- •Основы Информационных Систем (вопросы к спец экзамену)
- •If the dtd is included in your xml source file, it should be wrapped in a doctype definition with the following syntax:
- •Xml. Pcdata means:
- •In a dtd, Attributes are declared with an _______ declaration
- •Xml is case-sensitive ?
- •Xml. Elements with only character data are declared with
- •Is the follwing dtd definition valid ?
- •Is the following xml valid ?
- •XQuery. “Flower” Expressions are:
- •Is Development Challenges:
- •Xslt. Processing always starts at the root . Is it right?
- •Xsl. How do you divide 10 by 5?
- •Is Development. Choose the most right order of steps
- •Is the following text valid xml ?
- •XQuery. Which order of clauses is right?
- •Information Systems are
- •Is Development Opportunities:
- •Is the follwing dtd definition valid ?
- •Is the following text valid xml ?
- •Xslt is a...
- •Is the following xml file well-formed ?
Xml is case-sensitive ?
Ответ:
Верно Неверно
Question 59
What can't harm an information system?
Выберите один ответ.
a. Trojan horses
b. Malware
c. Tokens
d. Viruses
e. Updates
Question 60
What does Antivirus and antispyware software?
Выберите один ответ.
a. Examines events as they are happening to discover attacks in progress
b. Port blocking
c. Checks computers for presence of malware and can often eliminate it as well
d. Proxy filtering
e. Authenticates users, protecting identities, controlling access
Question 61
System Vulnerability and Abuse. Spoofing is
Выберите один ответ.
a. Eavesdropping program that monitors information traveling over network
b. Using of numerous computers to launch a DoS
c. Flooding server with thousands of false requests to crash the network.
d. Enabling hackers to steal proprietary information such as e-mail, company files, etc.
e. Misrepresenting oneself by using fake e-mail addresses or masquerading as someone else
Question 62
System Vulnerability and Abuse. Worm is
Выберите один ответ.
a. Software program that appears to be benign but then does something other than expected
b. Independent computer programs that copy themselves from one computer to other computers over a network
c. Rogue software program that attaches itself to other software programs or data files in order to be executed
d. Eavesdropping program that monitors information traveling over network
e. Small programs install themselves surreptitiously on computers to monitor user Web surfing activity and serve up advertising
Question 63
Which of the following SQL statements is correct?
Выберите по крайней мере один ответ:
a. SELECT CustomerName, COUNT(customer_id) FROM Orders GROUP BY CustomerName
b. SELECT CustomerName, COUNT(CustomerName) FROM Orders
c. SELECT CustomerName, COUNT(CustomerName) FROM Orders ORDER BY CustomerName
d. SELECT CustomerName, COUNT(CustomerName) FROM Orders GROUP BY CustomerName
e. SELECT CustomerName, COUNT(*) FROM Orders GROUP BY CustomerName
Question 64
Can you associate many DTDs with an XML document ?
Ответ:
Верно Неверно
Question 65
What is right for Sequential File Organization?
Выберите по крайней мере один ответ:
a. Records are stored in the order they were entered
b. Go directly to desired record by using a key
c. Tape storage uses sequential organization
d. If a particular record is desired, all prior records must be read first
e. Organization may be Direct/Indexed
Question 66
What is right for Use case model?
Выберите по крайней мере один ответ:
a. Illustrate a system
b. Use cases are usually described in a textual document that accompanies a use case diagram; the combination of these use case diagrams & their supporting documentation is known as a use case model
c. A single user may play only one role
d. Are used to communicate
e. Provide a union of testers & developers to discuss the database stability
Question 67
What is redirecting Web link to address different from intended one, with site masquerading as intended destination?
Выберите один ответ.
a. Denial-of-service attacks
b. Distributed denial-of-service attacks
c. Spoofing
d. Botnets
e. Sniffer
Question 68
With SQL, how do you select all the records from a table named "Persons" where the "LastName" is alphabetically between (and including) "Hansen" and "Pettersen"?
Выберите один ответ.
a. SELECT LastName>'Hansen' AND LastName<'Pettersen' FROM Persons
b. SELECT * FROM Persons WHERE LastName>'Hansen' AND LastName<'Pettersen'
c. SELECT LastName BETWEEN 'Hansen' AND 'Pettersen' FROM Persons
d. SELECT LastName>='Hansen' AND LastName<='Pettersen' FROM Persons
e. SELECT * FROM Persons WHERE LastName BETWEEN 'Hansen' AND 'Pettersen'
Question 69
Database is..
Выберите один ответ.
a. simplifies data entry by displaying one record at a time
b. formatted information suitable for distribution
c. a collection of records for a single subject
d. a collection of related tables and objects
e. selects data based on selection criteria
Question 70
