一起答
单选

衡量模块独立性的两个标准是内聚与耦合。如果某种内聚要求一个模块中包含的任务必须在同一段时间内执行,则这种内聚为(22),两个模块之间通过传递公共指针或地址相互作用的耦合为(23)。

  • A.时间内聚
  • B.逻辑内聚
  • C.通信内聚
  • D.信息内聚
参考答案
查看试卷详情
相关试题
  1. (82)

    • A.fabrication
    • B.falsification
    • C.stealing
    • D.rebuild
  2. (79)

    • A.decline
    • B.rejection
    • C.refusal
    • D.denial
  3. (81)

    • A.reason
    • B.assets
    • C.possession
    • D.component
  4. (80)

    • A.problems
    • B.flaws
    • C.defect
    • D.shortcoming
  5. (77)

    • A.search engine
    • B.search tools
    • C.database
    • D.computer
  6. In the following essay, each blank has four choices. Choose the best answer and write down on the answer sheet.

     In security, an(71)is a form. of possible loss or harm in a computing system; examples of exposures are unauthorized disclosure of data, modification of data, or(72)of legitimate access to computing. A vulnerability is a weakness in the security system that might be exploited to cause loss or harm. A human who exploits a vulnerability perpetrates an attack on the system. Threats to computing systems are circumstances that have the potential to cause loss or harm; human attacks are examples of threats, as are natural disasters, inadvertent human errors, and internal hardware or software(73). Finally, a control is a protective measure an action, a device, a procedure, or a technique - that reduces a vulnerability.  The major(74)of computing systems are hardware, software, and data. There are four kinds of threats to the security of a computing system: interruption, interception, modification, and(75). The four threats all exploit vulnerabilities of the assets in computing systems.

    • A.betrayal
    • B.uncover
    • C.emerge
    • D.exposure
  7. (74)

    • A.relevant
    • B.irrelevant
    • C.complicated
    • D.complex
  8. (75)

    • A.concrete
    • B.special
    • C.specific
    • D.particular
  9. (76)

    • A.seeing
    • B.searching
    • C.browsing
    • D.looking for
  10. In the following essay, each blank has four choices. Choose the best answer and write down on the answer sheet.It is more and more usual that users of Information Retrieval(IR)systems must face up to response of hundreds or thousands of(66)documents. A significant proportion of them are moreover(67)or redundant. This is a straight consequence of two well - known facts: the incessant growing of documental databases and the lack of ability of most users to define(68)information needs. In such a framework, further effective retrieval techniques are only part of the solution. Interfaces with alternative ways for organizing and(69)the results returned by a(70)would be of great utility assisting users to find relevant documents. Document clustering may play a central role as an effective technique for organizing query results.

    • A.replied
    • B.retrieved
    • C.received
    • D.relied