、Install the antivirus software on one Outlook Web Access server at each officeD、Install the antivirus software on a back-end server that contains no mailboxes

考题 单选题A user reports that they are unable to open any audio files. Yesterday, the user uninstalled third party music software. Which of the following is the MOST likely cause of the user’s error?()A The file associations were not returned after the software was uninstalled.B The user is not opening the files correctly.C The uninstalled software has corrupted all the audio files on the computer.D The sound card is not properly configured.

考题 单选题Documentation of a software package is normally produced for two purposes. One is to explain the (1) ofthe software and describe how to use them. This is known as (2) because it is designed to be read by the user of the software. The other purpose of documentation is to describe the software's internal composition so that the system can be maintained later in its life cycle. Documentation ofthis type is known as ( 3 ) 空白(3)处填()A system documentationB user documentationC vender documentationD license documentation

考题 问答题Questions 1 to 5 are based on the following passage.  Computer users fed up with hacker attacks and other security threats that exploit holes in Microsoft software are increasingly turning to alternatives such as open source Internet browsers developed by Mozilla.  “It’s reflective of a trend that we’ve seen over the last year with more web users becoming frustrated with the Internet experience,” said Chris Hoffmann of the Mozilla Foundation, a non-profit group supported by Sun Microsystems, IBM and other companies, backing as an alternative to Microsoft.  Much of that frustration has centered on Microsoft, which has been heavily criticized for producing software vulnerable to hand virus writers. Microsoft has responded with a series of patches designed to plug vulnerabilities in its Windows operating system, Internet Explorer web browser and other software.  But computer owners are growing weary of continuously updating software to protect against new threats. One incident last month enabled hackers to gain access to web surfers’ computers by taking advantage of vulnerabilities in Microsoft’s browser.  Hackers could then install remote access Trojan programs that enabled them to control a victim’s computer. The hackers could also install software to capture a victim’s keystrokes to steal data such as bank account numbers and passwords.  Mr. Hoffmann hoped publicity stemming from Microsoft’s security woes(灾难) would translate into a market share increase for Mozilla’s software, which includes the new highly regarded Firefox Internet browser.  But Mozilla suffered a setback last week when it was forced to issue a software patch to counter a newly discovered vulnerability affecting its Internet browsers.  Still, Mr. Hoffmann said Microsoft’s security woes stem in part from the way its browser has been integrated into Windows for user convenience. Security experts agree that has made it easier for hackers to exploit computers running on Microsoft software.  Others suggest Microsoft has been targeted by hackers and virus writers simply because more than 90 per cent of the world’s computers run on the software giant’s operating system.  Questions:  1.What is the meaning of the phrase “fed up with” (Para.1)?  2.It can be guessed that the word “plug” (Para.3) means ________________.  3.Why more web users have become frustrated?  4.What happened to Mozilla’s Internet browsers last week?  5.How would Microsoft be less vulnerable?

考题 单选题Which of the following options indicates why it is important to talk to the user and ask appropriate questions about a software problem? ()A Software problems don't generate errors. B The user is more knowledgeable about software. C The system logs will provide useful information alone. D Key information pertaining to the software may be uncovered.

考题 单选题After a successful recovery, the system administrator wishes to remove the fileset bos.net.tcp.server and all dependent software. After running an lslpp command, it is verified that the fileset is in the BROKEN state. What is the correct method for deinstallation?()A Use installp -u command with -g to remove the fileset and all dependent software.B Use installp -c command to commit fileset; use installp command with -g to remove the fileset and all dependent software.C Use installp -C command to perform cleanup of fileset; use install command with -g to remove the fileset and all dependent software.D Use installp -a command to apply fileset; use installp command with -g to remove the fileset and all dependent software.

考题 问答题【参考范例二】PART 2Describe a colleague that you like to work with. You should say: what this person does what sort of work you do with this person how long you have known each other and explain why you like to work with this person.You will have to talk about the topic for one or two minutes.You have one minute to think about what you’re going to say.You can make some notes to help you if you wish.