在关于逆向工程(reverse engineering)的描述中,正确的是:(22)。
A. 从已经安装的软件中提取设计规范,用以进行软件开发
B. 按照“输出→处理→输入”的顺序设计软件
C. 用硬件来实现软件的功能
D. 根据软件处理的对象来选择开发语言和开发工具
查看答案
How do women use the Internet according to the passage?
A. They are more likely to be early adopters of podcast.
B. They tend to be users of entertainment and information.
C. They tend to use the Web for direction information.
D. They are more interested in Web-based technologies.
The word "underscore" (Line , Para. 3) most probably means ______ .
A. corroborate
B. disprove
C. influence
D. weaken
The passage intends to express the idea that ______ .
A. doctors should be blamed for teenager's controlled substance abusing
B. the prescriptions written for the controlled substances increased greatly
C. more and more teenagers are likely to be addicted to controlled drugs
D. doctors should reserve the prescriptions for those who really need them
With hundreds of millions of electronic(71)taking place daily, businesses and organizations have a strong incentive to protect the(72)of the data exchanged in this manner, and to positively ensure the(73)of those involved in the transactions. This has led to an industry-wide quest for better, more secure methods for controlling IT operations, and for deploying strong security mechanisms deeply and broadly throughout networked infrastructures and client devices. One of the more successful concepts to engage the imaginations of the security community has been the development of standards-based security(74)that can be incorporated in the hardware design of client computers. The principle of encapsulating core security capabilities in(75)and integrating security provisions at the deepest levels of the machine operation has significant benefits for both users and those responsible for securing IT operations.
A. devices
B. transactions
C. communications
D. businesses