Software architecture reconstruction is an interpretive, jnteractive, and iterative process including many activities. ( )involves analyzing a systems existing design and implementation artifacts to construct a model of it. The result is used in the following activities to construct a view of the system. The database construction activity converts the ( ) contained in the view into a standard format for storage in a database. The ( )activity involves defining and manipulating the information stored in database to reconcile, augment, and establish connections between the elements. Reconstruction consists of two primary activities: ( ) and ( ). The former provides a mechanism for the user to manipulate architectural elements, and the latter provides facilities for architecture reconstruction.A.Reverse engineering B.Information extraction C.Requirements analysis D.Source code analysis A.actors and use cases B.processes and data C.elements and relations D.schemas and tables A.database normalization B.schema definition C.database optimization D.view fusion A.architecture analysis and design B.domain analysis and static modeling C.visualization and interaction D.user requirements modeling A.pattern definition and recognition B.architecture design and implementation C.system architecture modeling D.dynamic modeling and reconstruction

Software architecture reconstruction is an interpretive, jnteractive, and iterative process including many activities. ( )involves analyzing a system&39;s existing design and implementation artifacts to construct a model of it. The result is used in the following activities to construct a view of the system. The database construction activity converts the ( ) contained in the view into a standard format for storage in a database. The ( )activity involves defining and manipulating the information stored in database to reconcile, augment, and establish connections between the elements. Reconstruction consists of two primary activities: ( ) and ( ). The former provides a mechanism for the user to manipulate architectural elements, and the latter provides facilities for architecture reconstruction.

A.Reverse engineering B.Information extraction C.Requirements analysis D.Source code analysis A.actors and use cases B.processes and data C.elements and relations D.schemas and tables A.database normalization B.schema definition C.database optimization D.view fusion A.architecture analysis and design B.domain analysis and static modeling C.visualization and interaction D.user requirements modeling A.pattern definition and recognition B.architecture design and implementation C.system architecture modeling D.dynamic modeling and reconstruction


相关考题:

● Software (75) focuses on three attributes of the program: software architecture, data structure, and procedural detail.(75)A. analysisB. designC. installationD. upgrade

试题(71)~(75)The software architecture is a set of software components, subsystems, relationships, interactions, the properties of each of these elements, and the set of guiding principles that together constitute the fundamental properties and constraints of a software system or set of systems. (71) defines a general set of element types and their interactions. The examples include Pipes and Filters, Model-View-Controller, and Reflection. A (72) in software architecture is a representation used to understand or document one or more aspects of a problem or solution. Architecture is usually used in conjunction with many adjunct terms. The (73) defines the key strategies, organization, goals and related processes of the enterprise. At the enterprise level, the (74) may be more of a set of guidelines on how the various software architectures should be constructed consistently across the enterprise. The (75), which describes the high-level set of elements involved in application from a particular domain along with their interactions, is often used to focus on subsystem definition rather than application process level definition.(71)A. Architectural patternB. Architectural descriptionC. Architectural viewD. Architectural viewpoint(72)A. modelB. domainC. componentD. subsystem(73)A. enterprise architectureB. technical architectureC. infrastructure architectureD. business architecture(74)A. enterprise architectureB. data architectureC. application architectureD. information architecture(75)A. product-line architectureB. reference architectureC. technology architectureD. infrastructure architecture

Software______focuses on three attributes of the program:software architecture,data structure,and procedural detail.A.analysisB.designC.installationD.UpgradeA.B.C.D.

Microsoft's COM is a software(71) that allows applications to be built from binary software components. COM is the underlying architecture that forms the foundation for higher-level software services, like those provided by OLE. COM defines a binary standard for function calling between components, a way for components to dynamically discover the interfaces implemented by other components, and a mechanism to identify components and their interfaces uniquely.OLE is a compound(72) standard developed by Microsoft. OLE makes it possible to create(73) with one application and link or embed them in a second application. Embedded objects retain their original format and(74) to the application that created them. Support for OLE is built into the Windows and MacOS Operating Systems. A(75) compound document standard developed mainly by Apple and IBM is called OpenDoc.A.structureB.procedureC.protocolD.architecture

Thesoftware architecture isa set of software components, subsystems,relationships, interactions, the properties of each of these elements,and the set of guiding principles that together constitute thefundamental properties and constraints of a software system or set of systems.(71)defines a general set of element types and their interactions.The examples include Pipes and Filters,Model-View-Controller, and Reflection.A (72)in software architecture is a representation used to understand or document oneor more aspects of a problem or solution. Architectureis usually used in conjunction with many adjunct terms. The(73)defines the key strategies, organization, goals and related processes of theenterprise. Atthe enterprise level, the (74)may be more of a set of guidelines on how the various software architecturesshould be constructed consistently across the enterprise.The (75), whichdescribes the high-level set of elements involved in application from a particular domainalong with their interactions, is often used to focus on subsystemdefinition rather than application process level definition.A.Architectural patternB.Architectural descriptionC.Architectural viewD.Architectural viewpoint

What are two components of the Junos software architecture? ()(Choose two.) A. Linux kernelB. routing protocol daemonC. session-based forwarding moduleD. separate routing and security planes

( )A.physical componentsB.network architectureC.software architectureD.interface architecture

Which two are components of the enhanced services software architecture?() (Choose two.) A. Linux kernelB. routing protocol daemonC. session-based forwarding moduleD. separate routing and security planes

Microsoft's COM is a software(73) that allows applications to be built from binary software components。A.structureB.protocolC.procedureD.architecture

Computer( )focuses on protecting information ,hardware ,and software from unauthorized use and damage.A.network B.virus C.security D.architecture

Software defined networking(SDN) is a telecommunications network ( ) that provides the promise of significant improvements in the network ( ).A.solution B.structere C.scheme D.architecture A.throughput B.data rate C.loss D.performance

Computer ( ) focuses on protecting information, hardware, and software from unauthorized use and damage.A.networkB.vimsC.securityD.architecture

Computer ( ) focuses on protecting information, hardware, and software from unauthorized use and damage.A. networkB. vimsC. securityD. architecture

Computer______focuses on protecting information,hardware,and software from unauthorized use and damage.A.networkB.virusC.securityD.architecture

The architecture design specifies the overall architecture and the placement of software and hardware that will be used. Architecture design is a very complex process that is often left to experienced architecture designers and consultants. The first step is to refine the ( 请作答此空) into more detailed requirements that are then employed to help select the architecture to be used and the software components to be placed on each device. In a (), one also has to decide whether to use a two-tier, three-tier, or n-tier architecture. Then the requirements and the architecturedesign are used to develop the hardware and software specification. There are four primary types of nonfunctional requirements that can be important in designing the architecture. () specify the operating environment(s) in which the system must perform and how those may change over time. () focus on the nonfunctional requirements issues such as response time, capacity, and reliability. () are the abilities to protect the information system from disruption and data loss, whether caused by an intentional act. Cultural and political requirements are specific to the countries in which the system will be used. A. functional requirements功能需求B. nonfunctional requirements非功能需求C. system constraint系统约束D. system operational environment系统运行环境

The architecture design specifies the overall architecture and the placement of software and hardware that will be used. Architecture design is a very complex process that is often left to experienced architecture designers and consultants. The first step is to refine the () into more detailed requirements that are then employed to help select the architecture to be used and the software components to be placed on each device. In a (), one also has to decide whether to use a two-tier, three-tier, or n-tier architecture. Then the requirements and the architecturedesign are used to develop the hardware and software specification. There are four primary types of nonfunctional requirements that can be important in designing the architecture. () specify the operating environment(s) in which the system must perform and how those may change over time. () focus on the nonfunctional requirements issues such as response time, capacity, and reliability. (请作答此空 ) are the abilities to protect the information system from disruption and data loss, whether caused by an intentional act. Cultural and political requirements are specific to the countries in which the system will be used. A. Safety requirements安全要求B. Security requirements安全要求C. Data management requirements数据管理要求D. System requirements 系统要求

The architecture design specifies the overall architecture and the placement of software and hardware that will be used. Architecture design is a very complex process that is often left to experienced architecture designers and consultants. The first step is to refine the () into more detailed requirements that are then employed to help select the architecture to be used and the software components to be placed on each device. In a (), one also has to decide whether to use a two-tier, three-tier, or n-tier architecture. Then the requirements and the architecturedesign are used to develop the hardware and software specification. There are four primary types of nonfunctional requirements that can be important in designing the architecture. (请作答此空 ) specify the operating environment(s) in which the system must perform and how those may change over time. () focus on the nonfunctional requirements issues such as response time, capacity, and reliability. () are the abilities to protect the information system from disruption and data loss, whether caused by an intentional act. Cultural and political requirements are specific to the countries in which the system will be used. A. client-based architecture操作要求B. server-based architecture速度要求C. network architecture存取控制要求D. client-server architecture定制要求

The architecture design specifies the overall architecture and the placement of software and hardware that will be used. Architecture design is a very complex process that is often left to experienced architecture designers and consultants. The first step is to refine the () into more detailed requirements that are then employed to help select the architecture to be used and the software components to be placed on each device. In a ( ), one also has to decide whether to use a two-tier, three-tier, or n-tier architecture. Then the requirements and the architecturedesign are used to develop the hardware and software specification. There are four primary types of nonfunctional requirements that can be important in designing the architecture. () specify the operating environment(s) in which the system must perform and how those may change over time. () focus on the nonfunctional requirements issues such as response time, capacity, and reliability. () are the abilities to protect the information system from disruption and data loss, whether caused by an intentional act. Cultural and political requirements are specific to the countries in which the system will be used. A. client-based architecture基于客户端的架构B. server-based architecture基于服务器的体系结构C. network architecture网络体系结构D. client-server architecture客户机服务器体系结构

NeuSA的英文全称是()。A、Neusoft Service ApplicationB、Neusoft Software ApplicationC、Neusoft Solution ArchitectureD、Neusoft SOA Architecture

Where will an administrator find documents in PDFformat that include detailed architecture and step-by-step installation instructions for Power servers?()A、AIX Fix CentralB、IBM Developer WorksC、IBM Systems Software Information CenterD、IBM Systems Hardware Information Center

Where will an administrator find documents in PDF format that include detailed architecture and step-by-step installation instructions for Power servers?() A、AIX Fix CentralB、IBM Developer WorksC、IBM Systems Software Information CenterD、IBM Systems Hardware Information Center

单选题CPU全称是()。Acetral processing unitBcentral processingCcentral processing unitDcetral proces unit

多选题Which two are components of the enhanced services software architecture?() (Choose two.)ALinux kernelBrouting protocol daemonCsession-based forwarding moduleDseparate routing and security planes

填空题Where is the reconstruction work going on at the moment?On the ____.

多选题What are two components of the JUNOS Software architecture?()ALinux kernelBrouting protocol daemonCsession-based forwarding moduleDseparate routing and security planes

多选题What are two components of the Junos software architecture? ()(Choose two.)ALinux kernelBrouting protocol daemonCsession-based forwarding moduleDseparate routing and security planes

填空题What’s the purpose of the hotel’s reconstruction program?To improve its ____.