首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
It should go without saying that the focus of UML is modeling. However, what that means, exactly, can be an open-ended question.
It should go without saying that the focus of UML is modeling. However, what that means, exactly, can be an open-ended question.
admin
2009-02-01
17
问题
It should go without saying that the focus of UML is modeling. However, what that means, exactly, can be an open-ended question.(71)is a means to capture ideas, relationships, decisions, and requirements in a well-defined notation that can be applied to many different domains. Modeling not only means different things to different people, but also it can use different pieces of UML depending on what you are trying to convey. In general, a UML model is made up of one or more(72)A diagram graphically represents things, and the relationships between these things. These(73)can be representations of real-world objects, pure software constructs, or a description of the behavior of some other objects. It is common for an individual thing to show up on multiple diagrams; each diagram represents a particular interest, or view, of the thing being modeled. UML 2.0 divides diagrams into two categories: structural diagrams and behavioral diagrams.(74)are used to capture the physical organization of the things in your system, i.e., how one object relates to another.(75)focus on the behavior of elements in a system. For example, you can use behavioral diagrams to capture requirements, operations, and internal state changes for elements.
选项
A、views
B、diagrams
C、user views
D、structure pictures
答案
B
解析
转载请注明原文地址:https://kaotiyun.com/show/lGWZ777K
本试题收录于:
嵌入式系统设计师上午基础知识考试题库软考中级分类
0
嵌入式系统设计师上午基础知识考试
软考中级
相关试题推荐
阅读下列说明,回答问题1至问题3,将解答填入答题纸的对应栏内。【说明】在Linux系统中,用户账号是用户的身份标志,它由用户名和用户口令组成。Linux系统中用户名文件和口令字文件的默认访问权限分别是什么?
阅读下列说明,回答问题1至问题4,将解答填入答题纸的对应栏内。【说明】恶意代码是指为达到恶意目的而专门设计的程序或者代码。常见的恶意代码类型有:特洛伊木马、蠕虫、病毒、后门、Rootkit、僵尸程序、广告软件。2017年5月,勒索软件
阅读下列说明和表,回答问题,将解答填入答题纸的对应栏内。【说明】密码学作为信息安全的关键技术,在信息安全领域有着广泛的应用。密码学中,根据加密和解密过程所采用密钥的特点可以将密码算法分为两类:对称密码算法和非对称密码算法。此外,密码技术还用于信息鉴别、
电子商务系统除了面临一般的信息系统所涉及的安全威胁之外,更容易成为不法分子的攻击目标,其安全性需求普遍高于一般的信息系统。电子商务系统中的电子交易安全需求不包括()。
甲不但怀疑乙发给他的信遭人篡改,而且怀疑乙的公钥也是被人冒充的。为了消除甲的疑虑,甲和乙需要找一个双方都信任的第三方来签发数字证书,这个第三方是(36)________________。
下面对国家秘密定级和范围的描述中,不符合《保守国家秘密法》要求的是(10)________。
Todocumentyourcodecanincreaseprogram(72)andmakeprogrameasierto(73).
Projectmanagerbelievesthatmodifyingtheprojectscopemayprovideaddedvalueforthecustomer.Theprojectmanagershould(
Cloudcomputingisastyleofcomputinginwhichdynamicallyscalableandoften_________resourcesareprovidedasaserviceove
随机试题
()在有效孔隙度相同的条件下,孔隙直径小的岩石比直径大的岩石渗透率低,孔隙形状复杂的岩石比形状简单的岩石渗透率低。
防晒漆为()色涂料,涂于防腐层表面,形成()色漆膜,可减弱阳光辐射引起的外防腐层损坏。
A.国家药品监督管理部门B.省级药品监督管理部门C.设区的市级药品监督管理部门D.国家药品监督管理部门和国家农业主管部门定点经营资格审批中,审批专门从事第二类精神药品批发业务的企业的是()。
预制梁均应设置桥牌,桥牌应标明:跨度、活载等级、设计图号、梁号、()、许可证编号等。
统计设计是统计工作的()。
(三)在漫漫十年的时间里,以营养、柔顺、去屑为代表的宝洁三剑客“潘婷”“飘柔”“海飞丝”几乎垄断了中国洗发水市场的绝对份额。想在洗发水领域有所发展的企业无不被这三座大山压得喘不过气来,生存在宝洁的阴影里难以重见天日。后来的“舒蕾”“风影”“夏士莲
按照所要测量的特征大体上可把心理测验分成_________和_________。
下列各项中,不是多媒体设备的是
Forthisgenerationofyoungpeople,thefuturelooksbleak.Onlyoneinsixisworkingfulltime.Threeoutoffivelivewitht
A、Thestudentswillread.B、ThestudentswillhavearestC、Thestudentswilleat.D、Thestudentswillmakeabrake,B
最新回复
(
0
)