一起答
单选

软件测试是软件质量保证的主要手段之一,测试的费用已超过(10)的30%以上。因此提高测试的有效性非常重要。“高产”的测试是指(11)。根据国家标准GB8566-88计算机软件开发规范的规定,软件的开发和维护分为8个阶段,其中单元测试是在(12)阶段完成的;组装测试的计划内是在(13)阶段制定的;确认测试的计划是在(14)阶段制定的。

  • A.软件开发费用
  • B.软件维护费用
  • C.软件开发和维护费用
  • D.软件研制费用
参考答案
查看试卷详情
相关试题
  1. (127)

    • A.Cache
    • B.Buffer
    • C.Register
    • D.Trigger
  2. (128)

    • A.volume
    • B.space
    • C.capacity
    • D.size
  3. (126)

    • A.sequential
    • B.serial
    • C.chain
    • D.successive
  4. (125)

    • A.instant
    • B.temporary
    • C.timely
    • D.transient
  5. The "main storage" normally means that part of internal storage into which instructions and other data must be loaded for subsequent execution or processing. In large computing systems, the term "main storage" is(71) to "memory". "Buffer" mainly indicates a special-purpose storage or storage area allowing, through(72) storage, the data transfer between two functional units having different transfer characteristics. A buffer storage is used between non-synchronized devices or where one is(73) and the other is parallel or between those having different trans far rates. "(74) (memory)" is also a special-purpose buffer storage, smaller and faster than main storage, used to hold a copy of instructions and data obtained from main storage and likely to be needed next by the processor. "Register" is commonly composed of a part of internal storage having a specified storage(75) and usually intended for a specific purpose.

    • A.suitable
    • B.optional
    • C.choice
    • D.preferred
  6. (123)

    • A.predefined
    • B.predetermined
    • C.predicted
    • D.pmscheduled
  7. (122)

    • A.malicious
    • B.greedy
    • C.destructive
    • D.chaos
  8. (121)

    • A.usable
    • B.accessible
    • C.available
    • D.obtainable
  9. (120)

    • A.initiated
    • B.called
    • C.referenced
    • D.invoked
  10. (66) program propagates itself by modifying other programs to include a possibly changed copy of itself and that is executed when the infected program is(67). A virus often causes damage or annoyance and may be triggered by some event such as the occurrence of a predetermined date.Worm is a self-contained program that can propagate itself through data processing systems or computer networks. Worms are often designed by hackers to use up(68) resources such as storage space or processing time.Trojan horse implies by the name an apparently harmless program containing(69) logic that allows the unauthorized collection, falsification or destruction of data. Logic bomb causes damage to a data processing system when triggered by some specific system condition. Time bomb is also a malicious program being activated at a(70) time.

    • A.Worm
    • B.Virus
    • C.Disaster
    • D.Demon