plan
requirement
implementation
design
第1题:
A(68)is a feature of the system or adescription of something the system is capable of doing in order to fulfill the system's purpose.
A.plan
B.requirement
C.document
D.Design
第2题:
The purpose of systems analysis phase is to build a logical model of the new system. The first step is( ), where you investigate business processes and document what the new system must do to satisfy users. This step continues the investigation that began during the( ). You use the fact-finding results to build business models, data and process models, and object models. The deliverable for the systems analysis phase is the( ), which describes management and user requirements, costs and benefits, and outlines alternative development strategies. The purpose of the systems design phase is to create a physical model that will satisfy all documented requirements for the system. During the systems design phase, you need to determine the( ), which programmers will use to transform the logical design into program modules and code. The deliverable for this phase is the( ), which is presented to management and users for review and approval.
A.System logical modelingB.use case modelingC.requirements modelingD.application modeling A.systems planning phaseB.systems modeling phaseC.systems analysis phaseD.systems design phase A.system charterB.system scope definitionC.system blueprintD.system requirement document A.application architectureB.system data modelC.system process modelD.implement environment A.system architecture descriptionB.system design specificationC.system technique architectureD.physical deployment architecture
第3题:
Text 3 The first big-name hackers include Steve Wozniak, Bill Gates and Linus Torvalds, all now highly recognizable names behind many of the computer technologies used today. These early hackers had a love of technology and a compelling need to know how it all worked, and their goal was to push programs beyond what they were designed to do. Back then, the word "hacker" didn't have the negative connotation it has today. The original hacker ethic, rooted out of simple curiosity and a need to be challenged, appears to be dead.
The objectives of early hackers are a far cry from the goals of today's hacker. The motivation of the new breed of hackers appears not to be curiosity, or a hunger for knowledge, as it used to be. Instead, most of today's hackers are driven by greed, power, revenge, or some other malicious intent, treating hacking as a game or sport, employing the tools that are readily available via the Internet.
The rate of security attacks is actually outpacing the growth of the Internet. This means that something besides the growth of the Internet is driving the rise in security attacks. Here are some realities you should know about: Operating systems and applications will never be secure. New vulnerabilities will be introduced into your environment every day. And even if you ever do get one operating system secure, there will be new operating systems with new vulnerabilities—phones, wireless devices, and network appliances. Employees will never keep up with security polices and awareness. It doesn't matter how much you train and educate your employees. If your employees disregard warnings about the hazards of opening questionable email attachments, how are you going to educate them about properly configuring firewalls and intrusion detection systems for their PCs? Managers have more responsibility than ever. And on top of the realities listed above. security managers are being asked to support increasing degrees of network availability and access.
There are some good security measures you can take: Employ a layer 7, full-inspection firewall. Automatically update your anti-virus at the gateway, server and client. Keep all of your systems and applications updated. Hackers commonly break into a Web site through known security holes, so make sure your servers and applications are patched and up to date. Turn off unnecessary network services. Eliminate all unneeded programs. Scan network for common backdoor services—Use intrusion detection systems, vulnerability scans, antivirus protection.
第31题:Which of the following statements of Steve Wozniak, Bill Gates and Linus Torvalds is TRUE?
[A] They are all good examples of today's computer users.
[B] They are driven by greed, power, revenge, or some other malicious intent.
[C] Their goal is to push programs beyond what they are designed to do.
[D] They are all dead.
第4题:
第5题:
第6题:
第7题:
第8题:
Most Computer operating systems in use today, including all consumer-targeted systems, include a TCP/IP().
第9题:
A manufacturing business is presently supporting multiple UNIX platforms and considering the advantages of consolidating environments, adding new applications and standardizing on HP-UX with IA-64. Which advantage should be communicated as the most compelling reason to consider pSeries as the platform of choice?()
第10题:
You need to recommend a configuration design for the new VMs. The design must ensure that operating systems can be deployed to the new VMs. What should you include in the recommendation?()
第11题:
a synthetic network adapter
an emulated network adapter
virtual machine queue (VMQ)
Virtual Machine Chimney
第12题:
virtual machine queue (VMQ)
Virtual Machine Chimney
a synthetic network adapter
an emulated network adapter
第13题:
Most operating systems have a standard set of () to handle the processing of all input and output instructions.
A.spreadsheet
B.control instructions
C.I/O operation
D.data table
第14题:
Operating systems provide ( ) between users and the computer.
A.a link
B.an interface
C.devices
D.applications
第15题:
The underlined word \\\"hacker\\\" (Para. 1) most probably means \\\"________\\\".
[A] highly recognizable names behind many of the computer technologies used today
[B] the negative connotation of those computer users
[C] a game, employing the tools that are readily available via the Internet
[D] people who break into computer systems
第16题:
第17题:
第18题:
第19题:
第20题:
Which of the following is the MOST important step in any disaster recovery plan?()
第21题:
You are designing a plan for maintaining the WINS infrastructure on the new Windows Server 2003 Active Directory environment. Which factor or factors necessitate the need to maintain the WINS infrastructure?()
第22题:
Appropriate use of backup media and offsite storage
The disaster recovery testing process过程
Classifying systems according to operational impact
Use appropriate fire suppressant systems
第23题:
plan
requirement
implementation
design
第24题:
The pSeries family of servers offers many choices from small entry servers to data-center class systems
pSeries systems support both AIX and Linux operating systems providing a single platform for both environments
AIX contains the tools and utilities necessary to convert all their UNIX software onto a single pSeries server
Thousands of AIX operating system-based applications, middleware, and tools are available today and already optimized