The prototyping method is a dynamic design processes,which requires people who use prototyping method to have the following capability of( ).A.proficient program expertiseB.immediately acquire requirementC.coordinata&organize eloquentlyD.handle tools smartly
The prototyping method is a dynamic design processes,which requires people who use prototyping method to have the following capability of( ).
A.proficient program expertise
B.immediately acquire requirement
C.coordinata&organize eloquently
D.handle tools smartly
B.immediately acquire requirement
C.coordinata&organize eloquently
D.handle tools smartly
参考解析
解析:原型法是一种动态的设计过程,需要使用原型法的人具有快速获取需求的能力。
相关考题:
The prototyping method is a dynamic design process, which requires people who use prototyping method to have the following capability ofA.proficient program expertiseB.immediately acquire requirementC.coordinate organize eloquentlyD.handle tools smartly
●The prototyping method is a dynamic design processs,which requires people who use prototyping method to have the following capability of (66) .(66) A.Proficient program expertiseB.immediately acquire requirementC.coordinate & organize eloquentlyD.handle tools smartly
M.Jackson suggested the data structure oriented software design method.Which of the following structure can be introduced by using input data structure?A.algorithm structureB.procedure structureC.code structureD.program structure
Traditional structured analysis techniques focus upon the flow of(1)within a system. Object-oriented analysis emphasizes the building of real-world models, It examines requirements from the perspective of the classes and objects found in the vocabulary of the(2)domain.Traditional system design method emphasizes the proper and effective structure of a complex system. Object-oriented design method encompasses the process of object- oriented decomposition and a(3)for depicting both logical and physical as well as static and dynamic models of the system under design.Object-oriented programming is a method of implementation in which programs are organized as cooperative collections of objects, each of which represents an(4)of some class, and whose classes are all members of a hierarchy of classes united via(5)relationships.A.controlB.programC.dataD.reference
●The prototyping method is a dynamic design processes, which requires people who use prototyping method to have the following capability of (71).(71)A. proficient program expertiseB. immediately acquire requirementC. coordinate&organize eloquentlyD. handle tools smartly
A customer has installed UAC in their network. They have both Windows and Linux endpoints andmust choose a deployment method that everyone can use. Which deployment method allows for multiple platforms? ()A. IPsec enforcementB. 802.1X enforcementC. Source IP enforcementD. Odyssey Access Client
All the following tools and techniques are helpful to accurately confirming customers’needs,except( 72 )。A.questionnairesB.prototyping approachesC.fishbone diagramsD.interviews
all of the following tools and techniques are helpful to acurately confirming customers needsexcept ()A.questionnairesB.prototyping approachesC.fishbone diagramsD.interviews
all of the following tools and techniques are helpful to acurately confirming customers needs except () A、questionnairesB、prototyping approachesC、fishbone diagramsD、interviews
Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows Vista computers. You are planning to deploy Windows 7 and a custom application. You have the following requirements: The application must be available to only a specific group of users. You must be able to monitor application usage. You need to design a deployment method for the custom application that meets the requirements. Which deployment method should you use in your design?()A、software installation in Group PolicyB、startup scripts in Group PolicyC、Microsoft Application Virtualization (App-V)D、baseline Windows 7 image that includes the custom application
Which two statements best describe the wireless security standard that is defined by WPA? (Choose two.)()A、It specifies use of a static encryption key that must be changed frequently to enhance security.B、It requires use of an open authentication method.C、It specifies the use of dynamic encryption keys that change each time a client establishes a connection.D、It requires that all access points and wireless devices use the same encryption key.E、It includes authentication by PSK
A bare metal backup requires which of the following backup method ologies?()A、 FullB、 DifferentialC、 IncrementalD、 Database
A customer has installed UAC in their network. They have both Windows and Linux endpoints andmust choose a deployment method that everyone can use. Which deployment method allows for multiple platforms? ()A、IPsec enforcementB、802.1X enforcementC、Source IP enforcementD、Odyssey Access Client
You have a login.ascx control and to display it in a view which method u would use()A、http.displayB、http.partialC、http.loadD、http.get
You are planning to upgrade Internet Explorer. You have the following requirements: Create a report that identifies which computers are successfully upgraded. Do not install additional software on the client computers. You need to design a deployment method that meets the requirements. What should you do?()A、Use Internet Explorer Administration Kit (IEAK) and Group Policy.B、Use Microsoft System Center Configuration Manager.C、Use Windows Server Update Services (WSUS).D、Use Microsoft System Center Essentials.
Your company has a single Active Directory Domain Services (AD DS) domain with Windows Server 2008 R2 member servers and 1,000 Windows 7 client computers. You are designing the deployment of a custom application. You have the following requirements: The application must be available to only users who need it. Minimize network traffic during deployment. You need to design a deployment strategy that meets the requirements. Which deployment method should you use?()A、RemoteApp and Desktop ConnectionsB、software installation in Group PolicyC、Microsoft Application Virtualization (App-V)D、Microsoft System Center Configuration Manager 2007
You use Microsoft .NET Framework 4 to create a Windows application. You use ClickOnce technology to install the application on computers that run Windows 7 with User Access Control (UAC) enabled. The application requires access to environment variables on each computer. You need to ensure that users who do not have administrative permissions can install the application. Which deployment method should you use? ()A、Start from Web.B、Install from Web.C、Start from network shareD、Install from network share.
单选题You have a login.ascx control and to display it in a view which method u would use()Ahttp.displayBhttp.partialChttp.loadDhttp.get
多选题Which two statements best describe the wireless security standard that is defined by WPA? (Choose two.)()AIt specifies use of a static encryption key that must be changed frequently to enhance security.BIt requires use of an open authentication method.CIt specifies the use of dynamic encryption keys that change each time a client establishes a connection.DIt requires that all access points and wireless devices use the same encryption key.EIt includes authentication by PSK
单选题A customer has installed UAC in their network. They have both Windows and Linux endpoints andmust choose a deployment method that everyone can use. Which deployment method allows for multiple platforms? ()AIPsec enforcementB802.1X enforcementCSource IP enforcementDOdyssey Access Client
单选题You are developing a method to decrypt data that was encrypted with the Triple DES Algorithm. The method accepts the following parameters: The byte array to be decrypted, which is named cipherMessage The key, which is named key An initialization vector, which is named iv You need to decrypt the message by using the TripleDES class and place the result in a string. Which code segment should you use?()A AB BC CD D
多选题Which of the following statements about variables and scope are true?()ALocal variables defined inside a method are destroyed when the method is exited.BLocal variables are also called automatic variables.CVariables defined outside a method are created when the object is constructed.DA method parameter variable continues to exist for as long as the object is needed in which the method is defined.
单选题You are creating a Windows Forms application by using the .NET Framework 3.5. The application requires a thread that accepts a single integer parameter. You write the following code segment (Line numbers are included for reference only.) Thread myThread = new Thread(new ParameterizedThreadStart(DoWork)) ; myThread.Start(100); You need to declare the method signature of the DoWork method. Which method signature should you use?()Apublic void DoWork();Bpublic void DoWork(int nCounter);Cpublic void DoWork(object oCounter);Dpublic void DoWork(Delegate oCounter);
单选题Which of the following is TRUE?AWe use all the words, phrases and quotations from Shakespeare’s writings.BShakespeare’s writings have become the property of those who are learning to speak English.CIt is likely to be true that people often do not know the origin of the words they use.DAll the words people use are taken from Shakespeare’s writings.
单选题Your network has a single domain with 1,000 client computers that run Windows Vista. You are planning a deployment of Windows 7. Your company has multiple departments. Only the sales department will use the existing target computers to run Windows 7. You have the following requirements:Migrate the user state for each user. Preserve the file system and existing applications for only the sales department computers. You need to recommend the deployment method that is appropriate for the environment. Which combination of deployment scenarios should you recommend?()A Use the Refresh Computer method for the sales department computers. Use the New Computer method for all other computers.B Use the Refresh Computer method for the sales department computers. Use the Replace Computer method for all other computers.C Use the Upgrade Computer method for the sales department computers. Use the Refresh Computer method for all other computers.D Use the Upgrade Computer method for the sales department computers. Use the Replace Computer method for all other computers.
单选题You are planning a Windows 7 deployment infrastructure. You have the following requirements: Enable network deployments of WIM images or VHDs. Support multicast with the use of multiple stream transfer functionality. Allow drivers to be stored centrally,and use dynamic driver provisioning. You need to design an infrastructure that meets the requirements. Which deployment method should you recommend?()AMicrosoft Deployment Toolkit (MDT) 2008BMicrosoft Deployment Toolkit (MDT) 2010CDeployment Image Servicing and Management (DISM)DWindows Deployment Services in Windows Server 2008 R2
单选题A bare metal backup requires which of the following backup method ologies?()A FullB DifferentialC IncrementalD Database