Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
FIS_SpecExam_188_full.docx
Скачиваний:
0
Добавлен:
01.07.2025
Размер:
65.99 Кб
Скачать

Xslt is a...

Выберите один ответ.

a. high-level transformation language;

b. query and functional programming language;

c. query language for selecting nodes;

d. a markup language that defines a set of rules for encoding documents;

Question 165

HTTP is the ubiquitous protocol, which is running practically everywhere on:

Выберите один ответ.

a. Internet;

b. pages;

c. systems;

d. networks;

Question 166

When the same DTD declaration is found in the internal and external subset, which one has priority ? The one from the external subset or the one from the internal subset ?

Выберите один ответ.

a. external subset

b. internal subset

c. all answers not right

d. none of them

e. both of them

Question 167

What does not belong to Ensuring software quality?

Выберите один ответ.

a. Walkthrough: Review of specification or design document

b. Early and regular testing

c. Software classification

d. Debugging: Process by which errors are eliminated

e. Software metrics

Question 168

Is the following xml file well-formed ?

<!-- comment -->

<?xml version="1.0"?>

<root>

</root>

Ответ:

Верно Неверно

Question 169

Encryption: Transforming text or data into cipher text that cannot be read by unintended recipients

Выберите один ответ.

a. False

b. True

Question 170

What does this instruction mean?

<xsl:apply-templates select="//div" />

Выберите один ответ.

a. This means "Find all the

elements which are children of the current context node, and process them according to any applicable templates".

b. This is a template that should contain instructions for how to render a

element.

c. This means "Find all the

elements in the document, and process them according to any applicable templates".

Question 171

The left outer join is one type of outer join. Another one is the.

Выберите один ответ.

a. full

b. right outer

c. full outer

d. all answers are right

e. right

Question 172

Which XQuery's agregator computes the sum?

Выберите один ответ.

a. avg

b. sum

c. round

d. distinct-values

e. count

Question 173

Which XQuery's agregator computes the average?

Выберите один ответ.

a. sum

b. distinct-values

c. avg

d. count

e. round

Question 174

System Vulnerability and Abuse. Trojan is

Выберите один ответ.

a. Eavesdropping program that monitors information traveling over network

b. Small programs install themselves surreptitiously on computers to monitor user Web surfing activity and serve up advertising

c. Rogue software program that attaches itself to other software programs or data files in order to be executed

d. Independent computer programs that copy themselves from one computer to other computers over a network

e. Software program that appears to be benign but then does something other than expected

Question 175

Web Services. The UDDI is:

Выберите один ответ.

a. United Description, Discovery and the Integration Service;

b. Universal Description, Discovery and the Integration Service;

c. Unidirectional Description, Discovery and the Integration Service;

d. Universal Discovery, Description and the Integration Service;

Question 176

Hackers and Crackers. Are they different?

Выберите один ответ.

a. None difference. They are totaly the same.

b. All answers are wrong

c. Yes. They are opposite to each other. Hackers are "good guys" and Crackers are "bad guys".

d. Yes. They are opposite to each other. Hackers are "bad guys" and Crackers are "good guys".

Question 177

System Vulnerability and Abuse. Pharming is

Выберите один ответ.

a. Steal of personal Information (social security id, driver

b. Setting up fake Web sites or sending e-mail messages that look like legitimate businesses to ask users for confidential personal data

c. Occurs when individual or computer program fraudulently clicks on online ad without any intention of learning more about the advertiser or making a purchase

d. Wireless networks that pretend to offer trustworthy Wi-Fi connections to the Internet

e. Redirects users to a bogus Web page, even when individual types correct Web page address into his or her browser

Question 178

The Web services can not offer the application components like:

Выберите один ответ.

a. weather reports;

b. web browsers;

c. the currency conversion;

d. the language translation;

Question 179

System Vulnerability and Abuse. SQL injection is

Выберите один ответ.

a. Software program that appears to be benign but then does something other than expected

b. Hackers submit data to Web forms that exploits site

c. Small programs install themselves surreptitiously on computers to monitor user Web surfing activity and serve up advertising

d. Independent computer programs that copy themselves from one computer to other computers over a network

e. Rogue software program that attaches itself to other software programs or data files in order to be executed

Question 180

XML publishing: XML --> relational data. Is it right?

Выберите один ответ.

a. False

b. True

Question 181

System Vulnerability and Abuse. Click fraud is

Выберите один ответ.

a. Wireless networks that pretend to offer trustworthy Wi-Fi connections to the Internet

b. Steal of personal Information (social security id, driver

c. Redirects users via fraudulently click to a bogus Web page, even when individual types correct Web page address into his or her browser

d. Setting up fake Web sites or sending e-mail messages that look like legitimate businesses to ask users for confidential personal data

e. Occurs when individual or computer program dishonestly presses on online ad without any intention of learning more about the advertiser or making a purchase

Question 182

Which of the following statements contains an error?

Выберите один ответ.

a. SELECT * FROM student WHERE stud_id = 578693;

b. SELECT stud_id WHERE stud_id = 45238 AND lastname = ‘Sabiev’;

c. SELECT stud_id FROM student;

d. SELECT stud_id FROM student WHERE stud_id= 578693;

e. SELECT * FROM student;

Question 183

Is the following DTD declaration valid ?

<!DOCTYPE personnel SYSTEM "./dtd/RplClient.dtd" -->

Ответ:

Верно Неверно

Question 184

Which of the following steps should you take when creating a DTD for an existing XML document? Please select all the correct answers.

Выберите по крайней мере один ответ:

a. Noting which elements will contain text, and which will contain only other elements

b. Determining whether certain elements' content must be present

c. Listing all the document elements in alphabetical order

d. Deciding whether elements should appear in a specific order

Question 185

XSL. How do you select the first two titles in the document:

Выберите один ответ.

a. (//title)[last()<=2]

b. (//title)[order()<=2]

c. (//title)[position()<=2]

d. (//title)[index()<=2]

Question 186

Select which of the following is the specification used when transforming XML documents to HTML.

Выберите один ответ.

a. DTD

b. XML Schema

c. XSLT

d. XPATH

e. SOAP

Question 187

Which of the following tags are valid ? (check all valid options)

Выберите по крайней мере один ответ:

a. <ce/ll>

b. <cell/>

c. <cell />

d. <cell / >

Question 188

Choose right way of applying an XSLT to an XML document

Выберите один ответ.

a. Transforming

b. Formating

c. Adding

d. Modifying

33

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]