- •Основы Информационных Систем (вопросы к спец экзамену)
- •If the dtd is included in your xml source file, it should be wrapped in a doctype definition with the following syntax:
- •Xml. Pcdata means:
- •In a dtd, Attributes are declared with an _______ declaration
- •Xml is case-sensitive ?
- •Xml. Elements with only character data are declared with
- •Is the follwing dtd definition valid ?
- •Is the following xml valid ?
- •XQuery. “Flower” Expressions are:
- •Is Development Challenges:
- •Xslt. Processing always starts at the root . Is it right?
- •Xsl. How do you divide 10 by 5?
- •Is Development. Choose the most right order of steps
- •Is the following text valid xml ?
- •XQuery. Which order of clauses is right?
- •Information Systems are
- •Is Development Opportunities:
- •Is the follwing dtd definition valid ?
- •Is the following text valid xml ?
- •Xslt is a...
- •Is the following xml file well-formed ?
Xml. Pcdata means:
Выберите один ответ.
a. parsed and compiled data
b. private character data
c. public character data
d. parsed character data
Question 44
What is right for Actor?
Выберите по крайней мере один ответ:
a. Someone or something that interacts with the system
b. Use case is always initiated by an actor
c. A single user may play only one role
d. Typically, an actor represents a role that a human, a hardware device, or even another system plays with a system
e. Finding the actors also means that you enlarge the boundaries of the system
Question 45
System Vulnerability and Abuse. Key logger is
Выберите один ответ.
a. Record every keystroke on computer to steal serial numbers, passwords, launch Internet attacks
b. Independent computer programs that copy themselves from one computer to other computers over a network
c. Small programs install themselves surreptitiously on computers to monitor user Web surfing activity and serve up advertising
d. Software program that appears to be benign but then does something other than expected
e. Rogue software program that attaches itself to other software programs or data files in order to be executed
Question 46
TLS is:
Выберите один ответ.
a. Tunel Layer Security
b. Transport Layer Soft
c. Tunel Level Security
d. Transport Layer Security
e. Transport Level Security
Question 47
What does use of numerous computers to launch a DoS?
Выберите один ответ.
a. Botnets
b. Distributed denial-of-service attacks
c. Sniffer
d. Denial-of-service attacks
e. Spoofing
Question 48
Business IS. What is C2C :
Выберите один ответ.
a. Client to Client
b. Not all
c. Customer to Customer
d. Company to Company
Question 49
Considering the following XML document, what is the result of count(//*):
<?xml version="1.0" encoding="UTF-8"?>
<root>
<employee id="45">
<name>John</name>
<salary>$100,000</salary>
</employee>
</root>
Выберите один ответ.
a. 0
b. 1
c. 5
d. 2
e. 4
f. 8
Question 50
What does the following SQL statement do: SELECT Customer, COUNT(Order) FROM Sales GROUP BY Customer HAVING
COUNT(Order) >5
Выберите один ответ.
a. All answers are incorrect
b. Selects all Customers from the Sales table
c. Selects the total number of orders from the Sales table, if this number is less than 5
d. Selects all customers from table Sales that have made more than 5 orders.
e. Selects the total number of orders from the Sales table, if this number is greater than 5
Question 51
Which of the following are not a group function?
Выберите по крайней мере один ответ:
a. sqrtegg
b. maxegg
c. sumegg
d. avgegg
e. round()
Question 52
In a dtd, Attributes are declared with an _______ declaration
Выберите один ответ.
a. ATTLIST
b. ALIST
c. ATTRIBUTELIST
d. All the above
Question 53
What is right for Random File Organization?
Выберите по крайней мере один ответ:
a. If a particular record is desired, all prior records must be read first
b. Organization may be Direct/Indexed
c. Records are stored in the order they were entered
d. Tape storage uses sequential organization
e. Go directly to desired record by using a key
Question 54
Write a query that will find all of the fields in the car table for those cars that were sold. Use EXISTS.
Car(carid, name, model, year, maker)
Carsale(carid, stickerprice, dealercost)
Ответ:
Question 55
What is the non-system vulnerability?
Выберите один ответ.
a. Revolution
b. Theft of portable devices
c. Accessibility of networks
d. Software problems
e. Hardware problems
Question 56
What is ER Model? ER model..
Выберите один ответ.
a. is a low-level data model that is useful in developing a conceptual design for a inventory systems
b. is a way of graphically representing the logical relationships of entities (or objects) in order to create a database
c. is an abstract and conceptual representation of processed information
Question 57
Which of the following are valid XML names ? (check all valid options)
Выберите по крайней мере один ответ:
a. R&T
b. Size-
c. data-xml
d. Value$
Question 58
