题目内容

若要封装对象,并提供不同的接口时,可采用(33);若要将请求封装成对象,则可采用(34);若要将可互换的行为封装起来,并采用委托的方式来决定使用哪一个,则可采用(35)。

A. 代理模式
B. 外观模式
C. 访问者模式
D. 适配器模式

查看答案
更多问题

A.W/SB.S/CC.B/SD.C/S

A. W/S
B. S/C
C. B/S
D. C/S

A.12B.8C.3D.15

A. 12
B. 8
C. 3
D. 15

在OSI参考模型中,数据链路层处理的数据单位是(61),工作在该层的设备有(62)。

A. 帧
B. 比特
C. 分组
D. 报文

Remote administration types are an example of one kind of(71)malicious software, the Trojan horse, or more simply Trojan. The purpose of these programs isn't replication,(72)to penetrate and control. That masquerade as one thing when in fact they are something else, usually something destructive. There are a number of kinds of Trojans, including spybots, (73) report on the Web sites a computer user visits, and keybots or keyloggers, which record and report the user's keystrokes in order to discover passwords and other confidential information.
RATS attempt to give a remote intruder administrative control of an infected computer. They work as(74)pairs. The server resides on the infected machine, while the client resides elsewhere, across the network, where it's available to a remote intruder. Using standard TCP/IP or UDP protocols, the client sends instructions to the server. The server does(75) it's told to do on the infected computer.

A. nonviral
B. unviral
C. inviral
D. abviral

答案查题题库