51 喜欢·157 浏览
选择填空

若采用白盒测试法对下面流程图所示算法进行测试,且要满足语句覆盖,则至少需要()个测试用例。

A.1

B.2

C.3

D.4

若表示输入和输出的测试用例格式为(A,B,X;X),则满足语句覆盖的测试用例是()。

A.(1,3,3;8)

B.(1,3,5;10)

C.(5,2,15;8)

D.(5,2,20;9)

请帮忙给出每个问题的正确答案和分析,谢谢!

题目答案

AA

答案解析

暂无解析
举一反三
选择填空

The number of home users and small businesses that want to use the Internet is ever increasing. The shortage of addresses is becoming a serious problem.A quick solution to this problem is called network address translation(NAT).NAT enables a user to have a large set of addresses( )and one address, or a smallset of addresses,externally. The traffic inside can use the large set; the traffic( ), the small set. To separate the addresses used inside the home or business and the ones used for the Internet, the Internet authorities have reserved three sets of addresses as( )addresses. Any organization can use an address out of this set without permission from the Internet authorities. Everyone knows that these reserved addresses are for private networks.They are( )inside the organization, but they are not unique globally. No router will( )a packet that has one of these addresses as the destination address.The site must have only one single connection to the global Internet through a router that runs the NAT software.

A.absolutely

B.completely

C.internally

D.externally

A.local

B.outside

C.middle

D.around

A.private

B.common

C.public

D.external

A.unique

B.observable

C.particular

D.ordinary

A.reject

B.receive

C.deny

D.forward

请帮忙给出每个问题的正确答案和分析,谢谢!

题目答案

CBAAD

答案解析

暂无解析
选择填空

Trust is typically interpreted as a subjective belief in the reliability,honesty and security of an entity on which we depend( )our welfare.In online environments we depend on a wide spectrun of things,ranging from computer hardware,software and data to people and organizations.

A security solution always assumes certain entities function according to specific policies.To trust is precisely to make this sort of assumptions , hence,a trusted entity is the same as an entity that is assumed to function according to policy.A consequence of this is that a trust component of a system must work correctly in order for the security of that system to hold, meaning that when a trusted( )fails,then the sytems and applications that depend on it can( )be considered secure .

An often cited articulation of this principle is:"a trusted system or component is one that can break your security policy”(which happens when the trust system fails).The same applies to a trusted party such as a service provider (SP for short )that is , it must operate according to the agreed or assumed policy in order to ensure the expected level of securty and quality of services. A paradoxical conclusion to be drawn from this analysis is that security assurance may decrease when increasing the number of trusted components and parties that a service infrastructure depends on. This is because the security of an infrastructure consisting of many

Trusted components typically follows the principle of the weakest link,that is,in many situations the the overall security can only be as strong as the least reliable or least secure of

all the trusted components.We cannot avoid using trusted security components,but the fewer the better.This is important to understand when designing the identity management architectures,that is,fewer the trusted parties in an identity management model,stronger the security that can be achieved by it.

The transfer of the social constructs of identity and trust into digital and computational concepts helps in designing and implementing large scale online markets and communities,and also plays an important role in the converging mobile and Internet environments.Identity management (denoted Idm hereafter) is about recognizing and verifying the correctness of identitied in online environment.Trust management becomes a component of( )whenever different parties rely on each other for identity provision and authentication.IdM and Trust management therefore depend on each other in complex ways because the correctness of the identity itself must be trusted for the quality and reliability of the corresponding entity to be trusted.IdM is also an essential concept when defining authorisation policies in personalised services.

Establishing trust always has a cost , so that having complex trust requirement typically leads to high overhead in establishing the required trust.To reduce costs there will be incentives for stakeholders to “cut corners”regarding trust requirements,which could lead to inadequate security.The challenge is to design IdM systems with relatively simple trust requirements.Cryptographic mechanisms are often a core component of IdM solutions,for example,for entity and data authentication.With cryptography,it is often possible to propagate trust from where it initially exists to where it is needed .The establishment of initial( )usually takes place in the physical world,and the subsequent propagation of trust happens online,often in an automated manner.

A.with

B.on

C.of

D.for

72

A.entity

B.person

C.component

D.thing

73

A.No longer

B.never

C.always

D.often

74

A.SP

B.IdM

C.Internet

D.entity

75

A.rust

B.cost

C.IdM

D.solution

请帮忙给出每个问题的正确答案和分析,谢谢!

题目答案

BABBA

答案解析

暂无解析
选择填空

男患,42岁,因"发作性四肢抽搐4年,智能下降,行为异常2年"入院。患者两个舅舅均在年轻时发现精神异常,诊为"精神病",均于40岁左右去世,死因不详。查体:神志清醒,语言刻板、重复,记忆力、定向力、计算力、理解判断力均下降。MMSE:4分。ADL:58分。表情淡漠、呆板。行为异常,余神经系统查体未见明显异常。为明确诊断,最终需要哪种检查

A、脑电图

B、头颅MRI

C、实验室检查

D、脑活检

E、腰穿

若头颅MRI显示双侧额颞叶萎缩,脑活检病理可见泛素染色阳性神经元,则诊断为

A、Alzheimer病

B、Pick病

C、额颞叶痴呆

D、Lewy体痴呆

E、进行性核上性麻痹

若此患者无抽搐,而表现为全身不自主运动,则可能的诊断为

A、Alzheimer病

B、Pick病

C、额颞叶痴呆

D、Lewy体痴呆

E、亨廷顿病痴呆

题目答案

DCE

答案解析

暂无解析
选择填空

患者,男性,上腹隐痛1个月余,向腰背部放射,并进行性黄疸,CT平扫发现胰头体积增大,形态失常,并可见低密度肿块影,肝内外胆管扩张,胆囊体积增大。根据以上病史,最有可能的诊断是

A、慢性胰腺炎

B、胰腺癌

C、胰岛细胞瘤

D、胰腺囊腺瘤

E、以上都不是

如果考虑为胰腺癌,则以下哪种影像学表现最不可能出现

A、上消化道造影见十二指肠降部反"3"字征

B、胰管扩张

C、增强扫描早期病变可见明显均匀强化

D、增强扫描早期病变强化程度低于正常胰腺

E、周围血管被病灶包绕

题目答案

BC

答案解析

暂无解析
选择填空

男,25岁,双上肢热液烫伤,浅Ⅱ度,急诊入院。创面的最佳处理方法是

A、暴露疗法

B、包扎疗法

C、创面切除

D、刃厚植皮

E、以上都是

其烧伤面积为

A、9%

B、18%

C、15%

D、20%

E、10%

题目答案

BB

答案解析

暂无解析
选择填空

男性,57岁,发现高血压5年,近1月l出现喘憋、夜间憋醒、下肢水肿,满肺可闻1湿啰音。心电图提示陈旧前壁心肌梗死,胸片心影增大。最可能的诊断是

A、高血压收缩性心力衰竭

B、高血压舒张性心力衰竭

C、冠心病左心衰竭

D、冠心病右心衰竭

E、冠心病全心衰竭

缓解症状最迅速的药物是

A、血管紧张素转换酶抑制剂

B、β受体阻滞剂

C、钙拮抗剂

D、利尿剂

E、阿司匹林

最迫切的化验是

A、血常规

B、肾功能

C、肝功能

D、脑钠肽

E、血电解质

最迫切的辅助检查是

A、胸部CT

B、肝肾B超

C、超声心动图

D、心脏核素检查

E、冠脉造影

目前不宜使用哪类药物

A、血管紧张素转换酶抑制剂

B、β受体阻滞剂

C、洋地黄

D、利尿剂

E、螺内酯(安体舒通)

题目答案

EDDCB

答案解析

暂无解析
选择填空

患者,男性,双眼异物感及烧灼感,伴大量水样分泌物4天。结膜充血水肿,伴片状结膜下出血,角膜上皮点状脱失,3天后形成上皮下浸润。伴有耳前淋巴结肿大和压痛。根据以上临床表现,初步的诊断是

A、急性细菌性结膜炎

B、流行性角结膜炎

C、包涵体性结膜炎

D、过敏性结膜炎

E、沙眼

结膜刮片染色镜检最常见到的细胞类型是

A、多形核白细胞

B、淋巴细胞

C、巨噬细胞

D、嗜酸性粒细胞

E、浆细胞

患者发病后3周,角膜上皮下浸润加剧,此时应选择的治疗方案是

A、此病具有自限性,不需要治疗

B、局部冷敷,可以使用血管收缩剂

C、局部抗生素眼药水联合激素眼药水

D、局部抗病毒眼药水联合激素眼药水

E、局部抗过敏眼药水

题目答案

BBD

答案解析

暂无解析
选择填空

患者,女性,45岁,搬重物后出现腰痛伴左下肢疼痛3天,咳嗽、喷嚏时加重,卧床后缓解,体检:L3~5棘突及其左侧压痛,左侧直腿抬高试验40°(+),左小腿外侧痛觉减退,双侧膝腱及跟腱反射正常对称,弯腰活动明显受限,X线片示L4~5椎间隙略窄。考虑的诊断是

A、腰肌筋膜炎

B、急性腰扭伤

C、腰椎间盘突出症

D、腰肌劳损

E、肥大性脊柱炎

为明确诊断,最适宜的辅助检查是

A、CT

B、神经传导速度检查

C、肌电图检查

D、超声检查

E、血流图检查

目前不宜选择

A、超短波治疗

B、腰椎牵引

C、直流电药物离子导入

D、腰背肌抗阻肌力训练

E、电脑中频治疗

题目答案

CAD

答案解析

暂无解析
选择填空

女,45岁,因患乳腺癌在3个月前行乳腺癌根治术,术中曾输血800mL,最近查肝功能发现ALTl50u,进一步检查发现甲肝抗体阳性,抗HBs阳性,抗HCV阳性,丁肝和戊肝抗体均阴性该病例最可能的诊断是

A、手术后谷丙转氨酶升高

B、输血后甲型肝炎

C、输血后乙型肝炎

D、输血后丙型肝炎

E、输血后病毒性肝炎,甲、乙、丙型肝炎病毒重叠感染

最佳治疗方案是

A、以“保肝”治疗为主

B、“保肝”治疗十阿昔洛韦

C、“保肝”治疗+猪苓多糖

D、“保肝”治疗+α干扰素

E、“保肝”治疗十强的松

如不给予特殊治疗,最常见的疾病转归是

A、转变为黄疸型肝炎

B、转变为重症肝炎

C、痊愈

D、转变为慢性肝炎

E、转变为淤胆型肝炎

题目答案

DDD

答案解析

暂无解析
选择填空

患者16岁,主诉从无月经来潮,健康状况良好,其姐12岁时月经初潮。患者否认过度锻炼或厌食症,无抑郁症家族史,有一次晕厥史。体格检查:身高140cm,体重50kg,璞颈不明显,乳房未发育(TannerⅠ),未见阴毛、腋毛,腹部检查无肿块。肘外翻。妇科检查示正常青春期前外阴(TannerⅠ),阴蒂无肥大,处女膜完整,见阴道外口,棉签探阴道深6cm,肛诊触及偏小子宫,附件区未及包块。初步的诊断应该包括

A、继发性闭经

B、原发性闭经

C、21-羟化酶缺乏

D、先天性处女膜闭锁

E、青春期延迟

F、Turner综合征

G、雄激素不敏感综合征

H、先天性肾上腺皮质增生

患者还应做哪些进一步的检查

A、染色体核型分析

B、泌尿系统检查

C、血常规检查

D、肝肾功能检查

E、肌电图检查

F、肿瘤标记物检

G、心血管系统检查

H、胸片检查

患者进一步检查结果示染色体核型为45,XO,右肾缺如,该患者最终的诊断应为

A、雄激素不敏感综合征

B、先天性无子宫无阴道

C、Turner综合征

D、处女膜闭锁

E、混合性生殖腺发育不全

F、单纯性生殖腺发育不全

G、青春期延迟

题目答案

BEFABGC

答案解析

暂无解析