Which of the following tactic can be used to achieve the Usability?
A: Checkpoint/rollback
B: Built-in monitors
C: Maintain a model of the system
D: Bound execution times
A: Checkpoint/rollback
B: Built-in monitors
C: Maintain a model of the system
D: Bound execution times
举一反三
- Which of the following tactic can be used to achieve the Modifiability? A: Process monitor B: Authenticate users C: Semantic coherence D: Built-in monitors
- Which of the following tactic can be used to achieve the Performance? A: Introduce concurrency B: Limit exposure C: Separate interface from implementation D: Exception
- Which of the following tactic can be used to achieve the Security? A: Control frequency of sampling B: Limit exposure C: Reduce computational overhead D: Manage event rate
- Which of the following statistics and procedures can be used to determine whether a linear model should be employed?
- Which of the following functions can a timer in a computer system be used to achieve? A: Generate interrupt signal regularly B: Measuring the frequency of external periodic signals C: Generate periodic pulse signals D: Generate periodic sine wave