Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
FIS_SpecExam_188_full.docx
Скачиваний:
0
Добавлен:
01.07.2025
Размер:
65.99 Кб
Скачать

Xsl. How do you divide 10 by 5?

Выберите один ответ.

a. 10 / 5

b. 10 mod 5

c. 10 div 5

d. 10 // 5

e. 10 % 5

Question 112

System Vulnerability and Abuse. Phishing is

Выберите один ответ.

a. Email designed to fool recipients into divulging personal information

b. A type of computer network

c. A type of computer virus

d. A Farmville application

e. An example of a security method to protect computers

Question 113

Which XQuery's agregator computes the number of elements?

Выберите один ответ.

a. count

b. sum

c. avg

d. distinct-values

e. round

Question 114

Can you use an XSL style sheet to convert an HTML document to valid XML ?

Ответ:

Верно Неверно

Question 115

Is Development. Choose the most right order of steps

Выберите один ответ.

a. Analysis -> Investigation -> Design -> Implementation -> Maintenance&Review

b. Analysis -> Design -> Investigation -> Implementation -> Maintenance&Review

c. Investigation -> Design -> Analysis -> Implementation -> Maintenance&Review

d. Investigation -> Analysis -> Design -> Implementation -> Maintenance&Review

e. Investigation -> Analysis -> Implementation -> Design -> Maintenance&Review

Question 116

WSDL is used for describing the services available.

Выберите один ответ.

a. True

b. False

c. Not all

d. Not always

Question 117

Which SQL statement is used to insert new data in a database?

Выберите один ответ.

a. ADD NEW

b. PUT INTO

c. INSERT

d. ADD RECORD

e. ADD INTO

Question 118

Web Services. What is SOAP :

Выберите один ответ.

a. Simplified Object Access Protocol

b. Specified Simple Object Access Protocol

c. Not all

d. Simple Object Access Protocol

Question 119

SSL is:

Выберите один ответ.

a. Software Sockets Layer

b. Special Sockets Level

c. Special Sockets Layer

d. Secure Sockets Layer

e. Secure Sockets Level

Question 120

System Vulnerability and Abuse. Identity theft is

Выберите один ответ.

a. Occurs when individual or computer program fraudulently clicks on online ad without any intention of learning more about the advertiser or making a purchase

b. Wireless networks that pretend to offer trustworthy Wi-Fi connections to the Internet

c. Redirects users to a bogus Web page, even when individual types correct Web page address into his or her browser

d. Setting up fake Web sites or sending e-mail messages that look like legitimate businesses to ask users for confidential personal data

e. Steal of personal Information (social security id, driver

Question 121

System Vulnerability and Abuse. "Evil twins" is

Выберите один ответ.

a. Wireless networks that pretend to offer trustworthy Wi-Fi connections to the Internet

b. Occurs when individual or computer program fraudulently clicks on online ad without any intention of learning more about the advertiser or making a purchase

c. Redirects users to a bogus Web page, even when individual types correct Web page address into his or her browser

d. Setting up fake Web sites or sending e-mail messages that look like legitimate businesses to ask users for confidential personal data

e. Steal of personal Information (social security id, driver

Question 122

Choose the false statement.

Выберите один ответ.

a. XSLT is not a W3C Recommendation

b. XSLT uses XPath

c. XSLT is a subset of XSL

d. XSLT is written in XML

Question 123

There are three ways of applying an XSLT to an XML document. Which is NOT this way?

Выберите один ответ.

a. Applying

b. Calling

c. Editing

d. Adding

Question 124

According lectures Information Systems are NOT used to

Выберите по крайней мере один ответ:

a. Create New products & services

b. Improve operations

c. Increase customer solvency

d. Remote control of computers

e. Improve decision making

Question 125

DBMS. Report is..

Выберите один ответ.

a. a collection of related tables and objects

b. formatted information suitable for distribution

c. simplifies data entry by displaying one record at a time

d. a collection of records for a single subject

e. selects data based on selection criteria

Question 126

What will be the result of the following statement?

SELECT ROUND(431.68, 0)

Ответ:

Question 127

Sometimes the expression "select count(*)" will return fewer rows than the expression "select count(value)".

Ответ:

Верно Неверно

Question 128

What will be the result of the following statement?

SELECT 100 + NULL

Выберите один ответ.

a. all answers aren't right

b. NULL

c. error

d. 100

e. 100+NULL

Question 129

What is right for "cookie"?

Выберите по крайней мере один ответ:

a. a small piece of text containing identifying information

b. Sent by server to browser on first interaction

c. Sent by driver to the OS that created the cookie on further interactions

d. Server cleans information about cookies it issued, and can't use it when serving a request

e. can be stored permanently or for a limited time

Question 130

Using a ______ you can do exchange the data between the different applications and different platforms.

Выберите один ответ.

a. Web application;

b. Not all;

c. Web services;

d. Web pages;

Question 131

Use case diagram "Hairdressing salon" has 2 actors: client & haircutter and 4 use cases: "make apoinment", "wash head", ""take haircut" and ""pay". Some use cases are extend or include and others just use cases. What combination of use cases is right for Use case diagram "Hairdressing salon"?

Выберите один ответ.

a. make & take are just, wash is include to take, pay is extend to take

b. take is just, make & wash are inlcude to take, pay is extend to take

c. make, pay & take are just, wash is inlcude to take

d. take is just, make & wash are extend to take, pay is include to take

e. make & take are just, wash is extend to take, pay is include to take

Question 132

What is Difference Between UNION and UNION ALL?

Выберите один ответ.

a. UNION ALL is faster then UNION

b. UNION is faster then UNION ALL

c. None of the listed

d. Both are same

e. UNION combine all row of both table, while UNION ALL select only atomic rows of both table

Question 133

What does Identity management software?

Выберите один ответ.

a. Checks computers for presence of malware and can often eliminate it as well

b. Examines events as they are happening to discover attacks in progress

c. Authenticates users, protecting identities, controlling access

d. Proxy filtering

e. Port blocking

Question 134

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]