2008 1 1 A. B. C. D. UML 2 3 2 A. B. C. D. 3 A. B. C. D. UML 4 5 4 A. B. C. D. 5 A. B. C. D. 6 6 A. DES B. RC-5 C. IDEA D. RSA 7 7 A. B. C. D. TCP/IP SSL(Security Socket Layer) 8 8 A. B. C. D. 9 9 A. SET B. SHTTP C. PGP D. MOSS GJB 10 PSD PAD 11 10 A B C D 11 A B C D PC PC 12 12 A B C PC D DSS 13
13 A DSS B DSS C DSS D DSS 14 15 14 A. B. C. CPU D. 15 A B Cache C Cache D L0 L1 L2 Cache 16 SMP 17 16 A B. C D 17 A B. C D 18 18 A B - C - D - 19 19 A. B. C. D. RAD 20 21 22 20 A. B. C. D. 21 A. B. C. D. 22 A. B. C. D. UML 23 23 A. B. C. D. 24
24 A. B. C. D. 25 25 A. B. C. D. UML BRO Branch and Relational Operator C1 (E1> E2) & (E3< E4) E1, E2, E3, E4 & > = C1 26 C1 26 A. {(>, =), (>, >), (>, <), (<, <), (=, <)} B. {(<, <), (<, =), (<, >), (=, <), (=, =), (=, >), (>, <), (>, =), (>, >)} C. {(>, <), (=, <), (>, =)} D. {(>, <), (=, <), (>, =), (<, <)} 27 27 A. B. C. D. 28 28 A. B. C. D. / 29 30 29 A. API B. C. D. 30 A. API B. C. D. 31 31 A. B.
C. D. 32 32 A. B. C. D. Service Component Architecture SCA Service Oriented Architecture SOA SCA 33 33 A. SCA B. SCA C. SCA D. SCA 34 34 A. B. C. / D. 20 100 35 35 A 20 B 80 C 100 D 36 36 A B C D 10 MTTF 1,000,000 1 SCSI MTTF 500,000 1 MTTF 200,000 1 MTTF 200,000 1 SCSI MTTF 1,000,000 MTTF 37 37 A 2 B 3 C 4 D 5 38 38 A B C D 20000 4 5000 / 250 / 39
39 A 1 B 1.05 C 1.08 D 1.11 40 41 42 40 A. B. C. D. 41 A. B. C. D. 42 A. B. C. D. 43 44 43 A. B. C. D. 44 A. B. C. D. 45 45 A. B. C. D. / 46 46 A. Spooling B. Spooling C. D. n Pi(i=1 2 n) Xj j=1 2 m Temp Pi P V S 47 48
47 A. 0 B. 1 C. 2 D. 3 48 A. P(S) V(S) V(S) B. P(S) P(S) V(S) C. V(S) P(S) P(S) D. V(S) V(S) P(S) 10 100 32 2 bitmap 49 5 50 49 A. 32000 B. 3200 C. 2000 D. 1600 50 A. 400 B. 360 C. 320 D. 160 OS 51 OS OS 52
51 A. B. C. D. 52 A. B. C. D. A B C D A B C D 29 53 53 A. 25 B. 26 C. 27 D. 28 1 4 4 12 1 12 54
54 A. 28 B. 31 C. 33 D. 34 55 55 0 1 0 1 0 1 N N 56 x y x 2 +y 2 1
N m N m/n 57 56 A. 1/2 1/2 B. (0 1) C. (a,b) b - a D. (0 1) N 57 A. /4 B. /2 C. 1/2 D. 1 A B A(0 3) B(2.5 0) Y=1 Y=1.5 X= 58 58 A. 1 B. 1.25 C. 1.5 D. 2 A B C A B 0.90 B C 0.70 A C 59 A C 0.90 59 A. 0.27 B. 0.37 C. 0.63 D. 0.73 60 60 A. B. C.
D. 61 61 A. B. C. D. JPEG 62 62 A. DCT B. RLE C. D. ISO MPEG-21 63 63 A. DVB B. HDTV C. D. Linux 64 64 A. ping B. ifconfig C. netstat D. uname 65 65 A. RARP B. ARP C. IGMP D. ICMP IP 140.252.12.120 255.255.255.0 66 67 66 A. 0.0.0.120 B. 0.0.12.120 C. 0.0.12.0 D. 0.252.12.120 67 A. 255.255.255.255 B. 140.252.12.255 C. 140.252.12.120 D. 140.252.255.255 68 68 A. SSL B. SOCKS C. IPSEC D. RPC TCP X Y 69 70 69 A. SYN 1 X B. SYN 1 X+1 ACKX 1 C. SYN 1 Y D. SYN 1 Y ACKY+1 1 70 A. SYN 1 X+1 B. SYN 1 X+1 ACKX 1 C. SYN 1 Y ACKX+1 1 D. SYN 1 Y ACKY+1 1 ACK Accelerated analysis approaches emphasize the construction of 71 to more rapidly
identify business and user requirements for a new system. As an accelerated analysis technology, 72 reads the program code and automatically generates the equivalent system model, and the code can be obtained from 73. All system analysis approaches require some form of 74 which includes those techniques to be used to identify or extract system problems and solution requirements from user community. 75 is a classical set of techniques used to collect information about system problems, opportunities, solution requirements, and priorities. 71 A. object models B. prototypes C. use cases D. components 72 A. extreme programming B. model driven C. reverse engineering D.agile method 73 A. existing database and application program B. application program and user interface C. existing database and user interface D. existing database, application program and user interface 74 A. requirement discovery B. business process redesign C. cause-and-effect analysis D. total quality management 75 A. Continuous process improvement B. Joint requirements planning C. Fact-finding D. Structured engineering
2008 I 25 1 4 CIO CIO AVMSS AVMSS AVMSS 1 8 AVMSS 2 4 300 3 8 a b Oracle c d 50% 4 5 200 25
1 3 A B C D E 30% CPU CPU A B C D E 30% 35% 45% 45% 45% 15% 20% 40% 33% 40% 5 5 1 9 3 2 8 3 8 25 1 3 1 8 200 2 9 MC/DC MC/DC C/DC IF A OR B THEN
ELSE ENDIF 3 8 25 1 4 SQL SQL 1 5 2 6 SQL 3 8 SQL 4 6 25 Web 1 3 traveler.com GPS
Mashup A, B, C, D 1 A 2 B 3 C 4 D 1 8 5-1 Mashup 5-1 Mashup 1 Traveler 2 3 4 A Traveler 5 6 B Traveler 7 8 Traveler 2 9 Mashup Mashup 300 3 Mashup 3 8 Mashup Mashup Rich
Internet Application RIA 200
2008 II Scenarios SAAM (Scenario-based Architecture Analysis Method) ATAM Architecture Tradeoff Analysis Method CBAM Cost Benefit Analysis Method) SAAM ATAM CBAM ATAM 1 2 SAAM ATAM 3 90 Stand Up Frequent Release Minimal Documentation Collaborative Focus Customer Engagement Automated Testing Adaptive Planning Pair Programming Test-Driven Development
Continuous Integration Refactoring 1 2 3 SOA SOA IT SOA SOA 1 2 SOA SOA 3 SOA SaaS Software-as-a-Service SaaS IT SaaS 1. SaaS 2. SaaS SaaS 3. SaaS