- •Основы Информационных Систем (вопросы к спец экзамену)
- •If the dtd is included in your xml source file, it should be wrapped in a doctype definition with the following syntax:
- •Xml. Pcdata means:
- •In a dtd, Attributes are declared with an _______ declaration
- •Xml is case-sensitive ?
- •Xml. Elements with only character data are declared with
- •Is the follwing dtd definition valid ?
- •Is the following xml valid ?
- •XQuery. “Flower” Expressions are:
- •Is Development Challenges:
- •Xslt. Processing always starts at the root . Is it right?
- •Xsl. How do you divide 10 by 5?
- •Is Development. Choose the most right order of steps
- •Is the following text valid xml ?
- •XQuery. Which order of clauses is right?
- •Information Systems are
- •Is Development Opportunities:
- •Is the follwing dtd definition valid ?
- •Is the following text valid xml ?
- •Xslt is a...
- •Is the following xml file well-formed ?
Xslt is a...
Выберите один ответ.
a. high-level transformation language;
b. query and functional programming language;
c. query language for selecting nodes;
d. a markup language that defines a set of rules for encoding documents;
Question 165
HTTP is the ubiquitous protocol, which is running practically everywhere on:
Выберите один ответ.
a. Internet;
b. pages;
c. systems;
d. networks;
Question 166
When the same DTD declaration is found in the internal and external subset, which one has priority ? The one from the external subset or the one from the internal subset ?
Выберите один ответ.
a. external subset
b. internal subset
c. all answers not right
d. none of them
e. both of them
Question 167
What does not belong to Ensuring software quality?
Выберите один ответ.
a. Walkthrough: Review of specification or design document
b. Early and regular testing
c. Software classification
d. Debugging: Process by which errors are eliminated
e. Software metrics
Question 168
Is the following xml file well-formed ?
<!-- comment -->
<?xml version="1.0"?>
<root>
</root>
Ответ:
Верно Неверно
Question 169
Encryption: Transforming text or data into cipher text that cannot be read by unintended recipients
Выберите один ответ.
a. False
b. True
Question 170
What does this instruction mean?
<xsl:apply-templates select="//div" />
Выберите один ответ.
a. This means "Find all the
elements which are children of the current context node, and process them according to any applicable templates".
b. This is a template that should contain instructions for how to render a
element.
c. This means "Find all the
elements in the document, and process them according to any applicable templates".
Question 171
The left outer join is one type of outer join. Another one is the.
Выберите один ответ.
a. full
b. right outer
c. full outer
d. all answers are right
e. right
Question 172
Which XQuery's agregator computes the sum?
Выберите один ответ.
a. avg
b. sum
c. round
d. distinct-values
e. count
Question 173
Which XQuery's agregator computes the average?
Выберите один ответ.
a. sum
b. distinct-values
c. avg
d. count
e. round
Question 174
System Vulnerability and Abuse. Trojan is
Выберите один ответ.
a. Eavesdropping program that monitors information traveling over network
b. Small programs install themselves surreptitiously on computers to monitor user Web surfing activity and serve up advertising
c. Rogue software program that attaches itself to other software programs or data files in order to be executed
d. Independent computer programs that copy themselves from one computer to other computers over a network
e. Software program that appears to be benign but then does something other than expected
Question 175
Web Services. The UDDI is:
Выберите один ответ.
a. United Description, Discovery and the Integration Service;
b. Universal Description, Discovery and the Integration Service;
c. Unidirectional Description, Discovery and the Integration Service;
d. Universal Discovery, Description and the Integration Service;
Question 176
Hackers and Crackers. Are they different?
Выберите один ответ.
a. None difference. They are totaly the same.
b. All answers are wrong
c. Yes. They are opposite to each other. Hackers are "good guys" and Crackers are "bad guys".
d. Yes. They are opposite to each other. Hackers are "bad guys" and Crackers are "good guys".
Question 177
System Vulnerability and Abuse. Pharming is
Выберите один ответ.
a. Steal of personal Information (social security id, driver
b. Setting up fake Web sites or sending e-mail messages that look like legitimate businesses to ask users for confidential personal data
c. Occurs when individual or computer program fraudulently clicks on online ad without any intention of learning more about the advertiser or making a purchase
d. Wireless networks that pretend to offer trustworthy Wi-Fi connections to the Internet
e. Redirects users to a bogus Web page, even when individual types correct Web page address into his or her browser
Question 178
The Web services can not offer the application components like:
Выберите один ответ.
a. weather reports;
b. web browsers;
c. the currency conversion;
d. the language translation;
Question 179
System Vulnerability and Abuse. SQL injection is
Выберите один ответ.
a. Software program that appears to be benign but then does something other than expected
b. Hackers submit data to Web forms that exploits site
c. Small programs install themselves surreptitiously on computers to monitor user Web surfing activity and serve up advertising
d. Independent computer programs that copy themselves from one computer to other computers over a network
e. Rogue software program that attaches itself to other software programs or data files in order to be executed
Question 180
XML publishing: XML --> relational data. Is it right?
Выберите один ответ.
a. False
b. True
Question 181
System Vulnerability and Abuse. Click fraud is
Выберите один ответ.
a. Wireless networks that pretend to offer trustworthy Wi-Fi connections to the Internet
b. Steal of personal Information (social security id, driver
c. Redirects users via fraudulently click to a bogus Web page, even when individual types correct Web page address into his or her browser
d. Setting up fake Web sites or sending e-mail messages that look like legitimate businesses to ask users for confidential personal data
e. Occurs when individual or computer program dishonestly presses on online ad without any intention of learning more about the advertiser or making a purchase
Question 182
Which of the following statements contains an error?
Выберите один ответ.
a. SELECT * FROM student WHERE stud_id = 578693;
b. SELECT stud_id WHERE stud_id = 45238 AND lastname = ‘Sabiev’;
c. SELECT stud_id FROM student;
d. SELECT stud_id FROM student WHERE stud_id= 578693;
e. SELECT * FROM student;
Question 183
Is the following DTD declaration valid ?
<!DOCTYPE personnel SYSTEM "./dtd/RplClient.dtd" -->
Ответ:
Верно Неверно
Question 184
Which of the following steps should you take when creating a DTD for an existing XML document? Please select all the correct answers.
Выберите по крайней мере один ответ:
a. Noting which elements will contain text, and which will contain only other elements
b. Determining whether certain elements' content must be present
c. Listing all the document elements in alphabetical order
d. Deciding whether elements should appear in a specific order
Question 185
XSL. How do you select the first two titles in the document:
Выберите один ответ.
a. (//title)[last()<=2]
b. (//title)[order()<=2]
c. (//title)[position()<=2]
d. (//title)[index()<=2]
Question 186
Select which of the following is the specification used when transforming XML documents to HTML.
Выберите один ответ.
a. DTD
b. XML Schema
c. XSLT
d. XPATH
e. SOAP
Question 187
Which of the following tags are valid ? (check all valid options)
Выберите по крайней мере один ответ:
a. <ce/ll>
b. <cell/>
c. <cell />
d. <cell / >
Question 188
Choose right way of applying an XSLT to an XML document
Выберите один ответ.
a. Transforming
b. Formating
c. Adding
d. Modifying
