title>GB/T 11457-1995 Software Engineering Terminology - GB/T 11457-1995 - Chinese standardNet - bzxz.net
Home > GB > GB/T 11457-1995 Software Engineering Terminology
GB/T 11457-1995 Software Engineering Terminology

Basic Information

Standard ID: GB/T 11457-1995

Standard Name: Software Engineering Terminology

Chinese Name: 软件工程术语

Standard category:National Standard (GB)

state:Abolished

Date of Release1995-05-04

Date of Implementation:1995-01-02

Date of Expiration:2006-07-01

standard classification number

Standard ICS number:Information technology, office machinery and equipment >> 35.080 Software development and system documentation

Standard Classification Number:Electronic Components and Information Technology>>Information Processing Technology>>L77 Software Engineering

associated standards

alternative situation:Replaced GB 11457-1989; replaced by GB/T 11457-2006

Publication information

publishing house:China Standards Press

ISBN:155066.1-12004

Publication date:2004-04-09

other information

Review date:2004-10-14

Drafting unit:China Computer Software and Technology Service Center

Focal point unit:National Information Technology Standardization Technical Committee

Publishing department:State Bureau of Technical Supervision

competent authority:National Standardization Administration

Introduction to standards:

This standard defines the common terms in the field of software engineering and is applicable to software development, maintenance, scientific research, teaching and publishing. GB/T 11457-1995 Software Engineering Terminology GB/T11457-1995 Standard download decompression password: www.bzxz.net

Some standard content:

National Standard of the People's Republic of China
Software engineering terminology
This standard is summarized as follows:
The items are listed in alphabetical order according to their English equivalents; if a term has more than one definition, they are explained separately; b.
Definition is explained in paragraphs where necessary d.
GB/T11457
Synonyms GB11157·39
In order to explain the relationship between one term and other terms in this standard, the following terms are used. Compare. All complementary terms
In contrast to ..... Refers to a term with the opposite or different meaning: In contrast to a term with the same meaning
Refers to a term that is recommended or closely related to the term. See also .... Related terms
1 Subject matter and scope
This term is commonly used in the field of software engineering and is used in software development, maintenance, research, teaching and publishing. 2 Terminology
2.1 Abor
Abort
Aborts before the process is completed.
2.2 Absolute machine code Absolute machine code that must be loaded into a specific storage unit each time it is used and cannot be located. Contrast with 2.399. ?.3 Abstract machine
H: A representation of a process or machine,
h. a module that processes inputs like a machine. 2.4 Abstraction
A summary of a problem that abstracts the essential content related to a specific problem and ignores the non-essential content. a.
Forms a process of describing an image.
Acceptance criteria aeririnm
The criteria that must be met for a software product to meet the delivery requirements. 2.6 Acceptance testing Accepiance1esting the formal test of determining whether a system meets its acceptance criteria, enabling the user to determine the standard for accepting the system, see 2.3B1, 3.497.
2.7 Accessibility
The degree to which parts of the software are selected for use or maintenance. National Technical Supervision Network 19950504 approved
1995-12-01 implementation
GB/T 11457
2 Access control machine UUNXs
To allow a computer system or basic part of a computer system to be accessed by the user and prevent unauthorized access. Access is designed to 1! The performance or teaching characteristics, operation process or tube type. 2.9 Code accuracy ay
. A quality of error-free.
A qualitative ancient computer program with high error-free process. The smaller the error size and the true basis, the better the relative error, the higher the accuracy, the smaller the corresponding reading, d. A quantitative computer program with a degree of error. 2.34 2.10 Buyer acajuirer
point supplier to obtain or will obtain a system, product or service of an organization. Juice: can be a buyer, Shenzhen owner, use the unpurchased group policy 2.11 I weguisitiul
get a system, a product domain a ring service more than the house, 2.12 active file ariive il
has not exceeded the end time of the document,
2.13 activity
a process of annual variable program.
method: the change of the baseline requires the approval of the relevant authorities, 2.14 cler
when calling a subroutine, the value or expression of the data to be transferred to the program* is used to indicate the value of the program: compared with 2.211 program.
Adaptability
acaptabilits
The ease with which the software product can be updated and the needs of users can be met. 2.16
Applicability
The protection provided to ensure that the software product can be used in a changed environment. 2-17
A character or a sequence of characters that identifies a register, a specific part of a memory device, a source of some data, or a place. b, specifies a device or a data item, 21ec
A range of addresses that a computer program can use. 2.19
A, a set of well-defined operations that can be solved by a given set of operations; for example, a set of operations that can be completed by a given set of operations. 2-18
A, a set of well-defined operations that can be solved by a given set of operations; for example, a set of operations that can be completed by a given set of operations. 2-19
B. Definition A set of rules and finite elements that give a sequence of operations to perform a particular task. 2.20 Algorithm analysis The examination of an algorithm. The purpose is to determine whether it is correct in relation to its intended use, to determine its operation and characteristics, or to better understand an algorithm in order to modify, simplify or improve it. 2.21 Alias ​​Another name for a function. b. Replacement of a label. For example, a label and one or more aliases may be used to indicate the same data element or point in a computer program. 2 Analysis phase See 2.405. 2.23 Analytical procedure A set of solvable equations is used to represent a process or phenomenon, in accordance with 2.20. 2.24 Application-oriented language: A language for computing that has a particular application domain in its language or notation, e.g., a language for statistical analysis and computer design.
A problem-oriented language that contains or aggregates user or industry terms. 2.25 Software applications: Software that solves problems other than those of a specific domain and that is not computer-related. 2.26 System design: The process of defining a set of hardware software elements and their interfaces that are subsequently used to construct a computer system.
b. The result of the design process.
2.8 Human language Artifieiul lunguagc See 2.210.
2.29 Assembly language A55emble
The process of converting a program into a machine language program and storing it in memory. A common method of implementing this is to replace assembly language code with machine language code and replace symbolic addresses with absolute addresses, locations, lines, or addresses. In contrast to 2.72 and 2.254, 2.30 Assembly program Araml
The process of allowing a computer to perform assembly: In contrast to 2.73 and 2.255, 2.31 Assemble language
A. A computer-oriented language whose instructions correspond one-to-one with computer instructions and provide convenience for using instructions. Contrast with 2.279, 2.235. See 2.72, 2.33, 2.34, 2.35. A specific machine language, usually with a condition: 2.32 assertion
A logical expression that states a program state that must exist, or a condition that a variable must satisfy at a particular point in the program's execution, e.g., A is positive and A>H, see 2.2, 2.32. 2.33 assignment statement An instruction that assigns a sequence of operations to a specified variable, such as an operand, a symbol, or a variable. 2.3A A separate check of code to assess compliance with requirements, specifications, procedures, instructions, etc., see 2.3.
b. Activities conducted to determine, through investigation, whether established instructions, specifications, codes and standards or agreed-upon requirements are appropriate or complied with, and whether their implementation is effective. 2.35 Automated design tools mloaellig
Software tools that assist in the training, analysis, simulation or documentation of software design. The following are examples of automated design tools: simulators, analysis tools, design representation processors and documentation. 2.36 Automatic test generator automatic test cascade cncrator automatic test generator 2.38.
2.37 Automatic test data generator automatic test catalyst kene!atot 2.38.
GE/T11457—1995
2.38 Automatic test generator automatic test generator A tool which takes a calculation procedure and criteria as input, generates test input data that meets these criteria, and sometimes also determines the expected results.
2.39 Automated verification system Euromated verification system A software tool that uses a representation of a computer program and its specifications as an abstract (possibly with the help of a human) to generate an indication of whether the program is correct or not. 2.4G.
7.4 Automated verification tools Euromated verification tools are used to evaluate the products of the software development process. These tools can only help to verify the correctness, completeness, reliability, specificity, testability, and check whether the following standards are met. Toolkits include dynamic verification systems, state analyzers, dynamic analyzers and annotation implementors: 2.41 automatic verification tools
7.4 Automated verification tools Euromated verification tools are used to evaluate the products of the software development process. These tools can only help to verify the correctness, completeness, reliability, specificity, testability, and check whether the following standards are met. Toolkits include dynamic verification systems, state analyzers, dynamic analyzers and annotation implementors: 2.41 automatic verification tools
7.4 Automated verification tools Euromated verification tools : The rate at which the specified system function can be achieved when the system is used. . The ratio of normal system operation time to total operation time: C. The ability of a configuration item to achieve the specified function during operation. 2.42 Availabilitymodel: A model used to predict, estimate and determine availability. 2.43 Backup. Back-up
When a system failure or fault occurs, the backup computer equipment is used to restore data files or software.
2.44 Haseline
: A product that has been formally reviewed and approved and can be used as the basis for the next step of development and can only be modified through formal modification management procedures. At a specific time in the life cycle of the configuration item The piping identification file and a set of detailed b,
documents officially designated or issued by the government, plus the changes approved according to these lines constitute the current piping identification. For piping management, there are three lines:
's energy baseline - the most likely passed energy configuration; allocation card line - the initial allocation passed. The product baseline is the most likely passed or the product configuration passed in strips. 2.45 and start-endblockheginl and en separate the design text sequence test, which is characterized by a single entry and a single exit. 2.46 Agreement (name), association, constraint. Station combination binding assigns a value or a specified quantity object (refcrcnt) to an identifier: for example, assign a value to a date or Assign an absolute, relative, or service identifier to a symbolic address or label of a computer program. See 2.166, 2.170. 2.47 Block (n) Block (verb) hluk
A string of bits, words, or characters formed by some technical reason. a.
b. A group of consecutive records recorded as a unit, separated by gaps between blocks, each block may contain one or more records,
, a group of binary or N-ary bits that are transmitted as a unit. This group of binary or N-ary bits is usually abbreviated to achieve error control, d. A thing treated as a unit, such as a collection of characters or numbers, see 2.351.
「.Some operations in the system can only be continued temporarily due to some reasons.2.48 grid nirrkdiugat
GB/T 11457—1995bzxZ.net
A diagram showing a system, computer, or device in which the major parts are represented by appropriately shaped geometrical figures, illustrating the basic functions of the major parts and their functional relationships. Contrast with 2.209. 9 Block-structured language 2.49
A programming language in which sequences of statements are delimited by the bcgin and eud delimiters. See 2.351. 2.50 Guide bn9
4. A computer program that is easily loaded into a computer and whose execution by a boot program brings another, larger program, such as an operating system or its loading program, into memory, and sets of instructions that cause additional instructions to be loaded until the entire computer program is stored in memory. h.
A technique or device that achieves a desired state by its own action; e.g., a segment of a computer. A program that is used to create a version of a computer program. An input routine that uses a pre-programmed computer to load a boot sequence. A method that starts with the lowest level of structure and works its way up to the highest level. 2.53 Bottom-up Design: A method of designing a system from the most basic or primitive level to the higher levels. Contrast with 2.527. For example, see 2.19: For example, see 2.526: 201:
5 build!
, a working version that contains a specified subset of the capabilities that the final product will have.
building block of a software product
building block
a single module used by a higher-level program or module: (division) case statement
a multi-branch conditional statement that can selectively execute a limited number of statements based on the value of a control table option. See 2.105. certification on
a system A written assurance that a computer system is functional and can operate in a defined environment or produce reasonable confidence. A formal demonstration of the system's compatibility in order to obtain approval for operational use. Certification is the process of verifying that a system, software or computer library can meet specified requirements in its operating environment. Certification is often conducted on-site under actual conditions and is used not only to verify the software itself, but also to evaluate the specifications that the software design was based on. Certification extends the process of verification and confirmation to the formal verification and certification of the actual or proposed operating environment based on the requirements that can be implemented in writing, and verifies and certifies the steps and actions taken by the personnel to verify or certify the case. 2.60 Link beimxl lis1
A list in which the items may be discrete, but each item contains an identifier indicating the next item: Same as 2.269.
2.61 Changes to CB/T11457—1995
The process of proposing a change and its evaluation, approval or rejection, scheduling and tracking. 2.62 Unambiguous rules that specify the way in which data can be represented in a certain format. h.
Data or computer programs can be represented in a symbolic format acceptable to the machine. c. Books and routines.
d. Also called a part of a program or computer program that is composed of multiple programs. For the sake of security, the data is added. 2.63 Code inspection An independent review of the code by the author, a team, or other tools to verify that it complies with the design documents and program design standards. It may also be estimated for correctness and effectiveness. See 2.3, 2.465, 2.237, 2.545, 2.64 Code inspection A program or program function, often used as part of a compiler, that converts a computer program from some intermediate representation (usually the output of a grammatical analysis program) to a lower-level representation. 2.65 Code inspection See 2.257. 2.66 Codewalk-thraugh
Dream of 2.545 tea.
2.67 Depth of cohesion
The degree of correlation between the underlying tasks performed by a single program module and the functions performed by it. Contrast with 2.112 strategy. 2.6 Command language
Command language The combination of operators and their associated syntax: used to specify functions to be performed by the operating system. 2.69 Comments
Explanatory information in a computer program, command language, or data, intended to provide clarity to the reader and not to affect the interpretive function of the computer.
b. Descriptions, notes, or explanations of or in the source language are invalid in this standard. 2.70 Comparator A tool used to compare two computer programs, files, or data in order to find commonalities or differences. The objects of comparison are typically source code, code, database files, or test results. 2.71 Compatibility The ability of two or more systems to produce the same results by running the same software. The ability of one or more systems to produce the same results by processing the same data files. 2.233 Comparison 2.72 Compiler A floating or absolute machine equivalent to a high-level program. Contrast with 2.29. 2.73 Compiler ||A computer program compiled in 1 line. Compare with 2.30, 2.255. 2. Compiler compiler compiler cf. 2.75
2.75 Compiler generator A program or interpreter used to construct terminal functions. Synonymous with 2.200. 2.76 Complexity rmplexiy
The complexity of a system or a component of a system, as determined by factors such as the efficiency and gain of interfaces, the number of conditional transfers 6
CR/T11457 —1995
and the degree of complexity, depth of nesting, type of data structure, and other system characteristics. 2.77 Component, component of a system or program
2.7 Computer comju
A functional device capable of performing a large number of calculations, including many arithmetic and logical operations, without interference from the operating system during operation.
b, a programmable functional device consisting of one or more interconnected processors and external devices, which has an internal thread control system and can perform large calculations (many calculations) 2.79 Computer datacamputerata
Data used for communication between computers and computer equipment or within computer equipment. This data may be in any external (computer-interconnected) form, may reside in the computer equipment, and may be analog or digital.2.-Networkom[rtwuk
A complex of two or more computers that perform the same task.2.81cpuproam
A sequence of instructions suitable for processing by a computer according to specific requirements.See 2. 352 clauses
2.82Computer program abstract
Armple- mentary statements:
A brief description of a computer program that provides the user with sufficient information to determine whether the computer program is appropriate for his or her needs and the resources available to him or her.
2.83Computer program annotation: See clause 2.60.
Computer program certification
See clause 2.59.
2.85Computer program identification
Comppu:er program certification
See clause 2.96
2.86Computer program development plan2.87 Computer program validation 2.533 Computer program validation 2-88 Computer program validation 2.537. 2.89 Computer system A functional unit consisting of one or more computers and associated software. 2.90 Concurrent processes A number of processes that can be executed simultaneously on multiple processors or asynchronously on a single processor. Concurrent processes can interact with each other, and one process can suspend execution before accepting another process's request or before an external event occurs. 2.426 Relative to 2.91 System control structure A program design control structure that allows the use of control flows that are selected according to the conditions of a specified delay: for example, if yes, then no...
2.92 Configuration
, the arrangement of a computer system or network according to the characteristics of its functional components and the number of main characteristics. Specifically, the term configuration can be used to refer to hardware configuration or hardware configuration, 7
CD/T11457—1995
b, the requirements and design implementations invested in a specific amount of money for a system or component that requires a certain amount of money, and the hardware, functional knowledge (or) physical properties of the hardware in a parallel product specified in the technical specification. 2.93 The configuration must be audited after all the required configuration items have been produced and the current configuration is in compliance with the specified requirements. The technical documentation is fully accurate and meets the requirements of the configuration items and all changes that have been proposed have been resolved. 2.94 The configuration must be audited before the configuration identification of the configuration is formally determined. The evaluation, coordination, approval or disapproval of the configuration items must be carried out. After the configuration identification of the configuration items is formally determined. The systematic evaluation, coordination, and approval of the configuration items must be carried out. The implementation process of the approved changes in the configuration must be carried out by the configuration control committee. 2.951 The configuration control committee must evaluate the proposed changes, approve them, and ensure their implementation. 2.96 The system of matching items in the matching system shall record its characteristics and determine the support of a matching item after the process of fat. b.
The technical documentation of a matching item that has been approved or conditionally approved, and the relevant table compensation description in the specification.
2.97 Configuration item management is the hardware and/or software component of a single test unit, or a combination of them that is designated for configuration management. Configuration items vary in complexity, performance and model, and can be anything from a ship's main instrument to an aircraft system. During the development and initial production stages, a configuration item is one that is directly referenced in the contract (or its equivalent in-house agreement). During operation and ongoing maintenance, any maintainable item that is designated to be separately installed is also a configuration item. 2.98 Management ur:figuralicn Manixement1 The process of identifying and determining the key items in a system, controlling the introduction and modification of these items throughout the life of the system, recording the status of the items and the requirements for modification, and ensuring the integrity and correctness of the items. See 2.61, 2.66, 2.91, 2.99, 2.93. b. Technical and administrative guidance and supervision of the following: ..… Identify and document the functional and physical characteristics of a component: a. Control requirements, such as changes or modifications, and record the processing and implementation status of these changes. 2 .gg The preparation module reports the details of the records and reports required to effectively manage a preparation. This includes a list of approved preparation identifications, the status of actions taken on the preparation, and the implementation status of approved changes. 2.100 Monitor canfinement
2, and prevent unauthorized changes, reuse, recovery, and abandonment of medical data during the approved decision period: see 2.247b. Restrictions on differences and omissions are imposed so that they do not access or affect unapproved data, procedures, or processes. 2.1 01 link inme:lim
: a reference to a part of a program and an identifier of another part of the program (i.e., an identifier developed by a foreign party). See 2.245b. A documented relationship between functional components for the purpose of transferring information. 2.102 A contract is a collaboration between the parties that is legally binding, or an internal agreement within an organization for the provision of services, which provides for the supply, development, production, operation or maintenance of a system or part of a system: 2.1 03 The audit process required by the contract is contranalyrequiruurlir. It is usually conducted by the purchaser or an independent organization. This process provides an evaluation of the product or service to determine whether the product or service meets their needs. 2.104 Contrnldata
The operation mode or sub-mode in the sample and sequence is used to draw the sequence flow: it must directly affect the data of the software. 2.105 The controlstatemen
affects the execution of the operation to obtain the program effect. 2.106 Control station structurecnntralstructure The general type of computer program determines the structure of the control station. Refer to 2. 2.107 Conversion coverage The modification of existing software so that it retains the same performance without interruption. For example, converting a program from FOR to A, converting a program that runs on a different computer to one that can run on another computer. 2-108 Collaborative routines Two or more modules that share the same functions but do not have a hierarchy. 2.109 Maintenance maintenance performed to overcome existing defects. See 2.449. 2.110 Resilience The degree to which there are no defects, i.e., no defects, and the degree to which a software product meets the requirements specified by the manufacturer. The degree to which software meets the requirements of the manufacturer.
2-111 Proof of correctness or reproducibility
42.374
2.112 Coupling
Determine the degree of interdependence between modules in a program. 2.375
2.113 Critical, relevant, critical:
Record:
And. Due to improper design, some parts of the system or operation may exceed the limit at runtime, or there may be potential, large, undetectable errors, which may cause serious consequences such as crashes, damage to personnel, mission failure, data loss, financial loss, or catastrophic equipment damage. Or it refers to the degree of effectiveness and risk reduction of the software development techniques to be used. 2.114 Prioritization of relevant parts is an approach to software development that focuses on implementing the most relevant parts of the software system first. Criticality can be determined based on the service provided, the level of risk, the difficulty of the installation or other functions. 2.115 Criticality A section of code that is about to be executed. The execution of a set of code that is mutually exclusive with the execution of another set of code: if the code uses a certain amount of computer resources and time, these sections are required to be executed exclusively. 2.116 Criticality The classification of software errors or failures based on the assessment of their impact on the development and operation of the system (usually used to determine whether a certain change needs to be corrected, and when to correct it). 2.117 A standard programming program that generates standard code on one computer for another computer. 2.118 A standard programming program that generates standard code on one computer for another computer. 119 A standard programming program that generates standard code on one computer for another computer. 2.9 Data data
The formalized form of a reality, concept or command that is communicated, interpreted or processed by a human being (see 2.79, 2.104, 2.179, 2.3$, 3.445). 2.20 Data a method of extracting data using a model that can be used to determine its relevant characteristics, without changing the original characteristics of the data, or hiding them from the details (see 2.235, 2.121). 4. Data de ta5a
data file means a data file or a whole file which contains at least enough information for a given data processing system.
b, a set of data that is essential to the system.2.122data dictionarydata dictionary
a collection of names of all valid data used in a software system and some of the relevant characteristics (for example, length, display, etc. of data items).
h. A collection of fixed information related to data flows, data element searches, text, data lookups and reverse engineering processes involved in data dictionaries.2.123data dictionary ovw ehart
is a graphical representation of a node system, which shows the data source, data collection, storage and processing performed on the data by node shadow, and the logic that is an important part of the migration between nodes. It is similar to 2.124 and 2.125. 2.124 European data flow diagram dataflowliaga
See 2. 123.
2.125 Data flow datatype datatype datatype datatype A datatype that is a collection of data items that are not in the same order as the data item.
2.126 Data type datatype A datatype that is a collection of data items that are not in the same order as the data item.
2.127 Data type datatype A datatype that is a collection of data items that are not in the same order as the data item.
2.128 Data type datatype A datatype that is a collection of data items that are not in the same order as the data item.
2.130 Datatype A datatype that is a collection of data items that are not in the same order as the data item.
2.131 Datatype A datatype that is a collection of data items that are not in the same order as the data item.
2.132 Datatype A datatype that is a collection of data items that are not in the same order as the data item.
2.133 Datatype A datatype that is a collection of data items that are not in the same order as the data item.
2.134 Datatype A datatype that is a collection of data items that are not in the same order as the data item.
2.135 Datatype A datatype that is a collection of data items that are not in the same order as the data item.
2.136 Datatype A datatype that is a collection of data items that are not in the same order as the data item.
2.137 Datatype A datatype that is a collection of data items that are not in the same order as the data item.
2.138 Datatype A datatype that is a collection of data items that are not in the same order as the data item. tuble
r. A list of all possible situations to be considered in a problem and the actions to be taken for a set of possible situations,
b. A matrix or table representation of the situations and their actions, see clause 2.198.
2.132 Definition phase, see clause 2.40.
2.133 Delivery
The phase in the software development cycle where the product is delivered to the users for their use. The phase in the software development cycle where the product is delivered to the intended users. h
2.134 Design
The process of determining the software architecture, components, solutions, interfaces, test paths, and data sets so that the software system meets specified requirements.
h Collection of design processes.
2.135 Design analysis
GB/T11457—1995
. To estimate a design to determine its accuracy relative to the predetermined requirements, the rationality of the design standards, the efficiency of the weak system and whether it meets certain other requirements.
h. Evaluation of other alternative design approaches. 2.136 Design analysis
An automatic design tool that receives information about the process and the design method and generates the following outputs: a schematic diagram, a graphical representation of the control data structure, and a quick list of the accessed data. 2-137 Design review
See 2.27.
2.138 design languagedesignlanguage
A specific and sometimes specific language used to develop, document, and analyze designs.2.39 design methodology
A systematic approach to design consisting of the orderly application of specifically selected techniques, techniques, and principles.designphase
A period of time in the life cycle of a software component during which the design of the design, interfaces, and data is documented and verified to meet predetermined requirements.design requirementsdesignrenairemen
The requirements of a design for a system or component or part of a system: for example, kinetic requirements, physical requirements, energy requirements: requirements for the design of a system or component or part of a system ... In a formal discussion, the proposed or detailed design of a system is presented to the user, client, or other interested party for review or evaluation.
h: A formal evaluation and review of a proposed or existing design to identify design deficiencies that may affect the usability and effectiveness of the product, process, or service and/or to identify possible improvements in performance, safety, and economy:
2.143 Design specification A formal document required in a design that describes the design of a system or system component (e.g., features, configuration items), including system or system component calculations, control logic, data structure settings and usage (sct.1), and interface formats and descriptions. See clause 2.539. Design path verification

Design Walkthrough
See 2.515.
2.146 Surface Checking
Manually review the execution of a program: Use a series of steps to check for errors or syntax errors in the source code. See 2.468.
2.147 Tailed Design
Develop and expand the design to obtain a more detailed description of the processing logic, data structure, and data definitions until the design is complete enough to be implemented.
b. Result of detailed design adaptation
2.148 Development deepener
GB/T114571995
An organization that performs development activities (from requirements analysis to design to completion) in the software life cycle. 2.149 Development cycle developmcntcycle See 2.438.
2-150 Development cycle dcvciopmcntlifecycle See 2.438.
2.151 Development method deepens metinadalnRy A systematic approach to development that determines the stages of development and specifies the activities, products, verification levels and completion criteria for each stage.
2.152 Development Specifications>emxficr
Same as 2.137
2.153 CIAgnastic
Information generated by a program, used to indicate the presence of a system flow. For example, errors marked by a program,
Description of faults and failures. 2.154 Digraph
Subject to 2.155.
2.155 Directed Graph directedgraph
A graph in which the edges are unidirectional. 2.156 Document. File dnemem1
A digital medium and the data recorded thereon, which is permanent and can be read by humans or machines. Generally only refers to the description of artificially reversible content. For example, technical files, design files, version notes. b.
Compile documents:
2.157 documents, document management: document management dumemtliasra.
The combination of the six given questions, 2.335 records, 2.443 items, 2.493. Document management may include the following activities: the acquisition, processing, storage and validation of documents. The process of producing a document is any tangible or graphic information that describes, defines, specifies, reports or authenticates an action, request, process or result. 2.15 Document level docmentatinn level See 2.263. A program A procedure that performs the operation of a system or system component by means of analogy to a higher level system component. 2.11
2.160 Dual Eoding
A concurrency technique in which two versions of a program that are functionally identical are developed by different programmers and different program design teams based on the same specification. The resulting source code may be in the same or different languages. Dual Eoding provides error detection, improves reliability, provides additional documentation, or reduces the chance of system errors affecting program design or compilation errors. Dummy parameter
See 2.211:
2.162 Dual Eoding is a concurrency technique in which two versions of a program that are functionally identical are developed by different programmers and program design teams based on the same specification. The resulting source code may be in the same or different languages. Dual Eoding provides error detection, improves reliability, provides additional documentation, or reduces the chance of system errors affecting program design or compilation errors affecting program performance. Dummy parameter
See 2.211:
2.162 Dual Eoding is a concurrency technique in which two versions of a program are converted to memory. For a specific purpose, such as allowing memory to be used for other purposes, or as a measure to prevent faults and errors; or for the purpose of performing b.
Tip: This standard content only shows part of the intercepted content of the complete standard. If you need the complete standard, please go to the top to download the complete standard document for free.