[A] Anti-virus software often bounces a warning back to the sender of an infected e-mail, saying that the e-mail in question cannot be delivered because it contains a virus. SoBig. F was able to spoof this system by" harvesting" e-mail addresses from the hard disks of infected computers. Some of these addresses were then sent infected e-mails that had been doctored to look as though they had come from other harvested addresses. The latter were thus sent warnings, even though their machines may not have been infected.
[B] Blaster worked by creating a "buffer overrun in the remote procedure call". In English, that earns it attacked a piece of software used by Microsoft’s Windows operating system to allow one computer to control another. It did so by causing that software to use too much memory.
[C] Though both of these programs fell short of the apparent objectives of their authors, they still caused damage. For instance, they forced the sh
The software architecture is a set of software components, subsystems, relationships, interactions, the properties of each of these elements, and the set of guiding principles that together constitute the fundamental properties and constraints of a software system or set of systems. (1) defines a general set of element types and their interactions. The examples include Pipes and Filters, Model-View-Controller, and Reflection. A (2) in software architecture is a representation used to understand or document one or more aspects of a problem or solution. Architecture is usually used in conjunction with many adjunct terms. The (3) defines the key strategies, organization, goals and related processes of the enterprise. At the enterprise level, the (4) may be more of a set of guidelines on how the various software architectures should be constructed consistently across the enterprise. The (5) , which describes the high-level set of elements involved in application from a particular dom
A. model
B. domain
C. component
D. subsystem
我来回答: