一起答
单选

在可行性研究中,需要进行初步调查。最好的方法是(8)。

  • A.访问企业主要业务部门领导,征求其对信息系统的需求
  • B.访问信息部门负责人,了解系统更新原因
  • C.访问终端用户,了解其对系统功能的需求
  • D.访问企业高层主管,了解系统目标、边界要求
参考答案
查看试卷详情
相关试题
  1. (59)

    • A.procedure
    • B.program
    • C.programmer
    • D.process
  2. (57)

    • A.chips
    • B.frame
    • C.structure
    • D.cell
  3. Programmers test a program by running it to ensure that the(74)are correct and that the program produces the desired outcome. If errors do occur, the programmer must make the appropriate change and recheck the program until it produces the correct results. This(75)is called testing and debugging.

    • A.commands
    • B.software
    • C.instructions
    • D.measure
  4. Computer hardware engineers research, design, develop, and test computer hardware and supervise its manufacture and(72). Hardware refers to computer(73), circuit boards, computer systems, and related equipment such as keyboards, modems, and printers.

    • A.fixing
    • B.building
    • C.setting
    • D.installation
  5. (55)

    • A.protocol
    • B.specification
    • C.prescript
    • D.rule
  6. The major goal of USB was to define an external expansion bus which makes adding(70)to a PC as easy as hooking up a telephone to a wall-jack. USB 2.0 is an evolution of the USB 1.1(71), providing a higher performance interface.

    • A.peripherals
    • B.outside
    • C.inside
    • D.beside
  7. Like personal computers, most workstations are(72)computers

    • A.single-user
    • B.single user
    • C.multi-user
    • D.multi user
  8. The term data is often used to distinguish()machine-readable information from textual human-readable information.

    • A.binary
    • B.hex
    • C.octal
    • D.decimal
  9. (50)

    • A.回溯
    • B.回归
    • C.返回
    • D.合成
  10. The major technical areas of computer security are usually represented by the initials CIA:(66), integrity, and authentication or availability.

    • A.confidentiality
    • B.confident
    • C.secret
    • D.safety