9. Software Life Cycle Models &__ Testing
- 格式:pdf
- 大小:635.20 KB
- 文档页数:39
1.A user interface we said here is __ABC________A.a text-based user interface or GUIB.an interface between a computer and its peripheral deviceC.an interaction between an operating system and a userD.an interaction between an application program and a user2.___A___provides transparent transfer of data between end users, providing reliable data transfer services to the upper layers.A.The Transport LayerB. Session LayerC. Network LayerE.Application Layer E. Presentation Layer3.Many viruses do harmful things such as (ABCD ).A.deleting filesB. slowing your PC downB.simulating typos D. changing random data on your disk4.We can classify programming languages under two types:(AB ) languages and ( )languages.A.high-levelB. low-levelC. advanced-levelD. basic-level5.With an Internet connection you can get some of the basic services available are:___ABCD_______A.E-mailB. TelnetC. FTPD. Usenet news6. A general purpose computer has four main sections: ( ABCE).A.the control unitB. the memoryC. the input and output devicesD. the cpuE. the arithmetic and logic unit (ALU),7.Windows 2000 has the key technologies, they are (ABCD ).A.securityB. active directoryC. flat directoryD. enterprise management8.The register file is___ACD_______A.addressed by much shorter addressesB. physically largeC.physically smallD. one the same chip as the CPU9. A stack protocol can be used for (A ).A.removing the latest element ins( )ertedB. removing the earliest element ins( )ertedC. subroutine callsD. operation of arithmetic expressions10.The end equipment in a communication system includes (ABCD ).A.printersB. computersC. CRTsD. keyboards11.Microsoft Office Professional 2000 include____ABCD______.A.Excel 2000B. PowerPoint 2000C. Word 2000D. Outlook 200012. A general purpose computer has four main sections: ______ABCE______A.the input and output devicesB. the memoryC. the arithmetic and logic unit (ALU),D. the cpuE. the control unit13.The two most common types of scanners are (BC ) and ( )A. hand-held scannersB. flatbed scannersC. auto scannersD. handler scanners14.Some viruses use (CD ) and ( ) techniques to hide their existence.A.quickly spreadB. replace a part of system softwareC. stealthD. polymorphic15.The Windows 2000 product line includes____ABCD______.A.Windows 2000 Datacenter ServerB. Windows 2000 ProfessionalC. Windows 2000 ServerD. Windows 2000 Advanced Server16.Similar to viruses, you can also find malicious code in (ABC ).A.Trojan HorsesB. logic bombsC. wormsD. Microsoft Word Documents17.Viruses all have two phases to their execution, the ( ) and the ( BD).A.create phaseB. attack phaseC. del( )ete phaseD. infection phase18.Active Directory can help you (ACD ).A.get off the limits of down level networksB. deliver complete enterprise security by itselfC. build a complex international networkD. manage every resource with a single logon19.High-level languages are commonly classified as (ACDE ).A.object-orientedB. automaticC. functionalD. logic languagesE. procedure-oriented20.(CD )is a type of executable file .A.TXT fileB. JPG fileC. EXE fileD. COM file21.( ABCD) maybe a certain cause that some viruses infect upon.A.an external event on your PCB. a dayC. a counter within the virusD. a time22.(BC )is a type of executable file .A.TXT fileB. EXE fileC. COM fileD. JPG file23.The web browsers which is normal used, such as(ABCE ).A.FirefoxB. Internet ExplorerC. OpraD. ICQE. Apple Safari24.Newer ideas in computing such as(ABDE ) have radically altered the traditional concepts that once determined program form and functionA.artificial intelligenceB. distributed computingC. software engineeringD. parallel computingE. data mining25.Microsoft Windows currently supports __AC___and _____file systemsA.NTFSB. OCFSC. FATD. ext2E. NILFS26.Modem is ____ACD______.A.a modulator/demodulatorB. a data setC. a demodulatorD. a modulator27.The equipment _AB_____.A.transfers the number of bits in serial formB.manipulates digital information internally in word unitsC.transfers the number of bits in parallelD. manipulates digital information internally in serial form28.Electronic commerce that is conducted between businesses is referred to as business-to-business or DA. C2CB. C2BC. e-commerceD. B2B29.The World Wide Web also subsumes previous Internet information systems such as (AC ).A.GopherB. FtpC. FTPD. Telnet relies on the services of .NET data providers.There are ABCDA.ConnectionB. Data AdapterC. DataReaderD. Command31.The development process in the software life cycle involves four phases: analysis, design, implementation, and ___ACDE_____.A.analysisB. auditC. implementationD. designE. testing32.The end equipment in a communication system includes __ABCD____.A.printersB. CRTsC. computersD. keyboards33.In electronic commerce ,information search and discovery services include (ABCDE ).A.search enginesB. information filtersC. software agentsD. directoriesE. electronic catalogs34.GIS work with two fundamentally different types of geographic models.They are the (BD ).A.geography modelB. vector modelC. mathematic modelD. raster modelE. data model35.The two most common types of scanners are ____AC___and _____A.flatbed scannersB. hand-held scannersC. auto scannersD. handler scanners36.Windows 2000 has the key technologies, they are ( ABCD).A.active directoryB. flat directoryC. enterprise managementD. securityputer software, or just software is a general term used to describe a collection of computer programs, procedures and documentation that perform some tasks on a computer system.The term includes: ABCA.Firmware which is software programmed resident to electrically programmable memorydevices on board mainboards or other types of integrated hardware carriers.B.Application software such as word processors which perform productive tasks for users.C.Middleware which controls and co-ordinates distributed systems.38.Software engineering is related to the disciplines of ___ADE_____A.project managementB. natural languageC. netural networkD. systems engineeringE. computer science39.What make it is difficult to agree on how to count viruses? ABCDA.some viruses can create different versions when they infect other programsB.just a trivial change may create a new virusC.some viruses can use polymorphic techniqueD.new virus arise from an existing virus40. A virus is a program that reproduces its own code by (ABC ).A.ins_erting into the middle of a fileB. simply placing a pointerC. adding to the end of a fileD. replacing another program41.Input devices include: ____ABCD______.A.the keyboardB. microphoneC. touch screenD. the mouse42.Viruses all have two phases to their execution, the ( ) and the ( AD).A.attack phaseB. create phaseC. del_ete phaseD. infection phase43.The equipment (BC ).A.manipulates digital information internally in serial formB.manipulates digital information internally in word unitsC.transfers the number of bits in serial formD.transfers the number of bits in parallel44.Office automation is___CD_______.A.. the computerB. communications technologyC. the application of computerD. used to improve the productivity of people45.The types (classes, structs, enums, and so on) associated with each .NET data provider are located in their own namespaces are: ABCDEA.System.Data.SqlClient. Contains the SQL Server .NET Data Provider types.B.System.Data.Odbc. Contains the ODBC .NET Data Provider types.C.System.Data. Contains provider-independent types such as the DataSet and DataTable.D.System.Data.OracleClient. Contains the Oracle .NET Data ProviderE.System.Data.OleDb. Contains the OLE DB .NET Data Provider types.46.C++ is __ACD________.A.extended from CB. a superset of CC. object-orientedD. procedure-oriented47.Some viruses, with no attack phase, often damage the programs or disks they infect because they (AD ).A.have bugs in themB. show messages on your screenC. steal storageD. contain poor quality code48.Windows 2000 is ( A).A.an inventive technologyB. used for building a scalable networkB.the same as Windows NT D. new lease of Windows49.Some common applications related to electronic commerce are the following:A.TeleconferencingB. Online bankingC. EmailD. Instant messagingE. Enterprise content managementF. NewsgroupsG. Shopping cart software50. A program is a sequence of ( ) that can be executed by a computer.It can either be built into the hardware or exist independently in the form of (BC ).A.hardwareB. softwareC. instructionsD. data51.Electronic payments include ___ABCD______.A.credit card paymentsB. electronic checksC. digital currenciesD. cash payment52.The web browsers which is normal used, such as____ABCD_____.A.OpraB. Internet ExplorerC. FirefoxD. Apple SafariE. ICQputer programs fall into two major classes: __AC____and ____.A.application programsB. application suiteC. operating systemsD. database application54.Database connection ( B) allows an application to reuse an existing connection from a pool instead of repeatedly establishing a new connection with the database.A.pondB. poolingC. linkD. connection55.The development process in the software life cycle involves four phases: analysis, design, implementation, and (ABCE ).A.implementationB. designC. analysisD. auditE. testing56.Hypermedia include ( ABCDEF)A.video clipsB. imagesC. textD. flashE. vidoeF. sounds57.An asleep state is_____ABD_____ed to lessen wear-and tear on the computerB. used for saving energyC. indicated by the indicator light putting outD. a low power standby mode58.Electronic payments include (ABCD ).A.digital currenciesB. electronic checksC. credit card paymentsD. cash payment59.You want to (BCD ) maybe wake up a virus that has residented in memory.A.del( )ete a fileB. access a disketteC. execute a programD. copy a file60.Before you turn the power on with a new computer, you should make sure_____ABCD_____A.the computer system has been set upB. the computer is already out of the boxB.appropriate software have been installed D. appropriate cables are correctly connected61.Security is usually enforced through ___ABE________.A.access controlB. encryptionC. data retrievingD. data storingE. auditingputer programming is the process of ABCD__the source code of computer programs.A. testingB. maintainingC. debuggingD. writing63.Queues that occur everyday life can be seen ( ABCD).A.as automobiles waiting for a traffic lightB. as people waiting for service at a bankC. in certain societies lacking equalityD. in an emergency room of a hospital64.Static graphics include____AB______.A.animatorsB. photographsC. moviesD. pictures66.which is the threat to computer security in the following choices ? ABCDA. Computer CriminalsB. Human ErrorsC. Computer CrimeD. earthquake65.The attributes of the stack are______A____.A.queueB. FIFOC. built into their circuitryD. LIFO66.If a virus simply reproduce and have no cause for an attack phase, but it will still ( ) without your permission. BDA.play musicB. stealing storageC. del( )ete filesD. pilfer CPU cycles67.According to the text,modern digital computers can be divided into four major categories on the basis of cost and performance.They are _______ABDE___________. A.minicomputers B. mainframes C. note book D. workstation E. microcomputers F. lenovo68.The Application layer in TCP/IP Model is correspond to (ABD ) in OSI ModelA.Presentation LayerB. Session LayerC. Transport LayerD. Application LayerE. Network Layer69. A computer system user generally more cares for___ABD_______A.speed of computationB. storage sizeC. physical size of the computerD. efficiency of the computer71.Cache is____ABC______A. slowB. high costC. fastD. relatively small72.We can say a bus is simply_____ABC_____ .A. a wireB. a 16-bit busC. a group of wiresD. a 8-bit bus73.Viruses can delay their attack for (ABCD ).A.yearsB. monthsC. weeksD. days74.In order to increase our computer’s performance we need to____BCD______A.buy a L1 cacheB. have a much larger main memoryC. have a L2 cacheD. buy a L2 cache75.The software that controls the interaction between the input and output hardware is called BIOS,which stands of __A________A.Basic Input Output SystemB. Classic Input Output SystemB.Advanced Input Output System D. Junior Input Output System76.To enhance performance of a computer system we should____ACD______A.improve the pattern of referencing operandB. optimize the simple movement of dataC. optimize the basic sequence control mechanismD. use IF and LOOP instructions as many as possible77.Their company used international lawyers to prosecute a crime ring involving software ____A____in Thailand.A.piracyB. copyingC. duplicationD. cloning78.The software that controls the interaction between the input and output hardware is called BIOS,which stands of (B)A.Advanced Input Output SystemB. Basic Input Output SystemC. Classic Input Output SystemD. Junior Input Output System79.Some viruses use ( AC) and ( ) techniques to hide their existence.A.stealthB. quickly spreadC. polymorphicD. replace a part of system software80.Middleware lies in______ACD____A.the middle of interactions between different application programsB.the top of the layering vertical stackC.the top of an operating systemD.the middle of the layering vertical stack81.Software includes ( ACDE) etcA.video gamesB. all kinds of filesC. programsD. websitesE. mobile application82.The major functional components of an office automation system include: ___ABCD__A.electronic mailB. personal assistance featuresC. information storage and retrievalD. text processing83.The Internet carries various information resources and services, such as (ACDEF ) and the inter-linked hypertext documentsA.online chatB. talkingC. electronic mailD. file transferE. online gamingF. file sharing84. A processor is composed of:____ABCD______.A.an arithmeticB. a control unitC. RegistersD. logic unit85.Functions of the compiler used in RISC are ___ABC_______A.to optimize register usageB.to maximize register usageC.to allocate registers to those variables that will be used the most in a given time periodD.to compile a high level language program86. A digital computer is generally made up of five dstinct elements: a central processing unit,(ABCD).A.a busB. input devicesC. memeory storage devicesD. output devicesE. crt screen87.There are AB (CD)_between the DTEs.A.digital-to-analog converterB. the modemC. communications equipmentD. will be replaced by an upd_ated standard88.What make it is difficult to agree on how to count viruses? ABCDA.just a trivial change may create a new virusB.some viruses can use polymorphic techniqueC.some viruses can create different versions when they infect other programsD.new virus arise from an existing virus89.which aspect have to be considered in the design of a piece of software. ABCDEFGA.Fault-toleranceB. ExtensibilityC. ModularityD. CompatibilityE.MarketabilityF. PackagingG. Maintainability90.Active Directory can help you (ACD ).A.build a complex international networkB. deliver complete enterprise security by itselfC.manage every resource with a single logonD. get off the limits of down level networks91.Early computer solved_____CD_____ problems.A.controlB. engineeringC. mathematicalD. business applications92.The tools which Programming software usually provides include: ABCDEA.debuggersB. text editorsC. linkersD. compilersE. interpreters93.DTE is ( AB).A.data terminal equipmentB.the last piece of equipment that belonged to the subscriber in a data link systemC.satelliteD. Digital T-carrier94.According to the text,modern digital computers can be divided into four major categories on the basis of cost and performance.They are ( BDEF).A.note bookB. microcomputersC. lenovoD. minicomputersE. workstationF. mainframes95.which is the type of electronic commerce in the following choice ACA.B2BB. C2CC. B2C96.The operations of a structured data type might act on (ABCD ).A.a stackB. the values of the data typeC. component elements of the data structureD. a queue97.Types of media include__ACD________.A.textB. animationC. audioD. full-motion video98. A virus is a program that reproduces its own code by (ABC ).A.simply placing a pointerB. adding to the end of a fileC. ins( )erting into the middle of a fileD. replacing another program99.According to the text,the author mentions three of the most commonly used types of printer.They are (BDE ).A.belt printerB. dot-matrix printers;C. array printerD. laser printerE. inkjet printers100.The end equipment in a communication system includes ___ABD_______A.keyboardsB. DCEC. CRTsD. computers101.Software includes _____ACDE________etcA.programsB. all kinds of filesC. video gamesD. websitesE. mobile application102.With .NET, Microsoft is opening up a channel both to ( ) in other programming languages and to ( BC). (developers; components)A.coderB. developersC. componentsD. architecturemon contemporary operating systems include (ABCD ).A.LinuxB. Microsoft WindowsC. SolarisD. Mac OS104.A mechanism for translating Internet hostnames into IP addresses is___BCD_______A.equipped into the general-purpose operating systemB.typically inside of operating system kernelC.as a middleware by author’s definitionD.typically outside of operating system kernel105.RISC is____ABC______ed for many computer manufacturers nowadaysB.guided to be built from studying the execution behavior of high-level language programsC.abbreviation of reduced instruction set computerD.abbreviation of complex instruction set computer106.With .NET, Microsoft is opening up a channel both to _BC_______in other programming languages and to ________. (developers; components)A.coderB. componentsC. developersD. architecture107.The tools which Programming software usually provides include: ABCDEpilersB. interpretersC. text editorsD. linkersE. debuggers108.The following products of software are belong to middleware____BCD______A.OracleB. IBM’s Web Sphere MQC. Java 2 PlatformD. J2EE109.The system manager used by a fast processor can____BCD______A.connect a networkB. monitor processor’s core temperatureC. monitor processor’s supply voltagesD. reset a system110.Queues that occur everyday life can be seen (ABCD ).A.as automobiles waiting for a traffic lightB. as people waiting for service at a bankC. in an emergency room of a hospitalD. in certain societies lacking equality111.C++ include the following pillars: ____ABCD______.A.data hidingB. polymorphismC. encapsulationD. inheritance112.Windows 2000 is____ACD______A.new lease of WindowsB. an inventive technologyC. the same as Windows NTD. used for building a scalable network113.We use paged virtual memory to___ABCD_______A.extend the size of memoryB. reduce latency of the diskC. store large program and data setD. increase bandwidth of the disk114.According to the physical size of computers we can classify the __ABCD____ computers into A. supercomputer B. minicomputer C. microcomputer D. mainframe115.Some common applications related to electronic commerce are the following: ABCDEFGA.EmailB. TeleconferencingC. Instant messagingD. Shopping cart softwareE.NewsgroupsF. Enterprise content managementG. Online banking116.One machine cycle in RISC has _B_________A.two machine instructionsB. one machine instructionC. four machine instructionsD. three machine instructions117.The function of computer hardware is typically divided into three main categories.They are____ADE_____.A.inputB. motherboardC. cpuD. storageE. output118.Active Directory supports ( ABCD).A.granular access controlB. inheritanceC. encapsulationD. delegation of administrative task119.The core of SQL is formed by a command language that allows the (ACDE ) and performing management and administrative functions.A.deletion of dataB. process of dataC. updating of dataD. retrieval of dataE. ins( )ertion of data120.Some commentators say the outcome of the information revolution is likely to be as profound as the shift in (ABCD )A.industrialB. agriculturalC. Service IndustryD. handicraft industry。
100个信息工程专业术语中英文全文共3篇示例,供读者参考篇1Information engineering is a vast field that covers a wide range of knowledge and skills. In this article, we will introduce 100 important terms and concepts in information engineering, both in English and Chinese.1. Artificial Intelligence (AI) - 人工智能2. Machine Learning - 机器学习3. Deep Learning - 深度学习4. Natural Language Processing (NLP) - 自然语言处理5. Computer Vision - 计算机视觉6. Data Mining - 数据挖掘7. Big Data - 大数据8. Internet of Things (IoT) - 物联网9. Cloud Computing - 云计算10. Virtual Reality (VR) - 虚拟现实11. Augmented Reality (AR) - 增强现实12. Cybersecurity - 网络安全13. Cryptography - 密码学14. Blockchain - 区块链15. Information System - 信息系统16. Database Management System (DBMS) - 数据库管理系统17. Relational Database - 关系数据库18. NoSQL - 非关系型数据库19. SQL (Structured Query Language) - 结构化查询语言20. Data Warehouse - 数据仓库21. Data Mart - 数据集市22. Data Lake - 数据湖23. Data Modeling - 数据建模24. Data Cleansing - 数据清洗25. Data Visualization - 数据可视化26. Hadoop - 分布式存储和计算框架27. Spark - 大数据处理框架28. Kafka - 流数据处理平台29. Elasticsearch - 开源搜索引擎30. Cyber-Physical System (CPS) - 嵌入式系统31. System Integration - 系统集成32. Network Architecture - 网络架构33. Network Protocol - 网络协议34. TCP/IP - 传输控制协议/互联网协议35. OSI Model - 开放系统互连参考模型36. Router - 路由器37. Switch - 交换机38. Firewall - 防火墙39. Load Balancer - 负载均衡器40. VPN (Virtual Private Network) - 虚拟专用网络41. SDN (Software-Defined Networking) - 软件定义网络42. CDN (Content Delivery Network) - 内容分发网络43. VoIP (Voice over Internet Protocol) - 互联网语音44. Unified Communications - 统一通信45. Mobile Computing - 移动计算46. Mobile Application Development - 移动应用开发47. Responsive Web Design - 响应式网页设计48. UX/UI Design - 用户体验/用户界面设计49. Agile Development - 敏捷开发50. DevOps - 开发与运维51. Continuous Integration/Continuous Deployment (CI/CD) - 持续集成/持续部署52. Software Testing - 软件测试53. Bug Tracking - 缺陷跟踪54. Version Control - 版本控制55. Git - 分布式版本控制系统56. Agile Project Management - 敏捷项目管理57. Scrum - 敏捷开发框架58. Kanban - 看板管理法59. Waterfall Model - 瀑布模型60. Software Development Life Cycle (SDLC) - 软件开发生命周期61. Requirements Engineering - 需求工程62. Software Architecture - 软件架构63. Software Design Patterns - 软件设计模式64. Object-Oriented Programming (OOP) - 面向对象编程65. Functional Programming - 函数式编程66. Procedural Programming - 过程式编程67. Dynamic Programming - 动态规划68. Static Analysis - 静态分析69. Code Refactoring - 代码重构70. Code Review - 代码审查71. Code Optimization - 代码优化72. Software Development Tools - 软件开发工具73. Integrated Development Environment (IDE) - 集成开发环境74. Version Control System - 版本控制系统75. Bug Tracking System - 缺陷跟踪系统76. Code Repository - 代码仓库77. Build Automation - 构建自动化78. Continuous Integration/Continuous Deployment (CI/CD) - 持续集成/持续部署79. Code Coverage - 代码覆盖率80. Code Review - 代码审查81. Software Development Methodologies - 软件开发方法论82. Waterfall Model - 瀑布模型83. Agile Development - 敏捷开发84. Scrum - 看板管理法85. Kanban - 看板管理法86. Lean Development - 精益开发87. Extreme Programming (XP) - 极限编程88. Test-Driven Development (TDD) - 测试驱动开发89. Behavior-Driven Development (BDD) - 行为驱动开发90. Model-Driven Development (MDD) - 模型驱动开发91. Design Patterns - 设计模式92. Creational Patterns - 创建型模式93. Structural Patterns - 结构型模式94. Behavioral Patterns - 行为型模式95. Software Development Lifecycle (SDLC) - 软件开发生命周期96. Requirement Analysis - 需求分析97. System Design - 系统设计98. Implementation - 实施99. Testing - 测试100. Deployment - 部署These terms are just the tip of the iceberg when it comes to information engineering. As technology continues to advance, new terms and concepts will emerge, shaping the future of this dynamic field. Whether you are a student, a professional, or just someone interested in technology, familiarizing yourself with these terms will help you navigate the complex world of information engineering.篇2100 Information Engineering Professional Terms in English1. Algorithm - a set of instructions for solving a problem or performing a task2. Computer Science - the study of computers and their applications3. Data Structures - the way data is organized in a computer system4. Networking - the practice of linking computers together to share resources5. Cybersecurity - measures taken to protect computer systems from unauthorized access or damage6. Software Engineering - the application of engineering principles to software development7. Artificial Intelligence - the simulation of human intelligence by machines8. Machine Learning - a type of artificial intelligence that enables machines to learn from data9. Big Data - large and complex sets of data that require specialized tools to process10. Internet of Things (IoT) - the network of physical devices connected through the internet11. Cloud Computing - the delivery of computing services over the internet12. Virtual Reality - a computer-generated simulation of a real or imagined environment13. Augmented Reality - the integration of digital information with the user's environment14. Data Mining - the process of discovering patterns in large data sets15. Quantum Computing - the use of quantum-mechanical phenomena to perform computation16. Cryptography - the practice of securing communication by encoding it17. Data Analytics - the process of analyzing data to extract meaningful insights18. Information Retrieval - the process of finding relevant information in a large dataset19. Web Development - the process of creating websites and web applications20. Mobile Development - the process of creating mobile applications21. User Experience (UX) - the overall experience of a user interacting with a product22. User Interface (UI) - the visual and interactive aspects of a product that a user interacts with23. Software Architecture - the design and organization of software components24. Systems Analysis - the process of studying a system's requirements to improve its efficiency25. Computer Graphics - the creation of visual content using computer software26. Embedded Systems - systems designed to perform a specific function within a larger system27. Information Security - measures taken to protect information from unauthorized access28. Database Management - the process of organizing and storing data in a database29. Cloud Security - measures taken to protect data stored in cloud computing environments30. Agile Development - a software development methodology that emphasizes collaboration and adaptability31. DevOps - a set of practices that combine software development and IT operations to improve efficiency32. Continuous Integration - the practice of integrating code changes into a shared repository frequently33. Machine Vision - the use of cameras and computers to process visual information34. Predictive Analytics - the use of data and statistical algorithms to predict future outcomes35. Information Systems - the study of how information is used in organizations36. Data Visualization - the representation of data in visual formats to make it easier to understand37. Edge Computing - the practice of processing data closer to its source rather than in a centralized data center38. Natural Language Processing - the ability of computers to understand and generate human language39. Cyber Physical Systems - systems that integrate physical and computational elements40. Computer Vision - the ability of computers to interpret and understand visual information41. Information Architecture - the structural design of information systems42. Information Technology - the use of computer systems to manage and process information43. Computational Thinking - a problem-solving approach that uses computer science concepts44. Embedded Software - software that controls hardware devices in an embedded system45. Data Engineering - the process of collecting, processing, and analyzing data46. Software Development Life Cycle - the process of developing software from conception to deployment47. Internet Security - measures taken to protectinternet-connected systems from cyber threats48. Application Development - the process of creating software applications for specific platforms49. Network Security - measures taken to protect computer networks from unauthorized access50. Artificial Neural Networks - computational models inspired by the biological brain's neural networks51. Systems Engineering - the discipline that focuses on designing and managing complex systems52. Information Management - the process of collecting, storing, and managing information within an organization53. Sensor Networks - networks of sensors that collect and transmit data for monitoring and control purposes54. Data Leakage - the unauthorized transmission of data to an external source55. Software Testing - the process of evaluating software to ensure it meets requirements and functions correctly56. Internet Protocol (IP) - a set of rules for sending data over a network57. Machine Translation - the automated translation of text from one language to another58. Cryptocurrency - a digital or virtual form of currency that uses cryptography for security59. Software Deployment - the process of making software available for use by end-users60. Computer Forensics - the process of analyzing digital evidence for legal or investigative purposes61. Virtual Private Network (VPN) - a secure connection that allows users to access a private network over a public network62. Internet Service Provider (ISP) - a company that provides access to the internet63. Data Center - a facility that houses computing and networking equipment for processing and storing data64. Network Protocol - a set of rules for communication between devices on a network65. Project Management - the practice of planning, organizing, and overseeing a project to achieve its goals66. Data Privacy - measures taken to protect personal data from unauthorized access or disclosure67. Software License - a legal agreement that governs the use of software68. Information Ethics - the study of ethical issues related to the use of information technology69. Search Engine Optimization (SEO) - the process of optimizing websites to rank higher in search engine results70. Internet of Everything (IoE) - the concept of connecting all physical and digital objects to the internet71. Software as a Service (SaaS) - a software delivery model in which applications are hosted by a provider and accessed over the internet72. Data Warehousing - the process of collecting and storing data from various sources for analysis and reporting73. Cloud Storage - the practice of storing data online in remote servers74. Mobile Security - measures taken to protect mobile devices from security threats75. Web Hosting - the service of providing storage space and access for websites on the internet76. Malware - software designed to harm a computer system or its users77. Information Governance - the process of managing information to meet legal, regulatory, and business requirements78. Enterprise Architecture - the practice of aligning an organization's IT infrastructure with its business goals79. Data Backup - the process of making copies of data to protect against loss or corruption80. Data Encryption - the process of converting data into a code to prevent unauthorized access81. Social Engineering - the manipulation of individuals to disclose confidential information82. Internet of Medical Things (IoMT) - the network of medical devices connected through the internet83. Content Management System (CMS) - software used to create and manage digital content84. Blockchain - a decentralized digital ledger used to record transactions85. Open Source - software that is publicly accessible for modification and distribution86. Network Monitoring - the process of monitoring and managing network performance and security87. Data Governance - the process of managing data to ensure its quality, availability, and security88. Software Patch - a piece of code used to fix a software vulnerability or add new features89. Zero-Day Exploit - a security vulnerability that is exploited before the vendor has a chance to patch it90. Data Migration - the process of moving data from one system to another91. Business Intelligence - the use of data analysis tools to gain insights into business operations92. Secure Socket Layer (SSL) - a protocol that encrypts data transmitted over the internet93. Mobile Device Management (MDM) - the practice of managing and securing mobile devices in an organization94. Dark Web - the part of the internet that is not indexed by search engines and often used for illegal activities95. Knowledge Management - the process of capturing, organizing, and sharing knowledge within an organization96. Data Cleansing - the process of detecting and correcting errors in a dataset97. Software Documentation - written information that describes how software works98. Open Data - data that is freely available for anyone to use and redistribute99. Predictive Maintenance - the use of data analytics to predict when equipment will need maintenance100. Software Licensing - the legal terms and conditions that govern the use and distribution of softwareThis list of 100 Information Engineering Professional Terms in English provides a comprehensive overview of key concepts and technologies in the field of information technology. These terms cover a wide range of topics, including computer science, data analysis, network security, and software development. By familiarizing yourself with these terms, you can better understand and communicate about the complex and rapidly evolving world of information engineering.篇3100 Information Engineering Professional Terms1. Algorithm - 算法2. Artificial Intelligence - 人工智能3. Big Data - 大数据4. Cloud Computing - 云计算5. Cryptography - 密码学6. Data Mining - 数据挖掘7. Database - 数据库8. Deep Learning - 深度学习9. Digital Signal Processing - 数字信号处理10. Internet of Things - 物联网11. Machine Learning - 机器学习12. Network Security - 网络安全13. Object-Oriented Programming - 面向对象编程14. Operating System - 操作系统15. Programming Language - 编程语言16. Software Engineering - 软件工程17. Web Development - 网页开发18. Agile Development - 敏捷开发19. Cybersecurity - 网络安全20. Data Analytics - 数据分析21. Network Protocol - 网络协议22. Artificial Neural Network - 人工神经网络23. Cloud Security - 云安全24. Data Visualization - 数据可视化25. Distributed Computing - 分布式计算26. Information Retrieval - 信息检索27. IoT Security - 物联网安全28. Machine Translation - 机器翻译29. Mobile App Development - 移动应用开发30. Software Architecture - 软件架构31. Data Warehousing - 数据仓库32. Network Architecture - 网络架构33. Robotics - 机器人技术34. Virtual Reality - 虚拟现实35. Web Application - 网页应用36. Biometrics - 生物识别技术37. Computer Graphics - 计算机图形学38. Cyber Attack - 网络攻击39. Data Compression - 数据压缩40. Network Management - 网络管理41. Operating System Security - 操作系统安全42. Real-Time Systems - 实时系统43. Social Media Analytics - 社交媒体分析44. Blockchain Technology - 区块链技术45. Computer Vision - 计算机视觉46. Data Integration - 数据集成47. Game Development - 游戏开发48. IoT Devices - 物联网设备49. Multimedia Systems - 多媒体系统50. Software Quality Assurance - 软件质量保证51. Data Science - 数据科学52. Information Security - 信息安全53. Machine Vision - 机器视觉54. Natural Language Processing - 自然语言处理55. Software Testing - 软件测试56. Chatbot - 聊天机器人57. Computer Networks - 计算机网络58. Cyber Defense - 网络防御60. Image Processing - 图像处理61. IoT Sensors - 物联网传感器62. Neural Network - 神经网络63. Network Traffic Analysis - 网络流量分析64. Software Development Life Cycle - 软件开发周期65. Data Governance - 数据治理66. Information Technology - 信息技术67. Malware Analysis - 恶意软件分析68. Online Privacy - 在线隐私69. Speech Recognition - 语音识别70. Cyber Forensics - 网络取证71. Data Anonymization - 数据匿名化72. IoT Platform - 物联网平台73. Network Infrastructure - 网络基础设施74. Predictive Analytics - 预测分析75. Software Development Tools - 软件开发工具77. Information Security Management - 信息安全管理78. Network Monitoring - 网络监控79. Software Deployment - 软件部署80. Data Encryption - 数据加密81. IoT Gateway - 物联网网关82. Network Topology - 网络拓扑结构83. Quantum Computing - 量子计算84. Software Configuration Management - 软件配置管理85. Data Lakes - 数据湖86. Infrastructure as a Service (IaaS) - 基础设施即服务87. Network Virtualization - 网络虚拟化88. Robotic Process Automation - 机器人流程自动化89. Software as a Service (SaaS) - 软件即服务90. Data Governance - 数据治理91. Information Security Policy - 信息安全政策92. Network Security Risk Assessment - 网络安全风险评估93. Secure Software Development - 安全软件开发94. Internet Security - 互联网安全95. Secure Coding Practices - 安全编码实践96. Secure Network Design - 安全网络设计97. Software Security Testing - 软件安全测试98. IoT Security Standards - 物联网安全标准99. Network Security Monitoring - 网络安全监控100. Vulnerability Management - 漏洞管理These terms cover a wide range of topics within the field of Information Engineering, and are essential in understanding and discussing the various aspects of this discipline. It is important for professionals in this field to be familiar with these terms in order to effectively communicate and collaborate with others in the industry.。
CMMI 22个PA缩写及主要内容关键字:CMMI,CMMI PA CMMI 22个PA缩写EPG:工程过程组(Engineering Process Group)MSG:管理指导组/高层管理组(Management Steering Group)SPI:软件过程改进(Software Process Improvement)PAT:过程行动组(Process Action Team)PA:过程域(Process Area)PP:项目策划(Project Planning)PMC:项目监控(Project Monitoring and Control)IPM:集成的项目管理(Integrated Project Management)RSKM:风险管理(Risk Management)CM:配置管理(Configuration Management)PPQA:过程和产品质量保证(Process and Product Quality Assurance)MA:度量和分析(Measurement and Analysis)DAR:决策分析和解决方案(Decision Analysis and Resolution)REQM:需求管理(Requirements Management)RD:需求开发(Requirements Development)TS:技术解决方案(Technical Solution)PI:产品集成(Product Integration)Ver:验证(Verification)Val:确认(Validation)OPF:组织过程焦点(Organization Process Focus)OPD:组织过程定义(Organization Process Definition)OT:组织培训(Organizational Training)主要内容有:1. CM:(Configuration Management)软件配置管理。
软件测试⾯试题宝典--最经典⾯试(⼀篇⾜矣)问:你在测试中发现了⼀个bug ,但是开发经理认为这不是⼀个bug ,你应该怎样解决?1. 将问题提交到缺陷管理库⾥⾯进⾏记录。
2. 要获取判断的依据和标准:根据需求说明书、产品说明、设计⽂档等,确认实际结果是否与计划有不⼀致的地⽅,提供缺陷是否确认的直接依据;如果没有⽂档依据,可以根据类似软件的⼀般特性来说明是否存在不⼀致的地⽅,来确认是否是缺陷;根据⽤户的⼀般使⽤习惯,来确认是否是缺陷;3. 与设计⼈员、开发⼈员和客户代表等相关⼈员探讨,确认是否是缺陷;4. 合理的论述,向测试经理说明⾃⼰的判断的理由,注意客观、严谨,不参杂个⼈情绪。
5. 等待测试经理做出最终决定,如果仍然存在争议,可以通过公司政策所提供的渠道,向上级反映,并有上级做出决定。
问:给你⼀个⽹站,你如何测试?1. 查找需求说明、⽹站设计等相关⽂档,分析测试需求。
2. 制定测试计划,确定测试范围和测试策略,⼀般包括以下⼏个部分:功能性测试;界⾯测试;性能测试;数据库测试;安全性测试;兼容性测试3. 设计测试⽤例:3.1 功能性测试可以包括,但不限于以下⼏个⽅⾯:(1)链接测试:链接是否正确跳转,是否存在空页⾯和⽆效页⾯,是否有不正确的出错信息返回等。
(2)提交功能的测试。
(3)多媒体元素是否可以正确加载和显⽰。
(4)多语⾔⽀持是否能够正确显⽰选择的语⾔等。
(5)界⾯测试可以包括但不限于⼀下⼏个⽅⾯:页⾯是否风格统⼀,美观页⾯布局是否合理,重点内容和热点内容是否突出控件是否正常使⽤对于必须但为安装的空间,是否提供⾃动下载并安装的功能⽂字检查3.2 性能测试⼀般从以下三个⽅⾯考虑:压⼒测试;负载测试;强度测试3.3 数据库测试要具体决定是否需要开展。
数据库⼀般需要考虑连结性,对数据的存取操作,数据内容的验证等⽅⾯。
3.4 安全性测试:基本的登录功能的检查是否存在溢出错误,导致系统崩溃或者权限泄露关开发语⾔的常见安全性问题检查,例如SQL 注⼊等。
Software testing life cycle The trend of testing is changing and updating day by day. Testers are now learning and using more techniques. Testing is not just finding a few bugs and error in the software it has a more extensive range and scope. Testing is a process which we follow after the development of software to get ensure whether the software is bug-free or not.Software testing is the most critical process in the creation of the software life cycle. Testing also possesses its testing life cycle, so the need for the testing starts from the starting of theprojects. Software testing life cycle follows the same process steps involved in the software development life cycle.As we know before the development of any software, it follows the software development life cycle. In the same manner, the testing phase of software development also supports the software testing life cycle. In this article, we will study the software testing life cycle in- depth and you will get to know about every phase of software development life cycle accurately.Lifecycle: let’s understandSequences of changes from one to another known as a life cycle. These changes can happen at any phase of development. The software testing life cycle is almost similar to the software development life cycle. As we all know software development life cycle involves some steps in sequences. Testing also involves some steps that must be executed in a proper way. The purpose of software testing is the execution of testing activities in such a way so that it could make the software bug free. Hence we can say life cycle is a process of change that can occur at any instance of point in the process of anydevelopment. It is a planned way of executing the entities involved in the life cycleWhat is Software Testing Life Cycle and Why is Testing important?Before talking about the software testing life cycle now, we will talk about why testing is essential?Testing is quite important because with the help of testing we check the whole process and try to find out those potential which can break down the process of any activity.1-It detects the issues and errors that can arise during the software development life cycle. And helps to find out the mistake made by the programmer during the implementation of the software2-It helps to maintain the Quality of the product. If we provide a quality product, it will help us to gain customer confidence.3-Help to find out the bug that can stop the process of development. And we can fix them easily4-It’s essential to ens ure that there should be no failure after the application development Because it can increase the cost, in the future or the later stages of the event.Now we know about the testing and its benefits, let’s talk about the software testing life cycle.Software testing life cycle is a process that involves the execution of specific steps in such a systematic way so that it could give us the surety that after the complete implementation of the process it will provide us desired result. In the software testing life cycle, we make proper planning and precise execution for every activityso that it could perform its desired task. Software testing life cycle has many phases, and every phase has different goals and objective are set.Here are some phases involved in the software testing life cycleRequirement PhaseIn this phase of the software testing life cycle, we examine and study the need for the process. And we arrange a brainstorming session with the other team member and talk about the requirements involved in the whole process,whether they are examinable or not. The primary purpose of this phase is to find the scope of the testing, and if any entity can’t be tested, we take a backup for this situation and make some strategy so that we could overcome such situations.Planning PhasePractically, we can consider the planning phase as the first phase of software testing life cycle. In this phase, we find out the resources and activities, which help us to reach the desired goal. The planning phase is a way of identifying, gathering and tracking the metrics. Wheneverwe do the planning, we should care about all the resources involved in it and. With the help of this, we make a proper strategy for the rest of the process.The planning phase involves two essential factors.Test strategy Risk analysis and mitigationWhat is Test Strategy?Test Strategy means using available resources at one’s disposal and uses them in such a manner so that it could achieve the desired goaleffectively. Test strategy is part of the planning, and it ensures that how the testing objectives would be met adequately to the desired expectations.Here are some advantages of a practical test strategy are;It reduces the possibility of risks which may arise during the STLC.we can focus and analyze the different aspect of the system under the testwe can clear the clarity of the requirements such as people, procedures, tools and infrastructure.Risk analysisRisk analysis is a process of identifying those issues which can make a negative impact on the whole process of development. It could be related to any process either it is software testing life cycle or any business life cycle.With the help of risk analysis, we minimise or avoid the possibility of those events which can affect the whole process and cause an error. It is a process of preparing ourselves for thoseevents which can occur while the development or testing the software.organizations use risk analysis to prevent those events which can be harmful to the process. It helps to minimise the probability of failureBenefits of risk analysis1-Help to identify the overall impact of the risk on the whole process and provide exact details of issues that can arise at any instance of time during the process.2-Improve the overall process.3-Steps in the risk analysis processThere are few steps involved in the risk analysis are given belowConduct a risk management surveyFirst of all, we conduct the risk management survey, and we work on those potentials which can affect the whole body of the process. We talk about those potentials and make a backup plan for them.Identify the risks:After conducting the risk management survey now the second step is to identify the threat and its potential. Once the risk is identified, we move towards the next stepAnalyze the risksOnce the threat is identified we analyse what is kind of risk it is? And what issues it can arise in the whole process.Develop a risk management planafter examining the entire process we develop the risk management plan and work on it in sucha way so that it could be implemented during process failure.Implement the risk management planif we face any issues while the software testing life cycle we implement the backup plan which we made while the risk management processMonitor the risks:<p style="text-align:left"> After implementation, we keep tracking the potential which caused an error in the whole process and makes sure that issue or risk should not arise again.Analysis Phase:In this phase, we identify what could be tested in the software testing life cycle. And behalf of this we perform the analysis process.There are many things which affect the test conditions on behalf of its identification.Product/project risksThe complexity of the productLevels and depth of testingAvailability of the stakeholders.Software development life cycle involved.Test management Skills and knowledge of the team.Design Phase:This phase involves many tasks and defines how to test, the test conditions, and in this phase, we divide the test conditions into the sub-conditions by which we increase the coverage.Identify test data.Identify and create a test environment.Make the requirement traceability metrics.make the test coverage metrics.Implementation Phase:The implementation phase involves the creation of individual test cases. In this phase, we assign the priority level to the test cases and identify which test case will take part in the reversion suite. It is quite necessary to review the test case before finalizing it. And take the accomplishment of the test case before the actual implementation takes place. In case your project consist of automation, identify thecandidate test case for automation and then we should move further for proper scripting of the test case. But the thing is you must not forget to review them.Execution Phase:The execution of all entities in the process takes part in this phase. But the most important thing is before starting the performance make sure that every object is met. Implement the test cases, and simultaneously fill your traceability by which you could trace the whole process.Conclusion Phase:Finally, in this phase of the software testing life cycle, we perform the final process by reporting and making the database. It is necessary because its a requirement of your project and also it depends on stakeholders choice we create a report and ask the stakeholders whether they want monthly or daily reports. Making a report for every single phase and requirements is quite an important thing. In the conclusion phase, we estimate our expenses and review the whole process.Closure Phase:It is the ending phase of software testing life cycle by which ensure whether the expectations are met or not. As we can see software testing life cycle is similar to the software development life cycle, but it is a lit bit more complicated. It involves all the phases involved in any software development life cycle and provides the essential detail of the development.ConclusionNow with the help of this article, we can understand the process of the software testing life cycle and know about the details of every single phase which get involved in the process.The method of software testing life cycle is almost the same as the software development life cycle but with the cycles are essential for the development of any software. Hence we can say we can get the initial idea of the life cycle and its functionality by learning this topic.。
一、软件开发生命周期模型1.Code-and-fix life-cycle model:遗憾的是,许多产品都是使用"边做边改"模型来开发的。
在这种模型中,既没有规格说明,也没有经过设计,软件随着客户的需要一次又一次地不断被修改.在这个模型中,开发人员拿到项目立即根据需求编写程序,调试通过后生成软件的第一个版本。
在提供给用户使用后,如果程序出现错误,或者用户提出新的要求,开发人员重新修改代码,直到用户满意为止。
这是一种类似作坊的开发方式,对编写几百行的小程序来说还不错,但这种方法对任何规模的开发来说都是不能令人满意的,其主要问题在于:(1)缺少规划和设计环节,软件的结构随着不断的修改越来越糟,导致无法继续修改;(2)忽略需求环节,给软件开发带来很大的风险;(3)没有考虑测试和程序的可维护性,也没有任何文档,软件的维护十分困难。
2.Waterfall life-cycle model:1970年WinSTon Royce提出了著名的"瀑布模型",直到80年代早期,它一直是唯一被广泛采用的软件开发模型。
瀑布模型将软件生命周期划分为制定计划、需求分析、软件设计、程序编写、软件测试和运行维护等六个基本活动,并且规定了它们自上而下、相互衔接的固定次序,如同瀑布流水,逐级下落。
在瀑布模型中,软件开发的各项活动严格按照线性方式进行,当前活动接受上一项活动的工作结果,实施完成所需的工作内容。
当前活动的工作结果需要进行验证,如果验证通过,则该结果作为下一项活动的输入,继续进行下一项活动,否则返回修改。
瀑布模型强调文档的作用,并要求每个阶段都要仔细验证。
但是,这种模型的线性过程太理想化,已不再适合现代的软件开发模式,几乎被业界抛弃,其主要问题在于:(1)各个阶段的划分完全固定,阶段之间产生大量的文档,极大地增加了工作量;(2)由于开发模型是线性的,用户只有等到整个过程的末期才能见到开发成果,从而增加了开发的风险;(3)早期的错误可能要等到开发后期的测试阶段才能发现,进而带来严重的后果。
1、Chapter 11.1 What is Software Engineering? Software engineering is the application of engineering principles and techniques to the development, operation, and maintenance of software systems. It is a discipline that involves the application of scientific and mathematical principles to the design, development, and maintenance of software products. Software engineering focuses on the development of efficient, reliable, and maintainable software systems thatmeet the needs of their users.1.2 What is the Software Life Cycle? The software life cycle is the set of stages that a software product goes through from its conception to its retirement. It typically consists of the following stages: Requirements Analysis, Design, Implementation, Testing, Deployment, Maintenance, and Retirement. Requirements Analysis involves gathering information from stakeholders and users to determine the needs of the software. Design involves creating a plan for the software thatmeets the requirements identified during Requirements Analysis. Implementation involves coding the software according to the plan created during Design. Testing involves verifying that the software works as expected. Deployment involves making the software available to its users. Maintenance involves making changes to the software to fix any bugs or to add new features. Retirement involves removing the software from use and archiving any important data or documents associated with it.1.3 What is the Difference Between Software Engineering and Computer Science?Software engineering and computer science are related disciplines, but they are not the same. Software engineering focuses on the development of software products, while computer science focuses on the study of computers and computing. Software engineering involves the design, development, and maintenance of software systems, while computer science involves the study of algorithms, data structures, and programming languages. Softwareengineering focuses on the practical application of engineering principles and techniques to the development of software products, while computer science focuses on the theoretical aspects of computing.2、Chapter 22.1 What is the System Development Life Cycle?The system development life cycle (SDLC) is a process used by software engineers to develop software products. The SDLC consists of six stages: planning, analysis, design, implementation, testing, andmaintenance. During the planning stage, the software engineer collects information from stakeholders and users to determine the scope and requirements of the software product. During the analysis stage, the software engineer analyzes the gathered information to determine the user’s needs and the software’s requirements. During the design stage, the software engineer creates a plan for the software product. During the implementation stage, the software engineer codes the software according to the plan created during the design stage. During thetesting stage, the software engineer verifies that the software works as expected. During the maintenance stage, the software engineer makes changes to the software to fix any bugs or to add new features.2.2 What is the Waterfall Model?The waterfall model is a software development process that follows a linear approach. It is a sequential process where each stage must be completed before the next stage can begin. The stages of the waterfall model are: requirements analysis, design,implementation, testing, deployment, and maintenance. During the requirements analysis stage, the software engineer collects information from stakeholders and users to determine the scope and requirements of the software product. During the design stage, the software engineer creates a plan for the software product. During the implementation stage, the software engineer codes the software according to the plan created during the design stage. During the testing stage, the software engineer verifies that the software works as expected. During thedeployment stage, the software engineer makes the software available to its users. During the maintenance stage, the software engineer makes changes to the software to fix any bugs or to add new features.2.3 What is the Spiral Model?The spiral model is a software development process that follows a cyclical approach. It is an iterative process where each stage is repeated multiple times until the desired result is achieved. The stages of the spiral model are: requirements analysis, design,implementation, testing, deployment, and maintenance. During the requirements analysis stage, the software engineer collects information from stakeholders and users to determine the scope and requirements of the software product. During the design stage, the software engineer creates a plan for the software product. During the implementation stage, the software engineer codes the software according to the plan created during the design stage. During the testing stage, the software engineer verifies that the software works as expected. During the软件工程第四版齐治昌课后答案deployment stage, the software engineer makes the software available to its users. During the maintenance stage, the software engineer makes changes to the software to fix any bugs or to add new features. The spiral model allows the software engineer to quickly make changes and adjustments to the software product as needed.。
软件工程_东北大学中国大学mooc课后章节答案期末考试题库2023年1._______ is a discipline whose aim is the production of fault-free software,delivered on time and within budget, that satisfies the client's needs._______是一个学科,其目标是生产出满足客户的需求的、未超出预算的、按时交付的、没有错误的软件。
答案:2.The relationship between whole-class and part-classes is called ______.整体和部分类之间的关系被称为______。
答案:aggregation3.The relationship between super-class and subclasses is called ______.超类和子类之间的关系称为______。
答案:inheritance4.The strategy of inheritance is to use inheritance wherever _______.继承的策略是在_______的情况下使用继承。
答案:appropriate5._____is to encapsulate the attributes and operations in an object, and hides theinternal details of an object as possible. _____是为了在一个对象中封装属性和操作,并尽可能隐藏对象的内部细节。
Data encapsulation6.Two modules are ________ coupled if they have write access to global data.如果两个模块对全局数据具有写访问权限,则是________耦合。
Software Life-Cycle Models1. Which of the following is not a software life-cycle model?A. build-and-fixB. waterfallC. rapid prototypingD. incrementalE. synchronize and stabilizeF. spiralG. fountainH. all are software life-cycle models2. Which of the following is not a software life-cycle model?A. spiralB. waterfallC. rapid prototypingD. incrementalE. jacuzzi3. In which of the following circumstances might the 'build-and-fix' software life-cycle model be an appropriate one to use?A. large-scale, in-house products with heavy user-involvement in the designstageB. for products utilising an open architecture and complex user-interfaceC. real time systemsD. object-oriented systemsE. short programs that will not need maintenance4. In which of the following circumstances might the spiral software life-cyclemodel be an appropriate one to use?A. large-scale, in-house productsB. for products utilising an open architecture and complex user-interfaceC. real time systemsD. object-oriented systemsE. short programs that will not need maintenance5. In which of the following circumstances might the rapid prototyping software life-cycle model be an appropriate one to use?A. large-scale, in-house productsB. for products with complex user-interface where it is important to meet aparticular client's needsC. real time systemsD. object-oriented systemsE. short programs that will not need maintenance6. In which of the following circumstances might the waterfall software life-cycle model be an appropriate one to use?A. large-scale, in-house productsB. for products utilising an open architecture and complex user-interfaceC. real time systemsD. object-oriented systemsE. large document-driven projects requiring a disciplined approach7. What is a drawback of the synchronise-and-stabilise software life-cycle model?A. it is totally unsatisfactory for nontrivial programs.B. it can only be used for large-scale, in-house products.C. the developers have to be competent in risk analysis and risk resolution.D. it is only suitable for object-oriented systems developed in ADA for theDefence industry.E. it has not been widely used other than at Microsoft.8. Which feature of the waterfall software life-cycle model allows modifications to be made to the deliverables produced at an earlier stage?A. the cascade effectB. re-selection of the best solution, of those developed in parallel, from theprevious stageC. risk analysis and risk resolutionD. no modifications can be made as each stage once signed off by the clientsand developers becomes definitiveE. feedback loops9. A critical point of the waterfall software life-cycle model is that:A. the cascade effect ensures that the product gains momentum through each phase in its development thus ensuring buy-in from the clients.B. re-selection of the best solution, of those developed in parallel, from the previous stage.C. risk analysis and risk resolution are explicitly defined for each stage.D. no modifications can be made as each stage once signed off by the clients and developers becomes definitive.E. no phase is complete until the documentation for that phase has been completed and the deliverables for that phase have been approved by the SQA group.10. Which of the following statements about the waterfall software life-cyclemodel is true?A. Testing is a separate phase that is only conducted once the product isconstructed.B. Once the product is delivered to the client there is no need to maintain the documentation.C. Its strength is in the written documentation available to the client in astyle that makes the nature and characteristics of the product to be deliveredhighly visible.D. No modifications can be made as each stage once signed off by the clientsand developers becomes definitive.E. All of these statements are false.11. To a certain extent the use of the rapid prototyping software life-cycle model is to overcome one of the weaknesses of the waterfall model. To this extent the working model is primarily designed to be evaluated by the:A. developersB. analystsC. test teamD. managersE. end-users12. Which property of the rapid prototype is not important?A. the speed with which it can be developedB. the speed with which it can be modifiedC. its ability to determine the client's real needsD. the insights that the design team can gain from it, even if they are of the'how not to do it' varietyE. its internal structure13. Introducing rapid prototyping into an organization as a front-end to the waterfall model has an additional advantage. It will give management the opportunity to:A. dehire employees assigned to unsuccessful projects.B. remove the unnecessary step of producing documentation.C. put the onus of specifying the requirements fully on the users as they can no longer use the excuse that they did not understand the documentation to request changes to their 'needs'.D. assess the technique while minimising the associated risk.E. All of these are advantages.14. In one sense the Incremental model is a contradiction in terms.A. Like a house, each build (i.e. tradesmen such as plumbers, electricians) must complete their work until the whole (product) can be used.B. It is necessary to change (i.e. maintain) initial builds before the new ones can be added to it. Thus you have to maintain the product before it is completed, thus increasing the amount of work.C. A model is meant to represent one (simplistic) view of the whole. In contrast the incremental model is based on stand-alone building blocks and a view of the overall shape cannot be seen until the last build (block) is in place.D. The initial contract specifies the entire product to be built and the client is required to makeprogress payments every time period (usually monthly) as all increments may be worked on simultaneously and none may delivered within a time increment.E. The developer must design the product as a whole but simultaneously view it as a sequence of builds.15. An additional advantage of the Incremental model is that:A. the customer pays for the entire product initially although the costs (mostly labour) are accrued over time.B. work can begin quickly on the first build (justifying the pre-payment made by the client), although this may lead to more work for the subsequent builds as they are integrated into the earlier ones.C. stability is introduced early in the product's history once the overall architecture is specified and no changes are incorporated until after the last of the builds.D. the client has more time to introduce changes to the organization and there is no need for the parallel runs that accompany the big-bang approach typified by the waterfall and prototyping models.E. as the design is flexible enough to support incremental builds, enhancements undertaken during the maintenance phase can be easily incorporated as they are additional builds.16. An advantage of the Incremental model is that:A. change and adaptation are natural to the modelB. an operational quality product is delivered to the client at each stage.C. as the design is flexible enough to support incremental builds, enhancementsundertaken during the maintenance phase can be easily incorporated as they areadditional builds.D. it reduces the traumatic effect of introducing changes to the organizationas each new increment builds upon the work delivered in the previous one.E. All of these are advantages of the incremental model.17. A disadvantage of the Incremental model is that:A. clients are not billed until the last build is completed.B. it is not easy to accommodate changes that occur due to external(competitive, social and regulatory) forces.C. the model can easily degenerate into the 'build-and-fix' approach.D. There are no advantages of the incremental model - the approach has largelybeen discredited.E. All of these are disadvantages of the incremental model.18. The extreme programming software life-cycle model is an adaptation of the ____________ model.A. build-and-fixB. waterfallC. rapid prototypingD. incrementalE. spiral19. In extreme programming there is no overall design phase before the various builds are constructed. Instead the design is modified while the product is being built. This procedure is termed:A. regressionB. synchronizationC. stabilizationD. refactoringE. incrementing20. In extreme programming, the first step is that the software development teamdetermine the various features that the client would like the product to support. These are termed:A. buildsB. function pointsC. feature pointsD. storiesE. increments21. In extreme programming, what is the first step in a task that is to be part of a build?A. requirement definitionB. designingC. testingD. programmingE. documentation22. Which of the following is not a feature of extreme programming (XP)?A. computers of the XP team are set up in the centre of a large roomB. a client works with the XP team at all timesC. no individual can work overtime for more than 2 successive weeksD. there is no specialization, all members work on specification, design, codeand testingE. there is no overall design phaseF. None. That is, all of these are features of extreme programming.23. The synchronise-and-stabilise software life-cycle model is an adaptation ofthe ____________ model.A. build-and-fixB. waterfallC. rapid prototypingD. incrementalE. spiral24. The spiral software life-cycle model is an adaptation of the ____________model(s).A. build-and-fixB. waterfallC. rapid prototypingD. incrementalE. all of the above25. The aim of the synchronisation stage of the synchronise-and-stabilisesoftware life-cycle model is to:A. repair faults found in any earlier releasesB. freeze change requests so that the build can be stabilisedC. draw up the specification documentD. release the current version(s) of the product to the clients based on theversions and releases installed at their various sites.E. put the partially completed components together and test and debug theresulting product26. A disadvantage of the synchronise-and-stabilise software model is that:A. the model cannot be used if the initial specification is incomplete.B. the developers cannot gain an insight into the operation of the product until a build is complete.C. the model can easily degenerate into the 'build-and-fix' approach.D. There are no advantages of the synchronise-and-stabilise model - the approach has largely been discredited.E. All of these are disadvantages of the incremental model.F. the approach needs the existence of a disciplined change control operation before it can be put in place. Thus it is unlikely to be used by the many small software development organizations that typify the industry.27. An example of the risk involved in software development is:A. key personnel may resign before the product is complete.B. the manufacturer of critical components (e.g. the hardware associated with areal-time system) may go bankrupt.C. technology changes may render the product obsolete.D. competitors may market a fully functional lower-cost equivalent package.E. All of these are risks involved in software development.28. A simple way of looking at the spiral software life-cycle model is as a _________ model with each phase preceded by risk analysis.A. build-and-fixB. waterfallC. rapid prototypingD. incrementalE. Synchronize and stabilize29. A simple way of looking at the spiral software life-cycle model is as a waterfall model with each phase proceeded by:A. build-and-fixB. freezingC. synchronizationD. testingE. risk analysis30. There are many risks associated with software development. Which of the following represents the soundest scenario by way of resolving risk?A. adding more people to the project to ensure that it will be completed in time.B. freezing all outstanding change requests until every currently known fault is repairedC. insisting on the use of the waterfall technique to document each stage of a project before agreeing to proceed to the next phase.D. increase the amount of testing immediately prior to the release of the product.E. building a prototype to test say a routing algorithm, the failure of which would otherwise cause widespread disruption to the business.31. Which of the following are limitations of the spiral model?A. It is suited to internal development. For instance, termination of acontract with an external developer may lead to costly litigation.B. For small projects the cost of conducting risk analysis may not be warrantedwhen put alongside the total cost of the product.C. Members of the development team may not be competent risk analysts.D. All of these are limitations on or restrictions to the use of risk analysis.E. There are no limitations on or restrictions to the use of risk analysis.32. How is maintenance treated the spiral model of software development?A. It is not treated at all. This is one of the major limitations of the spiralmodel.B. Maintenance is the last of the four quadrants in the model.C. Maintenance is the first of the four quadrants in the model..D. Maintenance is treated within each quadrant of the model.E. Maintenance is treated as a further iteration of the model.33. A common feature(s) of object-oriented life cycle models is/are:A. iterationB. parallelism (overlap of activities)C. incremental developmentD. All of these are featuresE. None of these are features34. An intrinsic property of software production and the object-oriented paradigm in particular is:A. iterationB. the existence of bugsC. testingD. crisis managementE. All of these are features35. In an analysis of some of the life cycle models, Schach concludes that the_____________ model is the best.A. waterfallB. incrementalC. object-orientedD. spiralE. none of these are "the" best.。
目录Chapter1 (2)Chapter2 (3)Chapter3 (4)Chapter4 (6)Chapter5 (7)Chapter6 (8)Chapter7 (9)Chapter8 (11)Chapter9 (12)Chapter10 (13)Chapter11 (15)Chapter12 (16)Chapter13 (18)Chapter14 (19)Chapter15 (21)Chapter16 (22)Chapter17 (23)Chapter18 (25)Chapter19 (26)Chapter20 (27)Answers to Exercises (29)Chapter1EXERCISESMultiple-choice questions: For each question, choose one of the answers.1. What is software modeling?(a) Developing models of software.(b) Designing software applications before coding.(c) Developing software diagrams.(d) Developing software prototypes.2. What is the Unified Modeling Language?(a) A programming language for describing object-oriented models.(b) A diagramming tool for drawing object-oriented models.(c) A graphical language for describing object-oriented models.(d) A standardized graphical language and notation for describing object-oriented models.3. What is a software architecture?(a) The software inside a building.(b) The structure of a client/server system.(c) The overall structure of a software system.(d) The software classes and their relationships.4. What is a software design notation?(a) Notes about the software design.(b) A graphical or textual description of the software.(c) Documentation of the software.(d) A systematic approach for producing a design.5. What is a software design concept?(a) A graphical or textual description of the software.(b) Documentation of the software.(c) A fundamental idea that can be applied to designing a system.(d) A systematic approach for producing a design.6. What is a software design strategy?(a) A graphical or textual description of the software.(b) A fundamental idea that can be applied to designing a system.(c) A systematic approach for producing a design.(d) An overall plan and direction for developing a design.7. What are software structuring criteria?(a) Fundamental ideas that can be applied to designing a system.(b) Systematic approaches for producing a design.(c) Guidelines used to help in structuring a software system into its components.(d) Overall plans for developing a design.8. What is a software design method?(a) A systematic approach for producing a design.(b) Guidelines used to help in structuring a software system into its components.(c) An overall plan for developing a design.(d) A graphical or textual description of the software.9. What is a platform-independent model (PIM)?(a) A software platform before a commitment is made to a specific hardware platform.(b) A precise model of the software architecture before a commitment is made to a specific platform.(c) A precise model of the software architecture mapped to a specific platform.(d) A graphical or textual description of the software.10. What is a platform-specific model (PSM)?(a) A specific hardware platform.(b) A precise model of the software architecture before a commitment is made to a specific platform.(c) A precise model of the software architecture mapped to a specific platform.(d) A graphical or textual description of the software.Chapter2EXERCISESMultiple-choice questions: For each question, choose one of the answers.1. How is an actor depicted on a use case diagram?(a) An oval(b) A stick figure(c) A box(d) A dashed line2. How is a use case depicted on a use case diagram?(a) An oval(b) A stick figure(c) A box(d) A dashed line3. How is a class depicted on a class diagram?(a) A box with one compartment(b) A box with one or two compartments(c) A box with one, two, or three compartments(d) An oval4. How is an association depicted on a class diagram?(a) A solid line joining two class boxes(b) A dashed line joining two class boxes(c) A diamond touching the upper class box(d) An arrowhead touching the upper class box5. How is public visibility depicted for a class element on a class diagram?(a) + sign(b) −sign(c) # sign(d) ∗sign6. What are the two kinds of UML interaction diagrams?(a) Class diagram and sequence diagram(b) Sequence diagram and communication diagram(c) Class diagram and communication diagram(d) Statechart and communication diagram7. What does an interaction diagram depict?(a) Objects and links(b) Classes and relationships(c) Objects and messages(d) States and events8. What does a statechart diagram depict?(a) Objects and links(b) Classes and relationships(c) Objects and messages(d) States and events9. What is a UML package?(a) A box(b) A grouping of classes(c) A grouping of use cases(d) A grouping of model elements10. What does a deployment diagram depict?(a) The physical configuration of the system in terms of physical classes and physical connections between the classes(b) The physical configuration of the system in terms of physical objects and physical connections between the objects(c) The physical configuration of the system in terms of physical nodes and physical connections between the nodes(d) The physical configuration of the system in terms of physical computers and physical networks between the computersChapter3EXERCISESMultiple-choice questions: For each question, choose one of the answers.1. What is a software life cycle?(a) The life of the software(b) A cyclic approach to developing software(c) A phased approach to developing software(d) The life of software developed in cycles2. What is the waterfall life cycle model?(a) Software developed under a waterfall(b) A process model in which each phase is completed before the next phase is started(c) A process model in which phases are overlapped(d) A process model in which phases are cyclic3. Which of the following is a limitation of the waterfall life cycle model?(a) Software is developed in phases.(b) Each phase is completed before the next phase is started.(c) Software development is cyclic.(d) Software requirements are not properly tested until a working system is available.4. Which of the following approaches can overcome the limitation in the previous question?(a) Phased software development(b) Throwaway prototyping(c) Evolutionary prototyping(d) Incremental development5. What is evolutionary prototyping?(a) Phased software development(b) Throwaway prototyping(c) Risk-driven development(d) Incremental development6. What approach does the spiral model emphasize?(a) Phased software development(b) Throwaway prototyping(c) Risk-driven development(d) Incremental development7. What is the goal of software validation?(a) Building the system(b) Building the right system(c) Building the system right(d) Testing the system8. What is the goal of software verification?(a) Building the system(b) Building the right system(c) Building the system right(d) Testing the system9. What is “white box”testing?(a) Unit testing(b) Integration testing(c) Testing with knowledge of the system internals(d) Testing without knowledge of the software internals10. What is “black box”testing?(a) System testing(b) Integration testing(c) Testing with knowledge of the system internals(d) Testing without knowledge of the software internalsChapter4EXERCISESMultiple-choice questions: For each question, choose one of the answers.1. Which of the following are object-oriented concepts?(a) Modules and interfaces(b) Modules and information hiding(c) Classes, information hiding, and inheritance(d) Concurrency and information hiding2. Which of the following is a characteristic of an object?(a) A function or subroutine(b) A module(c) Groups data and procedures that operate on the data(d) Groups a function and an algorithm3. What is a class?(a) An object instance(b) The implementation of the object(c) A collection of objects with the same characteristics(d) A collection of objects with different characteristics4. What is an operation (also known as method) of a class?(a) Specification and the implementation of a function performed by a class(b) Specification and the implementation of a subroutine provided by a class(c) Specification and the implementation of a function or procedure provided by a class(d) Specification and the implementation of an interface provided by a class5. What is the signature of an operation?(a) The operation’s name(b) The operation’s function or subroutine(c) The operation’s name, parameters, and return value(d) The object’s interface6. What is the interface of a class?(a) The signature of a class(b) The specification of operations provided by the class(c) The internals of the class(d) The implementation of the class7. What is an attribute?(a) A description of a class(b) An internal property of a class(c) A data item held by a class(d) A parameter of a class8. What is information hiding in software design?(a) Hiding information so that it cannot be found(b) Hiding a design decision that is considered likely to change(c) Hiding information to make it secure(d) Encapsulating data in a class9. What is data abstraction?(a) Another name for information hiding(b) Encapsulating data so that its structure is hidden(c) Storing data in a database(d) Storing data in a data structure10. What is inheritance?(a) A mechanism for inheriting characteristics from a parent(b) A mechanism for sharing and reusing code between classes(c) A mechanism for sharing data between classes(d) A mechanism for hiding information between classesChapter5EXERCISESThe following questions relate to the software modeling and design method (COMET) described in this book.Multiple-choice questions: For each question, choose one of the answers.1. What is carried out during requirements modeling?(a) Functional requirements of the system are described in terms of functions, inputs, and outputs.(b) Functional requirements of the system are described in terms of actors and use cases.(c) Functional requirements of the system are described textually.(d) Functional requirements of the system are determined by interviewing users.2. What is carried out during analysis modeling?(a) Developing use case models(b) Developing data flow and entity relationship diagrams(c) Developing static and dynamic models(d) Developing software architectures3. What is carried out during design modeling?(a) Developing use case models(b) Developing data flow and entity relationship diagrams(c) Developing static and dynamic models(d) Developing software architectures4. What is carried out during incremental software construction?(a) Detailed design and coding of the classes in a subset of the system(b) Detailed design, coding, and unit testing of the classes in a subset of the system(c) Coding and unit testing of the classes in a subset of the system(d) Unit and integration testing of the classes in a subset of the system5. What is carried out during incremental software integration?(a) Implementation of the classes in each software increment(b) Unit testing of the classes in each software increment(c) Integration testing of the classes in each software increment(d) System testing of the classes in each software increment6. What is carried out during system testing?(a) White box testing(b) Black box testing(c) Unit testing(d) Integration testingChapter6EXERCISESMultiple-choice questions: For each question, choose one of the answers.1. What is a use case?(a) A case study involving users(b) A sequence of interactions between the user and the system(c) A sequence of interactions between the user and the objects in the system(d) A sequence of user inputs to the system2. What is an actor in a use case?(a) An object inside the system(b) A person who performs on stage(c) An external entity that interacts with the system(d) The customer to whom the system will be delivered3. What is a primary actor?(a) The actor who goes on stage first(b) The actor that starts the use case(c) An actor that participates in the use case(d) An object inside the system4. What is a secondary actor?(a) The actor who goes on stage second(b) The actor that starts the use case(c) An actor that participates in the use case(d) An object inside the system5. What is an alternative sequence in a use case?(a) A sequence that describes an error case(b) A sequence that is different from the main sequence(c) A sequence that describes interactions with a secondary actor(d) A sequence that describes interactions with a primary actor6. What can an inclusion use case be used for?(a) To describe an inclusive use case(b) To describe a lengthy interaction with an actor(c) To describe functionality that is common to more than one use case(d) To describe a use case that includes other use cases7. What can an extension use case be used for?(a) To describe a lengthy interaction with an actor(b) To describe functionality that is common to more than one use case(c) To describe the functionality of a use case that is extended by another use case(s)(d) To describe a conditional part of a different use case that is only executed under certain circumstances8. What can an activity diagram be used for in use case modeling?(a) To depict the sequence of activities executed by all the use cases in the System(b) To depict the sequence of external activities that the use case interacts with(c) To depict the sequence of active objects in a use case(d) To depict the activities in the main and alternative sequences of a use case9. How can a nonfunctional requirement be described in a use case model?(a) In a separate section of the use case description(b) As a use case precondition(c) As a use case postcondition(d) In a separate document10. What is a use case package?(a) A package describing the actors in the system(b) A package describing the use cases in the system(c) A group of related use cases(d) The package of objects that participate in the use caseChapter7EXERCISESMultiple-choice questions: For each question, choose one of the answers.1. What is a class?(a) A course(b) An object instance(c) A client or server in the system(d) A collection of objects with the same characteristics2. What is an attribute?(a) A relationship between two classes(b) A parameter of an operation or method(c) A data value held by an object in a class(d) The return value from an operation3. What is an association?(a) A relationship between two classes(b) A relationship between two objects(c) A link between two classes(d) A link between two objects4. What is meant by the multiplicity of an association?(a) The number of associations in a class(b) The number of associations between two classes(c) How many instances of one class relate to how many instances of another class(d) How many instances of one class relate to a single instance of another class.5. What is an association class?(a) A class with multiple associations(b) A class with one association(c) A class that models an association between two or more classes(d) A class that models an association between two or more objects6. What is a generalization/specialization hierarchy?(a) A whole/part relationship(b) An inheritance relationship(c) An association between a generalized class and a specialized class(d) A layered hierarchy7. What is a composition hierarchy?(a) A weak form of a generalization/specialization hierarchy(b) A strong form of a generalization/specialization hierarchy(c) A weak form of a whole/part relationship(d) A strong form of a whole/part relationship8. What is an aggregation hierarchy?(a) A weak form of a generalization/specialization hierarchy(b) A strong form of a generalization/specialization hierarchy(c) A weak form of a whole/part relationship(d) A strong form of a whole/part relationship9. What does the system context class diagram define?(a) The entity classes in the system(b) How the system interfaces to other systems(c) The boundary between the system and the external environment(d) The context classes in the system10. What is an entity class?(a) A class on an entity/relationship diagram(b) A class that stores data(c) A class that interfaces to an external entity(d) An external classChapter8EXERCISESMultiple-choice questions: For each question, choose one of the answers.1. What is a boundary object?(a) An external object(b) An object that stores data(c) An object that communicates with an external object(d) An object that controls other objects2.What is a control object?(a) An object that depends on other objects(b) An object that communicates with an external object(c) An object that controls other objects(d) An object that is controlled by other objects3. What is a state-dependent control object?(a) An object that depends on a state machine(b) An object that communicates with a state machine(c) An object that controls a state machine(d) An object that executes a state machine4. What is a coordinator object?(a) A manager object(b) An object that makes decisions based on a state machine(c) A decision-making object(d) An object that decides which entity object to interact with5. How would you determine a boundary class from the context diagram?(a) By looking at it(b) By selecting the external classes on the context diagram(c) By determining the software classes that communicate with the external classes(d) By drawing the boundary between the hardware and software classes6. What is a timer object?(a) An external clock(b) An internal clock(c) An object that is awakened by an external timer(d) An object that interacts with a clock7. What do class structuring criteria help with?(a) Structuring an application into classes(b) Defining the attributes of a class(c) Defining the associations of a class(d) Defining the operations of a class8. What is the classification process for application classes analogous to?(a) Categorizing books in a library(b) Deciding how many copies of a book are needed(c) Finding the classrooms in a school(d) Identifying what labs the school has9. What is the purpose of a stereotype in class structuring?(a) To label a class according to its class structuring criterion(b) To identify the objects that belong to the same class(c) To distinguish between external objects and software objects(d) To identify the association between two classes10. What is a business logic object?(a) An object used in business applications(b) An object that defines business-specific application logic(c) The internal logic of an object(d) A business object that determines whether a client request is logical Chapter9EXERCISESMultiple-choice questions: For each question, choose one of the answers.1. What does an interaction diagram depict?(a) The state and transitions inside a control object(b) Classes and their relationships(c) Software objects and the sequence of their interactions(d) The external objects communicating with the system2. How is an actor depicted on an interaction diagram?(a) An actor has an association with the interaction diagram.(b) An actor can provide input to or receive output from a boundary object.(c) An actor can provide input to or receive output from a boundary class.(d) An instance of an actor can provide input to or receive output from a boundary object.3. What does a sequence diagram depict?(a) The sequence of external objects communicating with each other(b) Classes and their relationships(c) Software objects and the sequence of their interactions(d) The external objects communicating with the system4. What does a communication diagram depict?(a) The sequence of external objects communicating with each other(b) Classes and their relationships(c) Software objects and the sequence of their interactions(d) The external objects communicating with the system5. What is the instance form of an interaction diagram?(a) Depicts several object instances interacting with each other(b) Depicts one possible sequence of interactions among object instances(c) Depicts all possible interactions among object instances(d) Depicts all object instances and their links to each other6. What is the generic form of an interaction diagram?(a) Depicts several objects interacting with each other(b) Depicts one possible sequence of interactions among objects(c) Depicts all possible interactions among objects(d) Depicts all classes and their associations with each other7. During dynamic interaction modeling, use cases are realized as follows:(a) Determine objects that participate in each use case and the sequence of interactions among them.(b) Determine external objects and the sequence in which they provide inputs to and receive outputs from each use case.(c) Determine sequence of interactions among use cases.(d) Determine how a use case is depicted through internal states and transitions between them.8. Which of the following interactions could happen on an interaction diagram?(a) An external user sends a message to a user interaction object.(b) An external user sends a message to an entity object.(c) An external user sends a message to an I/O object.(d) An external user sends a message to a printer object.9. Which of the following interactions is NOT likely to happen on an interaction diagram?(a) A user interaction object sends a message to an entity object.(b) An input object sends a message to a state-dependent control object.(c) An input object sends a message to a printer object.(d) A user interaction object sends a message to a proxy object.10. What kind of object would be the first object to receive an input from an external object?(a) A user interaction object(b) A proxy object(c) An entity object(d) A boundary objectChapter10EXERCISESMultiple-choice questions: For each question, choose one of the answers.1. What is a state in a state machine?(a) A recognizable situation that exists over an interval of time(b) A condition that is True or False(c) An input from the external environment(d) An output from the system2. What is an event in a state machine?(a) A discrete signal that causes a change of state(b) An input from the external environment(c) An input that is True or False(d) The result of a state transition3. What is an action in a state machine?(a) An occurrence at a point in time(b) A cause of a state transition(c) An interval between two successive events(d) A computation that executes as a result of a state transition4. What is an entry action in a state machine?(a) An action that is performed when the state is entered(b) An action that is performed when the state is left(c) An action that starts executing when the state is entered and completes executing when the state is left(d) An action that executes as a result of a state transition5. What is an exit action in a state machine?(a) An action that is performed when the state is entered(b) An action that is performed when the state is left(c) An action that starts executing when the state is entered and completes executing when the state is left(d) An action that executes as a result of a state transition6. What is a condition used for in a state machine?(a) A conditional action(b) A conditional state(c) A conditional state transition(d) A conditional event7. What is a state transition into a composite state equivalent to?(a) A transition into only one of the substates(b) A transition into each of the substates(c) A transition into none of the substates(d) A transition into any one of the substates8. What is a state transition out of a composite state equivalent to?(a) A transition out of only one of the substates(b) A transition out of each of the substates(c) A transition out of none of the substates(d) A transition out of any one of the substates9. How does a composite state relate to a substate?(a) A composite state is decomposed into substates.(b) Composite states are composed into substates.(c) A composite state transitions to a substate.(d) A substate transitions to a composite state.10. If two actions are shown on a given state transition, which of the following is true?(a) The two actions are dependent on each other.(b) The two actions are independent of each other.(c) One action provides an input to the other action.(d) The second action executes when the first action completes execution.Chapter11EXERCISESMultiple-choice questions: For each question, choose one of the answers.1. What does a state-dependent interaction involve?(a) A control object(b) A state-dependent entity object(c) A state-dependent control object(d) A state-dependent user interaction object2. Which kind of object executes a state machine(a) Any software object(b) An entity object(c) A state-dependent control object(d) A statechart3. An input message to a state-dependent control object corresponds to:(a) An event on the internal state machine(b) An action on the internal state machine(c) A condition on the internal state machine(d) A state on the internal state machine4. An output message from a state-dependent control object corresponds to:(a) An event on the internal state machine(b) An action on the internal state machine(c) A condition on the internal state machine(d) A state on the internal state machine5. An interaction diagram should be developed for:(a) Only the main sequence of the use case(b) The main sequence and every alternative sequence of the use case(c) The main sequence and a representative alternative sequence of the use case(d) The alternative sequences of the use case6. Which of the following could happen on an interaction diagram?(a) A state-dependent control object sends a message to an entity object.(b) A state-dependent control object sends a message to a coordinator object.(c) A state-dependent control object sends a message to a printer object.(d) All of the above7. If the same state machine is used in more than one use case, how is this modeled on interaction diagrams?(a) Develop one state-dependent control object for each use case.(b) Develop one state-dependent control object containing states from each use case.(c) Develop a hierarchical state machine.(d) Develop a coordinator object.8. How would two state-dependent control objects communicate with each other?(a) By sending messages to each other(b) By transitioning to the same state(c) Through an entity object(d) Through a proxy object9. An object can send alternative messages a or b to a state-dependent control object. How is this handled in the state machine?(a) One state with a different transition out of it for each incoming message(b) One state for each of the alternative messages(c) A composite state to handle the alternative messages(d) A substate for each alternative Message10. In a system in which a client object executes a state machine and communicates with a service, which of the following is true?(a) The client has a state-dependent control object but the service does not.(b) The service has a state-dependent control object but the client does not.(c) Both the client and the service have state-dependent control objects.(d) Neither the client nor the service has a state-dependent control object.Chapter12EXERCISESMultiple-choice questions: For each question, choose one of the answers.1. What does the software architecture describe?(a) The software inside a building(b) The structure of a client/server system(c) The overall structure of a software system(d) The software classes and their relationships2. Which of the following statements is NOT true for a component?(a) A composite object composed of other objects(b) An operation(c) A simple object(d) Provides an interface3. What is a structural view of a software architecture?(a) A view in terms of a module hierarchy(b) A view in terms of components and connectors(c) A view of the physical configuration in terms of nodes and interconnections(d) A view in terms of objects and messages。
CMMI主要内容有:1.CM:(Configuration Management)软件配置管理。
建立和维护在项目的整个软件生存周期中软件项目产品的完整性。
2.DAR:(Decision Analysis and Resolution)。
应用正式的评估过程依据指标评估候选方案,在此基础上进行决策。
3. IPM:(Integrated Project Management)集成项目管理。
根据从组织标准过程剪裁而来的集成的、定义的过程对项目和利益相关者的介入进行管理。
4. Life Cycle:(Software Life Cycle Model)项目管理的生命周期。
关注的是项目的过程管理。
5.MA:(Measurement & Analysis)。
开发并持续发展度量能力以满足项目管理的信息需求。
6.Milestone Review:(Milestone Review)阶段评审。
在阶段结束时评审项目的状态并确定项目是否应该进入下一阶段。
7.OPD:(Organizational Process Definition)组织级过程定义。
建立和维护有用的组织过程资产。
8.OPF:(Organizational Process Focus)组织级过程焦点。
在理解现有过程强项和弱项的基础上计划和实施组织过程改善。
9.OT:(Organizational Training)培训管理。
增加开发人员的技能和知识,使他们能有效地执行他们的任务。
10. PI:(Product Integration)产品集成。
从产品部件组装产品,确保集成产品功能正确并交付产品。
11. PMC:(Project Monitoring and Control)项目监督与控制。
通过项目的跟踪与监控活动,及时反映项目的进度、费用、风险、规模、关键计算机资源及工作量等情况,通过对跟踪结果的分析,依据跟踪与监控策略采取有效的行动,使项目组能在既定的时间、费用、质量要求等情况下完成项目。
软件资格考试信息技术支持工程师(基础知识、应用技术)合卷(中级)自测试卷(答案在后面)一、基础知识(客观选择题,75题,每题1分,共75分)1、在计算机网络中,下列哪种传输介质是使用电磁波在真空中传播的?A、双绞线B、光纤C、同轴电缆D、无线传输2、在软件开发过程中,瀑布模型的主要特点是什么?A、强调需求变更的灵活性B、将软件开发过程划分为若干阶段,每个阶段都有明确的输出和验收标准C、强调代码重用和组件化D、强调团队合作和迭代开发3、题目:以下关于软件工程中软件测试的说法,哪一个是正确的?A. 软件测试的目的是为了证明软件是正确的B. 软件测试是在软件开发完成后进行的C. 软件测试是软件开发过程中的一个重要组成部分D. 软件测试的结果不影响软件的质量4、题目:在软件需求工程中,以下哪个阶段通常用于确定软件系统的功能需求?A. 需求获取B. 需求分析C. 需求规格化D. 需求验证5、在信息系统中,数据仓库与传统数据库的主要区别是什么?6、以下哪个不是信息系统的基本功能?7、在计算机网络中,以下哪个协议负责处理不同网络之间的路由选择问题?A. TCP/IP协议族B. HTTP协议C. FTP协议D. DNS协议8、以下哪个技术用于实现计算机软件的版本控制?A. 数据库管理系统B. 操作系统C. 编译器D. 版本控制系统(VCS)9、题目:以下哪个选项不是软件工程中常用的软件生命周期模型?A. 水晶模型B. 瀑布模型C. 螺旋模型D. 原型模型11、在计算机网络中,OSI模型的哪一层负责数据的传输?A. 物理层B. 数据链路层C. 网络层D. 传输层13、在软件开发过程中,以下哪种需求分析方法适用于需求变更频繁的项目?()A. 结构化分析方法B. 原型化分析方法C. 软件需求规格说明书D. 需求跟踪矩阵15、题目:以下关于软件生命周期模型的说法,哪项是不正确的?A. 瀑布模型是最常用的软件生命周期模型B. V模型强调软件开发的迭代和增量C. RUP(Rational Unified Process)是一种基于迭代和增量的软件生命周期模型D. 瀑布模型适合于需求明确、技术成熟的软件开发项目17、以下哪个协议主要用于在互联网上传输文件?A. HTTPB. FTPC. SMTPD. DNS19、在软件生命周期模型中,哪一个模型强调了需求理解的重要性,并且允许项目过程中对需求的变化做出响应?A. 瀑布模型B. 增量模型C. 敏捷模型D. 螺旋模型21、在计算机网络中,以下哪个协议负责在源主机和目的主机之间建立端到端的连接?A. TCP(传输控制协议)B. UDP(用户数据报协议)C. IP(互联网协议)D. ICMP(互联网控制消息协议)23、在计算机网络中,下列哪项是用于将IP地址转换为物理地址的协议?A. ARPB. RARPC. DNSD. DHCP25、在软件开发过程中,以下哪项不是软件开发生命周期(SDLC)的典型阶段?A. 需求分析B. 系统设计C. 编码实现D. 运维支持27、在下列存储器中,存取速度最快的是:A. 硬盘B. 光盘C. 软盘D. 内存29、以下哪种技术不属于数据库管理系统(DBMS)的基本功能?A. 数据定义B. 数据查询C. 数据备份D. 用户界面设计31、在计算机网络中,用来衡量数据传输可靠性的指标是:A. 误码率B. 频带利用率C. 传输速率D. 信道容量33、以下关于数据结构中二叉树的说法,正确的是()A. 二叉树中每个节点最多只能有两个子节点B. 二叉树中每个节点最多只能有一个子节点C. 二叉树中每个节点可以有0个、1个或2个子节点D. 二叉树中只有根节点可以有0个或1个子节点35、下列关于操作系统的主要功能的描述错误的是?A. 处理器管理B. 存储器管理C. 文件管理D. 信息管理37、题干:在计算机网络中,OSI模型的哪一层负责数据的完整性校验?A. 物理层B. 数据链路层C. 网络层D. 传输层39、下列选项中哪一个不属于数据库管理系统(DBMS)的主要功能?A. 数据定义B. 数据操作C. 数据库的运行管理D. 数据通信41、以下关于TCP/IP协议族的描述中,哪一项是不正确的?A. TCP/IP协议族分为四层:应用层、传输层、网络层和链路层B. IP协议主要负责数据包的路由和寻址C. TCP协议负责提供可靠的、面向连接的、基于字节流的传输服务D. UDP协议是一种无连接的、不可靠的传输协议,适用于对实时性要求较高的应用43、在软件工程中,以下哪个阶段通常被称为“软件开发生命周期的核心阶段”?A. 需求分析B. 系统设计C. 编码实现D. 测试与部署45、在计算机系统中,下列哪项属于存储设备?A. 中央处理器(CPU)B. 内存储器(RAM)C. 外存储器(硬盘)D. 输入设备(键盘)47、在计算机系统中,下列哪种存储器访问速度最快?A. 硬盘B. 内存C. 磁带D. 光盘49、在软件开发过程中,以下哪个阶段不涉及具体的编程工作?A. 需求分析B. 系统设计C. 编码实现D. 测试验证51、在计算机网络中,OSI模型中的哪一层负责处理数据的封装和拆封?53、题干:在计算机网络中,下列哪种网络拓扑结构具有较好的抗干扰能力和稳定性?A. 星型拓扑结构B. 环型拓扑结构C. 树型拓扑结构D. 网状拓扑结构55、在信息系统中,数据库管理系统(DBMS)的主要功能不包括以下哪项?A. 数据定义B. 数据操作C. 数据控制D. 硬件维护57、以下哪种技术不属于云计算的三大服务模式?()A. IaaS(基础设施即服务)B. PaaS(平台即服务)C. SaaS(软件即服务)D. DaaS(数据即服务)59、以下关于软件工程中软件需求规格说明书(SRS)的描述,错误的是()A. 软件需求规格说明书是软件工程中的一种重要文档B. SRS文档描述了系统的功能需求和非功能需求C. SRS文档需要经过评审和确认,以确保其正确性和完整性D. SRS文档是软件开发过程中的一个输出,与软件开发过程无关61、以下哪项不属于软件工程的基本原则?()A. 客观性原则B. 易用性原则C. 可维护性原则D. 安全性原则63、以下关于操作系统内存管理的说法正确的是()A. 分区存储方式只能进行静态分配,不能进行动态分配B. 虚拟存储技术可以提高内存的使用效率,但不能增加内存的物理容量C. 快速交换技术(swap)是操作系统为了解决内存不足而采取的一种内存管理技术D. 分页存储方式下,页表占用空间小,但内存碎片现象严重65、在计算机网络中,OSI模型的哪一层负责数据的传输和路由选择?A. 物理层B. 数据链路层C. 网络层D. 传输层67、在软件开发过程中,以下哪种方法不属于敏捷开发方法?A. 精益软件开发B. ScrumC. 水晶D. 线性开发69、在软件开发过程中,以下哪个阶段是确定软件需求的关键阶段?A. 需求分析B. 设计阶段C. 编码阶段D. 测试阶段71、在信息系统安全领域,以下哪种技术主要用于确保数据的机密性?A. 数字签名B. 防火墙C. 加密算法D. 审计跟踪73、以下哪个选项不是软件工程中的“需求工程”阶段?A. 需求分析B. 需求获取C. 需求评审D. 软件测试75、在以下哪种网络拓扑结构中,所有设备都连接到一个中心设备上,并且如果中心设备出现故障,则整个网络会受到影响?A. 总线型B. 星型C. 环型D. 网状二、应用技术(全部为主观问答题,总5大题,第一题必选,剩下4选2,每题25分,共75分)第一题案例材料:某软件公司承接了一个企业资源规划(ERP)系统的开发项目。
《计算机英语(第2版)》参考答案注:这里仅给出《计算机英语(第2版)》新增或变化课文的答案,其他未改动课文答案参见《计算机英语(第1版)》原来的答案。
Unit OneSection CPDA Prizefight: Palm vs. Pocket PCI. Fill in the blanks with the information given in the text:1. With DataViz’s Documents To Go, you can view and edit desktop documents on your PDA without converting them first to a PDA-specific ________. (format)2. Both Palm OS and Windows Mobile PDAs can offer e-mail via ________ so that new messages received on your desktop system are transferred to the PDA for on-the-go reading. (synchronization)3. The Windows Mobile keyboard, Block Recognizer, and Letter Recognizer are all ________ input areas, meaning they appear and disappear as needed. (virtual)4. Generally speaking, Windows Mobile performs better in entering information and playing ________ files while Palm OS offers easier operation, more ________ programs, better desktop compatibility, and a stronger e-mail application. (multimedia; third-party)II. Translate the following terms or phrases from English into Chinese and vice versa:1. data field数据字段2. learning curve学习曲线3. third-party solution第三方解决方案4. Windows Media Player Windows媒体播放器5. 开始按钮Start button6. 指定输入区designated input area7. 手写体识别系统handwriting-recognition system8. 字符集character setUnit ThreeSection BLonghorn:The Next Version of WindowsI. Fill in the blanks with the information given in the text:1. NGSCB, the new security architecture Microsoft is developing for Longhorn, splits the OS into two parts: a standard mode and a(n) ________ mode. (secure)2. It is reported that Longhorn will provide different levels of operation that disable the more intensive Aero effects to boost ________ on less capable PCs. (performance)3. With Longhorn’s new graphics and presentation engine, we can create and display Tiles on the desktop, which remind us of the old Active Desktop but are based on ________ instead of ________. (XML; HTML)4. The most talked-about feature in Longhorn so far is its new storage system, WinFS, whichworks like a(n) ________ database. (relational)II. Translate the following terms or phrases from English into Chinese and vice versa:1. search box搜索框2. built-in firewall内置防火墙3. standalone application独立应用程序4. active desktop 活动桌面5. mobile device移动设备6. 专有软件proprietary software7. 快速加载键quick-launch key8. 图形加速器graphics accelerator9. 虚拟文件夹virtual folder10. 三维界面three-dimensional interfaceUnit FourSection CArraysI. Fill in the blanks with the information given in the text:1. Given the array called object with 20 elements, if you see the term object10, you know the array is in ________ form; if you see the term object[10], you know the array is in ________ form. (subscript; index)2. In most programming languages, an array is a static data structure. When you define an array, the size is ________. (fixed)3. A(n) ________ is a pictorial representation of a frequency array. (histogram)4. An array that consists of just rows and columns is probably a(n) ________ array. (two-dimensional)II. Translate the following terms or phrases from English into Chinese and vice versa:1. bar chart条形图2. frequency array频率数组3. graphical representation图形表示4. multidimensional array多维数组5. 用户视图user(’s) view6. 下标形式subscript form7. 一维数组one-dimensional array8. 编程结构programming constructUnit FiveSection BMicrosoft .NET vs. J2EEI. Fill in the blanks with the information given in the text:1. One of the differences between C# and Java is that Java runs on any platform with a Java Virtual ________ while C# only runs in Windows for the foreseeable future. (Machine)2. With .NET, Microsoft is opening up a channel both to ________ in other programming languages and to ________. (developers; components)3. J2EE is a single-language platform; calls from/to objects in other languages are possiblethrough ________, but this kind of support is not a ubiquitous part of the platform. (CORBA)4. One important element of the .NET platform is a common language ________, which runs bytecodes in an Internal Language format. (runtime)II. Translate the following terms or phrases from English into Chinese and vice versa:1. messaging model消息收发模型2. common language runtime通用语言运行时刻(环境)3. hierarchical namespace分等级层次的名称空间4. development community开发社区5. CORBA公用对象请求代理(程序)体系结构6. 基本组件base component7. 元数据标记metadata tag8. 虚拟机virtual machine9. 集成开发环境IDE(integrated development environment)10. 简单对象访问协议SOAP(Simple Object Access Protocol)Unit SixSection ASoftware Life CycleI. Fill in the blanks with the information given in the text:1. The development process in the software life cycle involves four phases: analysis, design, implementation, and ________. (testing)2. In the system development process, the system analyst defines the user, needs, requirements and methods in the ________ phase. (analysis)3. In the system development process, the code is written in the ________ phase. (implementation)4. In the system development process, modularity is a very well-established principle used in the ________ phase. (design)5. The most commonly used tool in the design phase is the ________. (structure chart)6. In the system development process, ________ and pseudocode are tools used by programmers in the implementation phase. (flowcharts)7. Pseudocode is part English and part program ________. (logic)8. While black box testing is done by the system test engineer and the ________, white box testing is done by the ________. (user; programmer)II. Translate the following terms or phrases from English into Chinese and vice versa:1. standard graphical symbol标准图形符号2. logical flow of data标准图形符号3. test case测试用例4. program validation程序验证5. white box testing白盒测试6. student registration system学生注册系统7. customized banking package定制的金融软件包8. software life cycle软件生命周期9. user working environment用户工作环境10. implementation phase实现阶段11. 测试数据test data12. 结构图structure chart13. 系统开发阶段system development phase14. 软件工程software engineering15. 系统分析员system(s) analyst16. 测试工程师test engineer17. 系统生命周期system life cycle18. 设计阶段design phase19. 黑盒测试black box testing20. 会计软件包accounting packageIII. Fill in each of the blanks with one of the words given in the following list, making changes if necessary:development; testing; programmer; chart; engineer; attend; interfacessystem; software; small; userdevelop; changes; quality; board; UncontrolledIV. Translate the following passage from English into Chinese:软件工程是软件开发的一个领域;在这个领域中,计算机科学家和工程师研究有关的方法与工具,以使高效开发正确、可靠和健壮的计算机程序变得容易。
软件⽣存周期及其模型是什么?
软件⽣存周期(Software life cycle)⼜称为软件⽣命期,⽣存期。
是指从形成开发软件概念起,所开发的软件使⽤以后,知道失去使⽤价值消亡为⽌的整个过程。
⼀般来说,整个⽣存周期包括计划(定义)、开发、运⾏(维护)三个时期,每个时期⼜划分为若⼲个阶段。
每个阶段有明确的任务。
周期模型(典型的⼏种):
瀑布模型
快速原型模型:快速原型模型允许在需求分析阶段对软件的需求进⾏初步⽽⾮完全的分析和定义,快速设计开发出软件系统的原型,该原型向⽤户展⽰待开发软件的全部或部分功能和性能;⽤户对该原型进⾏测试评定,给出具体改进意见以丰富细化软件需求;开发⼈员据此对软件进⾏修改完善,直⾄⽤户满意认可之后,进⾏软件的完整实现及测试、维护。
迭代模型:迭代包括产⽣产品发布(稳定、可执⾏的产品版本)的全部开发活动和要使⽤该发布必需的所有其他外围元素。
在某种程度上,开发迭代是⼀次完整地经过所有⼯作流程的过程:需求分析、设计、实施和测试⼯作流程。
实质上,它类似⼩型的瀑布式项⽬。
RUP认为,所有的阶段都可以细分为迭代。
每⼀次的迭代都会产⽣⼀个可以发布的产品,这个产品是最终产品的⼀个⼦集。
⽣命周期阶段:
软件计划与可⾏性分析
需求分析
软件设计
编码
软件测试
运⾏与维护。