Article directory
Topic and source of analysis: April 21, 2023 A software designer's daily practice
1. Today's results
2. Summary of wrong questions
first question
Parse:
second question
Parse:
activity diagramA state diagram is a special kind of state diagram that shows the flow from one activity to another within the system . Activity diagrams focus ondynamic view of the system, it is the system'sFunctional ModelingEspecially important and emphasizes the flow of control between objects .
third question
Analysis:
capture v. capture; capture
notion n. concept, idea scenario n. envisage ,
possible situations ; cycle n. bicycle; cycle, cycle consecutive adj. continuous, uninterrupted well-defined adj. clear boundaries; well-defined executable adj. executable; executable subset n. sub-equipment; small groups; [number ]Subset discipline n. discipline, discipline; punishment, punishment artifact n. artifacts, historical relics orientation n. target, positioning; direction, towards phase n. stage, period criteria n. standard, criterion, scale round n. round ;Round loop n. ring, ring; loop iteration n. iteration circularity n. circle workflow n. workflow, workflow milestone n. important events, turning points; milestones
fourth question
Parse:
derived attribute: can be obtained from other attributes .
multi-valued attribute: An attribute may correspond to a set of values .
Age can be calculated from the date of birth , soAge is a derived property; and the title mentions "'Contact information' requires recording the employee's mobile phone number and office phone number" , so the contact information corresponds to multiple values , soContact is a multi-valued attribute。
3. Gaps in knowledge
- reviewCacherelated information.
- A binary tree with 3 nodes has5kind of form.
- In the Publish-Subscribe (Publish-Subscribe) message mode, after a subscriber subscribes to a topic, all subscribers will receive a notification when a new message arrives on the topic .ObserverDesign patterns are best suited for this.
- In the process of object-oriented software development, the use of design patternsto reuse successful designs。
- OF THEyesSymmetric keyCipher algorithm , its encryption key and decryption key are the same .RSAyesasymmetric keyA cryptographic algorithm that uses separate keys for encrypting and decrypting data , and can also be used for digital signatures . The efficiency of the symmetric key encryption algorithm is much higher than that of the asymmetric key encryption algorithm , and it is suitable for encrypting a large amount of data such as files .
- The message digest is given byhash functiongenerate.
- reviewRelational Algebra in Databasessome relevant knowledge.