● 在关于用例(use case)的描述中,错误的是___(1)___。
(1)A.用例将系统的功能范围分解成许多小的系统功能陈述
B.一个用例代表了系统的一个单一的目标
C.用例是一个行为上相关的步骤序列
D.用例描述了系统与用户的交互
● 在用例建模的过程中,若几个用例执行了同样的功能步骤,这时可以把这些公共步骤提取成独立的用例,这种用例称为___(2)___。在UML的用例图上,将用例之间的这种关系标记为___(3)___。
(2)A.扩展用例 B.抽象用例 C.公共用例 D.参与用例
(3)A.association B.extends C.uses D.inheritances
● UML提供了4种结构图用于对系统的静态方面进行可视化、详述、构造和文档化。其中___(4)___是面向对象系统规模中最常用的图,用于说明系统的静态设计视图;当需要说明系统的静态实现视图时,应该选择___(5)___;当需要说明体系结构的静态实施视图时,应该选择___(6)___。
(4)A.构件图 B.类图 C.对象图 D.部署图
(5)A.构件图 B.协作图 C.状态图 D.部署图
(6)A.协作图 B.对象图 C.活动图 D.部署图
● 关于系统总线,以下叙述正确的是___(7)___。
(7) A.计算机内多种设备共乡的数字信号传输通路
B.广泛用于PC机,是与调制解调器或外围设备进行串行传输的标准
C.将数字信号转换成模拟信号,将模拟信号转换成数字信号的设备
D.I/O设备与主存之间传输数据的机制,独立于CPU
● 以下工程进度网络图中,若结点0和6分别表示起点和终点,则关键路径为___(8)___。
(8)A.0→1→3→6 B.0→1→4→6 C.0→1→2→4→6 D.0→2→5→6
● 某软件公司项目A的利润分析如下表所示。设贴现率为10%,第二年的利润净现值是___(9)___元。
利润分析
第零年
第一年
第二年
第三年
利润值
——
¥889,000
¥1,139,000
¥1,514,000
(9)A.1,378,190 B.949,167 C.941,322 D.922,590
● 某公司为便于员工在家里访问公司的一些数据,允许员工通过internet访问公司的FTP服务器,如下图所示。为了能够方便地实现这一目标,决定在客户机与FTP服务器之间采用___(10)___协议,在传输层对数据进行加密。该协议是一个保证计算机通信安全的协议,客户机与服务器之间协商相互认可的密码发生在___(11)___。
(10)A.SSL B.Ipsec C.PPTP D.TCP
(11) A.接通阶段 B.密码交换阶段 C.会谈密码阶段 D.客户认证阶段
● 3DES在DES的基础上,使用两个56位的密钥K1和K2,发送方用K1加密,K2解密,再用K1加密。接受方用K1解密,K2加密,再用K1解密,这相当于使用___(12)___倍于DES的密钥长度的加密效果。
(12)A.1 B.2 C.3 D.6
●如下图所示,某公司局域网防火墙由包过滤路由器R和应用网关F组成,下面描述错误的是___(13)___。
(13)A.可以限制计算机C只能访问Internet上在TCP端口80上开放的服务
B.可以限制计算机A仅能访问以"202"为前缀的IP地址
C.可以使计算机B无法使用FTP协议从Internet上下载数据
D.计算机A能够与计算机X建立直接的TCP连接
● 下列标准代号中,___(14)___不是国家标准代号。
(14)A.GSB B.GB/T C.GB/Z D.GA/T
● 由某市标准化行政主管部门制定,报国务院标准行政主管部门和国务院有关行政主管部门备案的某一项标准,在国务院有关行政主管部门公布其行业标准之后,该项地方标准___(15)___。
(15)A.与行业标准同时生效 B.即行废止 C.仍然有效 D.修改后有效
● 假设甲、乙二人合作开发了某应用软件,甲为主要开发者。该应用软件所得收益合理分配后,甲自行将该软件作为自己独立完成的软件作品发表,甲的行为___(16)___。
(16)A.不构成对乙权利的侵害 B.构成对乙权利的侵害
C.已不涉及乙的权利 D.没有影响乙的权利
● 甲公司从市场上购买丙公司生产的部件a,作为生产架公司产品的部件。乙公司已经取得部件a的中国发明权,并许可丙公司生产销售该部件a。甲公司的行为___(17)___。
D.kerberos是非对称密钥,而PKI是对称密钥
(65)A.RSA B.TGT C.DES D.LSA
● ___(66)___ is a method of constructing a project schedule network diagram that uses boxes or rectangles,referred to as nodes,to represent activites and connects them with arrows that asow the dependencies.
This method includes following types of dependcies orprecedence relationships:
___(67)___the initiation of the successor activity, depends upon the completion of the predecessor activity.
___(68)___the initiation of the successor activity, depends upon the initiation of the predecessor activity.
(66) A.PDM B.CPM C.PERT D.AOA
(67) A.F-S B.F-F C.S-F D.S-S
(68) A.F-S B.F-F C.S-F D.S-S
● estimating schedule activity costs involves developing an ___(69)___ of the cost of the resources needed to complete each schedule activity. Cost estimating includes identifying and considering various costing alternatives.for example,in mostapplication areas,additional work during a design phase is widely held to have the potential for reducing the cost of the execution phase and product oprations. the cost estimating process considers whether the expected savings can offset the cost of the additional design work. cost estmates are generally expressed in units of ___(70)___ to facilitate comparisons both within and across projects. the ___(71)___ describes important information about prject requirement that is considered duing cost estimating.
(69) A.accuracy B.approxination C.specification D.summary
(70) A.activity B.work C.currency D.time
(71) A.project scope statement B.statement of work
C.project management plan D.project policy
● The ___(72)___ technique involves using project characteristics in a mathematical model to predict total project cost.models can be simple or complex.
(72) A.cost aggregation B.reserve analysis
C.parametric estimating D.funding limit reconciliarion
● ___(73)___ is ameasurable, verifiable work poduct such as specification.feasibility study report, detail document, or working prototype
(73) A.milestone B.deliverable C.etc D.BAC
● ___(74)___ are individuals and organizations that are actively involved in the project, or whose interests may be affected as aresult of project execution or project completion; they may also exert influence over the project and its results.
(74) A.controls B.baselines
C.project stakeholders D.project managers
● ___(75)___ is the process of obtaining the stakeholdrs'formal acceptance of the completed project scope .verifying the scope includes reviewing deliverables and work results to ensure that all were completed satisfactorily.
(75) A.project acceptance B.scope verification
C.scope definition D.WBS Creation