一起答
单选

下列叙述中错误的是(13):

①模型是对现实的简化,建模是为了更好地理解所开发的系统。

②用例图定义了系统的功能需求,它是从系统的外部看系统功能,并不描述系统内部对功能的具体实现。

③白盒测试仅与程序的内部结构有关,完全可以不考虑程序的功能要求。

④软件技术复审是由用户和测试人员实施的一种质量保证活动。

  • A.①
  • B.②
  • C.③
  • D.④
参考答案
查看试卷详情
相关试题
  1. (45)

    • A.searched
    • B.checked
    • C.tested
    • D.detected
  2. (43)

    • A.visit
    • B.access
    • C.I/O
    • D.read/write
  3. (44)

    • A.power
    • B.rights
    • C.authorized
    • D.common
  4. (42)

    • A.reliable
    • B.secure
    • C.indestructible
    • D.steady
  5. Most computer systems are(71)to two different groups of attacks: Insider attacks and outsider attacks. A system that is known to be(72)to an outsider attack by preventing(73)from outside can still be vulnerable to the insider attacks accomplished by abusive usage of(74)users. Detecting such abusive usage as well as attacks by outsides not only provides information on damage assessment, but also helps to prevent future attacks. These attacks are usually(75)by tools referred to as Intrusion Detection Systems.

    • A.vulnerable
    • B.week
    • C.sensitively
    • D.helpless
  6. (39)

    • A.off
    • B.offer
    • C.office
    • D.officer
  7. (40)

    • A.abort
    • B.about
    • C.above
    • D.Around
  8. (37)

    • A.ciphertext
    • B.hypertext
    • C.paintext
    • D.supertext
  9. (38)

    • A.browser
    • B.repeater
    • C.router
    • D.server
  10. Because Web servers are platform. and application(66), they can send or request data from legacy or external applications including databases. All replies, once converted into(67)mark - up language, can then be transmitted to a(68). Used in this way, Intranets can(69)lower desktop support costs, easy links with legacy applications and databases and,(70)all, ease of use.

    • A.coupled
    • B.dependent
    • C.independent
    • D.related