首页/ 题库 / [单选题]

A company that m的答案

A company that makes Computer Assisted Design (CAD) software has, within its application, some utility classes that are used to perform 3D rendering tasks. The company's chief scientist has just improved the performance of one of the utility classes' key rendering algorithms, and has assigned a programmer to replace the old algorithm with the new algorithm. When the programmer begins researching the utility classes, she is happy to discover that the algorithm to be replaced exists in only one class. The programmer reviews that class's API, and replaces the old algorithm with the new algorithm, being careful that her changes adhere strictly to the class's API. Once testing has begun, the programmer discovers that other classes that use the class she changed are no longer working properly.
What design flaw is most likely the cause of these new bugs?()

单选题
2022-01-03 01:48
A、Inheritance
B、Tight coupling
C、Low cohesion
D、High cohesion
E、Loose coupling
F、Object immutability
查看答案

正确答案
B

试题解析

标签: 1z0-851
感兴趣题目
A(72)translates a computer program written in a human-readable computer language into a form. that a computer can exec ut
A(74)translates a computer program written in a human-readable computer language into a form. that a computer can executabl
●A computer virus is a computer program that is created to make and spread (72) of itself.
●A computer virus is a computer program that is created to make and spread (72) of itself.
● A(75) is a device that enables data from one computer to travel to another computer by using telephone lines.

I’m writing to ________ a position as a computer engineer in your company. 

Password is a(n)(71)series of characters that enables a user(72)a file, computer or program. On multi - user systems,(73)user must enter his or her password(74)the computer will respond to commands. The password helps ensure that unauthorized users do not access the computer. In addition, data files and programs may require a password.Ideally, the password should be something(75)could guess. In practice, most people choose a password that is easy to remember, such as their name or their initials. This is one reason it is relatively easy to break into most computer system.
Password is a secret series of(73) that enables a user to access a file, computer, or program. On multi-user systems, each user must enter his or her password before the computer will respond to(74). The password helps ensure that(75) users do not access the computer. In addition, data files and programs may require a password.
()is a computer technology that headsets,sometimes in combination with physical spaces or multi-projected environments,to generate realisitic images,sounds and other sensations that simulate a user’s physical presence in a virtual or imaginary environment.
A(68)copies a photograph,drawing or page of text into the computer.
You work as a network exchange administrator at Company.com.the Company.com network currently consists of a single active directory forest named Company.com which makes use of microsoft windows server 2008.The Company.com organization makes use of Microsoft exchange server 2010 as their messaging solution.The Company.com organization contains a computer named -ex01 which runs the hub transport server role.During the course of the day - ex01 fails and you delete the computer account with references of ex01 from active directory.Company.com has recently requested that you replace the hub transport server role on a new computer whilst ensuring you use the least amount of administrative effort.What should you do?()

All client computers in your company run Windows 7 Enterprise. Each client computer runs one guest virtual machine (VM) in Windows Virtual PC .
A user reports that a supported USB device connected to his client computer does not appear in the guest VM. The USB device functions correctly on the client computer.
You need to ensure that the USB device can be installed in the guest VM.
What should you do?()

相关题目

When a company needs to         new people, it may advertise the job in a newspaper or on a website.

I’m writing to ________ a position as a computer engineer in your company. 

—You mean... like becoming a publicly-traded company?
—That's right. ______________ .

The change in connectivity that uses the Internet and the Web to shift many computer activities from a user’s computer to computers on the Internet.

Computer software, or just software is a general term used to describe a collection of computer programs, procedures and documentation that perform some tasks on a computer system. The term includes: .

Before you turn the power on with a new computer, you should make sure .

A rectangular area that can contain a document, program, or message.

In a computer system, these records that are logically contiguous in one applications must be physically stored together.

A utility program that makes copies of files to be used in case the originals are lost or damaged.

To ( )the CEO( )ome of his work, the company decided to find for him two assis-tants. 选项
Frank: Hey, John. What makes you so happy?John: You know what. I've just got a new job with a computer company.Frank: _________!
A(71) is a device that enables the computer to handle sounds.
A (74) is a device that enables the computer to handle sounds.
● A (74) is a device that enables the computer to handle sounds.(74)
, the brains of a computer, it contains the ALU, the clock, many registers, the bus interface, and circuitry that makes these pans work together.
The reason for making a decision is that a problem exists, or something is standing ______the way of accomplishing them.
______means that a program written for one computer system can be compiled and run on another system with little or no modification.
● (71) means that a program written for one computer system can be compiled and run on another system with little or no modification.(71)
Virus Security Software is designed to detect, eliminate or quarantine computer viruses before they are able to harm a computer or server networked system.
A(n) ______ is a destructive program that fills a computer system with self-replicating information,clogging the system so that its operations are slowed or stopped.
广告位招租WX:84302438

免费的网站请分享给朋友吧