The architecture design specifies the overall architecture and the placement of software and hardware that will be used. Architecture design is a very complex process that is often left to experience

题目
The architecture design specifies the overall architecture and the placement of software and hardware that will be used. Architecture design is a very complex process that is often left to experienced architecture designers and consultants. The first step is to refine the () into more detailed requirements that are then employed to help select the architecture to be used and the software components to be placed on each device. In a (), one also has to decide whether to use a two-tier, three-tier, or n-tier architecture. Then the requirements and the architecturedesign are used to develop the hardware and software specification. There are four primary types of nonfunctional requirements that can be important in designing the architecture. () specify the operating environment(s) in which the system must perform and how those may change over time. () focus on the nonfunctional requirements issues such as response time, capacity, and reliability. (请作答此空 ) are the abilities to protect the information system from disruption and data loss, whether caused by an intentional act. Cultural and political requirements are specific to the countries in which the system will be used.

A. Safety requirements
安全要求
B. Security requirements
安全要求
C. Data management requirements
数据管理要求
D. System requirements
系统要求
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

In software engineering the design phase is divided into( )。

A.system design and detailed designB.computer design and program designC.system design and hardware designD.computer design and detailed design


正确答案:A

第2题:

Computer( )focuses on protecting information ,hardware ,and software from unauthorized use and damage.

A.network B.virus C.security D.architecture


正确答案:C

第3题:

试题(71)~(75)

The software architecture is a set of software components, subsystems, relationships, interactions, the properties of each of these elements, and the set of guiding principles that together constitute the fundamental properties and constraints of a software system or set of systems. (71) defines a general set of element types and their interactions. The examples include Pipes and Filters, Model-View-Controller, and Reflection. A (72) in software architecture is a representation used to understand or document one or more aspects of a problem or solution. Architecture is usually used in conjunction with many adjunct terms. The (73) defines the key strategies, organization, goals and related processes of the enterprise. At the enterprise level, the (74) may be more of a set of guidelines on how the various software architectures should be constructed consistently across the enterprise. The (75), which describes the high-level set of elements involved in application from a particular domain along with their interactions, is often used to focus on subsystem definition rather than application process level definition.

(71)

A. Architectural pattern

B. Architectural description

C. Architectural view

D. Architectural viewpoint

(72)

A. model

B. domain

C. component

D. subsystem

(73)

A. enterprise architecture

B. technical architecture

C. infrastructure architecture

D. business architecture

(74)

A. enterprise architecture

B. data architecture

C. application architecture

D. information architecture

(75)

A. product-line architecture

B. reference architecture

C. technology architecture

D. infrastructure architecture


正确答案:A,A,D,C,B
参考译文
软件架构是一组软件构件、子系统、关联关系、交互关系以及其中每个元素的特性和一组指导原则,这些共同构成一个软件系统或一组系统的基本特性和约束。架构模式定义了一组通用的元素类型及其交互关系。其中的例子包括Pipes and Filters、MVC和Reflection。软件架构中的模型是一种表现形式,用于从一个或多个方面理解或记录一个问题或解决方案。架构通常会与一些附属词结合起来使用。业务架构定义了企业的关键策略、组织、目标和相关过程。在企业层面,应用架构可能更多的是一组关于应该如何在整个企业一致地构建各种软件架构的指导原则。参考架构描述了源自特定领域的应用涉及的高层元素集合及其交互关系,通常用于关注子系统的定义而不是应用过程级别定义。
参考答案
(71)A  (72)A  (73)D  (74)C  (75)B

第4题:

Computer ( ) focuses on protecting information, hardware, and software from unauthorized use and damage.

A. network
B. vims
C. security
D. architecture

答案:C
解析:
计算机安全性注重保护信息、硬件和软件,防止非授权使用和损坏。

第5题:

Software architecture reconstruction is an interpretive, jnteractive, and iterative process including many activities. ( )involves analyzing a system&39;s existing design and implementation artifacts to construct a model of it. The result is used in the following activities to construct a view of the system. The database construction activity converts the ( ) contained in the view into a standard format for storage in a database. The ( )activity involves defining and manipulating the information stored in database to reconcile, augment, and establish connections between the elements. Reconstruction consists of two primary activities: ( ) and ( ). The former provides a mechanism for the user to manipulate architectural elements, and the latter provides facilities for architecture reconstruction.

A.Reverse engineering B.Information extraction C.Requirements analysis D.Source code analysis A.actors and use cases B.processes and data C.elements and relations D.schemas and tables A.database normalization B.schema definition C.database optimization D.view fusion A.architecture analysis and design B.domain analysis and static modeling C.visualization and interaction D.user requirements modeling A.pattern definition and recognition B.architecture design and implementation C.system architecture modeling D.dynamic modeling and reconstruction


正确答案:B,C,D,C,A

第6题:

The objective of ( )is to determine what parts of the application software will be assigned to what hardware.The major software components of the system being developed have to be identified and then allocated to the various hardware components on which the system will operate. All software systems can be divided into four basic functions. The first is( ). Most information systems require data to be stored and retrieved,whether a small file,such as a memo produced by a word processor,or a large database,such as one that stores an organization’s accounting records. The second function is the ( ),the processing required to access data,which often means database queries in Structured Query Language. The third function is the ( ),which is the logic documented in the DFDs,use cases,and functional requirements.The fourth function is the presentation logic,the display of information to the user and the acceptance of the user’s commands.The three primary hardware components of a system are ( ).

A.architecture design B.modular design C.physical design D.distribution design A.data access components B.database management system C.data storage D.data entities A.data persistence B.data access objects C.database connection D.dataaccess logic A.system requirements B.system architecture C.application logic D.application program A.computers,cables and network B.clients,servers,and network C.CPUs,memories and I/O devices D.CPUs,hard disks and I/O devices


正确答案:A,C,D,C,B

第7题:

Computer ( ) focuses on protecting information,hardware,and software,and software from unauthorized use and damade.

A.network B.virus C.security D.architecture


正确答案:C

第8题:

An application architecture specifies the technologies to be used to implement one or more information systems. It serves as an outline for detailed design, construction, and implementation. Given the models and details, include( ), we can distribute data and processes to create a general design of application architecture. The design will normally be constrained by architecture standards, project objectives, and ( ). The first physical DFD to be drawn is the( ). The next step is to distribute data stores to different processors. Data( ) are two types of distributed data which most RDBMSs support. There are many distribution options used in data distribution. In the case of ( )we should record each table as a data store on the physical DFD and connect each to the appropriate server.

A.logical DFDs and ERDB.ideal object model and analysis class modelC.use case models and interface prototypesD.physical DFDs and database schemaA.the database management systemB.the feasibility of techniques usedC.the network topology and technologyD.the user interface and process methodsA.context DFDB.system DFDC.network architecture DFDD.event-response DFDA.vertical partitioning and horizontal replicationB.vertical replication and horizontal partitioningC.integration and distributionD.partitioning and replicationA.storing all data on a single serverB.storing specific tables on different serversC.storing subsets of specific tables on different serversD.duplicating specific tables or subsets on different servers


正确答案:A,B,C,D,B

第9题:

Computer ( ) focuses on protecting information, hardware, and software from unauthorized use and damage.

A.network
B.vims
C.security
D.architecture

答案:C
解析:
计算机安全性注重保护信息、硬件和软件,防止非授权使用和损坏。

第10题:

Computer______focuses on protecting information,hardware,and software from unauthorized use and damage.

A.network
B.virus
C.security
D.architecture

答案:C
解析:

更多相关问题