- •Основы Информационных Систем (вопросы к спец экзамену)
- •If the dtd is included in your xml source file, it should be wrapped in a doctype definition with the following syntax:
- •Xml. Pcdata means:
- •In a dtd, Attributes are declared with an _______ declaration
- •Xml is case-sensitive ?
- •Xml. Elements with only character data are declared with
- •Is the follwing dtd definition valid ?
- •Is the following xml valid ?
- •XQuery. “Flower” Expressions are:
- •Is Development Challenges:
- •Xslt. Processing always starts at the root . Is it right?
- •Xsl. How do you divide 10 by 5?
- •Is Development. Choose the most right order of steps
- •Is the following text valid xml ?
- •XQuery. Which order of clauses is right?
- •Information Systems are
- •Is Development Opportunities:
- •Is the follwing dtd definition valid ?
- •Is the following text valid xml ?
- •Xslt is a...
- •Is the following xml file well-formed ?
If the dtd is included in your xml source file, it should be wrapped in a doctype definition with the following syntax:
Выберите один ответ.
a. <DOCTYPE root-element (element-declarations)>
b. <!DOCTYPE [element-declarations]>
c. <DOCTYPE root-element [element-declarations]>
d. <!DOCTYPE root-element [element-declarations]>
Question 20
Zero defects cannot be achieved because complete testing is not possible with large programs
Выберите один ответ.
a. True
b. False
Question 21
Which two of the following are correct when including “&” character within an element value?
Выберите по крайней мере один ответ:
a. The “&” character cannot be included within an element value
b. Enclose the “&” character in single quotes (‘’) <Element1>you'&'me</element>
c. Use a CDATA section <Element1><![CDATA[you&me]]></Element1>
d. Use the predefined entity reference “&аmр;” for the “&” character <Element1>you&me</Element1>
e. Enclose the “&” character in double quotes (“”) <Element1>you"&"me</element>
Question 22
System Vulnerability and Abuse. Spyware is
Выберите один ответ.
a. Software program that appears to be benign but then does something other than expected
b. Small programs install themselves surreptitiously on computers to monitor user Web surfing activity and serve up advertising
c. Rogue software program that attaches itself to other software programs or data files in order to be executed
d. Independent computer programs that copy themselves from one computer to other computers over a network
e. Eavesdropping program that monitors information traveling over network
Question 23
Denial-of-service attack is
Выберите один ответ.
a. Eavesdropping program that monitors information traveling over network
b. Flooding server with thousands of false requests to crash the network.
c. Enabling hackers to steal proprietary information such as e-mail, company files, etc.
d. Using of numerous computers to launch a DoS
e. Misrepresenting oneself by using fake e-mail addresses or masquerading as someone else
Question 24
DBMS. Tabel is..
Выберите один ответ.
a. selects data based on selection criteria
b. simplifies data entry by displaying one record at a time
c. formatted information suitable for distribution
d. a collection of records for a single subject
e. a collection of related tables and objects
Question 25
Which is the correct way to use the union operator:
Выберите один ответ.
a. <xsl:apply-templates select='/CD/Artist & /Tape/Artist' />
b. <xsl:apply-templates select='/CD/Artist AND /Tape/Artist' />
c. <xsl:apply-templates select='/CD/Artist OR /Tape/Artist' />
d. <xsl:apply-templates select='/CD/Artist | /Tape/Artist' />
e. <xsl:apply-templates select='/CD/Artist & /Tape/Artist' />
Question 26
File Management System - limitations:
Выберите по крайней мере один ответ:
a. Will require programming to create relationships and random access
b. Import controls
c. Ad-hoc queries are almost impossible
d. The operating system knows which files are related to each other
e. User manually creates folders and files
Question 27
Which XQuery's agregator eliminates duplicates?
Выберите один ответ.
a. distinct-values
b. count
c. avg
d. round
e. sum
Question 28
What isn't right for MIS audit?
Выберите один ответ.
a. Lists and ranks all program protocols
b. Assesses financial and organizational impact of each threat
c. Observe documentation, training, technologies, personnel, and procedures
d. Tests company
e. May even simulate disaster to test response of technology, IS staff, other employees
Question 29
XQuery. How many clauses in “Flower” Expressions?
Ответ:
Question 30
How data is processing? Choose the most right pathway
Выберите один ответ.
a. Input -> Output -> Feedback
b. Processing -> Output -> Feedback
c. Feedback -> Input -> Output
d. Input -> Processing -> Feedback
e. Processing -> Input -> Feedback
Question 31
XML. An element declaration has the following syntax:
Выберите один ответ.
a. <ELEMENT element-name category>
b. <!ELEMENT element-name category>
c. <!ELE element-name category>
d. <!element-name ELEMENT category>
Question 32
A NULL value is treated as a blank or 0.
Ответ:
Верно Неверно
Question 33
With SQL, how do you select a column named "Version" from a table named "Software" and a column named "Version" from a table named "Automobile"?
Выберите один ответ.
a. SELECT Software.Version, Automobile.Version FROM Software AND Automobile
b. SELECT s.Version AS 'softVer', a.Version AS 'autoVer' FROM Software AS s AND Automobile AS a
c. SELECT Version, Version FROM Software, Automobile
d. EXTRACT Version AS 'softVer', Version AS 'autoVer' FROM Software AND Automobile
e. SELECT Software.Version, Automobile.Version FROM Software, Automobile
Question 34
What actions does not belong to Security policy
Выберите один ответ.
a. Make complicated password
b. Change password per month
c. Update software
d. Install several antivirus programs
e. Encrypt data
Question 35
What isn't right for Indexed File Organization?
Выберите один ответ.
a. Data is directly accessed using the key
b. Records stored sequentially, but file contains an index for direct access
c. Combines elements of sequential and direct methods
d. Index is sorted and contains record key
e. Go directly to desired record by using a key
Question 36
What does enable hackers to steal proprietary information such as e-mail, company files, etc.?
Выберите один ответ.
a. Distributed denial-of-service attacks
b. Denial-of-service attacks
c. Botnets
d. Sniffer
e. Spoofing
Question 37
Design Principles. What ER diagram is right? ("---" - many to many, "-->" - many to one)
Выберите один ответ.
a. [Product] --- <Purchase> --> [Person]
b. [Product] <-- <Purchase> --- [Person]
c. [Product] --- <Purchase> --- [Person]
d. [Product] <-- <Purchase> --> [Person]
Question 38
Which is definition of Information System wrong?
Выберите один ответ.
a. IS an integrated set of components for collecting, storing, and processing data and for delivering information, knowledge, and digital products
b. IS a manual or computerized collection, storage, processing, and presentation system of data and other knowledge for decision making, progress reporting, planning and evaluation
c. IS is typically considered to be a set of interrelated elements or components that collect, manipulate, and disseminate data and information and provide a feedback mechanism to meet an objective
d. IS is the system consisting of the network of all communication channels used within an organization
e. IS is the tool used to store, manipulate, distribute or create information
Question 39
The method of joining two tables together in SQL is:
Выберите один ответ.
a. Where
b. Having
c. Join
d. Union
e. Add
Question 40
Select which of the following is a correct element type declaration for the occurrence of the “FirstName” element and the “LastName” element in that order as the child element of “Name” Element.
Выберите один ответ.
a. <!ELEMENT Name ( FirstName, LastName )>
b. <!ELEMENT Name (FirstName)> <!ELEMENT Name (LastName)>
c. <!ELEMENT Name ( FirstName | LastName )>
d. <!ELEMENT Name ( FirstName / LastName )>
Question 41
How do you specify that child elements contained in an element must appear in the same order specified by the DTD file? Please select the best answer.
Выберите один ответ.
a. Add a plus sign (+) after the child elements in the element declaration
b. Use vertical slashes ( | ) to separate ordered child elements in the element declaration
c. Add a forward slash ( / ) before the closing bracket of the child element declaration
d. Use commas ( , ) to separate ordered child elements in the element declaration
Question 42
System Vulnerability and Abuse. Virus is
Выберите один ответ.
a. Eavesdropping program that monitors information traveling over network
b. Small programs install themselves surreptitiously on computers to monitor user Web surfing activity and serve up advertising
c. Independent computer programs that copy themselves from one computer to other computers over a network
d. Rogue software program that attaches itself to other software programs or data files in order to be executed
e. Software program that appears to be benign but then does something other than expected
Question 43
