单选题A company that makes Computer Assisted Design (CAD) software has, within its application, some utilityclasses that are used to perform 3D rendering tasks. The company’s chief scientist has just improved theperformance of one of the utility classes’ key rendering algorithms, and has assigned a programmer toreplace the old algorithm with the new algorithm. When the programmer begins researching the utilityclasses, she is happy to discover that the algorithm to be replaced exists in only one class. The programmer reviews that class’s API, and replaces the old algorithm with the new algorithm, being carefulthat her changes adhere strictly to the class’s API. Once testing has begun, the programmer discovers thatother classes that use the class she changed are no longer working properly. What design flaw is mostlikely the cause of these new bugs?()AInheritanceBTight couplingCLow cohesionDHigh cohesionELoose coupling

单选题
A company that makes Computer Assisted Design (CAD) software has, within its application, some utilityclasses that are used to perform 3D rendering tasks. The company’s chief scientist has just improved theperformance of one of the utility classes’ key rendering algorithms, and has assigned a programmer toreplace the old algorithm with the new algorithm. When the programmer begins researching the utilityclasses, she is happy to discover that the algorithm to be replaced exists in only one class. The programmer reviews that class’s API, and replaces the old algorithm with the new algorithm, being carefulthat her changes adhere strictly to the class’s API. Once testing has begun, the programmer discovers thatother classes that use the class she changed are no longer working properly. What design flaw is mostlikely the cause of these new bugs?()
A

Inheritance

B

Tight coupling

C

Low cohesion

D

High cohesion

E

Loose coupling


参考解析

解析: 暂无解析

相关考题:

听力原文:Although the said company is a sun-rising firm, its accounting management should be improved before the loan is extended to it.(9)A.The company is a sun-rising firm so it is worthwhile to extend the loan.B.The company has some accounting problems, some improvement is needed.C.The company is short of funds because it is sun-rising.D.The company has some accounting problems because it is sun-rising.

A team of programmers is involved in reviewing a proposed design for a new utility class. After some discussion, they realize that the current design allows other classes to access methods in the utility class that should be accessible only to methods within the utility class itself.What design issue has the team discovered?()A.Tight couplingB.Low cohesionC.High cohesionD.Loose couplingE.Weak encapsulationF.Strong encapsulation

A company that makes Computer Assisted Design (CAD) software has, within its application, some utility classes that are used to perform 3D rendering tasks. The company‘s chief scientist has just improved the performance of one of the utility classes‘ key rendering algorithms, and has assigned a programmer to replace the old algorithm with the new algorithm. When the programmer begins researching the utility classes, she is happy to discover that the algorithm to be replaced exists in only one class. The programmer reviews that class‘s API, and replaces the old algorithm with the new algorithm, being careful that her changes adhere strictly to the class‘s API. Once testing has begun, the programmer discovers that other classes that use the class she changed are no longer working properly.What design flaw is most likely the cause of these new bugs?()A.InheritanceB.Tight couplingC.Low cohesionD.High cohesionE.Loose couplingF.Object immutability

A company has a business application that provides its users with many different reports: receivables reports, payables reports, revenue projects, and so on. The company has just purchased somenew, state-of-the-art, wireless printers, and a programmer has been assigned the task of enhancing all ofthe reports to use not only the company’s old printers, but the new wireless printers as well. When the programmer starts looking into the application, the programmer discovers that because of the design of theapplication, it is necessary to make changes to each report to support the new printers. Which two designconcepts most likely explain this situation? ()A、InheritanceB、Low cohesionC、Tight couplingD、High cohesionE、Loose couplingF、Object immutability

Your company has an Active Directory forest that contains eight linked Group Policy Objects (GPOs). One of these GPOs publishes applications to user objects. A user reports that the application is not available for installation. You need to identify whether the GPO has been applied What should you do()A、Run the Group Policy Results utility for the user.B、Run the Group Policy Results utility for the computer.C、Run the GPRESULT /SCOPE COMPUTER command at the command prompt.D、Run the GPRESULT /S  /Z command at the command prompt.

A technician works for a company that has recently been affected by a virus. The virus entered the network by using port 6000. Port 6000 is used by an application located on a server. The technician has been asked to block this port on all servers and computers except for the one server which uses this port. Which of the following should the technician do?()A、Update the antivirus applicationB、Install critical update security patchesC、Adjust the software firewall settingsD、Replace the current antivirus program

A team of programmers is involved in reviewing a proposed design for a new utility class, After some discussion, they realize that the current design allows other classes to access methods in the utility class that should be accessible only to methods within the utility class itself. What design issue has the team discovered?()A、Tight couplingB、Low cohesionC、High cohesionD、Loose couplingE、Weak encapsulationF、Strong encapsulation

Company.com is implementing an HACMP solution. The application ahs a license key based on  The hostname. The hostname is also the name used for one of the TCP/IP interfaces. The application vendor has worked with HACMP systems before and is aware of the issue. The preferred method for resolving this issue is to:()  A、 include the hostname in the resource group definition.B、 include the license key in the resource group definition.C、 obtain a second license key for a "standby" system from the application vendor.D、 Set the hostname to be one of the TCP/IP interface included in a resource group.

A company has a business application that provides its users with many different reports: receivables reports, payables reports, revenue projects, and so on.The company has just purchased some new, state-of-the-art,wireless printers, and a programmer has been assigned the task of enhancing all of the reports to use not only the company’s old printers, but the new wireless printers as well.When the programmer starts looking into the application, the programmer discovers that because of the design of the application, it is necessary to make changes to each report to support the new printers.  Which two design concepts most likely explain the situation?()A、InheritanceB、Low cohesionC、Tight couplingD、High cohesionE、Loose couplingF、Object immutablility

A company that makes Computer Assisted Design (CAD) software has, within its application, some utility classes that are used to perform 3D rendering tasks. The company's chief scientist has just improved the performance of one of the utility classes' key rendering algorithms, and has assigned a programmer to replace the old algorithm with the new algorithm. When the programmer begins researching the utility classes, she is happy to discover that the algorithm to be replaced exists in only one class. The programmer reviews that class's API, and replaces the old algorithm with the new algorithm, being careful that her changes adhere strictly to the class's API. Once testing has begun, the programmer discovers that other classes that use the class she changed are no longer working properly. What design flaw is most likely the cause of these new bugs?()A、InheritanceB、Tight couplingC、Low cohesionD、High cohesionE、Loose couplingF、Object immutability

A team of programmers is involved in reviewing a proposed design for a new utility class. After some discussion, they realize that the current design allows other classes to access methods in the utility class that should be accessible only to methods within the utility class itself. What design issue has the team discovered?()A、Tight couplingB、Low cohesionC、High cohesionD、Loose couplingE、Weak encapsulationF、Strong encapsulation

A company that makes Computer Assisted Design (CAD) software has, within its application, some utilityclasses that are used to perform 3D rendering tasks. The company’s chief scientist has just improved theperformance of one of the utility classes’ key rendering algorithms, and has assigned a programmer toreplace the old algorithm with the new algorithm. When the programmer begins researching the utilityclasses, she is happy to discover that the algorithm to be replaced exists in only one class. The programmer reviews that class’s API, and replaces the old algorithm with the new algorithm, being carefulthat her changes adhere strictly to the class’s API. Once testing has begun, the programmer discovers thatother classes that use the class she changed are no longer working properly. What design flaw is mostlikely the cause of these new bugs?()A、InheritanceB、Tight couplingC、Low cohesionD、High cohesionE、Loose coupling

Your company has an internal Web application that uses a self-signed SSL certificate.  The company has an internal certification authority (CA) with autoenrollment.When users attempt to start the Web application, Internet Explorer displays an error message that recommends closing the Web page rather than continuing to the application.    You need to ensure that Internet Explorer does not display the error message.   What should you do?()A、Issue a certificate from the internal CA and install it on the application serverB、Install the Web application’s certificate into the computer store on each client computerC、Install the Web application’s certificate into the personal store on each client computer. Add the application’s URL to the Trusted Sites zone in Internet ExplorerD、Purchase a commercial certificate and install it on the internal CA

Certkiller has an Active Directory forest with six domains. The company has 5 sites. The company requires a new distributed application that uses a custom application directory partition named ResData for data replication.  The application is installed on one member server in five sites.  You need to configure the five member servers to receive the ResData application directory partition for data replication. What should you do()A、Run the Dcpromo utility on the five member servers.B、Run the Regsvr32 command on the five member serversC、Run the Webadmin command on the five member serversD、Run the RacAgent utility on the five member servers

You need to design the network to support the company’s VPN requirements for mobile users who connect to the network in Seattle. Which two actions should you perform?()A、Use a password generator application to create a preshared key, and distribute it to all mobile usersB、Use computer autoenrollment to create digital certificates that can be used to authenticate to a VPN serverC、Acquire a digital certificate that can be used for SSL from a commercial CA for each computer that established a VPN connectionD、Configure IPSec policies on all Routing and Remote Access servers to require the use of digital certificates

单选题A technician works for a company that has recently been affected by a virus. The virus entered the network by using port 6000. Port 6000 is used by an application located on a server. The technician has been asked to block this port on all servers and computers except for the one server which uses this port. Which of the following should the technician do?()AUpdate the antivirus applicationBInstall critical update security patchesCAdjust the software firewall settingsDReplace the current antivirus program

单选题Company.com is implementing an HACMP solution. The application ahs a license key based on  The hostname. The hostname is also the name used for one of the TCP/IP interfaces. The application vendor has worked with HACMP systems before and is aware of the issue. The preferred method for resolving this issue is to:()A include the hostname in the resource group definition.B include the license key in the resource group definition.C obtain a second license key for a standby system from the application vendor.D Set the hostname to be one of the TCP/IP interface included in a resource group.

单选题An architectural design company with 45 employees has their office located within 5 kilometers oftheir disaster recovery center. They have an IBM System Storage N6040 installed at bothlocations. In this customer environment what protocol would be used for disaster recovery?()ANFSBCIFSCiFCPDiSCSI

单选题Your company has an internal Web application that uses a self-signed SSL certificate.  The company has an internal certification authority (CA) with autoenrollment.When users attempt to start the Web application, Internet Explorer displays an error message that recommends closing the Web page rather than continuing to the application.    You need to ensure that Internet Explorer does not display the error message.   What should you do?()AIssue a certificate from the internal CA and install it on the application serverBInstall the Web application’s certificate into the computer store on each client computerCInstall the Web application’s certificate into the personal store on each client computer. Add the application’s URL to the Trusted Sites zone in Internet ExplorerDPurchase a commercial certificate and install it on the internal CA

单选题Your company has an Active Directory forest that contains eight linked Group Policy Objects (GPOs). One of these GPOs publishes applications to user objects. A user reports that the application is not available for installation. You need to identify whether the GPO has been applied What should you do()ARun the Group Policy Results utility for the user.BRun the Group Policy Results utility for the computer.CRun the GPRESULT /SCOPE COMPUTER command at the command prompt.DRun the GPRESULT /S  /Z command at the command prompt.

单选题Your company’s network has client computers that run Windows 7.   A software vendor releases version 2 of an application that your company uses.  Your company currently uses version 1.  Version 1 and version 2 are not compatible. You plan to deploy version 2 of the application.   You have the following requirements:Users must be able to run both versions of the application on their computers.   Version 2 must be available when a client computer is not connected to the network.  You need to plan a software deployment process that meets the requirements.   What should you do?()A Deploy version 2 of the application by using Microsoft Application Virtualization (App-V). B Deploy version 2 of the application as a Remote Desktop Services RemoteApp.C Deploy version 2 of the application by using a Group Policy Software Installation policy.D Deploy version 2 of the application by using a Microsoft System Center Configuration Manager package.

单选题A team of programmers is involved in reviewing a proposed design for a new utility class. After some discussion, they realize that the current design allows other classes to access methods in the utility class that should be accessible only to methods within the utility class itself. What design issue has the team discovered?()ATight couplingBLow cohesionCHigh cohesionDLoose couplingEWeak encapsulation

多选题A company has a business application that provides its users with many different reports: receivables reports, payables reports, revenue projects, and so on. The company has just purchased somenew, state-of-the-art, wireless printers, and a programmer has been assigned the task of enhancing all ofthe reports to use not only the company’s old printers, but the new wireless printers as well. When the programmer starts looking into the application, the programmer discovers that because of the design of theapplication, it is necessary to make changes to each report to support the new printers. Which two designconcepts most likely explain this situation? ()AInheritanceBLow cohesionCTight couplingDHigh cohesionELoose couplingFObject immutability

单选题Certkiller has an Active Directory forest with six domains. The company has 5 sites. The company requires a new distributed application that uses a custom application directory partition named ResData for data replication.  The application is installed on one member server in five sites.  You need to configure the five member servers to receive the ResData application directory partition for data replication. What should you do()ARun the Dcpromo utility on the five member servers.BRun the Regsvr32 command on the five member serversCRun the Webadmin command on the five member serversDRun the RacAgent utility on the five member servers

单选题A company that makes Computer Assisted Design (CAD) software has, within its application, some utility classes that are used to perform 3D rendering tasks. The company's chief scientist has just improved the performance of one of the utility classes' key rendering algorithms, and has assigned a programmer to replace the old algorithm with the new algorithm. When the programmer begins researching the utility classes, she is happy to discover that the algorithm to be replaced exists in only one class. The programmer reviews that class's API, and replaces the old algorithm with the new algorithm, being careful that her changes adhere strictly to the class's API. Once testing has begun, the programmer discovers that other classes that use the class she changed are no longer working properly. What design flaw is most likely the cause of these new bugs?()AInheritanceBTight couplingCLow cohesionDHigh cohesionELoose couplingFObject immutability

单选题A team of programmers is involved in reviewing a proposed design for a new utility class. After some discussion, they realize that the current design allows other classes to access methods in the utility class that should be accessible only to methods within the utility class itself. What design issue has the team discovered?()ATight couplingBLow cohesionCHigh cohesionDLoose couplingEWeak encapsulationFStrong encapsulation

问答题Passage 14Questions 8—12  ● Read the article below about GE.  ● Choose the best sentence from the opposite page to fill each of the gaps.  ● For each gap (8—12), mark one letter (A—G) on your Answer Sheet.  ● Do not use any letter more than once.  ● There is an example at the beginning, (0).A slipping crown  For decades America’s General Electric (GE) has worn its AAA credit rating as a badge of pride. The company has also used it to mint money in its financial-services business, GE Capital. No longer (0)______. That added insult to the injury that GE has already suffered.  Last year the outfit generated a profit of $8.6 billion or almost 48% of GE’s total earnings. By exploiting its AAA rating, GE Capital was able to raise capital cheaply and then deploy it to fund everything from commercial-property and home loans to credit-card lending and insurance. (8)______. Announcing its decision to downgrade the business, SP predicted rising credit losses in coming months in several areas of GE Capital’s portfolio.  Although GE’s demotion from AAA was bad news, it triggered a rise in the firm’s shares, which had recently been trading at about the same price as one of the light bulbs that the company makes. (9)______. They may also have taken comfort from the agency’s conclusion that GE’s industrial businesses should continue to pump oodles of cash, in spite of the global downturn.  Yet some financial analysts are still fretting that GE Capital’s portfolio may contain more nasty surprises. (10)______. They also wonder out loud whether Moody’s, another rating agency, will take a more pessimistic view of GE’s prospects when it finishes a review of the AAA rating that it still assigns to the firm.  Next week GE plans to hold an in-depth briefing on the state of the assets in GE Capital’s portfolio, which will help to dispel the cloud still hanging over the business. It has also been telling anyone who will listen that it doesn’t expect this week’s downgrade to have a significant impact on its business, though it does plan to keep shrinking GE Capital’s activities so that the unit represents no more than 30% of total profit. (11)______. GE is sitting on $48 billion of cash and has already raised over 90% of its long-term debt needs for this year—no mean feat in a dire credit market.  The company also plans to slash its dividend from the second half of 2009, which it reckons to conserve an additional $9 billion a year on an ongoing basis. (12)______.. In his annual letter to shareholders published recently, Mr. Immelt admitted that GE’S reputation had been “tarnished”.  A. This has made some of the company’s small investors apoplectic; they have grown used to juicy dividend payments.  B. Jeff Immelt, GE’s CEO, has said that the overall company will continue to manage itself like a AAA-rated firm, notably by keeping plenty of liquidity to hand.  C. Resolving lingering doubts over GE Capital quickly will be essential if one of America’s most iconic companies is to regain its shine.  D. They point out that the business does not mark many of its assets to their market price—a practice that has blown huge holes in the finances of many big banks.  E. No doubt investors were relieved that SP didn’t make an even deeper cut in the company’s rating.  F. But the chaos triggered by the credit crunch has taken the shine off GE’s cash machine, which has seen some of its property and other loans turn sour.  G. SP stripped the company and its financial arm of their top-notch ratings, downgrading them to AA-plus.