首页
试卷库
试题库
当前位置:
X题卡
>
所有题目
>
题目详情
某软件企业根据市场需求,组织开发出一种新应用软件。为确保企业的市场竞争力,该企业对其所有员工进行了保密的约束。但某开发人员将该应用软件的程序设计技巧和算法通过论文向社会发表,使得软件企业丧失了____...
查看本题答案
包含此试题的试卷
高级系统分析师《单项选择》真题及答案
点击查看
你可能感兴趣的试题
45.某软件公司根据市场需求组织开发一套应用软件并对其公司的职工进行了保密的约束以确保市
丧失了计算机软件著作权
未丧失计算机软件著作权
丧失了发表权
丧失了专利权
企业应用软件开发的需求分析阶段其主要任务是明确企业的
数据流图
业务流图
组织结构
应用需求
立新软件公司根据市场需求组织开发出最新应用软件并对其公司的职工进行了保密的约束以确保市场竞争但其公司
商业秘密
计算机软件著作权
发表权
专利权
某软件公司根据市场需求组织开发出一套应用软件并对其公司的职工进行了保密的约束以确保市场竞争但是
丧失了计算机软件著作权
未丧失计算机软件著作权
丧失了发表权
丧失了专利权
关于Web应用软件说法不正确的是______
Web应用软件的系统测试不仅包括按照大纲检查其能否满足需求,还得针对Web应用软件的特点对薄弱环节进行测试
Web应用软件的开发可以根据需求有开发人员设定结构
Cookie测试是功能测试的重要组成部分
复杂的Web应用软件不仅是一个Web站点,还需要与其他系统协作完成所需的功能
立新软件公司根据市场需求组织开发出最新应用软件并对其公司的职工进行了保密的约束以确保市场竞争但其公司
商业秘密
计算机软件著作权
发表权
专利权
45.某软件公司根据市场需求组织开发一套应用软件并对其公司的职工进行了保密的约束以确保市
商业秘密
计算机软件著作权
发表权
专利权
企业应用软件开发的需求分析阶段其主要任务是明确企业的
数据流图
业务模型
组织结构
应用需求
通用会计核算软件一般是指
软件公司为会计工作而专门设计开发
一种应用软件
为某单位使用而开发
以产品形式投入市场
某软件公司根据市场需求组织开发出一套应用软件并对其公司的职工进行了保密的约束以确保市场竞争但是
商业秘密
计算机软件著作权
发表权
专利权
某软件企业根据市场需求组织开发出一种新应用软件为确保企业的市场竞争力该企业对其所有员工进行了保密的约
发行权
软件著作权
商业秘密权
专利权
某软件公司开发完成的一种应用软件由于受到国家行政指令和技术标准的限制与市场中的同类软件在界面和输出的
构成对现有同类软件著作权的侵犯
构成对现有同类软件界面和输出的侵犯
不构成对现有同类软件界面和输出的侵犯
不构成对现有同类软件著作权的侵犯
为解决实际问题而设计的会计软件企业管理软件都是一种应用软件
商品流通企业管理信息系统是指专门为商品流通企业管理商业信息而开发的一种管理信息系统它的核心是
具有商业信息管理功能的应用软件系统
公司的管理人员
管理信息的应用软件系统
公司的企业文化
热门试题
更多
PriortotheUMLtherewasnoclearleading111language.Usershadtochoosefromamongmanysimilarmodelinglanguageswithminordifferencesinoverall112power.Mostofthemodelinglanguagessharedasetofcommonlyacceptedconceptsthatareexpressedslightlydifferentlyinvariouslanguages.Thislackof113discouragednewusersfromenteringtheOOmarketandfromdoingOOmodelingwithoutgreatlyexpandingthepowerofmodeling.Userslongedfortheindustrytoadoptoneoraveryfewbroadlysupportedmodelinglanguagessuitablefor114usage.SomevendorswerediscouragedfromenteringtheOOmodelingareabecauseoftheneedtosupportmanysimilarbutslightlydifferentmodelinglanguages.Inparticularthesupplyofadd-ontoolshasbeendepressedbecausesmallvendorscannotaffordtosupportmanydifferentformatsfrommanydifferent115modelingtools.ItisimportanttotheentireO0industrytoencouragebroadlybasedtoolsandvendorsaswellasnicheproductsthatcatertotheneedsofspecializedgroups.
TCPfunctionsattheOpenSystemInterconnectionOSI61layerorLayer4.Itschiefresponsibilityistoensure62end-to-endconnectivity.IPlocatedonelayerdownattheOSInetworklayerorLayer3communicatestheaddressesofeach63senderandreceivertotheroutersalongtheway.RoutersandLayer3switchescanreadIPandotherLayer364.Thisinformationcombinedwithroutingtablesandothernetworkintelligenceisallittakestoget65theroomoraroundtheworldviaTCP/IP.
Theapproachweproposeisasystem-orientedmethodologyforknowledgeacquisitionthisorientationemphasizesongoingdocumentationthroughouteachcycleandtechniqueapplied.Program-widedocumentationissuggestedbothforthepurposeofinternal91andforlaterverificationand92efforts.Thedocumentationsystemweproposeincludesacentralknowledgeacquisition93whichis94toreflectknowledgeacquisitionplanssessionnodesanddomainexpertparticipation.Specifically95withinthedatabasesystemincludeknowledgeacquisitionformswhichdocumentplansforandnotesfromknowledgeacquisitionsessiondomainexpertfileandrulecontentforms.
MostIPlayer-basedproxymechanismssuchasnetworkaddresstranslationNATonlysupportuni-directionalproxyfromtheinternalnetworktoexternalnetworktheInternet.Theproxyestablishesthecommunicationchannelby86IPaddresses.TheIPaddressesmustbe87.Theseproxymechanismspreventapplicationsthatmustestablishreturndatachannelsfromestablishingtheirdatachannelssuchasmultimediaapplications.IPlayer-basedproxymechanismsneedadditionalsoftware88foreachapplicationthatuses89channels.SOCKSidentifiescommunicationtargetsthroughdomainnamesovercomingtherestrictionofusingprivateIPaddresses.SOCKScanusedomainnamestoestablishcommunicationbetweenseparateLANswith90IPaddresses.
YouwanttousetheWebtolet76usersoryourcustomerslook77corporateinformation.Butyouwanttokeepinstallationattheuserend78andyoudon’twantjust.79toget80yourdatabases.Thatmaybewhereanapplicationserverentersthepicture.Formoreusermachineindependentthesesoftwarepackagestypicallywritteninthe81programminglanguageforuseonWindows82-basedsystemsactasgo-betweens83browser-equippedenduserstothedatabasesthat84theinformationtheyneedto85.
Developingreliablesoftwareontimeandwithin106representsadifficultendeavorformanyorganizations.Usuallybusinesssolutionshavethreemainaspects:people107andtechnology.Themainreasonforfailingsoftwareprojectshaslittletodowith.technologyandtoolsandmuchtodowithlackofprocess108.Experiencehasshownthatintroducingnewtechnologyandtoolsinanimmatureorundisciplinedenvironmentislikelytoincreasethechaos.CASEtoolsarenotenough.Afoolwithatoolisstillafool!Structuredmethodwasthefirstwaveofthesoftwareindustry.Thiswasthebeginningoftransformingsoftwaredevelopmentfroma109industrytomassproduction.Softwareprocessmovementifthesecondwaveinthesoftwareindustry.Theprocessmaturitymovementpreparesthewayforthethirdwaveofthesoftwareindustry:softwareindustrialization.Softwaredevelopmentwillbecomelikeanassemblyandmanufacturingprocess.Acriticalenablingfactorisadisciplinedsoftwareengineeringprocesswithpredictablequality110andfunctionality.
AnIntranetis66theapplicationofInternettechnologywithinaninternalorclosedusergroup.Intranetsarecompany67anddonothavea68connectiontotheInternet.UsedproperlyanIntranetishighlyeffectivecorporatetoolcapableofregularly69informationtoempowertheworkforcewiththeinformationneededtoperformtheirroles.UsedinthiswayanIntranetrepresentsasteptowardsthe70office.
TCPfunctionsattheOpenSystemInterconnectionOSI61layerorLayer4.Itschiefresponsibilityistoensure62end-to-endconnectivity.IPlocatedonelayerdownattheOSInetworklayerorLayer3communicatestheaddressesofeach63senderandreceivertotheroutersalongtheway.RoutersandLayer3switchescanreadIPandotherLayer364.Thisinformationcombinedwithroutingtablesandothernetworkintelligenceisallittakestoget65theroomoraroundtheworldviaTCP/IP.
PublicKeyInfrastructurePKIserviceprovidersofferorganizationsfullyintegratedPKI-managedservicesdesignedtosecureIntranetExtranetVirtualPrivateNetworkVPNande-commerceapplications.PKIsolutionscanenableanumberofsecurityservicesincludingstrongauthenticationandnon-repudiationoftransactions.eTokenenablestheusersofPKIsystemstogenerateandstore101anddigitalcertificatesinsidethetokencreatingasecureenvironmentandallowingfullportabilityandmaximumeaseofuse.eTokenProcanalsoperformsensitiveon-chip102operationsensuringthatusers’keysaxeneverexposedtothePCenvironmenteTokeneliminatestheneedtostore103andkeysonaharddiskorbrowserfileortotransmitthemacrosstheInternet/Extranet;assuringpeace-of-mindandconfidenceduringonlinecommunications.AdigitalsignatureiscreatedusingtheprivatekeyofanindividualtoensuretheValidityofhisrequest.Thistechnologycanbeusedtoguarantee104ofvarioustransactions.Thestrengthofeithertheauthenticationlevelorthedigitalsignaturereliesonthelevelofprotectionofferedtotheprivatekey.eTokenProoffersthemaximumlevelofsecuritysinceitenablestheuseoftheprivatekeyforsigningandauthenticatinginsidetheeToken.Themostsecureuseofauthenticationinvolvesenclosingatleastonecertificatewitheverysignedmessage.Themessage105verifiesthecertificateusingtheCA’spublickey.Ifthesender’spublickeyislegitimatetherecipientverifiesthemessage’ssignature.Digitalsignaturescreatedwithaprivatekeyareverifiedwiththedigitalcertificatecontainingthepublickey.
Thetaskathandnowisto56theprogrammerswhostilluseyesterday’ssoftwaretechnologytosolvetoday’ssoftwareproblems.Object-orientedprogrammingrequiresanewattitudetowardproblem57.Problem57withcomputersystembecomesmorenatural.Applicationcan58betranslatedinto59.Althoughitiscommonlybelievedthatitwillbeeasiertotrainnewprogrammerstouseobject-orientedtechniquesthanto60programmerswhohavesubstantialexperienceinapplyingconventionalprogramminglanguageconstructs.
Acrossawidevarietyoffieldsdataarebeingcollectedandaccumulatedatadramaticpace.Thereisanurgentneedforanewgenerationofcomputationaltheoriesandtoolstoassisthumansin96usefulinformationknowledgefromtherapidlygrowing97ofdigitaldata.ThesetheoriesandtoolsarethesubjectoftheemergingfieldofknowledgediscoveryindatabaseKDD.AtanabstractleveltheKDDfieldisconcernedwiththedevelopmentofmethodsandtechniquesformaking98ofdata.ThebasicproblemaddressedbytheKDDprocessisoneofmappinglow-leveldatawhicharetypicallytoovoluminoustounderstandanddigesteasilyintootherformsthatmightbemore99forexampleashortreportmore100forexampleadescriptiveapproximationormodeloftheprocessthatgeneratedthedataormoreusefulforexampleapredictivemodelforestimatingthevalueoffuturecases.Atthecoreoftheprocessistheapplicationofspecificdata-miningmethodsforpatterndiscoveryandextraction.
Developingreliablesoftwareontimeandwithin106representsadifficultendeavorformanyorganizations.Usuallybusinesssolutionshavethreemainaspects:people107andtechnology.Themainreasonforfailingsoftwareprojectshaslittletodowith.technologyandtoolsandmuchtodowithlackofprocess108.Experiencehasshownthatintroducingnewtechnologyandtoolsinanimmatureorundisciplinedenvironmentislikelytoincreasethechaos.CASEtoolsarenotenough.Afoolwithatoolisstillafool!Structuredmethodwasthefirstwaveofthesoftwareindustry.Thiswasthebeginningoftransformingsoftwaredevelopmentfroma109industrytomassproduction.Softwareprocessmovementifthesecondwaveinthesoftwareindustry.Theprocessmaturitymovementpreparesthewayforthethirdwaveofthesoftwareindustry:softwareindustrialization.Softwaredevelopmentwillbecomelikeanassemblyandmanufacturingprocess.Acriticalenablingfactorisadisciplinedsoftwareengineeringprocesswithpredictablequality110andfunctionality.
MostIPlayer-basedproxymechanismssuchasnetworkaddresstranslationNATonlysupportuni-directionalproxyfromtheinternalnetworktoexternalnetworktheInternet.Theproxyestablishesthecommunicationchannelby86IPaddresses.TheIPaddressesmustbe87.Theseproxymechanismspreventapplicationsthatmustestablishreturndatachannelsfromestablishingtheirdatachannelssuchasmultimediaapplications.IPlayer-basedproxymechanismsneedadditionalsoftware88foreachapplicationthatuses89channels.SOCKSidentifiescommunicationtargetsthroughdomainnamesovercomingtherestrictionofusingprivateIPaddresses.SOCKScanusedomainnamestoestablishcommunicationbetweenseparateLANswith90IPaddresses.
PriortotheUMLtherewasnoclearleading111language.Usershadtochoosefromamongmanysimilarmodelinglanguageswithminordifferencesinoverall112power.Mostofthemodelinglanguagessharedasetofcommonlyacceptedconceptsthatareexpressedslightlydifferentlyinvariouslanguages.Thislackof113discouragednewusersfromenteringtheOOmarketandfromdoingOOmodelingwithoutgreatlyexpandingthepowerofmodeling.Userslongedfortheindustrytoadoptoneoraveryfewbroadlysupportedmodelinglanguagessuitablefor114usage.SomevendorswerediscouragedfromenteringtheOOmodelingareabecauseoftheneedtosupportmanysimilarbutslightlydifferentmodelinglanguages.Inparticularthesupplyofadd-ontoolshasbeendepressedbecausesmallvendorscannotaffordtosupportmanydifferentformatsfrommanydifferent115modelingtools.ItisimportanttotheentireO0industrytoencouragebroadlybasedtoolsandvendorsaswellasnicheproductsthatcatertotheneedsofspecializedgroups.
YouwanttousetheWebtolet76usersoryourcustomerslook77corporateinformation.Butyouwanttokeepinstallationattheuserend78andyoudon’twantjust.79toget80yourdatabases.Thatmaybewhereanapplicationserverentersthepicture.Formoreusermachineindependentthesesoftwarepackagestypicallywritteninthe81programminglanguageforuseonWindows82-basedsystemsactasgo-betweens83browser-equippedenduserstothedatabasesthat84theinformationtheyneedto85.
AnIntranetis66theapplicationofInternettechnologywithinaninternalorclosedusergroup.Intranetsarecompany67anddonothavea68connectiontotheInternet.UsedproperlyanIntranetishighlyeffectivecorporatetoolcapableofregularly69informationtoempowertheworkforcewiththeinformationneededtoperformtheirroles.UsedinthiswayanIntranetrepresentsasteptowardsthe70office.
Acrossawidevarietyoffieldsdataarebeingcollectedandaccumulatedatadramaticpace.Thereisanurgentneedforanewgenerationofcomputationaltheoriesandtoolstoassisthumansin96usefulinformationknowledgefromtherapidlygrowing97ofdigitaldata.ThesetheoriesandtoolsarethesubjectoftheemergingfieldofknowledgediscoveryindatabaseKDD.AtanabstractleveltheKDDfieldisconcernedwiththedevelopmentofmethodsandtechniquesformaking98ofdata.ThebasicproblemaddressedbytheKDDprocessisoneofmappinglow-leveldatawhicharetypicallytoovoluminoustounderstandanddigesteasilyintootherformsthatmightbemore99forexampleashortreportmore100forexampleadescriptiveapproximationormodeloftheprocessthatgeneratedthedataormoreusefulforexampleapredictivemodelforestimatingthevalueoffuturecases.Atthecoreoftheprocessistheapplicationofspecificdata-miningmethodsforpatterndiscoveryandextraction.
Theapproachweproposeisasystem-orientedmethodologyforknowledgeacquisitionthisorientationemphasizesongoingdocumentationthroughouteachcycleandtechniqueapplied.Program-widedocumentationissuggestedbothforthepurposeofinternal91andforlaterverificationand92efforts.Thedocumentationsystemweproposeincludesacentralknowledgeacquisition93whichis94toreflectknowledgeacquisitionplanssessionnodesanddomainexpertparticipation.Specifically95withinthedatabasesystemincludeknowledgeacquisitionformswhichdocumentplansforandnotesfromknowledgeacquisitionsessiondomainexpertfileandrulecontentforms.
Inapublic-keycryptosystem71encryptedwiththepublickeycanonlybedecipheredwiththeprivatekeyfromthesame72.Conversely71encryptedwiththeprivatekeycanbedecryptedonlywiththepublickey.Userscanmaketheirpublickeys73availableorplacethematakeydistributioncenterorotherstoaccess.Howevertheprivatekeymustbe74safe.Inpublic-keysystemsthere’sno75tofindasafechannelforcommunicatingasharedsecretkey.
Thetaskathandnowisto56theprogrammerswhostilluseyesterday’ssoftwaretechnologytosolvetoday’ssoftwareproblems.Object-orientedprogrammingrequiresanewattitudetowardproblem57.Problem57withcomputersystembecomesmorenatural.Applicationcan58betranslatedinto59.Althoughitiscommonlybelievedthatitwillbeeasiertotrainnewprogrammerstouseobject-orientedtechniquesthanto60programmerswhohavesubstantialexperienceinapplyingconventionalprogramminglanguageconstructs.
MostIPlayer-basedproxymechanismssuchasnetworkaddresstranslationNATonlysupportuni-directionalproxyfromtheinternalnetworktoexternalnetworktheInternet.Theproxyestablishesthecommunicationchannelby86IPaddresses.TheIPaddressesmustbe87.Theseproxymechanismspreventapplicationsthatmustestablishreturndatachannelsfromestablishingtheirdatachannelssuchasmultimediaapplications.IPlayer-basedproxymechanismsneedadditionalsoftware88foreachapplicationthatuses89channels.SOCKSidentifiescommunicationtargetsthroughdomainnamesovercomingtherestrictionofusingprivateIPaddresses.SOCKScanusedomainnamestoestablishcommunicationbetweenseparateLANswith90IPaddresses.
YouwanttousetheWebtolet76usersoryourcustomerslook77corporateinformation.Butyouwanttokeepinstallationattheuserend78andyoudon’twantjust.79toget80yourdatabases.Thatmaybewhereanapplicationserverentersthepicture.Formoreusermachineindependentthesesoftwarepackagestypicallywritteninthe81programminglanguageforuseonWindows82-basedsystemsactasgo-betweens83browser-equippedenduserstothedatabasesthat84theinformationtheyneedto85.
Inapublic-keycryptosystem71encryptedwiththepublickeycanonlybedecipheredwiththeprivatekeyfromthesame72.Conversely71encryptedwiththeprivatekeycanbedecryptedonlywiththepublickey.Userscanmaketheirpublickeys73availableorplacethematakeydistributioncenterorotherstoaccess.Howevertheprivatekeymustbe74safe.Inpublic-keysystemsthere’sno75tofindasafechannelforcommunicatingasharedsecretkey.
YouwanttousetheWebtolet76usersoryourcustomerslook77corporateinformation.Butyouwanttokeepinstallationattheuserend78andyoudon’twantjust.79toget80yourdatabases.Thatmaybewhereanapplicationserverentersthepicture.Formoreusermachineindependentthesesoftwarepackagestypicallywritteninthe81programminglanguageforuseonWindows82-basedsystemsactasgo-betweens83browser-equippedenduserstothedatabasesthat84theinformationtheyneedto85.
Developingreliablesoftwareontimeandwithin106representsadifficultendeavorformanyorganizations.Usuallybusinesssolutionshavethreemainaspects:people107andtechnology.Themainreasonforfailingsoftwareprojectshaslittletodowith.technologyandtoolsandmuchtodowithlackofprocess108.Experiencehasshownthatintroducingnewtechnologyandtoolsinanimmatureorundisciplinedenvironmentislikelytoincreasethechaos.CASEtoolsarenotenough.Afoolwithatoolisstillafool!Structuredmethodwasthefirstwaveofthesoftwareindustry.Thiswasthebeginningoftransformingsoftwaredevelopmentfroma109industrytomassproduction.Softwareprocessmovementifthesecondwaveinthesoftwareindustry.Theprocessmaturitymovementpreparesthewayforthethirdwaveofthesoftwareindustry:softwareindustrialization.Softwaredevelopmentwillbecomelikeanassemblyandmanufacturingprocess.Acriticalenablingfactorisadisciplinedsoftwareengineeringprocesswithpredictablequality110andfunctionality.
YouwanttousetheWebtolet76usersoryourcustomerslook77corporateinformation.Butyouwanttokeepinstallationattheuserend78andyoudon’twantjust.79toget80yourdatabases.Thatmaybewhereanapplicationserverentersthepicture.Formoreusermachineindependentthesesoftwarepackagestypicallywritteninthe81programminglanguageforuseonWindows82-basedsystemsactasgo-betweens83browser-equippedenduserstothedatabasesthat84theinformationtheyneedto85.
PublicKeyInfrastructurePKIserviceprovidersofferorganizationsfullyintegratedPKI-managedservicesdesignedtosecureIntranetExtranetVirtualPrivateNetworkVPNande-commerceapplications.PKIsolutionscanenableanumberofsecurityservicesincludingstrongauthenticationandnon-repudiationoftransactions.eTokenenablestheusersofPKIsystemstogenerateandstore101anddigitalcertificatesinsidethetokencreatingasecureenvironmentandallowingfullportabilityandmaximumeaseofuse.eTokenProcanalsoperformsensitiveon-chip102operationsensuringthatusers’keysaxeneverexposedtothePCenvironmenteTokeneliminatestheneedtostore103andkeysonaharddiskorbrowserfileortotransmitthemacrosstheInternet/Extranet;assuringpeace-of-mindandconfidenceduringonlinecommunications.AdigitalsignatureiscreatedusingtheprivatekeyofanindividualtoensuretheValidityofhisrequest.Thistechnologycanbeusedtoguarantee104ofvarioustransactions.Thestrengthofeithertheauthenticationlevelorthedigitalsignaturereliesonthelevelofprotectionofferedtotheprivatekey.eTokenProoffersthemaximumlevelofsecuritysinceitenablestheuseoftheprivatekeyforsigningandauthenticatinginsidetheeToken.Themostsecureuseofauthenticationinvolvesenclosingatleastonecertificatewitheverysignedmessage.Themessage105verifiesthecertificateusingtheCA’spublickey.Ifthesender’spublickeyislegitimatetherecipientverifiesthemessage’ssignature.Digitalsignaturescreatedwithaprivatekeyareverifiedwiththedigitalcertificatecontainingthepublickey.
AnIntranetis66theapplicationofInternettechnologywithinaninternalorclosedusergroup.Intranetsarecompany67anddonothavea68connectiontotheInternet.UsedproperlyanIntranetishighlyeffectivecorporatetoolcapableofregularly69informationtoempowertheworkforcewiththeinformationneededtoperformtheirroles.UsedinthiswayanIntranetrepresentsasteptowardsthe70office.
Acrossawidevarietyoffieldsdataarebeingcollectedandaccumulatedatadramaticpace.Thereisanurgentneedforanewgenerationofcomputationaltheoriesandtoolstoassisthumansin96usefulinformationknowledgefromtherapidlygrowing97ofdigitaldata.ThesetheoriesandtoolsarethesubjectoftheemergingfieldofknowledgediscoveryindatabaseKDD.AtanabstractleveltheKDDfieldisconcernedwiththedevelopmentofmethodsandtechniquesformaking98ofdata.ThebasicproblemaddressedbytheKDDprocessisoneofmappinglow-leveldatawhicharetypicallytoovoluminoustounderstandanddigesteasilyintootherformsthatmightbemore99forexampleashortreportmore100forexampleadescriptiveapproximationormodeloftheprocessthatgeneratedthedataormoreusefulforexampleapredictivemodelforestimatingthevalueoffuturecases.Atthecoreoftheprocessistheapplicationofspecificdata-miningmethodsforpatterndiscoveryandextraction.
Thetaskathandnowisto56theprogrammerswhostilluseyesterday’ssoftwaretechnologytosolvetoday’ssoftwareproblems.Object-orientedprogrammingrequiresanewattitudetowardproblem57.Problem57withcomputersystembecomesmorenatural.Applicationcan58betranslatedinto59.Althoughitiscommonlybelievedthatitwillbeeasiertotrainnewprogrammerstouseobject-orientedtechniquesthanto60programmerswhohavesubstantialexperienceinapplyingconventionalprogramminglanguageconstructs.
热门题库
更多
中级多媒体应用设计师
高级系统分析师
高级网络规划设计师
高级系统架构师
中级信息系统监理师
初级通信工程师
中级通信工程师
通信新技术、新业务知识
无线通信专业技术
移动通信专业技术
有线传输专业技术
电话交换专业技术
电信网络专业技术
计算机通信专业技术
通信电源专业技术
电信营销专业技术