单选

● 利用 (67) 可以对软件的技术信息、经营信息提供保护。

(67)

  • A. 著作权
  • B. 专利权
  • C. 商业秘密权
  • D. 商标权
参考答案
您可能感兴趣的试题

● Information systems design is defined as those tasks that focus on the specification of a detailed computer-based solution. Typically, there are four systems design tasks for in-house development. 

1) The first task is to specify (71) , which defines the technologies to be used by one, more, or all information systems in terms of their data, processes, interfaces, and network components. This task is accomplished by analyzing the data models and process models that are initially created during requirements analysis.

2) The next systems design task is to develop the (72) . The purpose of this task is to prepare technical design specifications for a database that will be adaptable to future requirements and expansion.

3) Once the database prototype has been built, the systems designer can work closely with system users to develop input, output and dialogue specifications. The (73) must be specified to ensure that the outputs are not lost, misrouted, misused, or incomplete.

4) The fourth design task involves packaging all the specifications from the previous design tasks into a set of specifications that will guide the (74) activities during the following phases of the systems development methodology.

Finally, we should (75) and update the project plan accordingly. The key deliverable should include a detailed plan for the construction phase that should follow.

(71)

  • A. an application architecture
  • B. a distributed system
  • C. a system scope
  • D. a system physical model     (72)
  • A. database design specifications
  • B. database organization decisions
  • C. data structure specifications
  • D. data distribution decisions    (73)
  • A. format and layout
  • B. transaction details

● 甲公司的某个注册商标是乙画家创作的绘画作品,甲申请该商标注册时未经乙的许可,乙认为其著作权受到侵害。在乙可采取的以下做法中,错误的是 (66) 。

(66)

  • A. 向甲公司所在地人民法院提起著作权侵权诉讼
  • B. 请求商标评审委员会裁定撤销甲的注册商标
  • C. 首先提起诉讼,如对法院判决不服再请求商标评审委员会进行裁定
  • D. 与甲交涉,采取许可方式让甲继续使用该注册商标

● 在网络管理中要防止各种安全威胁。在SNMP v3中,无法预防的安全威胁是 (64) 。

(64)

  • A. 篡改管理信息:通过改变传输中的SNMP报文实施未经授权的管理操作   
  • B. 通信分析:第三者分析管理实体之间的通信规律,从而获取管理信息
  • C. 假冒合法用户:未经授权的用户冒充授权用户,企图实施管理操作   
  • D. 消息泄露:SNMP引擎之间交换的信息被第三者偷听

● 软件质量属性通常需要采用特定的设计策略实现。例如, (58) 设计策略能提高该系统的可用性, (59) 设计策略能够提高该系统的性能, (60) 设计策略能够提高该系统的安全性。

(58)

  • A. 心跳机制
  • B. 数据驱动
  • C. 关注点分离
  • D. 信息隐藏    (59)
  • A. 引入中间层
  • B. 事务机制
  • C. 主动冗余
  • D. 优先级队列    (60)
  • A. 信息隐藏
  • B. 内置监控器
¥

订单号:

遇到问题请联系在线客服

订单号:

遇到问题请联系在线客服