Which of the following tactic can be used to achieve the Performance?
A: Introduce concurrency
B: Limit exposure
C: Separate interface from implementation
D: Exception
A: Introduce concurrency
B: Limit exposure
C: Separate interface from implementation
D: Exception
举一反三
- Which of the following tactic can be used to achieve the Security? A: Control frequency of sampling B: Limit exposure C: Reduce computational overhead D: Manage event rate
- Which of the following tactic can be used to achieve the Modifiability? A: Process monitor B: Authenticate users C: Semantic coherence D: Built-in monitors
- Which of the following tactic can be used to achieve the Usability? A: Checkpoint/rollback B: Built-in monitors C: Maintain a model of the system D: Bound execution times
- Which of the following expressions can be used to elicit opinions from others?
- Which of the following functions can be used to calculate[img=111x49]17de94b2f4f00a5.png[/img] A: diff B: integral C: int D: limit