首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
It should go without saying that the focus of UML is modeling. However, what that means, exactly, can be an open-ended question.
It should go without saying that the focus of UML is modeling. However, what that means, exactly, can be an open-ended question.
admin
2009-02-01
36
问题
It should go without saying that the focus of UML is modeling. However, what that means, exactly, can be an open-ended question.(71)is a means to capture ideas, relationships, decisions, and requirements in a well-defined notation that can be applied to many different domains. Modeling not only means different things to different people, but also it can use different pieces of UML depending on what you are trying to convey. In general, a UML model is made up of one or more(72)A diagram graphically represents things, and the relationships between these things. These(73)can be representations of real-world objects, pure software constructs, or a description of the behavior of some other objects. It is common for an individual thing to show up on multiple diagrams; each diagram represents a particular interest, or view, of the thing being modeled. UML 2.0 divides diagrams into two categories: structural diagrams and behavioral diagrams.(74)are used to capture the physical organization of the things in your system, i.e., how one object relates to another.(75)focus on the behavior of elements in a system. For example, you can use behavioral diagrams to capture requirements, operations, and internal state changes for elements.
选项
A、views
B、diagrams
C、user views
D、structure pictures
答案
B
解析
转载请注明原文地址:https://kaotiyun.com/show/lGWZ777K
本试题收录于:
嵌入式系统设计师上午基础知识考试题库软考中级分类
0
嵌入式系统设计师上午基础知识考试
软考中级
相关试题推荐
阅读下列说明和图,回答问题1至问题3,将解答填入答题纸的对应栏内。【说明】密码学的基本目标是在有攻击者存在的环境下,保证通信双方(A和B)之间能够使用不安全的通信信道实现安全通信。密码技术能够实现信息的保密性、完整性、可用性和不可否认性等安全目
阅读下列说明,回答问题,将解答填入答题纸的对应栏内。【说明】访问控制是保障信息系统安全的主要策略之一,其主要任务是保证系统资源不被非法使用和非常规访问。访问控制规定了主体对客体访问的限制,并在身份认证的基础上,对用户提出的资源访问请求加以控制。当前,主
智能卡是指粘贴或嵌有集成电路芯片的一种便携式卡片塑胶,智能卡的片内操作系统(COS)是智能卡芯片内的一个监控软件,以下不属于COS组成部分的是()。
电子商务系统除了面临一般的信息系统所涉及的安全威胁之外,更容易成为不法分子的攻击目标,其安全性需求普遍高于一般的信息系统。电子商务系统中的电子交易安全需求不包括()。
以下不属于信息安全风险评估中需要识别的对象是__________________。
强制访问控制(MAC)可通过使用敏感标签对所有用户和资源强制执行安全策略。MAC中用户访问信息的读写关系包括下读、上写、下写和上读四种,其中用户级别高于文件级别的读写操作是(23)________。
Todocumentyourcodecanincreaseprogram(72)andmakeprogrameasierto(73).
Theprojectteammembersshouldalsobeawareofoneofthefundamentaltenetsofmodemqualitymanagement:qualityisplanned,d
Alloffollowingsshouldbedonebytheprojectmanagerduringprojectcontrolexcept().
________isaparadigmforenablingnetworkaccesstoascalableandelasticpoolofshareablephysicalorvirtualresourcesw
随机试题
在我国,国际投资的法律形式主要表现为()
Whenamanisdrivingacarforlongdistancesalongamainroadormotorway,twoofhisproblemsaretokeepthecaratafairl
Mycatwouldnothavebittenthetoyfish______itwasmadeofrubber.
在片剂中作崩解剂的是
Ihad______mostpleasantweekendatMary’shome.
甲因犯盗窃罪于1998年被判处有期徒刑2年,2000年5月刑满释放。2005年3月17日晚上,甲潜入乙的家中,被发现后携所窃挎包一个(内有数码相机一部,物品价值人民币1500元)逃跑,乙紧迫不舍,无奈之下甲将挎包扔到路边,乙见状将包捡回。甲见路边有一辆未熄
人生观的核心是
设X的概率密度为f(x)=,一∞<x<+∞,(1)求E(X)和D(X);(2)求X与|X|的协方差,判断X与|X|是否不相关;(3)判断X与|X|是否相互独立.
[2010年]=().
Fancyathree-dayweekend—notjustonceinawhilebutweekinweekout?Youmaythinkyourbosseswouldneveragreetoit,but
最新回复
(
0
)