Which of the following tactic can be used to achieve the Security?
A: Control frequency of sampling
B: Limit exposure
C: Reduce computational overhead
D: Manage event rate
A: Control frequency of sampling
B: Limit exposure
C: Reduce computational overhead
D: Manage event rate
举一反三
- Which of the following tactic can be used to achieve the Performance? A: Introduce concurrency B: Limit exposure C: Separate interface from implementation D: Exception
- Which of the following tactic can be used to achieve the Modifiability? A: Process monitor B: Authenticate users C: Semantic coherence D: Built-in monitors
- Which of the following tactic can be used to achieve the Usability? A: Checkpoint/rollback B: Built-in monitors C: Maintain a model of the system D: Bound execution times
- Which one of the following will increase the maximum internal rate of growth a corporation can achieve?
- Which<br/>of the following can be used as the Y-axis of the bar chart? () A: frequency B: relative<br/>frequency C: relative<br/>frequency density D: values<br/>of a variable