Newer
Older
csv2brain / app / src / main / assets / exam / 2022_1.json
ubt on 24 Jan 2024 176 KB 增加习题列表
{"msg":"2022年上半年","code":200,"data":{"currentIndex":null,"examId":"1745024492155047936","examTime":9000,"questionList":[{"id":"796233815319138305","title":"()不属于基于生物特征的认证技术。","analyze":"生物特征识别技术主要是指通过人类生物特征进行身份认证的一种技术,这里的生物特征通常具有唯一的(与他人不同)、可以测量或可自动识别和验证、遗传性或终身不变等特点。所谓生物识别的核心在于如何获取这些生物特征,并将之转换为数字信息,存储于计算机中,利用可靠的匹配算法来完成验证与识别个人身份的过程。<br> 身体特征包括:指纹、静脉、掌型、视网膜、虹膜、人体气味、脸型、甚至血管、DNA、骨骼等。","multi":0,"questionType":1,"answer":"C","chooseItem":["796233816300605441"],"itemList":[{"id":"796233816241885185","questionId":"796233815319138305","content":" 指纹识别","answer":0,"chooseValue":"A"},{"id":"796233816271245313","questionId":"796233815319138305","content":" 人脸识别","answer":0,"chooseValue":"B"},{"id":"796233816300605441","questionId":"796233815319138305","content":" 口令","answer":1,"chooseValue":"C"},{"id":"796233816325771265","questionId":"796233815319138305","content":" 虹膜识别","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233799837962241","title":"对于安全关键系统,需要额外的安全保证、软件验证以及系统分析过程。( )是检查系统是否安全运行的一组活动,包含在软件开发过程的所有阶段中,记录了所进行的分析以及负责分析的相关人员。","analyze":"对于安全关键系统,需要额外的安全保证、软件验证以及系统分析过程。其中,安全保证是一组活动,主要包括确定和确认安全需求、安全规范和安全性能等,以确保系统在运行中满足安全要求。它是安全工程的重要组成部分,贯穿于软件开发过程的各个阶段,记录了所进行的分析以及参与分析的相关人员。\n<br>\n软件测试是指通过运行程序检验软件是否符合需求和规格说明书的预期目标,验证软件功能的正确性和稳定性,确保软件的质量。软件验证则是一种确认过程,用于验证软件产品是否符合客户的要求和规格说明书,软件开发过程中所遵循的标准和规范,以及对安全性的需求等。而系统分析则是指对系统进行全面的分析、研究和评估,以获得对系统完整性和各项功能的深入理解,并为后续的系统设计和实现提供支持。\n<br>\n因此,选项 B. 安全保证最符合题意。","multi":0,"questionType":1,"answer":"B","chooseItem":["796233800903315457"],"itemList":[{"id":"796233800890732545","questionId":"796233799837962241","content":" 软件测试","answer":0,"chooseValue":"A"},{"id":"796233800903315457","questionId":"796233799837962241","content":" 安全保证","answer":1,"chooseValue":"B"},{"id":"796233800915898369","questionId":"796233799837962241","content":" 软件验证","answer":0,"chooseValue":"C"},{"id":"796233800924286977","questionId":"796233799837962241","content":" 系统分析","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233858746961921","title":"云计算可以按需提供弹性资源,它的体系结构由5部分组成。其中,()为用户提供对资源层的各项云计算服务的封装,帮助用户构建所需的应用。","analyze":"资源层:资源池层是指基础架构层面的云计算服务,这些服务可以提供虚拟化的资源,从而隐藏物理资源的复杂性。如:服务器,存储。<br> 平台层:为用户提供对资源层服务的封装,使用户可以构建自己的应用。<br> 应用层:提供软件服务,如:财务管理,客户关系管理,商业智能。<br> 用户访问层:方便用户使用云计算服务所需的各种支撑服务,针对每个层次的云计算服务都需要提供相应的访问接口。<br> 管理层:提供对所有层次云计算服务的管理功能。","multi":0,"questionType":1,"answer":"B","chooseItem":["796233859690680321"],"itemList":[{"id":"796233859661320193","questionId":"796233858746961921","content":" 应用层","answer":0,"chooseValue":"A"},{"id":"796233859690680321","questionId":"796233858746961921","content":" 平台层","answer":1,"chooseValue":"B"},{"id":"796233859724234753","questionId":"796233858746961921","content":" 用户访问层","answer":0,"chooseValue":"C"},{"id":"796233859753594881","questionId":"796233858746961921","content":" 管理层","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233877977845761","title":"ISO 9000定义业务过程(Business Process)为一组将输入转化为输出的相互关联或相互作用的活动。该过程包括6个基本要素,分别是()、活动、活动的相互作用、输出结果、用户和价值。","analyze":"IS09000有关业务流程的定义是:业务流程是一组将输入转化为输出的相互关联或相互作用的活动。流程6个要素分别是:输入、活动、活动的相互作用(即结构)、输出、客户、价值。","multi":0,"questionType":1,"answer":"A","chooseItem":["796233878963507201"],"itemList":[{"id":"796233878963507201","questionId":"796233877977845761","content":" 输入资源","answer":1,"chooseValue":"A"},{"id":"796233878984478721","questionId":"796233877977845761","content":" 需求说明","answer":0,"chooseValue":"B"},{"id":"796233879009644545","questionId":"796233877977845761","content":" 活动环境","answer":0,"chooseValue":"C"},{"id":"796233879026421761","questionId":"796233877977845761","content":" 活动前提","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233818297094145","title":"()属于公钥加密算法。","analyze":"本题考查信息安全基础知识。<br> 对称加密算法包括:DES(数据加密标准)、AES。","multi":0,"questionType":1,"answer":"B","chooseItem":["796233819240812545"],"itemList":[{"id":"796233819211452417","questionId":"796233818297094145","content":" AES","answer":0,"chooseValue":"A"},{"id":"796233819240812545","questionId":"796233818297094145","content":" RSA","answer":1,"chooseValue":"B"},{"id":"796233819270172673","questionId":"796233818297094145","content":" MD5","answer":0,"chooseValue":"C"},{"id":"796233819299532801","questionId":"796233818297094145","content":" DES","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233827474231297","title":"下列关于计算机软件著作权的叙述,错误的是()。","analyze":"根据《计算机软件保护条例》的第十七条。<br> 第十七条u2003为了学习和研究软件内含有的设计思想和原理,通过安装、显示、传输或者存储软件等方式使用软件的,可以不经软件著作权人许可,不向其支付报酬。<br> 根据《计算机软件保护条例》的第十五条。<br> 第十五条u2003软件著作权属于自然人的,该自然人死亡后,在软件著作权的保护期内,软件著作权的继承人可以依照《中华人民共和国继承法》的有关规定,继承本条例第八条规定的除署名权以外的其他权利。<br> 根据《计算机软件保护条例》的第九条。<br> (九)应当由软件著作权人享有的其他权利。<br> 软件著作权人可以许可他人行使其软件著作权,并有权获得报酬。<br> 软件著作权人可以全部或者部分转让其软件著作权,并有权获得报酬。<br> 第九条u2003软件著作权属于软件开发者,本条例另有规定的除外。<br> 如无相反证明,在软件上署名的自然人、法人或者其他组织为开发者。","multi":0,"questionType":1,"answer":"B","chooseItem":["796233828493447169"],"itemList":[{"id":"796233828476669953","questionId":"796233827474231297","content":" 为了学习和研究软件内涵的设计思想和原理,通过安装、传输或存储软件等方式使用软件,可以不经软件著作权人许可,不向其支付报酬","answer":0,"chooseValue":"A"},{"id":"796233828493447169","questionId":"796233827474231297","content":" 软件著作权属于自然人的,该自然人死亡后,在软件著作权的保护期内,软件著作权的继承人可以继承各项软件著作权","answer":1,"chooseValue":"B"},{"id":"796233828514418689","questionId":"796233827474231297","content":" 软件著作权人可以许可他人行使其软件著作权,并有权获得报酬","answer":0,"chooseValue":"C"},{"id":"796233828535390209","questionId":"796233827474231297","content":" 软件著作权人可以全部或部分转让其软件著作权,并有权获得报酬","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233958546231297","title":"各种线性规划模型都可以将其标准化。线性规划模型标准形式的特点不包括()。","analyze":"本题考查线性规划相关知识。<br> 线性规划的标准型(standard form of linearprogramrmng)是线性规划模型的标准形式。其主要特征为:<br> (1)目标函数为极大化类型;<br> (2)所有的约束条件都是等式;<br> (3)所有约束方程右端的常数都是非负的,C选项描述不够准确;<br> (4)所有决策变量都是非负的。","multi":0,"questionType":1,"answer":"C","chooseItem":["796233959582224385"],"itemList":[{"id":"796233959548669953","questionId":"796233958546231297","content":" 目标函数达到最大化(或最小化)","answer":0,"chooseValue":"A"},{"id":"796233959561252865","questionId":"796233958546231297","content":" 约束条件都是线性等式","answer":0,"chooseValue":"B"},{"id":"796233959582224385","questionId":"796233958546231297","content":" 约束条件中的常数系数均为非负","answer":1,"chooseValue":"C"},{"id":"796233959599001601","questionId":"796233958546231297","content":" 所有的决策变量均为非负","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233994239758337","title":"<p><strong>请作答第<span style=\"color: red\">1</span>个空。</strong></p>遗留系统 (Legacy System)是指任何基本上不能进行修改和演化以满足新的业务需求变化的信息系统。针对遗留系统的再利用问题,通常从技术水平和业务价值两个维度进行考量,对于高水平、低价值的遗留系统,通常采用(63)策略;对于高水平、高价值的遗留系统,通常采用(64)策略。","analyze":"<img src=\"https://image.chaiding.com/ruankao/0c9f3f82b321896a97b286c5cd26ce75.jpg?x-oss-process=style/ruankaodaren\" alt=\"\" width=\"250\" height=\"223\" title=\"\" align=\"\">","multi":0,"questionType":1,"answer":"D","chooseItem":["796233995212836865"],"itemList":[{"id":"796233995154116609","questionId":"796233994239758337","content":" 淘汰","answer":0,"chooseValue":"A"},{"id":"796233995175088129","questionId":"796233994239758337","content":" 继承","answer":0,"chooseValue":"B"},{"id":"796233995196059649","questionId":"796233994239758337","content":" 改造","answer":0,"chooseValue":"C"},{"id":"796233995212836865","questionId":"796233994239758337","content":" 集成","answer":1,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796234003710496769","title":"DNS协议的功能是()。","analyze":"DNS协议(Domain Name System,域名系统)是一种将域名解析为IP地址的分布式数据库系统。在Internet上,每个主机都有一个唯一的IP地址,但是由于IP地址是一串数字,不便记忆,因此人们通常使用域名来代替IP地址访问目标主机。DNS协议就是将域名转换为IP地址的过程,从而方便用户访问Internet上的各种服务。DNS协议具体实现了包括递归查询、迭代查询、缓存等功能,使得DNS系统可以高效、准确地完成域名解析任务。因此,选项A是正确答案。选项B所描述的是ARP协议(Address Resolution Protocol,地址解析协议)的功能;选项C所描述的是RARP协议(Reverse Address Resolution Protocol,反向地址解析协议)的功能;选项D中的“主机名”和“域名”有所区别,主机名通常指局域网内的主机名称,而不是全局的域名。\n\n\n\n\n","multi":0,"questionType":1,"answer":"A","chooseItem":["796234004712935425"],"itemList":[{"id":"796234004712935425","questionId":"796234003710496769","content":" 将域名解析为IP地址","answer":1,"chooseValue":"A"},{"id":"796234004746489857","questionId":"796234003710496769","content":" 将MAC地址解析为IP地址","answer":0,"chooseValue":"B"},{"id":"796234004771655681","questionId":"796234003710496769","content":" 将IP地址解析为MAC地址","answer":0,"chooseValue":"C"},{"id":"796234004792627201","questionId":"796234003710496769","content":" 将主机名解析为IP地址","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796235485428076545","title":"试题一(25分)<br>\n阅读下列说明,回答问题1至问题3,将解答填入答题纸的对应栏内。<br>\n【说明】<br>\n某软件公司拟开发一套博客系统,要求能够向用户提供一个便捷发布自已心得,及时有效的与他人进行交流的平台。新用户发布个人博客之前,需要创建一个新的博客账户,以下为新用户注册的操作行为:<br>\n(a) 向系统请求创建一个新的博客账户;<br>\n(b) 输入个人详细信息;<br>\n(c) 使用证件数据库验证个人详细信息;<br>\n(d) 选择账户类型;<br>\n(e) 身份验证成功,创建新的博客账户;<br>\n(f) 用户身份信息验证不成功;<br>\n(g) 以电子邮件的方式将账户详细信息发送给用户;<br>\n(h) 博客账户申请被拒绝。\n<br><br>\n【问题1】(6分)<br>\n在结构化和面向对象的软件分析过程中,通常会使用到数据流图、活动图和流程图,请分别描述这三种模型的特点和适用场景。\n<br><br>\n【问题2】(9分)<br>\n采用用例图和用例描述建模系统需求,请使用题干给出的(a)~(h),完善“博客账户创建用例描述”中的(1)~(6),如表1-1所示。将正确答案填在答题纸上。<br>\n <img src=\"https://image.chaiding.com/ruankao/41ae2db44de5e4f4a6a6ffb8dbb16051.jpg?x-oss-process=style/ruankaodaren\" alt=\"\" width=\"700\" height=\"640\" title=\"\" align=\"\">\n<br><br>\n【问题3】(10分)<br>\n需求评审是通过将需求规格说明书递交给相关人员检查,以发现其中存在缺陷的过程。在需求工程中,需求评审是一个非常重要的过程。结合题干案例,请用300字以内的文字简要说明需求评审的内容及作用。","analyze":"【问题1】<br>\n数据流图:<br>\n特点:通过系统内数据的流动来描述系统功能的一种方法。强调系统中的数据流动。由:数据流,外部实体,加工,数据存储。<br>\n适用场景:结构化需求分析,为系统做功能建模。<br>\n活动图:<br>\n特点:与流程图类似,但可以表现并行执行。<br>\n适用场景:面向对象分析与设计建模。<br>\n流程图:<br>\n特点:能清晰展现业务执行的流程顺序。强调控制流。<br>\n适用场景:结构化需求分析与结构化设计,为系统梳理业务流程。\n<br><br>\n【问题2】<br>\n(1)(a)<br>\n(2)(d)<br>\n(3)(b)<br>\n(4)(c)<br>\n(5)(g)<br>\n(6)(h)\n<br><br>\n【问题3】<br>\n需求评审内容:<br>\n(1)SRS正确地描述了预期的、满足项目干系人需求的系统行为和特征。<br>\n(2)SRS中的软件需求是从系统需求、业务规格和其他来源中正确推导而来的。<br>\n(3)需求是完整的和高质量的。<br>\n本例中存在需求描述不完整的情况,如:谁向系统请求?输入个人详细信息要输入哪些?选择账户类型,有哪些账户类型供选择?<br>\n(4)需求的表示在所有地方都是一致的。<br>\n(5)需求为继续进行系统设计、实现和测试提供了足够的基础。<br>\n(6)用例优先级合理度评估。<br>\n本案例中,未说明用例的优先级。<br>\n作用:<br>\n1、发现二义性需求;<br>\n2、发现不确定性用户未达成共识的需求;<br>\n3、发现遗漏的需求;<br>\n4、为项目干系人在需求问题上达成共识提供支撑;<br>\n5、降低风险;<br>\n6、提高软件质量。","multi":0,"questionType":2,"answer":"","chooseItem":null,"itemList":null,"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233978213322753","title":"根据历史数据和理论推导可知,某应用中,随机变量s的分布密度函数为f(x)=3x<sup>2</sup>,(0&lt;x&lt;1)。这意味着,当Δx充分小时,随机变量s落在区间(x,x+Δx)内的概率约等于f(x)Δx。为此,开发该应用的仿真系统时,可用()来模拟该随机变量,其中,r1.r2.r3...为计算机逐个产生的、均匀分布在(0,1)区间内的互相独立的伪随机数。","analyze":"( 0 ,1 )区间内的分布密度函数3x<sup>2</sup>。意味着随着x的增大出现的概率也增大。显然,对于min(r1 ,r2 , r3 ) ,出现较小的数值的概率更大些;r1 *r2*r3(两个小于1 的数相乘会变得更小)也会这样。对于随机变量(r1+r2+r3)/2 , 出现中等大小数值的概率更大一些,出现较大的或较小值的概率会小一些,其分布密度函数会呈凸型。只有max(r1 ,r2 ,r3) ,出现较大数值的概率更大些。","multi":0,"questionType":1,"answer":"A","chooseItem":["796233979287064577"],"itemList":[{"id":"796233979287064577","questionId":"796233978213322753","content":" max(r1,r2,r3)","answer":1,"chooseValue":"A"},{"id":"796233979324813313","questionId":"796233978213322753","content":" min(r1,r2,r3)","answer":0,"chooseValue":"B"},{"id":"796233979358367745","questionId":"796233978213322753","content":" r1*r2*r3","answer":0,"chooseValue":"C"},{"id":"796233979396116481","questionId":"796233978213322753","content":" (r1+r2+r3)/3","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233997142216705","title":"<p><strong>请作答第<span style=\"color: red\">2</span>个空。</strong></p>遗留系统 (Legacy System)是指任何基本上不能进行修改和演化以满足新的业务需求变化的信息系统。针对遗留系统的再利用问题,通常从技术水平和业务价值两个维度进行考量,对于高水平、低价值的遗留系统,通常采用(63)策略;对于高水平、高价值的遗留系统,通常采用(64)策略。","analyze":"<img src=\"https://image.chaiding.com/ruankao/2f1184616f27c4408303d0e3b4a5fb09.jpg?x-oss-process=style/ruankaodaren\" alt=\"\" width=\"250\" height=\"223\" title=\"\" align=\"\">","multi":0,"questionType":1,"answer":"C","chooseItem":["796233998048186369"],"itemList":[{"id":"796233998027214849","questionId":"796233997142216705","content":" 淘汰","answer":0,"chooseValue":"A"},{"id":"796233998039797761","questionId":"796233997142216705","content":" 继承","answer":0,"chooseValue":"B"},{"id":"796233998048186369","questionId":"796233997142216705","content":" 改造","answer":1,"chooseValue":"C"},{"id":"796233998060769281","questionId":"796233997142216705","content":" 集成","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233861708140545","title":"相比传统SOA的服务实现方式,微服务更具有灵活性、可实施性以及可扩展性,其强调的是一种()的软件架构模式。","analyze":"微服务强调的是一种独立开发、独立测试、独立部署、独立运行的高度自治的架构模式,也是一种更灵活、更开发、更松散的演进式架构。","multi":0,"questionType":1,"answer":"C","chooseItem":["796233863163564033"],"itemList":[{"id":"796233863104843777","questionId":"796233861708140545","content":" 联合测试、独立部署、独立运行","answer":0,"chooseValue":"A"},{"id":"796233863138398209","questionId":"796233861708140545","content":" 联合测试、独立部署、集中运行","answer":0,"chooseValue":"B"},{"id":"796233863163564033","questionId":"796233861708140545","content":" 独立测试、独立部署、独立运行","answer":1,"chooseValue":"C"},{"id":"796233863192924161","questionId":"796233861708140545","content":" 独立测试、独立部署、集中运行","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233907564466177","title":"<p><strong>请作答第<span style=\"color: red\">1</span>个空。</strong></p>在企业信息化中,(36)的主要方法有业务与IT整合和企业IT架构构建。下面关于上述两种方法的说法中,不正确的是(37)。","analyze":"企业战略与信息化战略集成的主要方法有BITA(Business-IT Alignment,业务与IT整合)和EITA(Enterprise IT Architecture,企业IT架构)。<br> (1)业务与IT整合。BITA是一种以业务为导向的、全面的IT管理咨询实施方法论。从制订企业战略、建立(或改进)企业组织结构和业务流程,到进行IT管理和制订过渡计划(transition plan),使IT能够更好地为企业战略和目标服务。BITA适用于信息系统不能满足当前管理中的业务需要,业务和IT之间总是有不一致的地方。BITA的主要步骤是:评估和分析企业当前业务和IT不一致的领域,整理出企业的业务远景和未来战略,建立业务模型,提出达到未来目标的转变过程建议和初步计划,以及执行计划。<br> (2)企业IT架构。EITA分析企业战略,帮助企业制订IT战略,并对其投资决策进行指导。在技术、信息系统、信息、IT组织和IT流程方面,帮助企业建立IT的原则规范、模式和标准,指出IT需要改进的方面并帮助制订行动计划。EITA适用于现有信息系统和IT基础架构不一致、不兼容和缺乏统一的整体管理的企业。<br> 根据以上介绍可知,BITA和EITA有相同之处,甚至在某些领域有重叠。在企业信息化实践中,需要根据实际情况,选择其中的一种方法,或者结合使用BITA和EITA方法进行实施。","multi":0,"questionType":1,"answer":"B","chooseItem":["796233908608847873"],"itemList":[{"id":"796233908592070657","questionId":"796233907564466177","content":" 信息架构继承","answer":0,"chooseValue":"A"},{"id":"796233908608847873","questionId":"796233907564466177","content":" 企业战略与信息化战略集成","answer":1,"chooseValue":"B"},{"id":"796233908625625089","questionId":"796233907564466177","content":" 信息化规划与业务整合","answer":0,"chooseValue":"C"},{"id":"796233908646596609","questionId":"796233907564466177","content":" 信息化规划与企业战略规划","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233865436876801","title":"TOGAF框架是一个多视图的体系结构,它由企业的业务架构、信息架构、应用架构和技术架构共同构成。企业信息架构是将企业业务实体抽象成为信息对象,将企业的业务运作模式抽象为信息对象的属性和方法,建立面向对象的企业信息模型。企业信息架构实现了从()。<br> ①业务模式向信息模型的转变<br> ②业务需求向信息功能的映射<br> ③企业基础数据向企业信息的抽象<br> ④业务逻辑向功能逻辑的演化","analyze":"企业信息架构是将企业业务实体抽象成为信息对象,将企业的业务运作模式抽象成为信息对象的属性和方法,建立面向对象的企业信息模型。企业信息架构实现从业务模式向信息模型的转变,业务需求向信息功能的映射,企业基础数据向企业信息的抽象。<br> 企业信息架构对企业业务进行建模,它能独立于技术的发展和变化,并能帮助项目中业务人员和技术人员之间的沟通。","multi":0,"questionType":1,"answer":"A","chooseItem":["796233866498035713"],"itemList":[{"id":"796233866498035713","questionId":"796233865436876801","content":" ①②③","answer":1,"chooseValue":"A"},{"id":"796233866514812929","questionId":"796233865436876801","content":" ①②④","answer":0,"chooseValue":"B"},{"id":"796233866527395841","questionId":"796233865436876801","content":" ①③④","answer":0,"chooseValue":"C"},{"id":"796233866539978753","questionId":"796233865436876801","content":" ②③④","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233868595187713","title":"<p><strong>请作答第<span style=\"color: red\">1</span>个空。</strong></p>智能制造系统架构从生命周期、系统层级和智能特征3个维度对智能制造所涉及的活动、装备、特征等内容进行描述,主要用于明确智能制造的(24),指导国家智能制造标准体系建设。其中,系统层级是对与企业生产活动相关的组织结构的层级划分,包括(25)。","analyze":"智能制造系统架构从生命周期、系统层级和智能特征等3个维度对智能制造所涉及的要素、装备、活动等内容进行描述,主要用于明确智能制造的标准化对象和范围。 <p> <br> </p> <p> <img src=\"https://image.chaiding.com/ruankao/2ca6e5ddc691691274f04e82ecb0d36e.jpg?x-oss-process=style/ruankaodaren\" width=\"400\" height=\"375\" title=\"\" align=\"\" alt=\"\"><br> 1. 生命周期<br> 生命周期涵盖从产品原型研发到产品回收再制造的各个阶段,包括设计、生产、物流、销售、服务等一系列相互联系的价值创造活动。生命周期的各项活动可进行迭代优化,具有可持续性发展等特点,不同行业的生命周期构成和时间顺序不尽相同。<br> (1)设计是指根据企业的所有约束条件以及所选择的技术来对需求进行实现和优化的过程;<br> (2)生产是指将物料进行加工、运送、装配、检验等活动创造产品的过程;<br> (3)物流是指物品从供应地向接收地的实体流动过程;<br> (4)销售是指产品或商品等从企业转移到客户手中的经营活动;<br> (5)服务是指产品提供者与客户接触过程中所产生的一系列活动的过程及其结果。<br> 2. 系统层级<br> 系统层级是指与企业生产活动相关的组织结构的层级划分,包括设备层、单元层、车间层、企业层和协同层。<br> (1)设备层是指企业利用传感器、仪器仪表、机器、装置等,实现实际物理流程并感知和操控物理流程的层级;<br> (2)单元层是指用于企业内处理信息、实现监测和控制物理流程的层级;<br> (3)车间层是实现面向工厂或车间的生产管理的层级;<br> (4)企业层是实现面向企业经营管理的层级;<br> (5)协同层是企业实现其内部和外部信息互联和共享,实现跨企业间业务协同的层级。<br> 3. 智能特征<br> 智能特征是指制造活动具有的自感知、自决策、自执行、自学习、自适应之类功能的表征,包括资源要素、互联互通、融合共享、系统集成和新兴业态等5层智能化要求。<br> (1)资源要素是指企业从事生产时所需要使用的资源或工具及其数字化模型所在的层级;<br> (2)互联互通是指通过有线或无线网络、通信协议与接口,实现资源要素之间的数据传递与参数语义交换的层级;<br> (3)融合共享是指在互联互通的基础上,利用云计算、大数据等新一代信息通信技术,实现信息协同共享的层级;<br> (4)系统集成是指企业实现智能制造过程中的装备、生产单元、生产线、数字化车间、智能工厂之间,以及智能制造系统之间的数据交换和功能互连的层级;<br> (5)新兴业态是指基于物理空间不同层级资源要素和数字空间集成与融合的数据、模型及系统,建立的涵盖了认知、诊断、预测及决策等功能,且支持虚实迭代优化的层级。 </p>","multi":0,"questionType":1,"answer":"B","chooseItem":["796233869538906113"],"itemList":[{"id":"796233869509545985","questionId":"796233868595187713","content":" 标准化需求、业务和对象","answer":0,"chooseValue":"A"},{"id":"796233869538906113","questionId":"796233868595187713","content":" 标准化需求、对象和范围","answer":1,"chooseValue":"B"},{"id":"796233869568266241","questionId":"796233868595187713","content":" 标准化需求、业务和流程","answer":0,"chooseValue":"C"},{"id":"796233869593432065","questionId":"796233868595187713","content":" 标准化需求、流程和范围","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233824206868481","title":"以下商标注册申请、经审查,不能获取注册的是()。","analyze":"《中华人民共和国商标法》第十条规定:县级以上行政区划的地名或者公众知晓的外国地名,不得作为商标。但是,地名具有其他含义或者作为集体商标、证明商标组成部分的除外;已经注册的使用地名的商标继续有效。","multi":0,"questionType":1,"answer":"C","chooseItem":["796233825377079297"],"itemList":[{"id":"796233825314164737","questionId":"796233824206868481","content":" 青铜","answer":0,"chooseValue":"A"},{"id":"796233825339330561","questionId":"796233824206868481","content":" 华山","answer":0,"chooseValue":"B"},{"id":"796233825377079297","questionId":"796233824206868481","content":" 湖北","answer":1,"chooseValue":"C"},{"id":"796233825410633729","questionId":"796233824206868481","content":" 麒麟","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233871573143553","title":"<p><strong>请作答第<span style=\"color: red\">2</span>个空。</strong></p>智能制造系统架构从生命周期、系统层级和智能特征3个维度对智能制造所涉及的活动、装备、特征等内容进行描述,主要用于明确智能制造的(24),指导国家智能制造标准体系建设。其中,系统层级是对与企业生产活动相关的组织结构的层级划分,包括(25)。","analyze":"智能制造系统架构从生命周期、系统层级和智能特征等3个维度对智能制造所涉及的要素、装备、活动等内容进行描述,主要用于明确智能制造的标准化对象和范围。 <p> <img src=\"https://image.chaiding.com/ruankao/f4f3302d0804a0e5568502ed9aefe0d1.jpg?x-oss-process=style/ruankaodaren\" width=\"400\" height=\"375\" title=\"\" align=\"\" alt=\"\"><br> 1. 生命周期<br> 生命周期涵盖从产品原型研发到产品回收再制造的各个阶段,包括设计、生产、物流、销售、服务等一系列相互联系的价值创造活动。生命周期的各项活动可进行迭代优化,具有可持续性发展等特点,不同行业的生命周期构成和时间顺序不尽相同。<br> (1)设计是指根据企业的所有约束条件以及所选择的技术来对需求进行实现和优化的过程;<br> (2)生产是指将物料进行加工、运送、装配、检验等活动创造产品的过程;<br> (3)物流是指物品从供应地向接收地的实体流动过程;<br> (4)销售是指产品或商品等从企业转移到客户手中的经营活动;<br> (5)服务是指产品提供者与客户接触过程中所产生的一系列活动的过程及其结果。<br> 2. 系统层级<br> 系统层级是指与企业生产活动相关的组织结构的层级划分,包括设备层、单元层、车间层、企业层和协同层。<br> (1)设备层是指企业利用传感器、仪器仪表、机器、装置等,实现实际物理流程并感知和操控物理流程的层级;<br> (2)单元层是指用于企业内处理信息、实现监测和控制物理流程的层级;<br> (3)车间层是实现面向工厂或车间的生产管理的层级;<br> (4)企业层是实现面向企业经营管理的层级;<br> (5)协同层是企业实现其内部和外部信息互联和共享,实现跨企业间业务协同的层级。<br> 3. 智能特征<br> 智能特征是指制造活动具有的自感知、自决策、自执行、自学习、自适应之类功能的表征,包括资源要素、互联互通、融合共享、系统集成和新兴业态等5层智能化要求。<br> (1)资源要素是指企业从事生产时所需要使用的资源或工具及其数字化模型所在的层级;<br> (2)互联互通是指通过有线或无线网络、通信协议与接口,实现资源要素之间的数据传递与参数语义交换的层级;<br> (3)融合共享是指在互联互通的基础上,利用云计算、大数据等新一代信息通信技术,实现信息协同共享的层级;<br> (4)系统集成是指企业实现智能制造过程中的装备、生产单元、生产线、数字化车间、智能工厂之间,以及智能制造系统之间的数据交换和功能互连的层级;<br> (5)新兴业态是指基于物理空间不同层级资源要素和数字空间集成与融合的数据、模型及系统,建立的涵盖了认知、诊断、预测及决策等功能,且支持虚实迭代优化的层级。 </p>","multi":0,"questionType":1,"answer":"D","chooseItem":["796233872642691073"],"itemList":[{"id":"796233872562999297","questionId":"796233871573143553","content":" 设备层、单元层、车间层、企业层和应用层","answer":0,"chooseValue":"A"},{"id":"796233872592359425","questionId":"796233871573143553","content":" 设备层、单元层、传输层、企业层和应用层","answer":0,"chooseValue":"B"},{"id":"796233872621719553","questionId":"796233871573143553","content":" 设备层、单元层、传输层、企业层和协同层","answer":0,"chooseValue":"C"},{"id":"796233872642691073","questionId":"796233871573143553","content":" 设备层、单元层、车间层、企业层和协同层","answer":1,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233910823440385","title":"<p><strong>请作答第<span style=\"color: red\">2</span>个空。</strong></p>在企业信息化中,(36)的主要方法有业务与IT整合和企业IT架构构建。下面关于上述两种方法的说法中,不正确的是(37)。","analyze":"企业战略与信息化战略集成的主要方法有BITA(Business-IT Alignment,业务与IT整合)和EITA(Enterprise IT Architecture,企业IT架构)。<br> (1)业务与IT整合。BITA是一种以业务为导向的、全面的IT管理咨询实施方法论。从制订企业战略、建立(或改进)企业组织结构和业务流程,到进行IT管理和制订过渡计划(transition plan),使IT能够更好地为企业战略和目标服务。BITA适用于信息系统不能满足当前管理中的业务需要,业务和IT之间总是有不一致的地方。BITA的主要步骤是:评估和分析企业当前业务和IT不一致的领域,整理出企业的业务远景和未来战略,建立业务模型,提出达到未来目标的转变过程建议和初步计划,以及执行计划。<br> (2)企业IT架构。EITA分析企业战略,帮助企业制订IT战略,并对其投资决策进行指导。在技术、信息系统、信息、IT组织和IT流程方面,帮助企业建立IT的原则规范、模式和标准,指出IT需要改进的方面并帮助制订行动计划。EITA适用于现有信息系统和IT基础架构不一致、不兼容和缺乏统一的整体管理的企业。<br> 根据以上介绍可知,BITA和EITA有相同之处,甚至在某些领域有重叠。在企业信息化实践中,需要根据实际情况,选择其中的一种方法,或者结合使用BITA和EITA方法进行实施。","multi":0,"questionType":1,"answer":"A","chooseItem":["796233911779741697"],"itemList":[{"id":"796233911779741697","questionId":"796233910823440385","content":" 业务与IT整合和企业IT架构两种方法不存在任何领域的重叠","answer":1,"chooseValue":"A"},{"id":"796233911825879041","questionId":"796233910823440385","content":" 业务与IT整合是一种以业务为导向的、全面的IT管理咨询实施方法论","answer":0,"chooseValue":"B"},{"id":"796233911872016385","questionId":"796233910823440385","content":" 企业IT架构帮助企业制订IT战略,并对其投资决策进行指导","answer":0,"chooseValue":"C"},{"id":"796233911897182209","questionId":"796233910823440385","content":" 企业IT架构适用于现有信息系统和IT基础架构不一致、不兼容和缺乏统一的整体管理的企业","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233974866268161","title":"某地天然气输送管线网络图如下,每段管线旁的数字表示输气能力(单位:万立方米/小时)。根据该图,从源S到目的地T的最大输气能力为()万立方米/小时。<br> <img src=\"https://image.chaiding.com/ruankao/84f7a7899ed6716fe21e307ebf9a22b8.jpg?x-oss-process=style/ruankaodaren\" alt=\"\" width=\"300\" height=\"200\" title=\"\" align=\"\">","analyze":"题考查最大流量问题。<br> 可以按步骤依次抽取最大流量路径的流量,抽取过程如下所示:<br> 【可以有多种不同的抽取方案,都能取得最大流量值】<br> <img src=\"https://image.chaiding.com/ruankao/579abb2a3abaf72d353414494fbb072d.jpg?x-oss-process=style/ruankaodaren\" width=\"300\" height=\"233\" title=\"\" align=\"\" alt=\"\"><br> <img src=\"https://image.chaiding.com/ruankao/febd19e8c3e74392285e1540fcc6605e.jpg?x-oss-process=style/ruankaodaren\" width=\"300\" height=\"233\" title=\"\" align=\"\" alt=\"\"><br> <img src=\"https://image.chaiding.com/ruankao/67014a52bc87d69c0971b19569ce3c78.jpg?x-oss-process=style/ruankaodaren\" width=\"300\" height=\"233\" title=\"\" align=\"\" alt=\"\"><br> <img src=\"https://image.chaiding.com/ruankao/dea814234faadced7feeb39f4e1052ef.jpg?x-oss-process=style/ruankaodaren\" width=\"300\" height=\"233\" title=\"\" align=\"\" alt=\"\"><br> <img src=\"https://image.chaiding.com/ruankao/781836915c9216b59d3017b54acd1322.jpg?x-oss-process=style/ruankaodaren\" width=\"300\" height=\"233\" title=\"\" align=\"\" alt=\"\"><br> 总共抽取流量:3+2+2+1+1=9。 <p> 综上可得,最大输出能力为9万立方米/小时。 </p>","multi":0,"questionType":1,"answer":"C","chooseItem":["796233976007118849"],"itemList":[{"id":"796233975919038465","questionId":"796233974866268161","content":" 4","answer":0,"chooseValue":"A"},{"id":"796233975960981505","questionId":"796233974866268161","content":" 8","answer":0,"chooseValue":"B"},{"id":"796233976007118849","questionId":"796233974866268161","content":" 9","answer":1,"chooseValue":"C"},{"id":"796233976049061889","questionId":"796233974866268161","content":" 10","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233809166094337","title":"UML中的( )主要用于参与者与系统中对象之间的交互,以及这些对象之间交互的建模。","analyze":"<img src=\"https://image.chaiding.com/ruankao/2730e82d81a4cece6c4e370f9cb9cd2e.jpg?x-oss-process=style/ruankaodaren\">","multi":0,"questionType":1,"answer":"A","chooseItem":["796233810197893121"],"itemList":[{"id":"796233810197893121","questionId":"796233809166094337","content":" 顺序图","answer":1,"chooseValue":"A"},{"id":"796233810218864641","questionId":"796233809166094337","content":" 活动图","answer":0,"chooseValue":"B"},{"id":"796233810235641857","questionId":"796233809166094337","content":" 用例图","answer":0,"chooseValue":"C"},{"id":"796233810252419073","questionId":"796233809166094337","content":" 状态图","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233987696644097","title":"<p><strong>请作答第<span style=\"color: red\">1</span>个空。</strong></p>信息系统的安全是一个复杂的综合体,涉及系统的方方面面, 其中(61)是指保护计算机设备、设施和其他媒体免遭地震、水灾、火灾、有害气体和其他环境事故(例如,电磁辐射等)破坏的措施和过程。(62)是计算机信息系统安全的重要环节,其实质是保证系统的正常运行,不因偶然的或恶意的侵扰而遭到破坏,使系统可靠、连续地运行,服务不被中断。","analyze":"本题考查计算机信息系统的安全体系。<br> 信息系统的安全是个复杂的综合体,涉及系统的方方面面, 其中实体安全是指保护计算机设备、设施和其他媒体免遭地震、水灾、火灾、有害气体和其他环境事故(例如,电磁辐射等)破坏的措施和过程。运行安全是计算机信息系统安全的重要环节,其实质是保证系统的正常运行,不因偶然的或恶意的侵扰而遭到破坏,使系统可靠、连续地运行,服务不被中断。","multi":0,"questionType":1,"answer":"D","chooseItem":["796233988791357441"],"itemList":[{"id":"796233988699082753","questionId":"796233987696644097","content":" 信息安全","answer":0,"chooseValue":"A"},{"id":"796233988732637185","questionId":"796233987696644097","content":" 人员安全","answer":0,"chooseValue":"B"},{"id":"796233988761997313","questionId":"796233987696644097","content":" 运行安全","answer":0,"chooseValue":"C"},{"id":"796233988791357441","questionId":"796233987696644097","content":" 实体安全","answer":1,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233991026921473","title":"<p><strong>请作答第<span style=\"color: red\">2</span>个空。</strong></p>信息系统的安全是一个复杂的综合体,涉及系统的方方面面, 其中(61)是指保护计算机设备、设施和其他媒体免遭地震、水灾、火灾、有害气体和其他环境事故(例如,电磁辐射等)破坏的措施和过程。(62)是计算机信息系统安全的重要环节,其实质是保证系统的正常运行,不因偶然的或恶意的侵扰而遭到破坏,使系统可靠、连续地运行,服务不被中断。","analyze":"本题考查计算机信息系统的安全体系。<br> 信息系统的安全是个复杂的综合体,涉及系统的方方面面, 其中实体安全是指保护计算机设备、设施和其他媒体免遭地震、水灾、火灾、有害气体和其他环境事故(例如,电磁辐射等)破坏的措施和过程。运行安全是计算机信息系统安全的重要环节,其实质是保证系统的正常运行,不因偶然的或恶意的侵扰而遭到破坏,使系统可靠、连续地运行,服务不被中断。","multi":0,"questionType":1,"answer":"C","chooseItem":["796233992176160769"],"itemList":[{"id":"796233992113246209","questionId":"796233991026921473","content":" 信息安全","answer":0,"chooseValue":"A"},{"id":"796233992142606337","questionId":"796233991026921473","content":" 人员安全","answer":0,"chooseValue":"B"},{"id":"796233992176160769","questionId":"796233991026921473","content":" 运行安全","answer":1,"chooseValue":"C"},{"id":"796233992205520897","questionId":"796233991026921473","content":" 实体安全","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796235582417162241","title":"论原型法及其在信息系统开发中的应用<br> 作为一种信息系统开发方法,原型法(Prototyping)被普遍使用,原型法是指在获取一组基本的需求定义后,利用可视化的开发工具,快速建立一个目标系统的最初版本,并交由用户试用,并根据用户反馈进行补充和修改,再形成新的版本。反复进行这个过程,直到得出系统的“精确解”,即用户满意为止。\n请围绕“原型法及其在信息系统开发中的应用”论题,依次从以下三个方面进行论述。<br> 1.概要叙述你参与管理和开发的软件项目以及你在其中所承担的主要工作。<br> 2.请简要描述原型法的开发过程。<br> 3.具体阐述你参与管理和开发的项目是如何基于原型法进行信息系统开发的。","analyze":"论文暂无解析","multi":0,"questionType":3,"answer":"","chooseItem":null,"itemList":null,"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233968251850753","title":"<p><strong>请作答第<span style=\"color: red\">1</span>个空。</strong></p>某乡有7个小山村A~G,村与村之间原有小路可加宽修建公路的线路如下图所示(路边的数字表示路长的公里数)。为实现村村通公路,修建公路总长至少(55)公里。若在(56)村新建一所中学,则可以使人们从离它最远的村到该校所走的优化路程最短。<br> <img src=\"https://image.chaiding.com/ruankao/77a555490416c834476d1dbea0bb7490.jpg?x-oss-process=style/ruankaodaren\" alt=\"\" width=\"300\" height=\"248\" title=\"\" align=\"\">","analyze":"本题考查的是最小生成树相关问题。<br> 可以根据普里姆算法,选择某个顶点出发,每次查找离当前集合最近的结点,直到遍历所有结点一次且仅一次,并且无回路,此时找到的就是最小生成树。假设从F顶点出发,此时离F最近的是D结点【找到FD边】,离{F,D}最近的是E结点【找到DE边】,离{F,D,E}最近的是G结点【找到EG边】,离{F,D,E,G}最近的是C结点【找到EC边】,离{F,D,E,G,C}最近的是A结点(此时有2条路径AC、AD可选择,都是最小生成树的结果),接下来离{F,D,E,G,C,A}结点最近的是B顶点【找到GB边】。最终形成最小生成树可以有两种形态,如下所示: <p> <img src=\"https://image.chaiding.com/ruankao/a97e46138a5c7080e315e06b397e5f9e.jpg?x-oss-process=style/ruankaodaren\" width=\"250\" height=\"208\" title=\"\" align=\"\" alt=\"\"><br> <img src=\"https://image.chaiding.com/ruankao/cd44181cde0401b9707a9ee79a6e08f2.jpg?x-oss-process=style/ruankaodaren\" width=\"250\" height=\"208\" title=\"\" align=\"\" alt=\"\"><br> 综上可知,修建公路总长至少13.8公里。<br> 问题2:此处可以代入选项进行验证。<br> 如果学校建在A结点,此时B结点离学校最远,有9有公里。<br> 如果学校建在C结点,此时B结点离学校最远,有7.3有公里。<br> 如果学校建在D结点,此时B结点离学校最远,有7有公里。<br> 如果学校建在E结点,此时B结点离学校最远,有5.5有公里。此时从离它最远的村走到该小所走的优化路径最短。 </p>","multi":0,"questionType":1,"answer":"A","chooseItem":["796233969266872321"],"itemList":[{"id":"796233969266872321","questionId":"796233968251850753","content":" 13.8","answer":1,"chooseValue":"A"},{"id":"796233969296232449","questionId":"796233968251850753","content":" 14.3","answer":0,"chooseValue":"B"},{"id":"796233969329786881","questionId":"796233968251850753","content":" 14.8","answer":0,"chooseValue":"C"},{"id":"796233969359147009","questionId":"796233968251850753","content":" 15.3","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233971431133185","title":"<p><strong>请作答第<span style=\"color: red\">2</span>个空。</strong></p>某乡有7个小山村A~G,村与村之间原有小路可加宽修建公路的线路如下图所示(路边的数字表示路长的公里数)。为实现村村通公路,修建公路总长至少(55)公里。若在(56)村新建一所中学,则可以使人们从离它最远的村到该校所走的优化路程最短。<br> <img src=\"https://image.chaiding.com/ruankao/fab3ca73cf2c659f7d5f4e94fca6e988.jpg?x-oss-process=style/ruankaodaren\" alt=\"\" width=\"300\" height=\"248\" title=\"\" align=\"\">","analyze":"本题考查的是最小生成树相关问题。<br> 可以根据普里姆算法,选择某个顶点出发,每次查找离当前集合最近的结点,直到遍历所有结点一次且仅一次,并且无回路,此时找到的就是最小生成树。假设从F顶点出发,此时离F最近的是D结点【找到FD边】,离{F,D}最近的是E结点【找到DE边】,离{F,D,E}最近的是G结点【找到EG边】,离{F,D,E,G}最近的是C结点【找到EC边】,离{F,D,E,G,C}最近的是A结点(此时有2条路径AC、AD可选择,都是最小生成树的结果),接下来离{F,D,E,G,C,A}结点最近的是B顶点【找到GB边】。最终形成最小生成树可以有两种形态,如下所示: <p> <img src=\"https://image.chaiding.com/ruankao/db868ac1ebd470a94b11cb07de1490d1.jpg?x-oss-process=style/ruankaodaren\" width=\"250\" height=\"208\" title=\"\" align=\"\" alt=\"\"><br> <img src=\"https://image.chaiding.com/ruankao/c20b7173002554b6996c3919d7a3255d.jpg?x-oss-process=style/ruankaodaren\" width=\"250\" height=\"208\" title=\"\" align=\"\" alt=\"\"><br> 综上可知,修建公路总长至少13.8公里。<br> 问题2:此处可以代入选项进行验证。<br> 如果学校建在A结点,此时B结点离学校最远,有9有公里。<br> 如果学校建在C结点,此时B结点离学校最远,有7.3有公里。<br> 如果学校建在D结点,此时B结点离学校最远,有7有公里。<br> 如果学校建在E结点,此时B结点离学校最远,有5.5有公里。此时从离它最远的村走到该小所走的优化路径最短。 </p>","multi":0,"questionType":1,"answer":"D","chooseItem":["796233972622315521"],"itemList":[{"id":"796233972588761089","questionId":"796233971431133185","content":" A","answer":0,"chooseValue":"A"},{"id":"796233972601344001","questionId":"796233971431133185","content":" C","answer":0,"chooseValue":"B"},{"id":"796233972613926913","questionId":"796233971431133185","content":" D","answer":0,"chooseValue":"C"},{"id":"796233972622315521","questionId":"796233971431133185","content":" E","answer":1,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233874844700673","title":"基于模型的系统工程作为一种(),为了应对基于文档的传统系统工程工作模式在复杂产品和系统研发时面临的挑战,以逻辑连贯一致的多视角系统模型为桥梁和框架,实现跨领域模型的可追踪、可验证和动态关联,驱动人工系统生存周期内各阶段和各层级内的系统工程过程和活动,使其可管理、可复现、可重用,进而打破专业壁垒,破解设计和工艺、研发和制造、研制和使用维护的分离,极大地提高沟通协同效率,实现以模型驱动的方法来采集、捕获和提炼数据、信息和知识。","analyze":"基于模型的系统工程是一种形式化的建模方法学(A)。它通过逻辑连贯一致的多视角系统模型,实现跨领域模型的可追踪、可验证和动态关联,驱动人工系统生存周期内各阶段和各层级内的系统工程过程和活动。相比于基于文档的传统系统工程工作模式,在复杂产品和系统研发时,基于模型的工程方法更具备可管理、可复现、可重用等特点,并且能够打破专业壁垒,提高沟通协同效率。\n<br>\n非形式化的建模方法学(B)相对于形式化建模方法学而言,缺乏系统和规范性,难以进行自动化分析和处理,不适合前沿科技领域的工程项目。结构化建模方法学(C)和面向对象建模方法学(D)都是形式化建模方法学的一种,但它们主要针对不同类型的系统和应用领域,与基于模型的系统工程方法学略有不同。\n<br>\n综上所述,应该选用A. 形式化的建模方法学作为基于模型的系统工程方法学的分类。","multi":0,"questionType":1,"answer":"A","chooseItem":["796233875838750721"],"itemList":[{"id":"796233875838750721","questionId":"796233874844700673","content":" 形式化的建模方法学","answer":1,"chooseValue":"A"},{"id":"796233875868110849","questionId":"796233874844700673","content":" 非形式化的建模方法学","answer":0,"chooseValue":"B"},{"id":"796233875897470977","questionId":"796233874844700673","content":" 结构化建模方法学","answer":0,"chooseValue":"C"},{"id":"796233875931025409","questionId":"796233874844700673","content":" 面向对象建模方法学","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233961801011201","title":"<p><strong>请作答第<span style=\"color: red\">1</span>个空。</strong></p>某项目有8个作业A~H,每个作业的紧前作业、所需天数和所需人数见下表。由于整个项目团队总共只有10人,各个作业都必须连续进行,中途不能停止,因此需要适当安排施工方案,使该项目能尽快在(53)内完工。在该方案中,作业A应安排在(54)内进行。<br> <img src=\"https://image.chaiding.com/ruankao/1b9d01ad3c6337c2ac9d00e6d2c46ba9.jpg?x-oss-process=style/ruankaodaren\" alt=\"\" width=\"500\" height=\"96\" title=\"\" align=\"\">","analyze":"本题是项目管理知识中进度管理与人员管理的综合考查。<br> 首先根据题目给出的表格,可以得到进度网络图如下:<br> <img src=\"https://image.chaiding.com/ruankao/3a20f16d2711f821587e058c5a1ef0f8.jpg?x-oss-process=style/ruankaodaren\" width=\"500\" height=\"260\" title=\"\" align=\"\" alt=\"\"><br> 此时关键路径为C-F-G-H,项目工期至少需要11天。<br> 再根据题干要求分析,项目团队一共只有10人,此时项目受到人员限制,需要调整。<br> 分析发现,A、C、E、F这4个活动因为人员不足所以不可以同时并行只能顺序执行。根据逻辑关系可知C活动必须在F活动之前、B活动必须在E活动之前、D活动和F活动必须在G活动之前、E活动和G活动必须在H活动之前,A活动没有限制可以放在最后考虑。因为逻辑关系限定,可以先考虑C活动和F活动,再考虑E活动,然后将其他活动并行安排在这4个活动的时间内,得到如下的安排表:<br> <img src=\"https://image.chaiding.com/ruankao/513d1499cf9068faefcc9bc11d3f593f.jpg?x-oss-process=style/ruankaodaren\" width=\"600\" height=\"128\" title=\"\" align=\"\" alt=\"\"><br> 综上可知,项目最快能在12天完工,此时A活动安排在第8~12天。","multi":0,"questionType":1,"answer":"C","chooseItem":["796233962857975809"],"itemList":[{"id":"796233962799255553","questionId":"796233961801011201","content":" 10天","answer":0,"chooseValue":"A"},{"id":"796233962828615681","questionId":"796233961801011201","content":" 11天","answer":0,"chooseValue":"B"},{"id":"796233962857975809","questionId":"796233961801011201","content":" 12天","answer":1,"chooseValue":"C"},{"id":"796233962895724545","questionId":"796233961801011201","content":" 13天","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796234011092471809","title":"某信息系统不断受到SQL注入攻击,应部署()进行安全防护,实时阻断攻击行为。","analyze":"针对SQL注入攻击,最好的防护措施是部署WEB防火墙(B)或入侵检测系统(C),实时监控并及时拦截攻击行为。防火墙(A)可以起到一定的作用,但通常只能检查IP、端口、流量等底层网络层面的信息,无法深入检查HTTP协议中的参数,不能完全防范SQL注入攻击。堡垒机(D)则与此场景不相关,不适用于进行安全防护。\n<br>\n综上所述,应该选用B. WEB防火墙 进行安全防护,以最大程度地避免SQL注入攻击并保障系统的安全性。","multi":0,"questionType":1,"answer":"B","chooseItem":["796234012069744641"],"itemList":[{"id":"796234012040384513","questionId":"796234011092471809","content":" 防火墙","answer":0,"chooseValue":"A"},{"id":"796234012069744641","questionId":"796234011092471809","content":" WEB防火墙","answer":1,"chooseValue":"B"},{"id":"796234012103299073","questionId":"796234011092471809","content":" 入侵检测系统","answer":0,"chooseValue":"C"},{"id":"796234012128464897","questionId":"796234011092471809","content":" 堡垒机","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233936807153665","title":"在数据库的安全机制中,通过提供()供第三方开发人员调用进行数据更新,从而保证数据库的关系模式不被第三方所获取。","analyze":"在数据库的安全机制中,通过提供存储过程(D)供第三方开发人员调用进行数据更新,从而保证数据库的关系模式不被第三方所获取。存储过程可以封装SQL语句和业务逻辑,并且只允许输入和输出参数与结果,隐藏了底层表的细节,可以保护数据库的安全性。索引(A)是提高数据库查询效率的一种手段;视图(B)是从一个或多个表中筛选出部分数据的虚拟表;触发器(C)是与数据库表事件相关的程序代码,主要用于保持数据完整性,不能保证数据库的关系模式不被第三方所获取。","multi":0,"questionType":1,"answer":"D","chooseItem":["796233937855729665"],"itemList":[{"id":"796233937776037889","questionId":"796233936807153665","content":" 索引","answer":0,"chooseValue":"A"},{"id":"796233937801203713","questionId":"796233936807153665","content":" 视图","answer":0,"chooseValue":"B"},{"id":"796233937826369537","questionId":"796233936807153665","content":" 触发器","answer":0,"chooseValue":"C"},{"id":"796233937855729665","questionId":"796233936807153665","content":" 储存过程","answer":1,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233965009653761","title":"<p><strong>请作答第<span style=\"color: red\">2</span>个空。</strong></p>某项目有8个作业A~H,每个作业的紧前作业、所需天数和所需人数见下表。由于整个项目团队总共只有10人,各个作业都必须连续进行,中途不能停止,因此需要适当安排施工方案,使该项目能尽快在(53)内完工。在该方案中,作业A应安排在(54)内进行。<br> <img src=\"https://image.chaiding.com/ruankao/3f4a62dcbdf162fa3cdb93e29a2dbe82.jpg?x-oss-process=style/ruankaodaren\" alt=\"\" width=\"500\" height=\"96\" title=\"\" align=\"\">","analyze":"本题是项目管理知识中进度管理与人员管理的综合考查。<br> 首先根据题目给出的表格,可以得到进度网络图如下:<br> <img src=\"https://image.chaiding.com/ruankao/7b25240f6c15af60c8af03b094c83c6b.jpg?x-oss-process=style/ruankaodaren\" width=\"450\" height=\"234\" title=\"\" align=\"\" alt=\"\"><br> 此时关键路径为C-F-G-H,项目工期至少需要11天。<br> 再根据题干要求分析,项目团队一共只有10人,此时项目受到人员限制,需要调整。<br> 分析发现,A、C、E、F这4个活动因为人员不足所以不可以同时并行只能顺序执行。根据逻辑关系可知C活动必须在F活动之前、B活动必须在E活动之前、D活动和F活动必须在G活动之前、E活动和G活动必须在H活动之前,A活动没有限制可以放在最后考虑。因为逻辑关系限定,可以先考虑C活动和F活动,再考虑E活动,然后将其他活动并行安排在这4个活动的时间内,得到如下的安排表:<br> <img src=\"https://image.chaiding.com/ruankao/92686a76ba295d86dce71542c6b3d69c.jpg?x-oss-process=style/ruankaodaren\" width=\"650\" height=\"138\" title=\"\" align=\"\" alt=\"\"><br> 综上可知,项目最快能在12天完工,此时A活动安排在第8~12天。","multi":0,"questionType":1,"answer":"D","chooseItem":["796233966167281665"],"itemList":[{"id":"796233966070812673","questionId":"796233965009653761","content":" 第1~5天","answer":0,"chooseValue":"A"},{"id":"796233966104367105","questionId":"796233965009653761","content":" 第3~7天","answer":0,"chooseValue":"B"},{"id":"796233966133727233","questionId":"796233965009653761","content":" 第5~9天","answer":0,"chooseValue":"C"},{"id":"796233966167281665","questionId":"796233965009653761","content":" 第8~12天","answer":1,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233821337964545","title":"确保计算机系统机密性的方法不包括()。","analyze":"备份虽然能够保证数据的可用性和完整性,但并不能确保机密性。相反,备份可能会增加数据泄露的风险。因为备份通常是未经加密的,并且可能存储在不安全的设备或媒介中,如果备份数据被恶意获取,可能导致数据泄露。\n<br>\n而加密、认证和授权都是确保计算机系统机密性的有效方法。加密可以防止未经授权的人员访问和获取计算机系统中的敏感数据;认证可以验证用户的身份,确保只有合法的用户才能访问计算机系统;授权可以限制用户的权限,确保用户只能访问其所需的授权资源,从而减少数据泄露的风险。","multi":0,"questionType":1,"answer":"D","chooseItem":["796233822281682945"],"itemList":[{"id":"796233822248128513","questionId":"796233821337964545","content":" 加密","answer":0,"chooseValue":"A"},{"id":"796233822256517121","questionId":"796233821337964545","content":" 认证","answer":0,"chooseValue":"B"},{"id":"796233822269100033","questionId":"796233821337964545","content":" 授权","answer":0,"chooseValue":"C"},{"id":"796233822281682945","questionId":"796233821337964545","content":" 备份","answer":1,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796234014166896641","title":"IP地址10.10.33.66/16的网络地址是()。","analyze":"网络地址是将一个IP地址和子网掩码进行与运算得到的结果,其实现过程是将IP地址和子网掩码中相同位置上的二进制位进行&操作。\n<br>\n将IP地址10.10.33.66和子网掩码/16(即255.255.0.0)进行与运算,得到的结果是10.10.0.0。因此,答案为 A. 10.10.0.0。\n<br>\n综上所述,本题答案为 A. 10.10.0.0。","multi":0,"questionType":1,"answer":"A","chooseItem":["796234015077060609"],"itemList":[{"id":"796234015077060609","questionId":"796234014166896641","content":" 10.10.0.0","answer":1,"chooseValue":"A"},{"id":"796234015106420737","questionId":"796234014166896641","content":" 10.0.0.0","answer":0,"chooseValue":"B"},{"id":"796234015135780865","questionId":"796234014166896641","content":" 10.10.33.0","answer":0,"chooseValue":"C"},{"id":"796234015165140993","questionId":"796234014166896641","content":" 10.10.33.1","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796234017346179073","title":"IP报文首部不包含()。","analyze":"IP报文首部不包含源目的MAC,因为源目的MAC地址是在数据链路层中使用的,与IP协议不直接相关。因此,正确答案是B。","multi":0,"questionType":1,"answer":"B","chooseItem":["796234018482835457"],"itemList":[{"id":"796234018457669633","questionId":"796234017346179073","content":" 版本号","answer":0,"chooseValue":"A"},{"id":"796234018482835457","questionId":"796234017346179073","content":" 源目的MAC","answer":1,"chooseValue":"B"},{"id":"796234018512195585","questionId":"796234017346179073","content":" 生存时间","answer":0,"chooseValue":"C"},{"id":"796234018541555713","questionId":"796234017346179073","content":" 源/目的IP","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233852782661633","title":"企业信息化工程是将()相结合,改善企业的经营、管理、产品开发和生产等各个环节,提高生产效率、产品质量和企业的创新能力,从而实现产品设计制造和企业管理的信息化、生产过程的智能化、制造装备的数控化以及咨询服务的网络化,全面提高我国企业的竞争力。","analyze":"企业信息化工程(Enterprise Information Engineer,简称EIE)是指将信息技术,自动化技术,现代管理技术与制造技术相结合,改善制造企业的经营、管理、产品开发和生产等各个环节,提高生产效率、产品质量和企业创新能力,降低消耗,带动产品设计方法和设计工具的创新、企业管理模式的创新、制造技术的创新以及企业间协作关系的创新,从而实现产品设计制造和企业管理的信息化、生产过程智能化、制造装备的数控化以及咨询服务的网络化,全面提高我国企业的竞争力。","multi":0,"questionType":1,"answer":"A","chooseItem":["796233853722185729"],"itemList":[{"id":"796233853722185729","questionId":"796233852782661633","content":" 信息技术、自动化技术、现代管理技术、制造技术","answer":1,"chooseValue":"A"},{"id":"796233853751545857","questionId":"796233852782661633","content":" 信息技术、自动化技术、现代管理技术、建模技术","answer":0,"chooseValue":"B"},{"id":"796233853780905985","questionId":"796233852782661633","content":" 信息技术、测试技术、现代管理技术、制造技术","answer":0,"chooseValue":"C"},{"id":"796233853806071809","questionId":"796233852782661633","content":" 需求分析技术、建模技术、测试技术、现代管理技术","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233981421965313","title":"<p><strong>请作答第<span style=\"color: red\">1</span>个空。</strong></p>计算机系统性能评估中,(59)通常采用加法指令的运算速度来衡量计算机的速度。(60)首先计算出处理部件每个计算单元的有效计算率,再按不同字长加以调整,得出该计算单元的理论性能,所有组成该处理部件的计算单元的理论性能之和即为最终的计算机性能。","analyze":"本题考查计算机系统性能评价方法。<br> 指令执行速度法:在计算机发展的初期,曾用加法指令的运算速度来衡量计算机的速度,速度是计算机的主要性能指标之一。因为加法指令的运算速度大体上可反映出乘法、除法等其他算术运算的速度,而且逻辑运算、转移指令等简单指令的执行时间往往设计成与加法指令相同,因此加法指令的运算速度有一定代表性。表示机器运算速度的单位是KIPS(每秒千条指令)。<br> 等效指令速度法 ( Gibson mix,吉普森混合法):通过各类指令在程序中所占的比例(Wi)进行计算得到的。特点:考虑指令比例不同的问题。<br> 综合理论性能法(CTP ,Composite Theoretical Performance ):CTP用MTOPS(Million Theoretical Operations Per Second,每秒百万次理论运算)表示。CTP的估算方法是,首先算出处理部件每个计算单元的有效计算率,再按不同字长加以调整,得出该计算单元的理论性能,所有组成该处理部件的计算单元的理论性能之和即为CTP。<br> 基准程序法:把应用程序中用得最多、最频繁的那部分核心程序作为评估计算机系统性能的标准程序,称为基准测试程序(benchmark)。基准程序法是目前一致承认的测试系统性能的较好方法。","multi":0,"questionType":1,"answer":"A","chooseItem":["796233982344712193"],"itemList":[{"id":"796233982344712193","questionId":"796233981421965313","content":" 指令执行速度法","answer":1,"chooseValue":"A"},{"id":"796233982378266625","questionId":"796233981421965313","content":" 等效指令速度法","answer":0,"chooseValue":"B"},{"id":"796233982416015361","questionId":"796233981421965313","content":" 综合理论性能法","answer":0,"chooseValue":"C"},{"id":"796233982453764097","questionId":"796233981421965313","content":" 基准程序法","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233846386348033","title":"由于处理器芯片在不同领域应用时,需要考虑对环境的适应性。通常,我们把芯片分为民用级、工业级和军用级。()分别是民用级、工业级和军用级芯片的标准工作温度范围。","analyze":"商业级0~+70℃;工业级-40~+85℃;汽车级-40~+125℃;军用级-55~+155℃","multi":0,"questionType":1,"answer":"C","chooseItem":["796233847510421505"],"itemList":[{"id":"796233847455895553","questionId":"796233846386348033","content":" -10℃ ~+70℃ 、-40℃~+80℃ 、-50℃+150℃","answer":0,"chooseValue":"A"},{"id":"796233847485255681","questionId":"796233846386348033","content":" 0℃~+70℃、-30℃~+85℃、-60℃~+150℃","answer":0,"chooseValue":"B"},{"id":"796233847510421505","questionId":"796233846386348033","content":" 0℃~+70℃、-40℃~+85℃、-55℃~+150℃","answer":1,"chooseValue":"C"},{"id":"796233847543975937","questionId":"796233846386348033","content":" 10℃~+60℃、-40℃~+90℃、 -55℃~+150℃","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233984437669889","title":"<p><strong>请作答第<span style=\"color: red\">2</span>个空。</strong></p>计算机系统性能评估中,(59)通常采用加法指令的运算速度来衡量计算机的速度。(60)首先计算出处理部件每个计算单元的有效计算率,再按不同字长加以调整,得出该计算单元的理论性能,所有组成该处理部件的计算单元的理论性能之和即为最终的计算机性能。","analyze":"本题考查计算机系统性能评价方法。<br> 指令执行速度法:在计算机发展的初期,曾用加法指令的运算速度来衡量计算机的速度,速度是计算机的主要性能指标之一。因为加法指令的运算速度大体上可反映出乘法、除法等其他算术运算的速度,而且逻辑运算、转移指令等简单指令的执行时间往往设计成与加法指令相同,因此加法指令的运算速度有一定代表性。表示机器运算速度的单位是KIPS(每秒千条指令)。<br> 等效指令速度法 ( Gibson mix,吉普森混合法):通过各类指令在程序中所占的比例(Wi)进行计算得到的。特点:考虑指令比例不同的问题。<br> 综合理论性能法(CTP ,Composite Theoretical Performance ):CTP用MTOPS(Million Theoretical Operations Per Second,每秒百万次理论运算)表示。CTP的估算方法是,首先算出处理部件每个计算单元的有效计算率,再按不同字长加以调整,得出该计算单元的理论性能,所有组成该处理部件的计算单元的理论性能之和即为CTP。<br> 基准程序法:把应用程序中用得最多、最频繁的那部分核心程序作为评估计算机系统性能的标准程序,称为基准测试程序(benchmark)。基准程序法是目前一致承认的测试系统性能的较好方法。","multi":0,"questionType":1,"answer":"C","chooseItem":["796233985620463617"],"itemList":[{"id":"796233985536577537","questionId":"796233984437669889","content":" 指令执行速度法","answer":0,"chooseValue":"A"},{"id":"796233985578520577","questionId":"796233984437669889","content":" 等效指令速度法","answer":0,"chooseValue":"B"},{"id":"796233985620463617","questionId":"796233984437669889","content":" 综合理论性能法","answer":1,"chooseValue":"C"},{"id":"796233985645629441","questionId":"796233984437669889","content":" 基准程序法","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796235489928564737","title":"试题三(25分)<br>\n阅读下列说明,回答问题1至问题3,将解答填入答题纸的对应栏内。<br>\n【说明】<br>\n某公司长期从事宇航系统的研制任务。随着宇航系统能力的不断提升,软件的规模急剧增加,对应的缺陷密度呈现出几何增长,失效问题越来越严重。为了保证产品的质量,公司领导要求在重点项目中实施基于模型的系统工程(MBSE)。由于辅助动力控制系统关系着飞行器的飞行安全,有必要作为试点工程首先实施MBSE方法。王工作为该系统的主要负责人,承担起了此项工作。\n<br><br>\n【问题1】(10分)<br>\n王工以前一直负责用传统开发方法进行系统设计,深知基于文本的系统设计方式存在天然的局限性。王工接到指示后,研究了MBSE的相关理论基础和工程实现方法,提出了用MBSE方法设计辅助动力控制系统的实施方案。请用300字以内的文字说明什么是MBSE方法,并列举出三个基于文本设计方式的局限性。\n<br><br>\n【问题2】(9分)<br>\nMBSE的核心技术是模型方法论,王工对目前主流建模方法Harmony-SE(harmony for System Engineering)方法、RUP-SE(Rational Unified Process for System)方法和Vitech MBSE方法进行了分析、对比,鉴于该系统具备安全攸关系统的特殊性,强调验证的有效性,王工认为Harmony-SE方法比较适合宇航环境开发。图3-1给出了Harmony-SE方法的产品生命周期结构。请根据以下三种有关建模方式的描述,判定哪种描述是Harmony-SE方法的正确说明?并简要说明王工在本项目中选择Harmony-SE方法的理由。<br>\n描述1:一种面向对象的设计方法,可以将设计工作按照角色、工件和任务类型进行分解,生成新的分解结构,实现并行设计与迭代开发。<br>\n描述2:系统模型贯穿系统研发的整个生命周期,能够较好处理复杂与整体问题。<br>\n描述3:一种并行系统工程活动,由四个基本系统工程活动组而成,这四种活动通过公共系统设计库相关联。<br>\n<img src=\"https://image.chaiding.com/ruankao/fc07a87053002945c093e2d9ce5233a7.jpg?x-oss-process=style/ruankaodaren\" alt=\"\" width=\"600\" height=\"347\" title=\"\" align=\"\">\n<br><br>\n【问题3】(6分)<br>\nMBSE方法可以通过软硬件建模来预先评估系统的可靠性。王工带领项目成员针对其负责的辅助动力控制系统中的进排气门控制器组件开展了基于MBSE系统分析工作。<br>\n图3-2给出了进排气门控制器的可靠性分布图。<br>\n<img src=\"https://image.chaiding.com/ruankao/9cc9b2afa21718c24ae47a49aeacc253.jpg?x-oss-process=style/ruankaodaren\" width=\"700\" height=\"194\" title=\"\" align=\"\" alt=\"\"><br>\n王工指出:系统是由软硬件组成,以往考虑可靠性指标仅仅关注硬件失效问题,而不考虑软件失效对系统可靠性的影响。如果不考虑软件失效对系统可靠性的影响,本系统可靠性的MTTF(Mean Time To Failure,平均失效前时间)应该为125.9h(参考公式:<br>\n<img src=\"https://image.chaiding.com/ruankao/dab57aa2c36e2f87ab04bc26a1e432a5.jpg?x-oss-process=style/ruankaodaren\" width=\"500\" height=\"51\" title=\"\" align=\"\" alt=\"\"><br>\n请对照图3-3给出的考虑软件失效情况下的系统可靠性分布图(这里,假设SYS1软件非常可靠,系统仅仅将圈中的软件可靠性加入系统可靠性的评估过程),说明此时的系统可靠性(MTTF)应大于还是小于不考虑软件失效的MTTF?并计算出此时的系统可靠性(MTTF)是多少?<br>\n<img src=\"https://image.chaiding.com/ruankao/f9d449d2dc35e7c1755ea51c718dbddb.jpg?x-oss-process=style/ruankaodaren\" width=\"700\" height=\"215\" title=\"\" align=\"\" alt=\"\">","analyze":"【问题1】<br>\n基于模型的系统工程(MBSE)是一种形式化的方法,用于支持与复杂系统的开发相关的需求,设计,分析,验证和确认。与以文档为中心的工程,MBSE将模型放在系统设计的中心。。MBSE是向以模型为中心的一系列方法转变这一长期趋势的一部分,这些方法被应用于机械、电子和软件等工程领域,以期望取代原来系统工程师们所擅长的以文档为中心的方法,并通过完全融入系统工程过程来影响未来系统工程的实践。<br>\n基于文档的设计方法的局限性主要有:<br>\n(1)在基于文档的方法中,许多文档是由不同的作者生成的,以从各种利益相关者的观点(例如系统行为,软件,硬件,安全,安全性或其他学科)中捕获系统的设计。不利于利益相关者之间的沟通,容易产生歧义。<br>\n(2)开发复杂系统的能力有限,基于本设计方案法前期仿真验证。<br>\n(3)自然语言容易引入形容词等模糊描述,很难保证准确性。\n<br><br>\n【问题2】<br>\n正确的描述是【描述2】。<br>\n【描述1】描述1是对RUP-SE方法的描述。<br>\n【描述3】描述3是对vitech MBSE方法的描述。<br>\n根据王工对MBSE的研究,RUP-SE是一种面向对象的设计方法,vitech MBSE方法是一种并行系统,并不满足宇航系统所要求的高安全性和强调验证性的要求。而Harmony-SE建模方法是贯穿系统研发的整个生命周期,用于支持与复杂系统的开发相关的需求、设计、分析、验证和确认。符合宇航系统所描述的安全性和验证性的要求。\n<br><br>\n【问题3】<br>\n(1)小于不考虑软件失效的MTTF。<br>\n(2)系统可靠性的计算如下:<br>\n1/280+1/(5.01*10<sup>4</sup>) +1/10<sup>4</sup>+1/600+1/387+(1/0.3968+1/0.3968)<br>\n=0.007942+(1/0.3968+1/0.3968)<br>\n=0.007942+2/0.3968<br>\n=0.007942+5.040322<br>\n=5.048264(1/h)<br>\n所以系统的可靠性为:1/5.048264==0.1980879H。","multi":0,"questionType":2,"answer":"","chooseItem":null,"itemList":null,"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233812269879297","title":"TCP/IP的四层模型中,每一层都提供了安全协议,下列属于网络层安全协议的是()。","analyze":"HTTPS应用层协议   SSH安全外壳协议,应用层协议    \n</br><br/>\nIPSec网络层协议    Socks防火墙安全会话转换协议,会话层协议","multi":0,"questionType":1,"answer":"C","chooseItem":["796233813335232513"],"itemList":[{"id":"796233813263929345","questionId":"796233812269879297","content":" HTTPS","answer":0,"chooseValue":"A"},{"id":"796233813301678081","questionId":"796233812269879297","content":" SSH","answer":0,"chooseValue":"B"},{"id":"796233813335232513","questionId":"796233812269879297","content":" IPSec","answer":1,"chooseValue":"C"},{"id":"796233813372981249","questionId":"796233812269879297","content":" Socks","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796234000015314945","title":"下列协议中, 可以用于文件安全传输的是()。","analyze":"FTP是一种常见的文件传输协议,但是它并不安全,因为它的传输内容和用户名、密码等信息都是明文传输的。相比之下,SFTP(Secure File Transfer Protocol)提供了一种安全的文件传输方式,采用 SSH 加密协议来保证传输的安全性,可以更好地保护数据的机密性。\n<br>\n因此,选项B. SFTP是可以用于文件安全传输的协议,是本题的答案选项。","multi":0,"questionType":1,"answer":"B","chooseItem":["796234001009364993"],"itemList":[{"id":"796234000980004865","questionId":"796234000015314945","content":" FTP","answer":0,"chooseValue":"A"},{"id":"796234001009364993","questionId":"796234000015314945","content":" SFTP","answer":1,"chooseValue":"B"},{"id":"796234001042919425","questionId":"796234000015314945","content":" TFTP","answer":0,"chooseValue":"C"},{"id":"796234001072279553","questionId":"796234000015314945","content":" ICMP","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796234006927527937","title":"下列协议中,不属于电子邮件收发协议的是()。","analyze":"FTP是文件传输协议(File Transfer Protocol),主要用于计算机之间的文件传输和共享。而SMTP、POP和IMAP都是电子邮件收发协议,其中SMTP用于发送邮件,而POP和IMAP用于接收邮件。通常,当我们在邮箱中查看邮件时,就是通过POP或IMAP协议来接收邮件的。因此,选项 D 不属于电子邮件收发协议。","multi":0,"questionType":1,"answer":"D","chooseItem":["796234009037262849"],"itemList":[{"id":"796234008944988161","questionId":"796234006927527937","content":" SMTP","answer":0,"chooseValue":"A"},{"id":"796234008978542593","questionId":"796234006927527937","content":" POP","answer":0,"chooseValue":"B"},{"id":"796234009007902721","questionId":"796234006927527937","content":" IMAP","answer":0,"chooseValue":"C"},{"id":"796234009037262849","questionId":"796234006927527937","content":" FTP","answer":1,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233920428396545","title":"在数据库设计的需求分析、概念结构设计、逻辑结构设计和物理结构设计的四个阶段中,基本E-R图是()。","analyze":"<img src=\"https://image.chaiding.com/ruankao/a3c2e7356f65f60dd61697b198038b52.jpg?x-oss-process=style/ruankaodaren\">","multi":0,"questionType":1,"answer":"C","chooseItem":["796233921451806721"],"itemList":[{"id":"796233921380503553","questionId":"796233920428396545","content":" 需求分析阶段形成的文档,并作为概念结构设计阶段的设计依据","answer":0,"chooseValue":"A"},{"id":"796233921426640897","questionId":"796233920428396545","content":" 逻辑结构设计阶段形成的文档,并作为概念结构设计阶段的设计依据","answer":0,"chooseValue":"B"},{"id":"796233921451806721","questionId":"796233920428396545","content":" 概念结构设计阶段形成的文档,并作为逻辑结构设计阶段的设计依据","answer":1,"chooseValue":"C"},{"id":"796233921472778241","questionId":"796233920428396545","content":" 概念结构设计阶段形成的文档,并作为物理设计阶段的设计依据","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233904481652737","title":"信息化规划与企业战略规划总是互相影响、互相促进的。当财务部门提出财务电算化的需求,生产部门提出库房管理的需求时,IT部门根据不同部门的需求分别独立实施,以此形成一个完全基于企业组织与业务流程的信息系统结构, 其中各个信息系统分别对应于特定部门或特定业务流程。这表明()。","analyze":"第一个阶段主要以数据处理为核心,围绕职能部门需求的信息系统规划,主要的方法包括 BSP方法、关键成功因素法(Critical Success Factors,CSF)、战略集合转化法</br><br/>\n第二个阶段主要以企业内部管理信息系统为核心,围绕企业整体需求进行的信息系统规划,主要的方法包括IE方法、战略系统规划法(Strategic System Plannning SSP)</br><br/>\n第三个阶段的方法在综合考虑企业内外环境的情况下,以集成为核心,围绕企业战略需求进行的信息系统规划,主要的方法包括价值链分析法( Value-Chain Analysis,VCA)、战略一致性模型(Strategy Alignment.Model,SAM)等。","multi":0,"questionType":1,"answer":"A","chooseItem":["796233905471508481"],"itemList":[{"id":"796233905471508481","questionId":"796233904481652737","content":" 企业处在信息化的初级阶段","answer":1,"chooseValue":"A"},{"id":"796233905492480001","questionId":"796233904481652737","content":" 企业处在信息化的中级阶段","answer":0,"chooseValue":"B"},{"id":"796233905513451521","questionId":"796233904481652737","content":" 企业处在信息化的高级阶段","answer":0,"chooseValue":"C"},{"id":"796233905530228737","questionId":"796233904481652737","content":" 企业处在信息化的完成阶段","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233914099191809","title":"<p><strong>请作答第<span style=\"color: red\">1</span>个空。</strong></p>在软件逆向工程的相关概念中,(38)是指借助工具从已有程序中抽象出有关数据设计、总体结构设计和过程设计等方面的信息;(39)指不仅从现有系统中恢复设计信息,而且使用该信息去改变或重构现有系统,以改善其整体质量。","analyze":"与逆向工程相关的概念有重构、设计恢复、再工程和正向工程。<br> (1)重构(restructuring)。重构是指在同一抽象级别上转换系统描述形式。<br> (2)设计恢复(design recovery)。设计恢复是指借助工具从已有程序中抽象出有关数据设计、总体结构设计和过程设计等方面的信息。<br> (3)再工程(re-engineering)。再工程是指在逆向工程所获得信息的基础上,修改或重构已有的系统,产生系统的一个新版本。再工程是对现有系统的重新开发过程,包括逆向工程、新需求的考虑过程和正向工程三个步骤。它不仅能从已存在的程序中重新获得设计信息,而且还能使用这些信息来重构现有系统,以改进它的综合质量。在利用再工程重构现有系统的同时,一般会增加新的需求,包括增加新的功能和改善系统的性能。<br> (4)正向工程(forward engineering)。正向工程是指不仅从现有系统中恢复设计信息,而且使用该信息去改变或重构现有系统,以改善其整体质量。","multi":0,"questionType":1,"answer":"A","chooseItem":["796233915177127937"],"itemList":[{"id":"796233915177127937","questionId":"796233914099191809","content":" 设计恢复","answer":1,"chooseValue":"A"},{"id":"796233915210682369","questionId":"796233914099191809","content":" 正向工程","answer":0,"chooseValue":"B"},{"id":"796233915240042497","questionId":"796233914099191809","content":" 设计重构","answer":0,"chooseValue":"C"},{"id":"796233915269402625","questionId":"796233914099191809","content":" 重构","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233917358166017","title":"<p><strong>请作答第<span style=\"color: red\">2</span>个空。</strong></p>在软件逆向工程的相关概念中,(38)是指借助工具从已有程序中抽象出有关数据设计、总体结构设计和过程设计等方面的信息;(39)指不仅从现有系统中恢复设计信息,而且使用该信息去改变或重构现有系统,以改善其整体质量。","analyze":"与逆向工程相关的概念有重构、设计恢复、再工程和正向工程。<br> (1)重构(restructuring)。重构是指在同一抽象级别上转换系统描述形式。<br> (2)设计恢复(design recovery)。设计恢复是指借助工具从已有程序中抽象出有关数据设计、总体结构设计和过程设计等方面的信息。<br> (3)再工程(re-engineering)。再工程是指在逆向工程所获得信息的基础上,修改或重构已有的系统,产生系统的一个新版本。再工程是对现有系统的重新开发过程,包括逆向工程、新需求的考虑过程和正向工程三个步骤。它不仅能从已存在的程序中重新获得设计信息,而且还能使用这些信息来重构现有系统,以改进它的综合质量。在利用再工程重构现有系统的同时,一般会增加新的需求,包括增加新的功能和改善系统的性能。<br> (4)正向工程(forward engineering)。正向工程是指不仅从现有系统中恢复设计信息,而且使用该信息去改变或重构现有系统,以改善其整体质量。","multi":0,"questionType":1,"answer":"C","chooseItem":["796233918461267969"],"itemList":[{"id":"796233918406742017","questionId":"796233917358166017","content":" 再工程","answer":0,"chooseValue":"A"},{"id":"796233918436102145","questionId":"796233917358166017","content":" 需求工程","answer":0,"chooseValue":"B"},{"id":"796233918461267969","questionId":"796233917358166017","content":" 正向工程","answer":1,"chooseValue":"C"},{"id":"796233918490628097","questionId":"796233917358166017","content":" 逆向工程","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233891743551489","title":"<p><strong>请作答第<span style=\"color: red\">1</span>个空。</strong></p>在面向对象方法中,一个子类有多个父类,可以从多个父类中继承特性,这种继承称为(31)。 对于两个类A和B,如果A是B的子类,则B是A的(32)。","analyze":"<img src=\"https://image.chaiding.com/ruankao/d285f57092d3c075038eb692a7b98109.jpg?x-oss-process=style/ruankaodaren\">","multi":0,"questionType":1,"answer":"A","chooseItem":["796233893098311681"],"itemList":[{"id":"796233893098311681","questionId":"796233891743551489","content":" 多重继承","answer":1,"chooseValue":"A"},{"id":"796233893123477505","questionId":"796233891743551489","content":" 单一继承","answer":0,"chooseValue":"B"},{"id":"796233893144449025","questionId":"796233891743551489","content":" 多例继承","answer":0,"chooseValue":"C"},{"id":"796233893165420545","questionId":"796233891743551489","content":" 单例继承","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233849569824769","title":"嵌入式实时系统存在许多调度算法。如果调度程序根据任务的紧急程度确定该任务的优先级,任务紧急程度高,被赋予的优先级就高,可被优先执行。这种调度算法称之为()。","analyze":"这种调度算法根据任务的紧急程度确定任务的优先级,任务紧急程度高被赋予的优先级就高,可被优先执行。这种算法称之为抢占式优先级调度(Preemptive Priority Scheduling, PPS)算法,因为在运行时会根据任务的优先级抢占正在执行的低优先级任务。而最早截止时间优先(Earliest Deadline First, EDF)算法、最低松弛度优先(Least Laxity First, LLF)算法和单调速率调度(Rate Monotonic Scheduling, RMS)算法则是根据任务的截止时间、松弛度和周期等特性来确定调度策略的。因此,选项D是正确答案。","multi":0,"questionType":1,"answer":"D","chooseItem":["796233850765201409"],"itemList":[{"id":"796233850689703937","questionId":"796233849569824769","content":" 最早截止时间优先(Earliest Deadline First, EDF)算法","answer":0,"chooseValue":"A"},{"id":"796233850714869761","questionId":"796233849569824769","content":" 最低松弛度优先(Least Laxity First, LLF)算法","answer":0,"chooseValue":"B"},{"id":"796233850740035585","questionId":"796233849569824769","content":" 单调速率调度(Rate Monotonic Scheduling, RMS)算法","answer":0,"chooseValue":"C"},{"id":"796233850765201409","questionId":"796233849569824769","content":" 抢占式优先级调度(Preemptive Priority Scheduling, PPS)算法","answer":1,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796235487772692481","title":"试题二(25分)<br>\n阅读下列说明,回答问题1至问题3,将解答填入答题纸的对应栏内。<br>\n【说明】<br>\n某软件公司为某企业开发一套在线办公自动化系统,以提升企业管理服务的质量和效率。公司决定采用面向对象方法开发该系统,张工负责对员工请假审批业务进行了分析,具体描述如下:<br>\n企业员工通过请假申请页面提出请假申请后,首先由部门经理进行审核,若请假理由不合理,部门经理拒绝请假申请,将申请退回给员工,员工对请假申请表进行修改再次提交,或放弃请假申请。<br>\n若请假理由合理,且请假天数小于等于3天,则部门经理直接批准请假申请,生成请假批准单,申请结束。<br>\n若请假天数大于3天,则在部门经理批准请假申请后,需要提交给副总经理审核批准。副总经理若认为该申请合理,则审核通过,生成请假批准单,流程结束;若副总经理认为申请不合理,则拒绝请假申请,将请假申请退回给员工。\n<br><br>\n【问题1】(11分)<br>\n识别设计类是面向对象设计过程中的重要环节之一,设计类表达了类的职责,即该类所承担的任务。请用300字以内的文字说明设计类通常包含哪3种类型,以及每种类型的主要职责,并从题干描述案例涉及的具体类为每种类型的设计类举出两个实例。\n<br><br>\n【问题2】(6分)<br>\n识别类之间的关系是面向对象分析过程中的重要环节之一,常见的类之间关系包括泛化关系、关联关系、聚合关系、组合关系等。请用300字以内的文字对泛化关系和关联关系的内涵进行描述,并根据题干具体类的描述为这两种关系各举出一种实例。\n<br><br>\n【问题3】(8分)<br>\n在面向对象的设计过程中,状态图描述了一个实体基于事件反应的动态行为。请根据题干描述,填写图2-1中的(a)~(d)空白,完成请假审批的状态图。<br>\n<img src=\"https://image.chaiding.com/ruankao/c0d73756a766306b8f453e6580b1d57c.jpg?x-oss-process=style/ruankaodaren\" alt=\"\" width=\"600\" height=\"319\" title=\"\" align=\"\">","analyze":"【问题1】<br>\n(1)实体类。实体类映射需求中的每个实体,保存需要存储在永久存储体中的信息,例如,员工信息、请假申请表。<br>\n(2)控制类。控制类是用于控制用例工作的类,用于对一个或几个用例所特有的控制行为进行建模。例如,提交请假,审批请假。<br>\n(3)边界类。边界类用于封装在用例内、外流动的信息或数据流。例如,请假申请页面、请假批准单。\n<br><br>\n【问题2】<br>\n(1)泛化关系。泛化关系描述了一般事物与该事物中的特殊种类之间的关系,也就是父类与子类之间的关系。继承关系是泛化关系的反关系,也就是说,子类继承了父类,而父类则是子类的泛化。<br>\n(2)关联关系。关联提供了不同类的对象之间的结构关系,它在一段时间内将多个类的实例连接在一起。关联体现的是对象实例之间的关系,而不表示两个类之间的关系。其余的关系涉及类元自身的描述,而不是它们的实例。对于关联关系的描述,可以使用关联名称、角色、多重性和导向性来说明。<br>\n泛化关系实例:员工与部门经理。部门经理也是员工的一种。<br>\n关联关系:员工与请假记录之间有关联关系。\n<br><br>\n【问题3】<br>\n(a)部门经理拒绝请假申请<br>\n(b)请假天数&gt;3天<br>\n(c)副总经理不批准请假<br>\n(d)请假天数&lt;=3天","multi":0,"questionType":2,"answer":"","chooseItem":null,"itemList":null,"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233895161909249","title":"<p><strong>请作答第<span style=\"color: red\">2</span>个空。</strong></p>在面向对象方法中,一个子类有多个父类,可以从多个父类中继承特性,这种继承称为(31)。 对于两个类A和B,如果A是B的子类,则B是A的(32)。","analyze":"<img src=\"https://image.chaiding.com/ruankao/d285f57092d3c075038eb692a7b98109.jpg?x-oss-process=style/ruankaodaren\">","multi":0,"questionType":1,"answer":"B","chooseItem":["796233896126599169"],"itemList":[{"id":"796233896101433345","questionId":"796233895161909249","content":" 聚合","answer":0,"chooseValue":"A"},{"id":"796233896126599169","questionId":"796233895161909249","content":" 泛化","answer":1,"chooseValue":"B"},{"id":"796233896155959297","questionId":"796233895161909249","content":" 聚类","answer":0,"chooseValue":"C"},{"id":"796233896181125121","questionId":"796233895161909249","content":" 耦合","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796234020726788097","title":"<p><strong>请作答第<span style=\"color: red\">1</span>个空。</strong></p>Requirements validation is the process of checking that requirements actually define the system that the customer really wants. It overlaps with analysis as it is concerned with finding problems with the requirements. Requirements validation is important because errors in a requirements document can lead to extensive rework costs when these problems are discovered during development or after the system is in service. The cost of fixing a requirements problem by making a system change is usually much greater than repairing design or coding errors. The reason for this is that a change to the requirements usually means that the system design and implementation must also be changed. Furthermore, the system must then be re-tested.<br> During the requirements validation process, different types of checks should be carried out on the requirements in the requirements document. These checks include:<br> 1.(71): A user may think that a system is needed to perform certain function. However, further thought and analysis may identify additional or different functions that are required. Systems have diverse stakeholders with different needs and any set of requirements is inevitably a compromise across the stakeholder community.<br> 2.(72): Requirements in the document should not conflict. That is, there should not be contradictory constraints or different descriptions of the same system function.<br> 3.(73): The requirements document should include requirements that define all functions and the constraints intended by the system user.<br> 4. Realism checks: Using knowledge of existing technology, the requirements should be checked to ensure that they can actually be implemented. These checks should also take account of the(74)for the system development.<br> 5. Verifiability: To reduce the potential for dispute between customer and contractor, system requirements should always be written so that they are verifiable. This means that you should be able to write a set of tests that can demonstrate that the delivered system meets each specified(75).","analyze":"需求验证是检查需求是否实际定义了客户真正想要的系统的过程。它与分析重叠,因为它关注的是发现需求中的问题。需求验证是很重要的,因为当这些问题在开发过程中或系统投入使用后被发现时,需求文件中的错误会导致大量的返工成本。通过改变系统来修复需求问题的成本通常比修复设计或编码错误要大得多。原因是对需求的改变通常意味着系统的设计和实施也必须改变。此外,还必须重新测试系统。<br> 在需求验证过程中,应该对需求文件中的需求进行不同类型的检查。这些检查包括:<br> 1.():用户可能认为需要一个系统来执行某些功能。然而,进一步的思考和分析可能会发现需要额外的或不同的功能。系统有不同的利益相关者,有不同的需求,任何一套需求都不可避免地是整个利益相关者群体的妥协。<br> 2.():文件中的要求不应冲突。也就是说,不应该有相互矛盾的约束或对同一系统功能的不同描述。<br> 3.():需求文件应该包括定义所有功能的需求和系统用户所期望的约束。<br> 4. 现实性检查。利用现有技术的知识,应该对需求进行检查,以确保它们能够真正被实现。这些检查也应该考虑到系统开发的()。<br> 5. 可验证性。为了减少客户和承包商之间潜在的争议,系统需求的编写应该始终是可验证的。这意味着你应该能够编写一套测试,以证明所交付的系统符合每一个指定的()。 <br> (1)A. 安全检查&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; B. 有效性检查&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;C. 一致性检查&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; D. 完整性检查<br> (2)A. 安全检查 &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; B. 安全检查&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;C. 一致性检查&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; D. 可用性检查<br> (3)A. 一致性检查&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; B. 可用性检查&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; C. 操作性检查&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; D. 完整性检查<br> (4)A. 工具&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; B. 测试 &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; C. 模型 &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; D. 预算和时间表<br> (5)A. 需求&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; B. 模型 &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; C. 设计 &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; D. 实施","multi":0,"questionType":1,"answer":"B","chooseItem":["796234021825695745"],"itemList":[{"id":"796234021796335617","questionId":"796234020726788097","content":" Security checks","answer":0,"chooseValue":"A"},{"id":"796234021825695745","questionId":"796234020726788097","content":" Validity checks","answer":1,"chooseValue":"B"},{"id":"796234021859250177","questionId":"796234020726788097","content":" Consistency checks","answer":0,"chooseValue":"C"},{"id":"796234021896998913","questionId":"796234020726788097","content":" Completeness checks","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233837217599489","title":"<p><strong>请作答第<span style=\"color: red\">1</span>个空。</strong></p>嵌入式系统已被广泛应用到各行各业。嵌入式系统是一个内置于设备中,对设备的各种传感器进行管理与控制的系统。通常,根据系统对时间的敏感程度可将嵌入式系统划分为(14)两种,而实时系统又可分为强实时(Hard Real-Time)系统和弱实时(Weak Real-Time)系统;如果从安全性要求看,嵌入式系统还可分为(15)。","analyze":"简单地说,实时系统可以看成对外部事件能够及时响应的系统。这种系统最重要的特征是时间性,也就是实时性,实时系统的正确性不仅依赖于系统计算的逻辑结果,还依赖于产生这些结果的时间。在现实世界中,并非所有的嵌入式系统都具有实时特性,所有的实时系统也不--定都是嵌入式的。但这两种系统并不互相排斥,兼有这两种系统特性的系统称为实时嵌入式系统。","multi":0,"questionType":1,"answer":"A","chooseItem":["796233838345867265"],"itemList":[{"id":"796233838345867265","questionId":"796233837217599489","content":" 嵌入式系统和嵌入式实时系统","answer":1,"chooseValue":"A"},{"id":"796233838375227393","questionId":"796233837217599489","content":" 控制系统和业务系统","answer":0,"chooseValue":"B"},{"id":"796233838400393217","questionId":"796233837217599489","content":" 安全攸关系统和非安全攸关系统","answer":0,"chooseValue":"C"},{"id":"796233838421364737","questionId":"796233837217599489","content":" CPS系统和非CPS系统","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233840363327489","title":"<p><strong>请作答第<span style=\"color: red\">2</span>个空。</strong></p>嵌入式系统已被广泛应用到各行各业。嵌入式系统是一个内置于设备中,对设备的各种传感器进行管理与控制的系统。通常,根据系统对时间的敏感程度可将嵌入式系统划分为(14)两种,而实时系统又可分为强实时(Hard Real-Time)系统和弱实时(Weak Real-Time)系统;如果从安全性要求看,嵌入式系统还可分为(15)。","analyze":"简单地说,实时系统可以看成对外部事件能够及时响应的系统。这种系统最重要的特征是时间性,也就是实时性,实时系统的正确性不仅依赖于系统计算的逻辑结果,还依赖于产生这些结果的时间。在现实世界中,并非所有的嵌入式系统都具有实时特性,所有的实时系统也不--定都是嵌入式的。但这两种系统并不互相排斥,兼有这两种系统特性的系统称为实时嵌入式系统。","multi":0,"questionType":1,"answer":"C","chooseItem":["796233841424486401"],"itemList":[{"id":"796233841344794625","questionId":"796233840363327489","content":" 高可靠系统和高安全系统","answer":0,"chooseValue":"A"},{"id":"796233841395126273","questionId":"796233840363327489","content":" 实时系统和强实时系统","answer":0,"chooseValue":"B"},{"id":"796233841424486401","questionId":"796233840363327489","content":" 安全攸关系统和非安全攸关系统","answer":1,"chooseValue":"C"},{"id":"796233841453846529","questionId":"796233840363327489","content":" 网络系统和分布式系统","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796234023964790785","title":"<p><strong>请作答第<span style=\"color: red\">2</span>个空。</strong></p>Requirements validation is the process of checking that requirements actually define the system that the customer really wants. It overlaps with analysis as it is concerned with finding problems with the requirements. Requirements validation is important because errors in a requirements document can lead to extensive rework costs when these problems are discovered during development or after the system is in service. The cost of fixing a requirements problem by making a system change is usually much greater than repairing design or coding errors. The reason for this is that a change to the requirements usually means that the system design and implementation must also be changed. Furthermore, the system must then be re-tested.<br> During the requirements validation process, different types of checks should be carried out on the requirements in the requirements document. These checks include:<br> 1.(71): A user may think that a system is needed to perform certain function. However, further thought and analysis may identify additional or different functions that are required. Systems have diverse stakeholders with different needs and any set of requirements is inevitably a compromise across the stakeholder community.<br> 2.(72): Requirements in the document should not conflict. That is, there should not be contradictory constraints or different descriptions of the same system function.<br> 3.(73): The requirements document should include requirements that define all functions and the constraints intended by the system user.<br> 4. Realism checks: Using knowledge of existing technology, the requirements should be checked to ensure that they can actually be implemented. These checks should also take account of the(74)for the system development.<br> 5. Verifiability: To reduce the potential for dispute between customer and contractor, system requirements should always be written so that they are verifiable. This means that you should be able to write a set of tests that can demonstrate that the delivered system meets each specified(75).","analyze":"需求验证是检查需求是否实际定义了客户真正想要的系统的过程。它与分析重叠,因为它关注的是发现需求中的问题。需求验证是很重要的,因为当这些问题在开发过程中或系统投入使用后被发现时,需求文件中的错误会导致大量的返工成本。通过改变系统来修复需求问题的成本通常比修复设计或编码错误要大得多。原因是对需求的改变通常意味着系统的设计和实施也必须改变。此外,还必须重新测试系统。<br> 在需求验证过程中,应该对需求文件中的需求进行不同类型的检查。这些检查包括:<br> 1.():用户可能认为需要一个系统来执行某些功能。然而,进一步的思考和分析可能会发现需要额外的或不同的功能。系统有不同的利益相关者,有不同的需求,任何一套需求都不可避免地是整个利益相关者群体的妥协。<br> 2.():文件中的要求不应冲突。也就是说,不应该有相互矛盾的约束或对同一系统功能的不同描述。<br> 3.():需求文件应该包括定义所有功能的需求和系统用户所期望的约束。<br> 4. 现实性检查。利用现有技术的知识,应该对需求进行检查,以确保它们能够真正被实现。这些检查也应该考虑到系统开发的()。<br> 5. 可验证性。为了减少客户和承包商之间潜在的争议,系统需求的编写应该始终是可验证的。这意味着你应该能够编写一套测试,以证明所交付的系统符合每一个指定的()。 <br> (1)A. 安全检查&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; B. 有效性检查&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;C. 一致性检查&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; D. 完整性检查<br> (2)A. 安全检查 &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; B. 安全检查&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;C. 一致性检查&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; D. 可用性检查<br> (3)A. 一致性检查&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; B. 可用性检查&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; C. 操作性检查&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; D. 完整性检查<br> (4)A. 工具&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; B. 测试 &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; C. 模型 &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; D. 预算和时间表<br> (5)A. 需求&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; B. 模型 &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; C. 设计 &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; D. 实施","multi":0,"questionType":1,"answer":"C","chooseItem":["796234025130807297"],"itemList":[{"id":"796234025067892737","questionId":"796234023964790785","content":" Security checks","answer":0,"chooseValue":"A"},{"id":"796234025097252865","questionId":"796234023964790785","content":" Safety checks","answer":0,"chooseValue":"B"},{"id":"796234025130807297","questionId":"796234023964790785","content":" Consistency checks","answer":1,"chooseValue":"C"},{"id":"796234025160167425","questionId":"796234023964790785","content":" Usability checks","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796234027144073217","title":"<p><strong>请作答第<span style=\"color: red\">3</span>个空。</strong></p>Requirements validation is the process of checking that requirements actually define the system that the customer really wants. It overlaps with analysis as it is concerned with finding problems with the requirements. Requirements validation is important because errors in a requirements document can lead to extensive rework costs when these problems are discovered during development or after the system is in service. The cost of fixing a requirements problem by making a system change is usually much greater than repairing design or coding errors. The reason for this is that a change to the requirements usually means that the system design and implementation must also be changed. Furthermore, the system must then be re-tested.<br> During the requirements validation process, different types of checks should be carried out on the requirements in the requirements document. These checks include:<br> 1.(71): A user may think that a system is needed to perform certain function. However, further thought and analysis may identify additional or different functions that are required. Systems have diverse stakeholders with different needs and any set of requirements is inevitably a compromise across the stakeholder community.<br> 2.(72): Requirements in the document should not conflict. That is, there should not be contradictory constraints or different descriptions of the same system function.<br> 3.(73): The requirements document should include requirements that define all functions and the constraints intended by the system user.<br> 4. Realism checks: Using knowledge of existing technology, the requirements should be checked to ensure that they can actually be implemented. These checks should also take account of the(74)for the system development.<br> 5. Verifiability: To reduce the potential for dispute between customer and contractor, system requirements should always be written so that they are verifiable. This means that you should be able to write a set of tests that can demonstrate that the delivered system meets each specified(75).","analyze":"需求验证是检查需求是否实际定义了客户真正想要的系统的过程。它与分析重叠,因为它关注的是发现需求中的问题。需求验证是很重要的,因为当这些问题在开发过程中或系统投入使用后被发现时,需求文件中的错误会导致大量的返工成本。通过改变系统来修复需求问题的成本通常比修复设计或编码错误要大得多。原因是对需求的改变通常意味着系统的设计和实施也必须改变。此外,还必须重新测试系统。<br> 在需求验证过程中,应该对需求文件中的需求进行不同类型的检查。这些检查包括:<br> 1.():用户可能认为需要一个系统来执行某些功能。然而,进一步的思考和分析可能会发现需要额外的或不同的功能。系统有不同的利益相关者,有不同的需求,任何一套需求都不可避免地是整个利益相关者群体的妥协。<br> 2.():文件中的要求不应冲突。也就是说,不应该有相互矛盾的约束或对同一系统功能的不同描述。<br> 3.():需求文件应该包括定义所有功能的需求和系统用户所期望的约束。<br> 4. 现实性检查。利用现有技术的知识,应该对需求进行检查,以确保它们能够真正被实现。这些检查也应该考虑到系统开发的()。<br> 5. 可验证性。为了减少客户和承包商之间潜在的争议,系统需求的编写应该始终是可验证的。这意味着你应该能够编写一套测试,以证明所交付的系统符合每一个指定的()。 <br> (1)A. 安全检查&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; B. 有效性检查&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;C. 一致性检查&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; D. 完整性检查<br> (2)A. 安全检查 &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; B. 安全检查&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;C. 一致性检查&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; D. 可用性检查<br> (3)A. 一致性检查&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; B. 可用性检查&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; C. 操作性检查&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; D. 完整性检查<br> (4)A. 工具&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; B. 测试 &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; C. 模型 &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; D. 预算和时间表<br> (5)A. 需求&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; B. 模型 &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; C. 设计 &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; D. 实施","multi":0,"questionType":1,"answer":"D","chooseItem":["796234028163289089"],"itemList":[{"id":"796234028071014401","questionId":"796234027144073217","content":" Consistency checks","answer":0,"chooseValue":"A"},{"id":"796234028108763137","questionId":"796234027144073217","content":" Usability checks","answer":0,"chooseValue":"B"},{"id":"796234028146511873","questionId":"796234027144073217","content":" Operational checks","answer":0,"chooseValue":"C"},{"id":"796234028163289089","questionId":"796234027144073217","content":" Completeness checks","answer":1,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233884663566337","title":"<p><strong>请作答第<span style=\"color: red\">1</span>个空。</strong></p>工作流参考模型(Workflow Reference Model,WRM)包含6个基本模块,分别是(29)、工作流引擎、流程定义工具、(30)、调用应用和管理监控工具。","analyze":"<img src=\"https://image.chaiding.com/ruankao/3712f35bebd5b5c376c8755363420327.jpg?x-oss-process=style/ruankaodaren\" alt=\"\" width=\"500\" height=\"199\" title=\"\" align=\"\">","multi":0,"questionType":1,"answer":"A","chooseItem":["796233885590507521"],"itemList":[{"id":"796233885590507521","questionId":"796233884663566337","content":" 工作流执行服务","answer":1,"chooseValue":"A"},{"id":"796233885607284737","questionId":"796233884663566337","content":" 流程服务引擎","answer":0,"chooseValue":"B"},{"id":"796233885628256257","questionId":"796233884663566337","content":" 服务标准引擎","answer":0,"chooseValue":"C"},{"id":"796233885645033473","questionId":"796233884663566337","content":" 流程设计工具","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233843395809281","title":"嵌入式软件开发方法与传统软件开发方法存在较大差异,()的说法对嵌入式软件开发而言是错误的。","analyze":"由于嵌入式系统存储容量有限,所以嵌入式系统的软件代码都比较精炼,代码规模比较小。","multi":0,"questionType":1,"answer":"D","chooseItem":["796233844423413761"],"itemList":[{"id":"796233844314361857","questionId":"796233843395809281","content":" 嵌入式软件开发的结果通常需要固化在目标系统的储存器或处理器内部储存器资源中","answer":0,"chooseValue":"A"},{"id":"796233844347916289","questionId":"796233843395809281","content":" 嵌入式软件的开发一般需要专门的开发工具、目标系统和测试设备","answer":0,"chooseValue":"B"},{"id":"796233844385665025","questionId":"796233843395809281","content":" 嵌入式软件对安全性和可靠性的要求较高","answer":0,"chooseValue":"C"},{"id":"796233844423413761","questionId":"796233843395809281","content":" 嵌入式软件开发不用考虑代码的规模","answer":1,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796235584342347777","title":"论面向对象设计方法及其应用<br> 系统设计是根据系统分析的结果,运用系统科学的思想和方法,设计出能满是用户所要求的目标(或目的)系统的过程。面向对象设计方法是一种接近现实的系统设计方法。在该方法中,数据结构和在数据结构上定义的操作算法封装在一个对象之中。\n请围绕“面向对象设计方法及其应用”论题,依次从以下三个方面进行论述。<br> 1.概要叙述你参与管理和开发的软件项目以及你在其中所承担的主要工作。<br> 2.面向对象设计方法包含多种设计原则,请简要描述其中的三种设计原则。<br> 3.具体阐述你参与管理和开发的项目是如何遵循这三种设计原则进行信息系统设计的。","analyze":"论文暂无解析","multi":0,"questionType":3,"answer":"","chooseItem":null,"itemList":null,"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796234030134611969","title":"<p><strong>请作答第<span style=\"color: red\">4</span>个空。</strong></p>Requirements validation is the process of checking that requirements actually define the system that the customer really wants. It overlaps with analysis as it is concerned with finding problems with the requirements. Requirements validation is important because errors in a requirements document can lead to extensive rework costs when these problems are discovered during development or after the system is in service. The cost of fixing a requirements problem by making a system change is usually much greater than repairing design or coding errors. The reason for this is that a change to the requirements usually means that the system design and implementation must also be changed. Furthermore, the system must then be re-tested.<br> During the requirements validation process, different types of checks should be carried out on the requirements in the requirements document. These checks include:<br> 1.(71): A user may think that a system is needed to perform certain function. However, further thought and analysis may identify additional or different functions that are required. Systems have diverse stakeholders with different needs and any set of requirements is inevitably a compromise across the stakeholder community.<br> 2.(72): Requirements in the document should not conflict. That is, there should not be contradictory constraints or different descriptions of the same system function.<br> 3.(73): The requirements document should include requirements that define all functions and the constraints intended by the system user.<br> 4. Realism checks: Using knowledge of existing technology, the requirements should be checked to ensure that they can actually be implemented. These checks should also take account of the(74)for the system development.<br> 5. Verifiability: To reduce the potential for dispute between customer and contractor, system requirements should always be written so that they are verifiable. This means that you should be able to write a set of tests that can demonstrate that the delivered system meets each specified(75).","analyze":"需求验证是检查需求是否实际定义了客户真正想要的系统的过程。它与分析重叠,因为它关注的是发现需求中的问题。需求验证是很重要的,因为当这些问题在开发过程中或系统投入使用后被发现时,需求文件中的错误会导致大量的返工成本。通过改变系统来修复需求问题的成本通常比修复设计或编码错误要大得多。原因是对需求的改变通常意味着系统的设计和实施也必须改变。此外,还必须重新测试系统。<br> 在需求验证过程中,应该对需求文件中的需求进行不同类型的检查。这些检查包括:<br> 1.():用户可能认为需要一个系统来执行某些功能。然而,进一步的思考和分析可能会发现需要额外的或不同的功能。系统有不同的利益相关者,有不同的需求,任何一套需求都不可避免地是整个利益相关者群体的妥协。<br> 2.():文件中的要求不应冲突。也就是说,不应该有相互矛盾的约束或对同一系统功能的不同描述。<br> 3.():需求文件应该包括定义所有功能的需求和系统用户所期望的约束。<br> 4. 现实性检查。利用现有技术的知识,应该对需求进行检查,以确保它们能够真正被实现。这些检查也应该考虑到系统开发的()。<br> 5. 可验证性。为了减少客户和承包商之间潜在的争议,系统需求的编写应该始终是可验证的。这意味着你应该能够编写一套测试,以证明所交付的系统符合每一个指定的()。 <br> (1)A. 安全检查&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; B. 有效性检查&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;C. 一致性检查&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; D. 完整性检查<br> (2)A. 安全检查 &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; B. 安全检查&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;C. 一致性检查&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; D. 可用性检查<br> (3)A. 一致性检查&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; B. 可用性检查&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; C. 操作性检查&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; D. 完整性检查<br> (4)A. 工具&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; B. 测试 &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; C. 模型 &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; D. 预算和时间表<br> (5)A. 需求&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; B. 模型 &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; C. 设计 &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; D. 实施","multi":0,"questionType":1,"answer":"C","chooseItem":["796234031422263297"],"itemList":[{"id":"796234031342571521","questionId":"796234030134611969","content":" tools","answer":0,"chooseValue":"A"},{"id":"796234031384514561","questionId":"796234030134611969","content":" tests","answer":0,"chooseValue":"B"},{"id":"796234031422263297","questionId":"796234030134611969","content":" models","answer":1,"chooseValue":"C"},{"id":"796234031434846209","questionId":"796234030134611969","content":" budget and schedule","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233888459411457","title":"<p><strong>请作答第<span style=\"color: red\">2</span>个空。</strong></p>工作流参考模型(Workflow Reference Model,WRM)包含6个基本模块,分别是(29)、工作流引擎、流程定义工具、(30)、调用应用和管理监控工具。","analyze":"<img src=\"https://image.chaiding.com/ruankao/82d0a4852bb462e04ee5e1b60ed4cea4.jpg?x-oss-process=style/ruankaodaren\" alt=\"\" width=\"500\" height=\"199\" title=\"\" align=\"\">","multi":0,"questionType":1,"answer":"A","chooseItem":["796233889650593793"],"itemList":[{"id":"796233889650593793","questionId":"796233888459411457","content":" 客户端应用","answer":1,"chooseValue":"A"},{"id":"796233889663176705","questionId":"796233888459411457","content":" 服务端应用","answer":0,"chooseValue":"B"},{"id":"796233889684148225","questionId":"796233888459411457","content":" 部署端应用","answer":0,"chooseValue":"C"},{"id":"796233889696731137","questionId":"796233888459411457","content":" 网络端应用","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796234033443917825","title":"<p><strong>请作答第<span style=\"color: red\">5</span>个空。</strong></p>Requirements validation is the process of checking that requirements actually define the system that the customer really wants. It overlaps with analysis as it is concerned with finding problems with the requirements. Requirements validation is important because errors in a requirements document can lead to extensive rework costs when these problems are discovered during development or after the system is in service. The cost of fixing a requirements problem by making a system change is usually much greater than repairing design or coding errors. The reason for this is that a change to the requirements usually means that the system design and implementation must also be changed. Furthermore, the system must then be re-tested.<br> During the requirements validation process, different types of checks should be carried out on the requirements in the requirements document. These checks include:<br> 1.(71): A user may think that a system is needed to perform certain function. However, further thought and analysis may identify additional or different functions that are required. Systems have diverse stakeholders with different needs and any set of requirements is inevitably a compromise across the stakeholder community.<br> 2.(72): Requirements in the document should not conflict. That is, there should not be contradictory constraints or different descriptions of the same system function.<br> 3.(73): The requirements document should include requirements that define all functions and the constraints intended by the system user.<br> 4. Realism checks: Using knowledge of existing technology, the requirements should be checked to ensure that they can actually be implemented. These checks should also take account of the(74)for the system development.<br> 5. Verifiability: To reduce the potential for dispute between customer and contractor, system requirements should always be written so that they are verifiable. This means that you should be able to write a set of tests that can demonstrate that the delivered system meets each specified(75).","analyze":"需求验证是检查需求是否实际定义了客户真正想要的系统的过程。它与分析重叠,因为它关注的是发现需求中的问题。需求验证是很重要的,因为当这些问题在开发过程中或系统投入使用后被发现时,需求文件中的错误会导致大量的返工成本。通过改变系统来修复需求问题的成本通常比修复设计或编码错误要大得多。原因是对需求的改变通常意味着系统的设计和实施也必须改变。此外,还必须重新测试系统。<br> 在需求验证过程中,应该对需求文件中的需求进行不同类型的检查。这些检查包括:<br> 1.():用户可能认为需要一个系统来执行某些功能。然而,进一步的思考和分析可能会发现需要额外的或不同的功能。系统有不同的利益相关者,有不同的需求,任何一套需求都不可避免地是整个利益相关者群体的妥协。<br> 2.():文件中的要求不应冲突。也就是说,不应该有相互矛盾的约束或对同一系统功能的不同描述。<br> 3.():需求文件应该包括定义所有功能的需求和系统用户所期望的约束。<br> 4. 现实性检查。利用现有技术的知识,应该对需求进行检查,以确保它们能够真正被实现。这些检查也应该考虑到系统开发的()。<br> 5. 可验证性。为了减少客户和承包商之间潜在的争议,系统需求的编写应该始终是可验证的。这意味着你应该能够编写一套测试,以证明所交付的系统符合每一个指定的()。 <br> (1)A. 安全检查&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; B. 有效性检查&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;C. 一致性检查&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; D. 完整性检查<br> (2)A. 安全检查 &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; B. 安全检查&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;C. 一致性检查&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; D. 可用性检查<br> (3)A. 一致性检查&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; B. 可用性检查&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; C. 操作性检查&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; D. 完整性检查<br> (4)A. 工具&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; B. 测试 &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; C. 模型 &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; D. 预算和时间表<br> (5)A. 需求&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; B. 模型 &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; C. 设计 &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; D. 实施","multi":0,"questionType":1,"answer":"A","chooseItem":["796234034370859009"],"itemList":[{"id":"796234034370859009","questionId":"796234033443917825","content":" requirement","answer":1,"chooseValue":"A"},{"id":"796234034400219137","questionId":"796234033443917825","content":" model","answer":0,"chooseValue":"B"},{"id":"796234034429579265","questionId":"796234033443917825","content":" design","answer":0,"chooseValue":"C"},{"id":"796234034458939393","questionId":"796234033443917825","content":" implementation","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233830649319425","title":"郭一在单位运营管理部工作,负责经营报表和统计分析,为便于及时、准确完成报表,郭一利用自身软件开发基础,在下班后的业余时间与家人共同开发了一个统计软件。以下说法中,正确的是()。","analyze":"郭一开发的统计软件是针对统计企业“经营数据并制作成图表”的工作目标开发的,软件本身与其工作内容有直接的联系,因此是职务作品,软件著作权属于郭一所在企业。","multi":0,"questionType":1,"answer":"D","chooseItem":["796233831911804929"],"itemList":[{"id":"796233831853084673","questionId":"796233830649319425","content":" 该软件没有商业用途,没有著作权的问题","answer":0,"chooseValue":"A"},{"id":"796233831874056193","questionId":"796233830649319425","content":" 郭一在开发软件的过程中,没有利用企业的物质技术条件,该软件的著作权属于郭一","answer":0,"chooseValue":"B"},{"id":"796233831895027713","questionId":"796233830649319425","content":" 按照软件著作权归属的一般原则,该软件的著作权归属于郭一","answer":0,"chooseValue":"C"},{"id":"796233831911804929","questionId":"796233830649319425","content":" 该软件的著作权属于企业,因其是郭一为完成本职工作而产生的结果","answer":1,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233833971208193","title":"韩国甲公司生产的平板电脑在其本国享有“Upad“注册商标专用权,但未在中国申请注册。中国乙公司生产的平板电脑也使用“Upad”商标,并享有中国注册商标专用权,但未在韩国申请注册。甲公司与乙公司生产的平板电脑都在中国市场上销售,此情形下,依据中国商标法,()。","analyze":"根据中国商标法实施条例的规定,商标注册实行“先申请、先审查、先注册”的原则,并且商标的注册受到国界的限制,即在一个国家或地区注册的商标只在该国家或地区范围内受到保护。本题中,韩国甲公司在其本国享有“Upad”商标的注册商标专用权,但未在中国申请注册;而中国乙公司生产的平板电脑使用的商标已在中国注册并获得商标专用权,但未在韩国申请注册。两家公司的商标在对方的注册国家均没有注册,因此在该国家是不具有商标专用权的。然而,在中国市场上,由于乙公司已经注册了商标并获得专用权,而甲公司使用的商标与乙公司的商标相同,容易引起消费者混淆,导致商品来源等问题,因此甲公司在中国市场上使用“Upad”商标已经构成了对乙公司商标专用权的侵犯。因此,本题答案为A,“甲公司侵犯了乙公司的商标权”。","multi":0,"questionType":1,"answer":"A","chooseItem":["796233834902343681"],"itemList":[{"id":"796233834902343681","questionId":"796233833971208193","content":" 甲公司侵犯了乙公司的商标权","answer":1,"chooseValue":"A"},{"id":"796233834923315201","questionId":"796233833971208193","content":" 甲公司未侵犯乙公司的商标权","answer":0,"chooseValue":"B"},{"id":"796233834948481025","questionId":"796233833971208193","content":" 乙公司侵犯了甲公司的商标权","answer":0,"chooseValue":"C"},{"id":"796233834973646849","questionId":"796233833971208193","content":" 甲公司与乙公司均未侵犯商标权","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233881190682625","title":"工作流管理系统(Workflow Management System,WFMS)通过软件定义、创建工作流并管理其执行。其中,监控和管理进度完成情况和数据所处状态、工作分配与均衡情况等执行中的业务,体现着工作流管理系统()的基本功能。","analyze":"WFMS将业务流程中工作如何组织与协调的规则抽象出来,在WFMS的协助下,开发人员遵从一定的编程接口和约定,就可以开发出更具灵活性的事务处理系统,用户无需重新开发即可更改工作流程,以适应业务的变更。WFMS的基本功能体现在以下几个方面:<br> (1)对工作流进行建模。即定义工作流,包括具体的活动和规则等,所创建的模型是同时可以被人和计算机所“理解”的,工作流对应现实世界的业务处理过程,不能改变真实业务的处理逻辑。<br> (2)工作流执行。遵循工作流模型来创建和执行实际的工作流,即通过WFMS可以执行多个工作项。<br> (3)业务过程的管理和分析。监控和管理执行中的业务(工作流),例如,进度完成情况和数据所处状态、工作分配与均衡情况等。","multi":0,"questionType":1,"answer":"C","chooseItem":["796233882339921921"],"itemList":[{"id":"796233882293784577","questionId":"796233881190682625","content":" 工作流执行","answer":0,"chooseValue":"A"},{"id":"796233882314756097","questionId":"796233881190682625","content":" 业务过程的设计和实现","answer":0,"chooseValue":"B"},{"id":"796233882339921921","questionId":"796233881190682625","content":" 业务过程管理和分析","answer":1,"chooseValue":"C"},{"id":"796233882365087745","questionId":"796233881190682625","content":" 对工作流进行建模","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233806154584065","title":"敏捷软件开发方法是一种增量式开发方法,它将( )视为软件过程的中心活动,将其他开发活动融入其中。","analyze":"敏捷方法是一种以人为核心、迭代、循序渐进的开发方法。在敏捷方法中,软件项目的构建被切分成多个子项目,各个子项目成果都经过测试,具备集成和可运行的特征。在敏捷方法中,从开发者的角度来看,主要的关注点有短平快的会议、小版本发布、较少的文档、合作为重、 客户直接参与、自动化测试、适应性计划调整和结对编程;从管理者的角度来看,主要的关注点有测试驱动开发、持续集成和重构。","multi":0,"questionType":1,"answer":"D","chooseItem":["796233807198965761"],"itemList":[{"id":"796233807127662593","questionId":"796233806154584065","content":" 可行性分析","answer":0,"chooseValue":"A"},{"id":"796233807157022721","questionId":"796233806154584065","content":" 需求分析和设计","answer":0,"chooseValue":"B"},{"id":"796233807182188545","questionId":"796233806154584065","content":" 设计和实现","answer":0,"chooseValue":"C"},{"id":"796233807198965761","questionId":"796233806154584065","content":" 实现和测试","answer":1,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233939831246849","title":"某系统中有5个并发进程竞争资源R。假设每个进程都需要3个R,那么最少需要有()个R,才能保证系统不会发生死锁。","analyze":"至少需要资源数=并发进程数*(每个进程需要资源数-1)+1=5*(3-1)+1=11","multi":0,"questionType":1,"answer":"B","chooseItem":["796233940787548161"],"itemList":[{"id":"796233940753993729","questionId":"796233939831246849","content":" 10","answer":0,"chooseValue":"A"},{"id":"796233940787548161","questionId":"796233939831246849","content":" 11","answer":1,"chooseValue":"B"},{"id":"796233940816908289","questionId":"796233939831246849","content":" 12","answer":0,"chooseValue":"C"},{"id":"796233940833685505","questionId":"796233939831246849","content":" 13","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233942997946369","title":"<p><strong>请作答第<span style=\"color: red\">1</span>个空。</strong></p>某文件管理系统在磁盘上建立了位示图(bitmap),记录磁盘的使用情况。若磁盘上物理块的编号依次为:0 、1、2、……;系统中的字长为32位,字的编号依次为: 0 、1、2,字中的一位对应文件存储器上的一个物理块,取值0表示该物理块空闲,取值1表示该物理块占用,如下图所示。 <img src=\"https://image.chaiding.com/ruankao/b573416860a40988925ae47a8670d7fd.jpg?x-oss-process=style/ruankaodaren\" width=\"550\" height=\"286\" title=\"\" align=\"\" alt=\"\"> <br> 假设操作系统将256号物理块分配给某文件,那么该物理块的使用情况在位示图中编号为(47)的字中描述;系统应该将(48)。","analyze":"256整除32得8余0,所以在第8个字中描述,将该字的位号0的位置“1”。","multi":0,"questionType":1,"answer":"D","chooseItem":["796233943979413505"],"itemList":[{"id":"796233943937470465","questionId":"796233942997946369","content":" 5","answer":0,"chooseValue":"A"},{"id":"796233943950053377","questionId":"796233942997946369","content":" 6","answer":0,"chooseValue":"B"},{"id":"796233943966830593","questionId":"796233942997946369","content":" 7","answer":0,"chooseValue":"C"},{"id":"796233943979413505","questionId":"796233942997946369","content":" 8","answer":1,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233945950736385","title":"<p><strong>请作答第<span style=\"color: red\">2</span>个空。</strong></p>某文件管理系统在磁盘上建立了位示图(bitmap),记录磁盘的使用情况。若磁盘上物理块的编号依次为:0 、1、2、……;系统中的字长为32位,字的编号依次为: 0 、1、2,字中的一位对应文件存储器上的一个物理块,取值0表示该物理块空闲,取值1表示该物理块占用,如下图所示。 <img src=\"https://image.chaiding.com/ruankao/ef8db21fe5bf7bb081e1734c1542762b.jpg?x-oss-process=style/ruankaodaren\" width=\"550\" height=\"286\" title=\"\" align=\"\" alt=\"\"> <br> 假设操作系统将256号物理块分配给某文件,那么该物理块的使用情况在位示图中编号为(47)的字中描述;系统应该将(48)。","analyze":"256整除32得8余0,所以在第8个字中描述,将该字的位号0的位置“1”。","multi":0,"questionType":1,"answer":"B","chooseItem":["796233946948980737"],"itemList":[{"id":"796233946902843393","questionId":"796233945950736385","content":" 该字的位号32的位置“1”","answer":0,"chooseValue":"A"},{"id":"796233946948980737","questionId":"796233945950736385","content":" 该字的位号0的位置“1”","answer":1,"chooseValue":"B"},{"id":"796233946990923777","questionId":"796233945950736385","content":" 该字的位号32的位置“0”","answer":0,"chooseValue":"C"},{"id":"796233947016089601","questionId":"796233945950736385","content":" 该字的位号0的位置“0”","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233855873863681","title":"数据中台依据企业特有的业务模式和组织架构,通过有形的产品和实施方法论支撑,构建了一套持续不断将数据变成资产并服务于业务的机制。数据中台需要具备的4个核心能力为(),让企业员工、客户、伙伴能够方便地应用数据。","analyze":"数据中台必备的4个核心能力:<br> 1、数据汇聚整合能力:<br> 随着业务的多元化发展,企业内部往往信息部门和数据中心林立,大量系统、功能和应用重复建设,存在巨大的数据资源和人力资源浪费,同时组织壁垒也导致数据孤岛的出现,使得内外部数据难以被全局规划。数据中台需要能够对数据进行整合和完善,提供适用、适配、成熟、完善的一站式大数据平台工具,在简便有效的基础上,实现数据采集、交换等任务配置以及监控管理。<br> 2、数据提纯加工能力:<br> 企业需要完整的数据资产体系,也就必须以客户、产品、业务场景为指导原则进行建设,推动业务数据向数据资产的转化。 传统数字化建设往往局限在单个业务流程,而忽视了多业务的关联数据,缺乏对数据的深度理解。<br> 3、数据服务可视化:<br> 为了尽快让数据用起来,数据中台必须提供便捷、快速的数据服务能力,让相关人员能够迅速开发数据应用,支持数据资产场景化能力的快速输出,以响应客户动态的需求。多数受访者还期待数据中台可以提供数据化运营平台,帮助企业快速实现数据资产的可视化分析,提供包括实时流数据分析、预测分析、机器学习等更为高级的服务,为企业数据化运营赋能。<br> 4、价值变现方面:<br> 企业内部的各个部门和团队不应该是数据孤岛,打通不同部门和团队之间数据难以整合、标签不成体系、与业务关联断层的现状,数据中台被寄予厚望。企业期待数据中台能助力跨部门的普适性业务价值能力,更好地管理数据应用,将数据洞察变成直接驱动业务行动的核心动能,跨业务场景推进数据实践。","multi":0,"questionType":1,"answer":"C","chooseItem":["796233856796610561"],"itemList":[{"id":"796233856771444737","questionId":"796233855873863681","content":" 数据汇聚整合、数据清洗、数据加密、数据建模","answer":0,"chooseValue":"A"},{"id":"796233856784027649","questionId":"796233855873863681","content":" 数据汇聚整合、数据清洗、数据加密、数据分发","answer":0,"chooseValue":"B"},{"id":"796233856796610561","questionId":"796233855873863681","content":" 数据汇聚整合、数据提纯加工、数据服务可视化、数据价值变现","answer":1,"chooseValue":"C"},{"id":"796233856813387777","questionId":"796233855873863681","content":" 数据清洗、数据加密、数据解密、数据建模","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796235493942513665","title":"试题五(25分)<br>\n阅读下列说明,回答问题1至问题3,将解答填入答题纸的对应栏内。<br>\n【说明】<br>\n某公司拟开发一个食品供应链溯源系统,该系统需要提供从原材料供应商、加工商、物流、分销商、零售商、消费者的食品供应链全流程溯源。该公同组建了项目组,并召开了项目开发讨论会。会上,张工提出通过二维码扫描获取食品信息,采用中心化数据库作为数据存储媒介;李工提出使用中心化数据库容易产生数据信任、溯源追责困难等问题,建议建立区块链和数据库的映射存储,提供存储和查询操作功能,并提出采用数据接入层、数据核心层、应用表示层三层体系架构实现该食品溯源系统。\n<br><br>\n【问题1】(6分)<br>\n去中心化和开放性是区块链的重要特征,请用200字以内的文字简要说明什么是区块链的去中心化和开放性。\n<br><br>\n【问题2】(7分)<br>\n分布式交易账本、哈希散列函数、公私钥签名、时间戳就是区块链的核心技术,请从上述技术中选择两种最适合解决数据信任问题的技术,并用300字以内的文字说明原因。\n<br><br>\n【问题3】(12分)<br>\n根据李工的建议,该系统将采用三层架构。请从下面给出的(a)~(m)候选项中进行选择,补充完善图5-1中(1)~(6)处空白的内容,完成该系统的架构设计方案。<br>\n<img src=\"https://image.chaiding.com/ruankao/71e6515f44661d50fb500e193da02f24.jpg?x-oss-process=style/ruankaodaren\" width=\"500\" height=\"533\" title=\"\" align=\"\" alt=\"\"><br>\n(a)数据接入层<br>\n(b)智能合约<br>\n(c)Socket<br>\n(d)4G/Wifi<br>\n(e)应用表示层<br>\n(f)数据库<br>\n(g)MVC<br>\n(h)数据核心层<br>\n(i)传感器网络<br>\n(j)区块链网络<br>\n(k)4G/Wifi<br>\n(l)JDBC<br>\n(m)业务逻辑层","analyze":"【问题1】<br>\n1、去中心化<br>\n区块链采用了分布式计算和存储,不存在中心化的硬件或管理机构,因此使得任意节点的权利和义务都是均等的。<br>\n2、开放性<br>\n区块链的系统的一个开放性质的,除了交易各方的私有信息被加密外,区块链的数据对所有人公开的。\n<br><br>\n【问题2】<br>\n分布式交易账本、公私钥签名<br>\n分布式交易账本使交易账本在全网不止一份,而是有多份,当有人想篡改账本时,非常难以实现,所以能解决数据可信度问题。<br>\n公私钥签名是使用非对称加密机制,做签名,以验证持有人以及防止伪造的效果,这种技术也极难被破解,能验证持有人自然能一定程度解决数据可信度的问题。\n<br><br>\n【问题3】<br>\n(1)(a)数据接入层<br>\n(2)(k)4G/Wifi<br>\n(3)(b)智能合约<br>\n(4)(f)数据库<br>\n(5)(h)数据核心层<br>\n(6)(e)应用表示层","multi":0,"questionType":2,"answer":"","chooseItem":null,"itemList":null,"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233927084756993","title":"给定关系R(A,B,C,D,E)和关系S(D,E,F,G),对其进行自然连接运算R⋈S后其结果集的属性列为()。","analyze":"3.自然连接(Natural join)</br><br/>\n自然连接是一种特殊的等值连接</br><br/>\n两个关系中进行比较的分量必须是相同的属性组在结果中把重复的属性列去掉</br><br/>\n自然连接的含义</br><br/>\nR和S具有相同的属性组B","multi":0,"questionType":1,"answer":"B","chooseItem":["796233928351436801"],"itemList":[{"id":"796233928322076673","questionId":"796233927084756993","content":" R.A,R.B,R.C,R.D,R.E,S.D,S.E","answer":0,"chooseValue":"A"},{"id":"796233928351436801","questionId":"796233927084756993","content":" R.A,R.B,R.C,R.D,R.E,S.F,S.G","answer":1,"chooseValue":"B"},{"id":"796233928372408321","questionId":"796233927084756993","content":" R.A,R.B,R.C,R.D,R.E,S.E,S.F","answer":0,"chooseValue":"C"},{"id":"796233928389185537","questionId":"796233927084756993","content":" R.A,R.B,R.C,R.D,R.E,S.D,S.E,S.F,S.G","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233948987412481","title":"<p><strong>请作答第<span style=\"color: red\">1</span>个空。</strong></p>程P1、P2、P3、P4、P5和P6的前趋图如下所示:<br> <img src=\"https://image.chaiding.com/ruankao/1a91baf1ad12373328e404c0ed1a119c.jpg?x-oss-process=style/ruankaodaren\" width=\"350\" height=\"147\" title=\"\" align=\"\" alt=\"\"><br> 若用PV操作控制进程PI、P2、P3、P4、P5和P6并发执行的过程,则需要设置7个信号量S1、S2、S3、S4、S5、S6和S7, 且信号量S1~S7的初值都等于零。如下的进程执行图中,a和b处应分别填写(49);c和 d处应分别填写(50),e和f处应分别填写(51)。<br> <img src=\"https://image.chaiding.com/ruankao/e5a6836e0c0b11733279701348dec61a.jpg?x-oss-process=style/ruankaodaren\" width=\"600\" height=\"172\" title=\"\" align=\"\" alt=\"\">","analyze":"本题考查操作系统的PV操作。<br> 根据前趋图的特性和选项进行解答。<br> 第一空:如下图所示,在p2的前面是1个P操作,P2的后面是2个V操作,然后根据第一空的选项,可以得到第一空的(a)填P(S1),(b)空填V(S2)V(S3)。<br> 第二空:如下图所示,在P3的后面是两个V操作,在P4的前面是两个p操作,然后根据第二空的选项。<br> 第三空:如下图所示,在P5的后面是1个V操作,P6的前面是两个P操作,但是在题干的图中已经有了P(S6) 。<br> <img src=\"https://image.chaiding.com/ruankao/63f9194447a96b4d5c990ac04698ca9a.jpg?x-oss-process=style/ruankaodaren\" width=\"350\" height=\"159\" title=\"\" align=\"\" alt=\"\">","multi":0,"questionType":1,"answer":"A","chooseItem":["796233949952102401"],"itemList":[{"id":"796233949952102401","questionId":"796233948987412481","content":" P(S1)和V(S2)V(S3)","answer":1,"chooseValue":"A"},{"id":"796233949981462529","questionId":"796233948987412481","content":" V(S1)和P(S2)V(S3)","answer":0,"chooseValue":"B"},{"id":"796233950015016961","questionId":"796233948987412481","content":" P(S1)和P(S2)V(S3)","answer":0,"chooseValue":"C"},{"id":"796233950048571393","questionId":"796233948987412481","content":" V(S1)和V(S2)V(S3)","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233952107974657","title":"<p><strong>请作答第<span style=\"color: red\">2</span>个空。</strong></p>程P1、P2、P3、P4、P5和P6的前趋图如下所示:<br> <img src=\"https://image.chaiding.com/ruankao/03f8eaab06d74871fa94c9aa310583e5.jpg?x-oss-process=style/ruankaodaren\" width=\"350\" height=\"147\" title=\"\" align=\"\" alt=\"\"><br> 若用PV操作控制进程PI、P2、P3、P4、P5和P6并发执行的过程,则需要设置7个信号量S1、S2、S3、S4、S5、S6和S7, 且信号量S1~S7的初值都等于零。如下的进程执行图中,a和b处应分别填写(49);c和 d处应分别填写(50),e和f处应分别填写(51)。<br> <img src=\"https://image.chaiding.com/ruankao/f147e671acf7a92d9f7c0bda5b4a2852.jpg?x-oss-process=style/ruankaodaren\" width=\"600\" height=\"172\" title=\"\" align=\"\" alt=\"\">","analyze":"本题考查操作系统的PV操作。<br> 根据前趋图的特性和选项进行解答。<br> 第一空:如下图所示,在p2的前面是1个P操作,P2的后面是2个V操作,然后根据第一空的选项,可以得到第一空的(a)填P(S1),(b)空填V(S2)V(S3)。<br> 第二空:如下图所示,在P3的后面是两个V操作,在P4的前面是两个p操作,然后根据第二空的选项。<br> 第三空:如下图所示,在P5的后面是1个V操作,P6的前面是两个P操作,但是在题干的图中已经有了P(S6) 。<br> <img src=\"https://image.chaiding.com/ruankao/d4a8d027d53c8413f9964fb1f3765a03.jpg?x-oss-process=style/ruankaodaren\" width=\"350\" height=\"159\" title=\"\" align=\"\" alt=\"\">","multi":0,"questionType":1,"answer":"D","chooseItem":["796233953164939265"],"itemList":[{"id":"796233953106219009","questionId":"796233952107974657","content":" V(S4)和P(S3)P(S4)","answer":0,"chooseValue":"A"},{"id":"796233953127190529","questionId":"796233952107974657","content":" P(S4)和P(S3)P(S4)","answer":0,"chooseValue":"B"},{"id":"796233953143967745","questionId":"796233952107974657","content":" P(S3)和V(S4)V(S5)","answer":0,"chooseValue":"C"},{"id":"796233953164939265","questionId":"796233952107974657","content":" V(S4)V(S5)和P(S3)P(S4)","answer":1,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233955257896961","title":"<p><strong>请作答第<span style=\"color: red\">3</span>个空。</strong></p>程P1、P2、P3、P4、P5和P6的前趋图如下所示:<br> <img src=\"https://image.chaiding.com/ruankao/57ad4ccc2bd7c5f356be90ba845ce343.jpg?x-oss-process=style/ruankaodaren\" width=\"350\" height=\"147\" title=\"\" align=\"\" alt=\"\"><br> 若用PV操作控制进程PI、P2、P3、P4、P5和P6并发执行的过程,则需要设置7个信号量S1、S2、S3、S4、S5、S6和S7, 且信号量S1~S7的初值都等于零。如下的进程执行图中,a和b处应分别填写(49);c和 d处应分别填写(50),e和f处应分别填写(51)。<br> <img src=\"https://image.chaiding.com/ruankao/c91d1f2431acd6b4c76bafe974a8d4b3.jpg?x-oss-process=style/ruankaodaren\" width=\"600\" height=\"172\" title=\"\" align=\"\" alt=\"\">","analyze":"本题考查操作系统的PV操作。<br> 根据前趋图的特性和选项进行解答。<br> 第一空:如下图所示,在p2的前面是1个P操作,P2的后面是2个V操作,然后根据第一空的选项,可以得到第一空的(a)填P(S1),(b)空填V(S2)V(S3)。<br> 第二空:如下图所示,在P3的后面是两个V操作,在P4的前面是两个p操作,然后根据第二空的选项。<br> 第三空:如下图所示,在P5的后面是1个V操作,P6的前面是两个P操作,但是在题干的图中已经有了P(S6) 。<br> <img src=\"https://image.chaiding.com/ruankao/5d9dbdb8d722c2ebff2dd9bdccf6657b.jpg?x-oss-process=style/ruankaodaren\" width=\"350\" height=\"159\" title=\"\" align=\"\" alt=\"\">","multi":0,"questionType":1,"answer":"C","chooseItem":["796233956461662209"],"itemList":[{"id":"796233956398747649","questionId":"796233955257896961","content":" P(S6)和V(S7)","answer":0,"chooseValue":"A"},{"id":"796233956432302081","questionId":"796233955257896961","content":" V(S6)和P(S6)","answer":0,"chooseValue":"B"},{"id":"796233956461662209","questionId":"796233955257896961","content":" V(S7)和P(S7)","answer":1,"chooseValue":"C"},{"id":"796233956486828033","questionId":"796233955257896961","content":" V(S6)和V(S7)","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233803243737089","title":"模型驱动的体系结构是一种关注模型的软件设计和实现方法,使用了UML模型的子集描述系统,创建不同抽象层次上的模型,其中不包括( )。","analyze":"模型驱动的体系结构是一种关注模型的软件设计和实现方法,它使用了UML模型的子集来描述系统,并创建不同抽象层次上的模型,其中包括计算无关模型和平台无关模型。计算无关模型描述了系统的结构和行为,而不考虑任何具体的执行平台,因此选项A正确。平台无关模型则进一步确定了系统的实现细节,但仍然不依赖于特定的执行平台,因此选项C正确。相反,平台相关模型则考虑了系统的实现细节,如硬件架构、操作系统、编程语言等,并且通常与特定的执行平台直接相关,因此选项D也是正确的。因此,唯一不属于模型驱动的体系结构的选项是B,即计算相关模型。","multi":0,"questionType":1,"answer":"B","chooseItem":["796233804204232705"],"itemList":[{"id":"796233804195844097","questionId":"796233803243737089","content":" 计算无关模型","answer":0,"chooseValue":"A"},{"id":"796233804204232705","questionId":"796233803243737089","content":" 计算相关模型","answer":1,"chooseValue":"B"},{"id":"796233804216815617","questionId":"796233803243737089","content":" 平台无关模型","answer":0,"chooseValue":"C"},{"id":"796233804225204225","questionId":"796233803243737089","content":" 平台相关模型","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233933753700353","title":"<p><strong>请作答第<span style=\"color: red\">2</span>个空。</strong></p>给定关系模式R(U,F),U={A<sub>1</sub>,A<sub>2</sub>,A<span style=\"font-size:10px;\"><sub>3</sub></span>,A<sub>4</sub>}, F={A<sub>1</sub>→A<sub>2</sub>A<sub>3</sub>, A<sub>2</sub>A<sub>3</sub>→A<sub>4</sub><span></span>},那么在关系R中(43)。以下说法错误的是(44)。","analyze":"根据函数依赖的推导规则可知,对于关系模式R(U,F),如果X→Y,则XY也是候选关键字。因此,要找出R中的候选关键字,需要判断每个属性组合是否能够唯一地确定一条记录。\n<br>\n根据题意,我们有U={A1,A2,A3,A4},F={A1→A2A3, A2A3→A4},现在来分析每个属性组合:\n<br>\n{A1}:由于A1→A2A3,因此{A1}+={A1,A2,A3},且{A1,A2,A3}能唯一地确定记录。因此,{A1}是一个候选关键字。<br>\n{A2,A3}:由于A1→A2A3,因此{A2,A3}+={A1,A2,A3},且{A1,A2,A3}能唯一地确定记录。因此,{A2,A3}是一个候选关键字。<br>\n{A2,A4}:由于A1→A2A3,但A2、A4之间没有函数依赖关系,因此{A2,A4}不能唯一地确定记录,不是候选关键字。<br>\n{A3,A4}:与{A2,A4}的情况类似,{A3,A4}也不是候选关键字。<br>\n因此,R中只有一个候选关键字,即{A1}。选项 A 是正确答案。\n\n根据函数依赖“A2A3→A4”可以推导出“A2→A4”和“A3→A4”,但是反过来则不成立,不能通过已知的函数依赖推导出“A2A3→A4”。\n<br>\n因此,答案是 C。\n","multi":0,"questionType":1,"answer":"C","chooseItem":["796233934756139009"],"itemList":[{"id":"796233934722584577","questionId":"796233933753700353","content":" 根据F中“A<sub>1</sub>→A<sub>2</sub>A<sub>3</sub>”,可以得出“A<sub>1</sub>→A<sub>2</sub>”","answer":0,"chooseValue":"A"},{"id":"796233934739361793","questionId":"796233933753700353","content":" 根据F中“A<sub>1</sub>→A<sub>2</sub>A<sub>3</sub>”,可以得出“A<sub>1</sub>→A<sub>3</sub>”","answer":0,"chooseValue":"B"},{"id":"796233934756139009","questionId":"796233933753700353","content":" 根据F中“A<sub>2</sub>A<sub>3</sub>→A<sub>4</sub><span></span>”,可以得出“A<sub>2</sub>→A<sub>4</sub><span></span>,A<sub>3</sub>→A<sub>4</sub><span></span>”","answer":1,"chooseValue":"C"},{"id":"796233934777110529","questionId":"796233933753700353","content":" 根据F中“A<sub>1</sub>→A<sub>2</sub>A<sub>3</sub>,A<sub>2</sub>A<sub>3</sub>→A<sub>4</sub><span></span>”,可以得出“A<sub>1</sub>→A<sub>4</sub><span></span>”","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233930633138177","title":"<p><strong>请作答第<span style=\"color: red\">1</span>个空。</strong></p>给定关系模式R(U,F),U={A<sub>1</sub>,A<sub>2</sub>,A<sub>3</sub>,A<sub>4</sub>}, F={A<sub>1</sub>→A<sub>2</sub>A<sub>3</sub>, A<sub>2</sub>A<sub>3</sub>→A<sub>4</sub>},那么在关系R中(43)。以下说法错误的是(44)。","analyze":"根据函数依赖的推导规则可知,对于关系模式R(U,F),如果X→Y,则XY也是候选关键字。因此,要找出R中的候选关键字,需要判断每个属性组合是否能够唯一地确定一条记录。\n<br>\n根据题意,我们有U={A1,A2,A3,A4},F={A1→A2A3, A2A3→A4},现在来分析每个属性组合:\n<br>\n{A1}:由于A1→A2A3,因此{A1}+={A1,A2,A3},且{A1,A2,A3}能唯一地确定记录。因此,{A1}是一个候选关键字。<br>\n{A2,A3}:由于A1→A2A3,因此{A2,A3}+={A1,A2,A3},且{A1,A2,A3}能唯一地确定记录。因此,{A2,A3}是一个候选关键字。<br>\n{A2,A4}:由于A1→A2A3,但A2、A4之间没有函数依赖关系,因此{A2,A4}不能唯一地确定记录,不是候选关键字。<br>\n{A3,A4}:与{A2,A4}的情况类似,{A3,A4}也不是候选关键字。<br>\n因此,R中只有一个候选关键字,即{A1}。选项 A 是正确答案。<br><br><br>\n\n根据函数依赖“A2A3→A4”可以推导出“A2→A4”和“A3→A4”,但是反过来则不成立,不能通过已知的函数依赖推导出“A2A3→A4”。\n<br>\n因此,答案是 C。\n","multi":0,"questionType":1,"answer":"A","chooseItem":["796233931711074305"],"itemList":[{"id":"796233931711074305","questionId":"796233930633138177","content":" 有1个候选关键字A<sub>1</sub>","answer":1,"chooseValue":"A"},{"id":"796233931727851521","questionId":"796233930633138177","content":" 有1个候选关键字A<sub>2</sub><span></span>A<sub>3</sub><span></span>","answer":0,"chooseValue":"B"},{"id":"796233931748823041","questionId":"796233930633138177","content":" 有2个候选关键字A<sub>2</sub><span></span>和A<sub>3</sub><span></span>","answer":0,"chooseValue":"C"},{"id":"796233931769794561","questionId":"796233930633138177","content":" 有2个候选关键字A<sub>1</sub><span></span>和A<sub>3</sub><span></span>","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796235491916664833","title":"试题四(25分)<br>\n阅读下列说明,回答问题1至问题3,将解答填入答题纸的对应栏内。<br>\n【说明】<br>\n某大型电商平台构建了一个在线B2B商店系统。该系统采用微服务架构,将系统功能分解为多个松散耦合且可独立部署的较小组件或服务。最终设计的系统包括了电商系统中常见的服务:客户服务、订单服务、支付服务等,其中:<br>\n1、客户服务负责对客户相关的信息进行管理和维护;<br>\n2、订单服务负责对订单信息的管理和维护;<br>\n3、支付服务负责对在线支付功能和信息的管理和维护等。<br>\n为了确保微服务之间的松耦合,每个服务都有自己的数据,其中,订单服务使用了 NoSQL 数据库,客户服务和支付服务使用了关系数据库。<br>\n李工认为由于不同服务使用了各自的不同数据库,使得跨服务操作可能存在数据不一致。比如订单与支付的数据一致性问题,系统通过订单服务在本地 NoSQL 数据库中创建订单记录,同时在支付服务的关系数据库中创建支付记录,且必须保证订单记录和支付记录的一致性,该问题在系统构建时需要考虑。\n<br><br>\n【问题1】(7分)<br>\n李工建议采用两阶段提交协议(2PC)来解决服务数据的一致性问题。请用200字以内的文字简要说明2PC;说明2PC是否能解决该问题,并简要解释原因。\n<br><br>\n【问题2】(8分)<br>\n王工建议采用分布式数据管理方案,用事件驱动架构来解决服务数据的一致性问题,在订单服务和支付服务之间通过可靠的消息队列实现事件的传递,其基本操作步骤如下,请填写其中的空白处。<br>\n(1)订单服务接收订购请求,创建一个订单,该记录状态为(a),发布一个“创建订单”事件;<br>\n(2)(b)接收“创建订单”事件,记录(c),发布一个“支付完成”事件;<br>\n(3)订单服务接收“支付完成”事件,修改订单记录状态为(d)。\n<br><br>\n【问题3】(10分)<br>\n李工提出王工的方案会有数据库更新和发布事件的原子性问题,例如订单服务创建订单记录和发布“创建订单”事件需要原子性保障,否则会出现数据不一致状态。<br>\n王工认为可以使用本地事务发布事件的方法来解决该问题。请给出使用本地事务发布事件的基本方法,并说明该方法的缺点。","analyze":"【问题1】<br>\n1、两阶段提交协议2PC经常用来管理分布式事务。<br>\n(1)2PC包含协调者和参与者两类站点,只有协调者才拥有提交或撤销事务的决定权,而其他参与者各自负责在其本地数据库中执行写操作,并向协调者提出撤销或提交事务的意向。<br>\n(2)2PC分为两个阶段:表决阶段和执行阶段。<br>\n①表决阶段,目的是形成一个共同的决定。协调者给所有参与者发送“准备提交”消息,并进入等待状态,所有参与者给与回复“建议提交”或“建议撤销”。只要有一个结点选择撤销,则整体事务撤销,否则,执行该事务。<br>\n②执行阶段,目的是实现这个协调者的决定。根据协调者的指令,参与者或者提交事务,或者撤销事务,并给协调者发送确认消息。<br>\n2、两阶段提交协议2PC不能解决当前问题。<br>\n(1)分布式数据库遵循的是CAP原则,会在一定程度上牺牲一致性。<br>\n(2)大多数NoSQL数据库并不支持2PC。<br>\n(3)分布式两阶段提交协议2PC一般针对的对象在逻辑上是一个整体,对某一个整体事务需要在多个物理节点上执行时,进行表决和执行,对多个数据库的不同服务并不是很合适。\n<br><br>\n【问题2】<br>\n(a)未支付<br>\n(b)支付服务<br>\n(c)支付信息<br>\n(d)已支付\n<br><br>\n【问题3】<br>\n使用本地事务发布事件:<br>\n由一个独立进程来发布事件。具体来说,就是在存储业务实体状态的数据库中,使用一个事件表来充当消息队列。应用启动一个(本地)数据库事务,更新业务实体的状态,在事件表中插入一个事件,并提交该事务。一个独立的消息发布线程或进程查询该事件表,将事件发布到消息代理,并标注该事件为已发布。<br>\n缺点:<br>\n由于开发者必须牢记发布事件,因此有很大可能出错。此外这一方法对于某些使用NoSQL数据库的应用是个挑战,因为NoSQL本身交易和查询能力有限。","multi":0,"questionType":2,"answer":"","chooseItem":null,"itemList":null,"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233898135670785","title":"<p><strong>请作答第<span style=\"color: red\">1</span>个空。</strong></p>结构化设计 (Structured Design, SD)是一种面向数据流的方法,可进一步细分为(33)两个阶段,它根据(34)和系统结构准则,将DFD转换为系统结构图,用系统结构图来建立系统的物理模型,描述系统分层次的模块结构,以及模块之间的通信与控制关系。","analyze":"SD可以进一步细分为概要设计和详细设计两个阶段,它根据模块独立性原则和系统结构准则,将DFD转换为系统结构图(也称为模块结构图或控制结构图),用系统结构图来建立系统的物理模型,描述系统分层次的模块结构,以及模块之间的通信与控制关系。SD方法给出了一组帮助系统设计人员在模块层次上区分设计质量的原理与技术,它通常与SA方法衔接起来使用,以DFD为基础得到系统的模块结构。SD方法尤其适用于变换型结构和事务型结构的目标系统。","multi":0,"questionType":1,"answer":"A","chooseItem":["796233899201024001"],"itemList":[{"id":"796233899201024001","questionId":"796233898135670785","content":" 概要设计和详细设计","answer":1,"chooseValue":"A"},{"id":"796233899251355649","questionId":"796233898135670785","content":" 数据库设计和架构设计","answer":0,"chooseValue":"B"},{"id":"796233899293298689","questionId":"796233898135670785","content":" 概要设计和架构设计","answer":0,"chooseValue":"C"},{"id":"796233899310075905","questionId":"796233898135670785","content":" 模块设计和数据设计","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233901247844353","title":"<p><strong>请作答第<span style=\"color: red\">2</span>个空。</strong></p>结构化设计 (Structured Design, SD)是一种面向数据流的方法,可进一步细分为(33)两个阶段,它根据(34)和系统结构准则,将DFD转换为系统结构图,用系统结构图来建立系统的物理模型,描述系统分层次的模块结构,以及模块之间的通信与控制关系。","analyze":"SD可以进一步细分为概要设计和详细设计两个阶段,它根据模块独立性原则和系统结构准则,将DFD转换为系统结构图(也称为模块结构图或控制结构图),用系统结构图来建立系统的物理模型,描述系统分层次的模块结构,以及模块之间的通信与控制关系。SD方法给出了一组帮助系统设计人员在模块层次上区分设计质量的原理与技术,它通常与SA方法衔接起来使用,以DFD为基础得到系统的模块结构。SD方法尤其适用于变换型结构和事务型结构的目标系统。","multi":0,"questionType":1,"answer":"B","chooseItem":["796233902233505793"],"itemList":[{"id":"796233902204145665","questionId":"796233901247844353","content":" 模块耦合性原则","answer":0,"chooseValue":"A"},{"id":"796233902233505793","questionId":"796233901247844353","content":" 模块独立性原则","answer":1,"chooseValue":"B"},{"id":"796233902267060225","questionId":"796233901247844353","content":" 自顶向下原则","answer":0,"chooseValue":"C"},{"id":"796233902296420353","questionId":"796233901247844353","content":" 自底向上原则","answer":0,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233923431518209","title":"高校信息系统采用分布式数据库系统,该系统中“当某一场地故障时,系统可以使用其它场地上的副本而不至于使整个系统瘫痪”和“数据在不同场地上的存储”分别称为分布式数据库的()。","analyze":"高校信息系统采用分布式数据库系统,其中“当某一场地故障时,系统可以使用其它场地上的副本而不至于使整个系统瘫痪”是指分布式数据库系统的容错性,而“数据在不同场地上的存储”则是指分布式数据库系统的分布性。因此,选项D. 可用性和分布性 是正确的。共享性和分布性不是分布式数据库系统的特征,自治性和可用性虽然是分布式数据库系统的属性之一,但并不能完全概括题目中所述内容。","multi":0,"questionType":1,"answer":"D","chooseItem":["796233924526231553"],"itemList":[{"id":"796233924425568257","questionId":"796233923431518209","content":" 共享性和分布性","answer":0,"chooseValue":"A"},{"id":"796233924467511297","questionId":"796233923431518209","content":" 自治性和分布性","answer":0,"chooseValue":"B"},{"id":"796233924501065729","questionId":"796233923431518209","content":" 自治性和可用性","answer":0,"chooseValue":"C"},{"id":"796233924526231553","questionId":"796233923431518209","content":" 可用性和分布性","answer":1,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null},{"id":"796233796767731713","title":"( )是从系统的应用领域而不是从系统用户的特定需要中得出的,它们可以是新的功能性需求,或者是对已有功能性需求的约束,或者是陈述特定的计算必须遵守的要求。","analyze":"领域需求是从系统的应用领域而不是从系统用户的特定需求中得出的。它们可以自身就是新的功能性需求、对于已有的功能性需求的约束,或者陈述特定的计算机必须如何进行。","multi":0,"questionType":1,"answer":"D","chooseItem":["796233797703061505"],"itemList":[{"id":"796233797656924161","questionId":"796233796767731713","content":" 功能性需求","answer":0,"chooseValue":"A"},{"id":"796233797669507073","questionId":"796233796767731713","content":" 用户需求","answer":0,"chooseValue":"B"},{"id":"796233797690478593","questionId":"796233796767731713","content":" 产品需求","answer":0,"chooseValue":"C"},{"id":"796233797703061505","questionId":"796233796767731713","content":" 领域需求","answer":1,"chooseValue":"D"}],"userAnswer":null,"userChooseItem":null,"answerCorrect":null,"userCollect":null}]}}