● Bitmap images use a grid of small squares known as (72) to represent images.(72)A. pixels B. points C. elements D. dots

● Bitmap images use a grid of small squares known as (72) to represent images.

(72)A. pixels B. points C. elements D. dots


相关考题:

Object-oriented analysis(OOA)is a semiformal specification technique for the object-oriented paradigm. Object-oriented analysis consists of three steps. The first step is(71). It determines how the various results are computed by the product and presents this information in the form. of a(72)and associated scenarios. The second is(73), which determines the classes and their attributes. Then determine the interrelationships and interaction among the classes. The last step is(74), which determines the actions performed by or to each class or subclass and presents this information in the form. of(75).A.use-case modelingB.class modelingC.dynamic modelingD.behavioral modeling

● Every valid character in a computer that uses even (71) must always have an even number of1bits.(71)A. parity B. check C. test D. compare● The maximum number of data that can be expressed by 8 bits is (72) .(72)A. 64 B. 128 C. 255 D. 256● Integration (73) is the process of verifying that the components of a system work together as described in the program design and system design specifications.(73)A. trying B. checking C. testing D. coding● GIF files are limited to a maximum of 8 bits/pixel, it simply means that no more than 256 colors are allowed in (74) .(74)A. an image B. a file C. a window D. a page● Computer (75) is a complex consisting of two or more connected computing units, it is used for the purpose of data communication and resource sharing.(75)A. storage B. device C. network D. processor

Melissa and LoveLetter made use of the trust that exists between friends or colleagues. Imagine receiving an(71)from a friend who asks you to open it. This is what happens with Melissa and several other similar email(72). Upon running, such worms usually proceed to send themselves out to email addresses from the victim's address book, previous emails, web pages(73)As administrators seek to block dangerous email attachments through the recognition of well-known(74), virus writers use other extensions to circumvent such protection. Executable(.exe)files are renamed to .bat and .cmd plus a whole list of other extensions and will still nm and successfully infect target users.Frequently, hackers try to penetrate networks by sending an attachment that looks like a flash movie, which, while displaying some cute animation, simultaneously runs commands in the background to steal your passwords and give the(75)access to your network.A.attachmentB.packetC.datagramD.message

Object-oriented analysis (OOA) is a semiformal specification technique for the object-oriented paradigm. Object-oriented analysis consists of three steps. The first step is(71) . It determines how the various results are computed by the product and presents this information in the form. of a(72) and associated scenarios. The second is(73) , which determines the classes and their attributes, then determines the interrelationships and interaction among the classes. The last step is(74) , which determines the actions performed by or to each class or subclass and presents this information in the form. of (75) .A.static modelingB.dynamic modelingC.use-case modelingD.behavioral modeling

试题(71)~(75)Object-oriented analysis (OOA) is a semiformal specification technique for the object-oriented paradigm. Object-oriented analysis consists of three steps. The first step is (71). It determines how the various results are computed by the product and presents this information in the form. of a (72) and associated scenarios. The second is (73) , which determines the classes and their attributes. Then determine the interrelationships and interaction among the classes. The last step is (74) , which determines the actions performed by or to each class or subclass and presents this information in the form. of (75) .(71)A. use-case modelingB. class modelingC. dynamic modelingD. behavioral modeling(72)A. collaboration diagramB. sequence diagramC. use-case diagramD. activity diagram(73)A. use-case modelingB. class modelingC. dynamic modelingD. behavioral modeling(74)A. use-case modelingB. class modelingC. dynamic modelingD. behavioral modeling(75)A. activity diagramB. component diagramC. sequence diagramD. state diagram

●Object-oriented analysis (OOA) is a semiformal specification technique for the object-oriented paradigm. Object-oriented analysis consists of three steps. The first step is (71). It determines how the various results are computed by the product and presents this information in the form. of a (72) and associated scenarios. The second is (73) , which determines the classes and their attributes, then determines the interrelationships and interaction among the classes. The last step is (74) , which determines the actions performed by or to each class or subclass and presents this information in the form. of (75) .(71)A.use-case modelingB. class modelingC. dynamic modelingD. behavioral modeling(72)A. collaboration diagramB. sequence diagramC. use-case diagramD. activity diagram(73)A. use-case modelingB. class modelingC. dynamic modelingD. behavioral modeling(74)A.use-case modelingB. class modelingC. dynamic modelingD. behavioral modeling(75)A. activity diagramB. component diagramC. sequence diagramD. state diagram

YourcompanyusesWindowsDeploymentServices(WDS)todeployWindows7.YoucreateanewimageofWindows7.YouneedtoensurethatyoucandeploytheimagebyusingWDS.Whatshouldyoudo?() A.FromtheWindowsDeploymentServicessnap-in,addanewinstallimage.B.FromtheWindowsDeploymentServicessnap-in,addanewbootimage.C.RunOscdimg.exeandspecifythe-bootparameter.CopytheimagetoC:\remoteinstall\boot.D.RunImagex.exeandspecifythe/appendparameter.CopytheimagetoC:\remoteinstall\images.

● It should go without saying that the focus of UML is modeling. However, what that means, exactly, can be an open-ended question. (71) is a means to capture ideas, relationships, decisions, and requirements in a well-defined notation that can be applied to many different domains. Modeling not only means different things to different people, but also it can use different pieces of UMLdepending on what you are trying to convey. In general, a UML model is made up of one or more (72) . A diagram graphically represents things, and the relationships between these things. These (73) can be representations of real-world objects, pure software constructs, or a description of the behavior. of some other objects. It is common for an individual thing to show up on multiple diagrams; each diagram represents a particular interest, or view, of the thing being modeled. UML 2.0 divides diagrams into two categories: structural diagrams and behavioral diagrams. (74) are used to capture the physical organization of the things in your system, i.e., how one object relates to another. (75) focus on the behavior of elements in a system. For example, you can use behavioral diagrams to capture requirements, operations, and internal state changes for elements.(71)A.ProgrammingB. AnalyzingC. DesigningD. Modeling(72)A.viewsB. diagramsC. user viewsD. structure pictures(73)A. thingsB. picturesC. languagesD. diagrams(74)A. Activity diagramsB. Use-case diagramsC. Structural diagramsD. Behavioral diagrams(75)A. Activity diagramsB. Use-case diagramsC. Structural diagramsD. Behavioral diagrams

● It should go without saying that the focus of UML is modeling.However, what that means, exactly, can be an open-ended question. (71) is a means to capture ideas, relationships, decisions, and requirements in a well-defined notation that can be applied to many different domains.Modeling not only means different things to different people, but also it can use different pieces of UML depending on what you are trying to convey.In general, a UML model is made up of one or more (72) . A diagram graphically representsthings, and the relationships between these things.These (73) can be representations ofreal-world objects, pure software constructs, or a description of the behavior. of some other objects.It is common for an individual thing to show up on multiple diagrams; each diagram represents a particular interest, or view, of the thing being modeled.UML 2.0 divides diagrams into two categories: structural diagrams and behavioral diagrams. (74) are used to capture the physical organization of the things in your system, i. e. , how one object relatesto another. (75) focus on the behavior. of elements in a system.For example, you can use behavioral diagrams to capture requirements, operations, and internal state changes forelements.(71)A.ProgrammingB.AnalyzingC.DesigningD.Modeling(72)A.viewsB.diagramsC.user viewsD.structure pictures(73)A.thingsB.picturesC.languagesD.diagrams(74)A.Activity diagramsB.Use-case diagramsC.Structural diagramsD.Behavioral diagrams(75)A.Activity diagramsB.Use-case diagramsC.Structural diagramsD.Behavioral diagrams

● Object-oriented analysis (OOA) is a semiformal specification technique for the object-oriented paradigm. Object-oriented analysis consists of three steps. The first step is (71). It determines how the various results are computed by the product and presents this information in the form. of a (72) and associated scenarios. The second is (73) , which determines the classes and their attributes. Then determine the interrelationships and interaction among the classes. The last step is (74) , which determines the actions performed by or to each class or subclass and presents this information in the form. of (75) .(71)A.use-case modelingB. class modelingC. dynamic modelingD. behavioral modeling(72)A. collaboration diagramB. sequence diagramC. use-case diagramD. activity diagram(73)A. use-case modelingB. class modelingC. dynamic modelingD. behavioral modeling(74)A.use-case modelingB. class modelingC. dynamic modelingD. behavioral modeling(75)A. activity diagramB. component diagramC. sequence diagramD. state diagram