网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Generally software can be divided into two types:( )software and application software.

A.system B.I/O C.control D.database


参考答案

更多 “ Generally software can be divided into two types:( )software and application software.A.system B.I/O C.control D.database ” 相关考题
考题 Software is divided into two categories,system software and application software.Please choose one which is differ from other threeA.WindOws 98B.Word 2000C.C++compilerD.FoxBase DBMS

考题 The Rational Unified Process(RUP)is a software engineering process, which captures many of best practices in modem software development. The notions of(71)and scenarios have been proven to be an excellent way to capture function requirements. RUP can be described in two dimensions - time and content. In the time dimension, the software lifecycle is broken into cycles. Each cycle is divided into four consecutive(72)which is concluded with a well-defined(73)and can be further broken down into(74)- a complete development loop resulting in a release of an executable product, a subset of the final product under development, which grows incrementally to become the final system. The content structure refers to the disciplines, which group(75)logically by nature.A.artifactsB.use-casesC.actorsD.workers

考题 Generally speaking, performatives are sub-divided into two big types. They are explicit performatives, implicit performatives.()

考题 Computer systems consist of two very different types of elements: Hardware, which includes all the physical things that can be touched and(71)which tells the hardware how to do.A.Operating systemB.I/O devicesC.CoursewareD.Software

考题 ● The Rational Unified Process (RUP) is a software engineering process, which captures any of best practices in modern software development. The notions of (71) and scenarios ave been proven to be an excellent way to capture function requirements. RUP can be described two dimensions – time and content. In the time dimension, the software lifecycle is broken into cycles. Each cycle is divided into four consecutive (72) which is concluded with awell-defined (73) and can be further broken down into (74) – a complete developmentloop resulting in a release of an executable product, a subset of the final product underdevelopment, which grows incrementally to become the final system. The content structurerefers to the disciplines, which group (75) logically by nature.

考题 The J-Web application can install the JUNOS software from which two locations?() A. SDXB. local PCC. BSD shellD. remote host

考题 How many OSPF authentication types can be configured on a subinterface using JUNOS software?() A.0B.1C.2D.3

考题 Which two commands allow you to return to a previous verision of software on the device?() A. request sytem software addB. request sytem software downgradeC. request sytem software replaceD. request sytem software rollback

考题 A user can receive email but cannot send email with the email client software. Which of the following protocols is incorrectly configured?() A.FTPB.SMTPC.POPD.SNMP

考题 All client computers on your company network run Windows 7 and are members of a Windows Server 2008 R2 domain. The R&D department staff are local administrators on their computers and are members of the R&D global security group. A new version of a business software application is available on the network. You plan to apply an AppLocker security policy to the R&D group. You need to ensure that members of the R&D group are not allowed to upgrade the software. What should you do?()A.Create an Audit only restriction based on the version of the software.B.Create an Audit only restriction based on the publisher of the software.C.Create an Enforce rule restriction based on the version of the software.D.Create an Enforce rule restriction based on the publisher of the software.

考题 ● Documentation of a software package is normally produced for two purposes. One is to explain the __(71)__ of the software and describe how to use them. This is known as __(72)__ because it is designed to be read by the user of the software. The other purpose of documentation is to describe the software,s internal composition so that the system can be maintained later in its life cycle. Documentation of this type is known as __(73)__.(71)A.plansB.costC.featuresD.schedules(72)A.system documentationB.user documentationC.vender documentationD.product documentation(73)A.system documentationB.user documentationC.vender documentationD.license documentation

考题 ●Generally software can be divided into two types: (73) software and application software.(73)A. databaseB. systemC. operatingD. text

考题 Software engineering is the study and application of engineering to the ( ) , development and maintenance of software. 软件工程是将工程的研究和应用运用于软件的( )设计、开发和维护。A.research研究 B.management管理 C.assembly集成 D.design设计

考题 The objective of()is to determine what parts of the application software will be assigned to what hardware. The major software components of the system being developed have to be identified and then allocated to the various hardware components on which the system will operate. All software systems can be divided into four basic functions. The first is().Most information systems require data to be stored and retrieved, whether a small file,such as a memo produced by a word processor, or a large database, such as one that stores an organization's accounting records.The second function is the(),the processing required to access data, which often means database queries in Structured Query Language. The third function is the(请作答此空 ),which is the logic documented in the DFDs, use cases,and functional requirements.The fourth function is the presentation logic,the display of information to the user and the acceptance of the user's commands.The three primary hardware components of a system are (). A. system requirements B. system architecture C.application logic D.application program

考题 A customer is running system management software on one of their Windows xSeries servers, and the software seems to slow down their database application over time.  The customer is running IBM Director in their environment.  Which IBM Director tool can they utilize to guarantee processor time for the different applications and optimize the server performance?()A、Software RejuvenationB、Capacity ManagerC、Capacity Workload ManagerD、Aurema Application Workload Manager

考题 ()(货船)can be divided into two basic types.A、Cargo shipsB、Oil shipsC、Gas carriersD、Tramps

考题 A user can receive email but cannot send email with the email client software. Which of the following protocols is incorrectly configured?()A、FTPB、SMTPC、POPD、SNMP

考题 Which TWO of the following tasks of system maintenance can be improved by using Remote Deployment Manager?()A、DeploymentB、Software maintenanceC、Driver updatesD、DisposalE、Software inventory

考题 How many OSPF authentication types can be configured on a subinterface using JUNOS software?()A、0B、1C、2D、3

考题 单选题Virtualization is a technology that can help reduce power and cooling requirements. IT organizations can consolidate multiple OS and application stacks on each server with virtualization software.  What IBM solution simplifies virtualization for IBM hardware? ()A IBM DirectorB IBM Active Energy ManagerC IBM Capacity ManagerD IBM Virtualization Manager

考题 多选题Which two statements are true regarding IDP?()AIDP can be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.BIDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options, zones, and security policy.CIDP inspects traffic up to the Presentation layer.DIDP inspects traffic up to the Application layer.

考题 单选题All client computers on your company network run Windows 7 and are members of a Windows Server 2008 R2 domain. The RD department staff are local administrators on their computers and are members of the RD global security group. A new version of a business software application is available on the network. You plan to apply an AppLocker security policy to the RD group. You need to ensure that members of the RD group are not allowed to upgrade the software. What should you do?()A Create an Audit only restriction based on the version of the software.B Create an Audit only restriction based on the publisher of the software.C Create an Enforce rule restriction based on the version of the software.D Create an Enforce rule restriction based on the publisher of the software.

考题 单选题Documentation of a software package is normally produced for two purposes. One is to explain the (1) ofthe software and describe how to use them. This is known as (2) because it is designed to be read by the user of the software. The other purpose of documentation is to describe the software's internal composition so that the system can be maintained later in its life cycle. Documentation ofthis type is known as ( 3 ) 空白(1)处填()A plansB costC featuresD schedules

考题 单选题Documentation of a software package is normally produced for two purposes. One is to explain the (1) ofthe software and describe how to use them. This is known as (2) because it is designed to be read by the user of the software. The other purpose of documentation is to describe the software's internal composition so that the system can be maintained later in its life cycle. Documentation ofthis type is known as ( 3 ) 空白(3)处填()A system documentationB user documentationC vender documentationD license documentation

考题 多选题Which two external authentication server types are supported by JUNOS Software for firewall user authentication?()ARADIUSBTACACS+CLDAPDIIS

考题 多选题The J-Web application can install the JUNOS software from which two locations?()ASDXBlocal PCCBSD shellDremote host

考题 单选题You need to design the deployment of antivirus software. What should you do?()A Install the antivirus software on each mailbox storage serverB Install the antivirus software on each Outlook Web Access serverC Install the antivirus software on one Outlook Web Access server at each officeD Install the antivirus software on a back-end server that contains no mailboxes