Основы Информационных Систем

(вопросы к спец экзамену)

Каримжан Н.Б.

Кол-во заданий: 188

Question 1

Is the follwing DTD definition valid?

<! ELEMENT RPLClient (TestSession)?>

Ответ:

Верно Неверно

Question 2

Are DTDs well formed XML documents?

Ответ:

Верно Неверно

Question 3

Select which of the following XML documents are well-formed XML documents.

Выберите один ответ.

a. <productname>Dehumidifier "XZ001" </productname>

b. <productname/ >

c. <productname>”Water Purifier(<<6>>)”</productname>

d. <productname>Electric Water Heater&piccoro_</productname>

Question 4

It can convert your applications into Web-applications

Выберите один ответ.

a. Web programs;

b. Not all;

c. Web;

d. Web Services;

Question 5

What will be the result of the following statement?

SELECT ROUND(123.895, 2)

Ответ:

Question 6

XSLT is:

Выберите один ответ.

a. Extended Stylesheet Language Transformation;

b. Extensible Style Language Transformation;

c. Extensible Stylesheet Language Translators;

d. Extensible Stylesheet Language Transformation;

Question 7

XPath expressivity sufficient...

Выберите один ответ.

a. no changes to the XML structure possible

b. no quantifiers (as in SQL)

c. no join queries (as in SQL)

d. no aggregation and functions

e. no simple navigation through the tree

Question 8

Difference between IS & IT. What statement is right?

Выберите по крайней мере один ответ:

a. IS falls under the IT's umbrella

b. IT falls under the IS's umbrella

c. No difference, they are synonymous

d. Web-server and OS is IS

e. Pencil and paper is writing IS

Question 9

When creating a DTD for an existing XML document, when should you determine the root element? Please select all the correct answers.

Выберите по крайней мере один ответ:

a. Before you determine the document tree structure for the elements

b. As the first step

c. As the final step

d. After you list all the elements used in the document

e. Only if your document will not render the document in a browser

Question 10

Which one of the following represents a correct order for

Выберите один ответ.

a. INSERT, INTO, WHERE, AND, VALUES

b. INSERT, INTO, SELECT, FROM, WHERE

c. INSERT, INTO, VALUES, FROM, WHERE

d. INTO, INSERT, VALUES, FROM, WHERE

e. SELECT, FROM, WHERE, INSERT, INTO

Question 11

Write a query that will find all of the fields in the car table for those cars that were sold. Use a SUBQUERY with IN.

Car(carid, name, model, year, maker)

Carsale(carid, stickerprice, dealercost)

Ответ:

Question 12

Which clause specifies conditions that determines the groups included in the query?

Выберите один ответ.

a. exists

b. where

c. having

d. distinct

e. union

Question 13

Why Use a DTD? Select wrong sentence:

Выберите один ответ.

a. With a DTD, independent groups of people can agree to use a standard DTD for interchanging data.

b. With a DTD, we can keep information about foreign references to outside data files

c. With a DTD, each of your XML files can carry a description of its own format.

d. You can also use a DTD to verify your own data.

e. Your application can use a standard DTD to verify that the data you receive from the outside world is valid.

Question 14

Which clause you can use to restrict groups returned by a grouped query.

Выберите один ответ.

a. WHERE

b. DISTINCT

c. RESTRICT

d. HAVING

e. DISTINCTROW

Question 15

DBMS. Form is..

Выберите один ответ.

a. a collection of records for a single subject

b. simplifies data entry by displaying one record at a time

c. selects data based on selection criteria

d. formatted information suitable for distribution

e. a collection of related tables and objects

Question 16

DTD comments are in the same format as XML comments?

Ответ:

Верно Неверно

Question 17

What is result of Global Integration? If a.R1(prof, course, university) and b.R2(title, prof, course)

Выберите один ответ.

a. Global(prof,course,title,university)

b. Global(a.prof,a.course,b.title,a.university)

c. Global(b.title,a.university)

d. Global(title,university)

Question 18

Operations Support Systems are

Выберите по крайней мере один ответ:

a. Executive information systems

b. Process control systems

c. Office automation systems

d. Transaction processing systems

e. Management information systems

Question 19

If the DTD is included in your XML source file, it should be wrapped in a DOCTYPE definition with the following syntax:

Выберите один ответ.

a. <DOCTYPE root-element (element-declarations)>

b. <!DOCTYPE [element-declarations]>

c. <DOCTYPE root-element [element-declarations]>

d. <!DOCTYPE root-element [element-declarations]>

Question 20

Zero defects cannot be achieved because complete testing is not possible with large programs

Выберите один ответ.

a. True

b. False

Question 21

Which two of the following are correct when including “&” character within an element value?

Выберите по крайней мере один ответ:

a. The “&” character cannot be included within an element value

b. Enclose the “&” character in single quotes (‘’) <Element1>you'&'me</element>

c. Use a CDATA section <Element1><![CDATA[you&me]]></Element1>

d. Use the predefined entity reference “&аmр;” for the “&” character <Element1>you&me</Element1>

e. Enclose the “&” character in double quotes (“”) <Element1>you"&"me</element>

Question 22

System Vulnerability and Abuse. Spyware is

Выберите один ответ.

a. Software program that appears to be benign but then does something other than expected

b. Small programs install themselves surreptitiously on computers to monitor user Web surfing activity and serve up advertising

c. Rogue software program that attaches itself to other software programs or data files in order to be executed

d. Independent computer programs that copy themselves from one computer to other computers over a network

e. Eavesdropping program that monitors information traveling over network

Question 23

Denial-of-service attack is

Выберите один ответ.

a. Eavesdropping program that monitors information traveling over network

b. Flooding server with thousands of false requests to crash the network.

c. Enabling hackers to steal proprietary information such as e-mail, company files, etc.

d. Using of numerous computers to launch a DoS

e. Misrepresenting oneself by using fake e-mail addresses or masquerading as someone else

Question 24

DBMS. Tabel is..

Выберите один ответ.

a. selects data based on selection criteria

b. simplifies data entry by displaying one record at a time

c. formatted information suitable for distribution

d. a collection of records for a single subject

e. a collection of related tables and objects

Question 25

Which is the correct way to use the union operator:

Выберите один ответ.

a. <xsl:apply-templates select='/CD/Artist &amp; /Tape/Artist' />

b. <xsl:apply-templates select='/CD/Artist AND /Tape/Artist' />

c. <xsl:apply-templates select='/CD/Artist OR /Tape/Artist' />

d. <xsl:apply-templates select='/CD/Artist | /Tape/Artist' />

e. <xsl:apply-templates select='/CD/Artist & /Tape/Artist' />

Question 26

File Management System - limitations:

Выберите по крайней мере один ответ:

a. Will require programming to create relationships and random access

b. Import controls

c. Ad-hoc queries are almost impossible

d. The operating system knows which files are related to each other

e. User manually creates folders and files

Question 27

Which XQuery's agregator eliminates duplicates?

Выберите один ответ.

a. distinct-values

b. count

c. avg

d. round

e. sum

Question 28

What isn't right for MIS audit?

Выберите один ответ.

a. Lists and ranks all program protocols

b. Assesses financial and organizational impact of each threat

c. Observe documentation, training, technologies, personnel, and procedures

d. Tests company

e. May even simulate disaster to test response of technology, IS staff, other employees

Question 29

XQuery. How many clauses in “Flower” Expressions?

Ответ:

Question 30

How data is processing? Choose the most right pathway

Выберите один ответ.

a. Input -> Output -> Feedback

b. Processing -> Output -> Feedback

c. Feedback -> Input -> Output

d. Input -> Processing -> Feedback

e. Processing -> Input -> Feedback

Question 31

XML. An element declaration has the following syntax:

Выберите один ответ.

a. <ELEMENT element-name category>

b. <!ELEMENT element-name category>

c. <!ELE element-name category>

d. <!element-name ELEMENT category>

Question 32

A NULL value is treated as a blank or 0.

Ответ:

Верно Неверно

Question 33

With SQL, how do you select a column named "Version" from a table named "Software" and a column named "Version" from a table named "Automobile"?

Выберите один ответ.

a. SELECT Software.Version, Automobile.Version FROM Software AND Automobile

b. SELECT s.Version AS 'softVer', a.Version AS 'autoVer' FROM Software AS s AND Automobile AS a

c. SELECT Version, Version FROM Software, Automobile

d. EXTRACT Version AS 'softVer', Version AS 'autoVer' FROM Software AND Automobile

e. SELECT Software.Version, Automobile.Version FROM Software, Automobile

Question 34

What actions does not belong to Security policy

Выберите один ответ.

a. Make complicated password

b. Change password per month

c. Update software

d. Install several antivirus programs

e. Encrypt data

Question 35

What isn't right for Indexed File Organization?

Выберите один ответ.

a. Data is directly accessed using the key

b. Records stored sequentially, but file contains an index for direct access

c. Combines elements of sequential and direct methods

d. Index is sorted and contains record key

e. Go directly to desired record by using a key

Question 36

What does enable hackers to steal proprietary information such as e-mail, company files, etc.?

Выберите один ответ.

a. Distributed denial-of-service attacks

b. Denial-of-service attacks

c. Botnets

d. Sniffer

e. Spoofing

Question 37

Design Principles. What ER diagram is right? ("---" - many to many, "-->" - many to one)

Выберите один ответ.

a. [Product] --- <Purchase> --> [Person]

b. [Product] <-- <Purchase> --- [Person]

c. [Product] --- <Purchase> --- [Person]

d. [Product] <-- <Purchase> --> [Person]

Question 38

Which is definition of Information System wrong?

Выберите один ответ.

a. IS an integrated set of components for collecting, storing, and processing data and for delivering information, knowledge, and digital products

b. IS a manual or computerized collection, storage, processing, and presentation system of data and other knowledge for decision making, progress reporting, planning and evaluation

c. IS is typically considered to be a set of interrelated elements or components that collect, manipulate, and disseminate data and information and provide a feedback mechanism to meet an objective

d. IS is the system consisting of the network of all communication channels used within an organization

e. IS is the tool used to store, manipulate, distribute or create information

Question 39

The method of joining two tables together in SQL is:

Выберите один ответ.

a. Where

b. Having

c. Join

d. Union

e. Add

Question 40

Select which of the following is a correct element type declaration for the occurrence of the “FirstName” element and the “LastName” element in that order as the child element of “Name” Element.

Выберите один ответ.

a. <!ELEMENT Name (FirstName, LastName)>

b. <!ELEMENT Name (FirstName)> <!ELEMENT Name (LastName)>

c. <!ELEMENT Name (FirstName | LastName)>

d. <!ELEMENT Name (FirstName / LastName)>

Question 41

How do you specify that child elements contained in an element must appear in the same order specified by the DTD file? Please select the best answer.

Выберите один ответ.

a. Add a plus sign (+) after the child elements in the element declaration

b. Use vertical slashes (|) to separate ordered child elements in the element declaration

c. Add a forward slash (/) before the closing bracket of the child element declaration

d. Use commas (,) to separate ordered child elements in the element declaration

Question 42

System Vulnerability and Abuse. Virus is

Выберите один ответ.

a. Eavesdropping program that monitors information traveling over network

b. Small programs install themselves surreptitiously on computers to monitor user Web surfing activity and serve up advertising

c. Independent computer programs that copy themselves from one computer to other computers over a network

d. Rogue software program that attaches itself to other software programs or data files in order to be executed

e. Software program that appears to be benign but then does something other than expected

Question 43

XML. PCDATA means:

Выберите один ответ.

a. parsed and compiled data

b. private character data

c. public character data

d. parsed character data

Question 44

What is right for Actor?

Выберите по крайней мере один ответ:

a. Someone or something that interacts with the system

b. Use case is always initiated by an actor

c. A single user may play only one role

d. Typically, an actor represents a role that a human, a hardware device, or even another system plays with a system

e. Finding the actors also means that you enlarge the boundaries of the system

Question 45

System Vulnerability and Abuse. Key logger is

Выберите один ответ.

a. Record every keystroke on computer to steal serial numbers, passwords, launch Internet attacks

b. Independent computer programs that copy themselves from one computer to other computers over a network

c. Small programs install themselves surreptitiously on computers to monitor user Web surfing activity and serve up advertising

d. Software program that appears to be benign but then does something other than expected

e. Rogue software program that attaches itself to other software programs or data files in order to be executed

Question 46

TLS is:

Выберите один ответ.

a. Tunel Layer Security

b. Transport Layer Soft

c. Tunel Level Security

d. Transport Layer Security

e. Transport Level Security

Question 47

What does use of numerous computers to launch a DoS?

Выберите один ответ.

a. Botnets

b. Distributed denial-of-service attacks

c. Sniffer

d. Denial-of-service attacks

e. Spoofing

Question 48

Business IS. What is C2C:

Выберите один ответ.

a. Client to Client

b. Not all

c. Customer to Customer

d. Company to Company

Question 49

Considering the following XML document, what is the result of count(//*):

<?xml version="1.0" encoding="UTF-8"?>

<root>

<employee id="45">

<name>John</name>

<salary>$100,000</salary>

</employee>

</root>

Выберите один ответ.

a. 0

b. 1

c. 5

d. 2

e. 4

f. 8

Question 50

What does the following SQL statement do: SELECT Customer, COUNT(Order) FROM Sales GROUP BY Customer HAVING

COUNT(Order) >5

Выберите один ответ.

a. All answers are incorrect

b. Selects all Customers from the Sales table

c. Selects the total number of orders from the Sales table, if this number is less than 5

d. Selects all customers from table Sales that have made more than 5 orders.

e. Selects the total number of orders from the Sales table, if this number is greater than 5

Question 51

Which of the following are not a group function?

Выберите по крайней мере один ответ:

a. sqrtegg

b. maxegg

c. sumegg

d. avgegg

e. round()

Question 52

In a DTD, Attributes are declared with an _______ declaration

Выберите один ответ.

a. ATTLIST

b. ALIST

c. ATTRIBUTELIST

d. All the above

Question 53

What is right for Random File Organization?

Выберите по крайней мере один ответ:

a. If a particular record is desired, all prior records must be read first

b. Organization may be Direct/Indexed

c. Records are stored in the order they were entered

d. Tape storage uses sequential organization

e. Go directly to desired record by using a key

Question 54

Write a query that will find all of the fields in the car table for those cars that were sold. Use EXISTS.

Car(carid, name, model, year, maker)

Carsale(carid, stickerprice, dealercost)

Ответ:

Question 55

What is the non-system vulnerability?

Выберите один ответ.

a. Revolution

b. Theft of portable devices

c. Accessibility of networks

d. Software problems

e. Hardware problems

Question 56

What is ER Model? ER model..

Выберите один ответ.

a. is a low-level data model that is useful in developing a conceptual design for a inventory systems

b. is a way of graphically representing the logical relationships of entities (or objects) in order to create a database

c. is an abstract and conceptual representation of processed information

Question 57

Which of the following are valid XML names? (check all valid options)

Выберите по крайней мере один ответ:

a. R&T

b. Size-

c. data-xml

d. Value$

Question 58

XML is case-sensitive?

Ответ:

Верно Неверно

Question 59

What can't harm an information system?

Выберите один ответ.

a. Trojan horses

b. Malware

c. Tokens

d. Viruses

e. Updates

Question 60

What does Antivirus and antispyware software?

Выберите один ответ.

a. Examines events as they are happening to discover attacks in progress

b. Port blocking

c. Checks computers for presence of malware and can often eliminate it as well

d. Proxy filtering

e. Authenticates users, protecting identities, controlling access

Question 61

System Vulnerability and Abuse. Spoofing is

Выберите один ответ.

a. Eavesdropping program that monitors information traveling over network

b. Using of numerous computers to launch a DoS

c. Flooding server with thousands of false requests to crash the network.

d. Enabling hackers to steal proprietary information such as e-mail, company files, etc.

e. Misrepresenting oneself by using fake e-mail addresses or masquerading as someone else

Question 62

System Vulnerability and Abuse. Worm is

Выберите один ответ.

a. Software program that appears to be benign but then does something other than expected

b. Independent computer programs that copy themselves from one computer to other computers over a network

c. Rogue software program that attaches itself to other software programs or data files in order to be executed

d. Eavesdropping program that monitors information traveling over network

e. Small programs install themselves surreptitiously on computers to monitor user Web surfing activity and serve up advertising

Question 63

Which of the following SQL statements is correct?

Выберите по крайней мере один ответ:

a. SELECT CustomerName, COUNT(customer_id) FROM Orders GROUP BY CustomerName

b. SELECT CustomerName, COUNT(CustomerName) FROM Orders

c. SELECT CustomerName, COUNT(CustomerName) FROM Orders ORDER BY CustomerName

d. SELECT CustomerName, COUNT(CustomerName) FROM Orders GROUP BY CustomerName

e. SELECT CustomerName, COUNT(*) FROM Orders GROUP BY CustomerName

Question 64

Can you associate many DTDs with an XML document?

Ответ:

Верно Неверно

Question 65

What is right for Sequential File Organization?

Выберите по крайней мере один ответ:

a. Records are stored in the order they were entered

b. Go directly to desired record by using a key

c. Tape storage uses sequential organization

d. If a particular record is desired, all prior records must be read first

e. Organization may be Direct/Indexed

Question 66

What is right for Use case model?

Выберите по крайней мере один ответ:

a. Illustrate a system

b. Use cases are usually described in a textual document that accompanies a use case diagram; the combination of these use case diagrams & their supporting documentation is known as a use case model

c. A single user may play only one role

d. Are used to communicate

e. Provide a union of testers & developers to discuss the database stability

Question 67

What is redirecting Web link to address different from intended one, with site masquerading as intended destination?

Выберите один ответ.

a. Denial-of-service attacks

b. Distributed denial-of-service attacks

c. Spoofing

d. Botnets

e. Sniffer

Question 68

With SQL, how do you select all the records from a table named "Persons" where the "LastName" is alphabetically between (and including) "Hansen" and "Pettersen"?

Выберите один ответ.

a. SELECT LastName>'Hansen' AND LastName<'Pettersen' FROM Persons

b. SELECT * FROM Persons WHERE LastName>'Hansen' AND LastName<'Pettersen'

c. SELECT LastName BETWEEN 'Hansen' AND 'Pettersen' FROM Persons

d. SELECT LastName>='Hansen' AND LastName<='Pettersen' FROM Persons

e. SELECT * FROM Persons WHERE LastName BETWEEN 'Hansen' AND 'Pettersen'

Question 69

Database is..

Выберите один ответ.

a. simplifies data entry by displaying one record at a time

b. formatted information suitable for distribution

c. a collection of records for a single subject

d. a collection of related tables and objects

e. selects data based on selection criteria

Question 70

XML. Elements with only character data are declared with

Выберите один ответ.

a. #TEXT

b. #CDATA

c. #CHAR

d. #PCDATA

Question 71

What is right for Disaster recovery and Business continuity planning?

Выберите один ответ.

a. All are right

b. Management must determine which systems restored first

c. None of these

d. Both types of plans needed to identify firm

e. Business impact analysis to determine impact of an outage

Question 72

Select which of the following is a correct XML declaration description.

Выберите один ответ.

a. <?xml encoding="UTF-8" version="1.0"?>

b. <?xml version="1.0"?>

c. <?xml version="1.0" encoding="">

d. <?xml encoding="UTF-8">

Question 73

Which of the following declarations must every XML document that uses a DTD have? Please select the best answer.

Выберите один ответ.

a. A <DOCTYPE> declaration

b. A <!DTD> declaration

c. A <STANDALONE> declaration

d. A <!DOCTYPE> declaration

Question 74

Is the follwing DTD definition valid?

<

!ELEMENT RPLClient (TestSession)?>

Ответ:

Верно Неверно

Question 75

What does this XSLT output:

<xsl:text disable-output-escaping="yes">

<!-- hello -->

</xsl:text>

Выберите один ответ.

a. <!-- hello -->

b. It will not output anything

c. hello

d. &lt;!-- hello --&gt;

Question 76

Is the following XML valid?

<AnElement some_attribute="<UpperCase>">Yes</AnElement>

Ответ:

Верно Неверно

Question 77

This XML extension is a standard way to describe how to transform the structure of an XML document into an XML document with a different structure.

Выберите один ответ.

a. tree structure;

b. extract, transform, load;

c. phase change;

d. XSLT;

Question 78

What is the difference between the WHERE and HAVING SQL clauses?

Выберите по крайней мере один ответ:

a. The HAVING SQL clause condition(s) is applied to all rows in the result set before the WHERE clause is applied (if present).

b. The WHERE and the HAVING clauses are identical.

c. The WHERE clause is used only with SELECT SQL statements and specifies a search condition for an aggregate or a group.

d. The WHERE SQL clause condition(s) is applied to all rows in the result set before the HAVING clause is applied (if present).

e. The HAVING clause is used with SELECT SQL statements and specifies a search condition for an aggregate or a group.

Question 79

XML. CDATA means:

Выберите один ответ.

a. common data

b. computer data

c. character data

d. None of these

Question 80

XSL. LET - Binds collection variables --> one value. Is it right?

Выберите один ответ.

a. True

b. False

Question 81

Business IS. What is B2B:

Выберите один ответ.

a. Business to Bank

b. Bank to Business

c. Business to Business

d. Not all

Question 82

XSL. How do you select all the og attributes in the document?

Выберите один ответ.

a. /@og

b. /og

c. /../og

d. //og

e. //@og

Question 83

Is the following text valid XML?

<employee id="4" phone="00234567" phone="00434656">Teo Leo</employee>

Ответ:

Верно Неверно

Question 84

How many root elements can be found in a proper XML document?

Выберите один ответ.

a. 0

b. unlimited

c. 1

d. 3

e. 2

Question 85

Classification of IS. Information Sytems have two subclasses

Выберите по крайней мере один ответ:

a. Management Support System

b. Executive Information System

c. Informal Information System

d. Operations Support System

e. Formal Information System

Question 86

What is the non-system vulnerability?

Выберите один ответ.

a. Accessibility of networks

b. Hardware problems

c. Theft of portable devices

d. Revolution

e. Software problems

Question 87

XQuery. “Flower” Expressions are:

Выберите по крайней мере один ответ:

a. LET

b. RETURN

c. WHERE

d. IN

e. FOR

Question 88

 Which of these are not valid path expressions of XPath?

Выберите один ответ.

a. //

b. $

c. /

d.../

e. @

Question 89

Given an employees table as follows: empid name managerid a1 bob NULL b1 jim a1 B2 tom a1 What value will select count(*) from employees return?

Выберите один ответ.

a. 3

b. 1

c. None of the listed

d. NULL

e. 2

Question 90

What will be the result of the following SQL statement: SELECT * FROM Table1 HAVING Column1 > 10

Выберите один ответ.

a. All answers are incorrect

b. The result will be empty data set.

c. The result will be all rows from Table1 which have Column1 values less than 10.

d. The SQL statement will generate an error.

e. The result will be all rows from Table1 which have Column1 values greater than 10.

Question 91

Business IS. Which is Supply Chain correct?

Выберите один ответ.

a. Manufacturer--Wholesaler--Raw Material--Retailer--Customer

b. Raw Material--Manufacturer--Retailer--Wholesaler--Customer

c. Manufacturer--Raw Material--Wholesaler--Retailer--Customer

d. Raw Material--Wholesaler--Manufacturer--Retailer--Customer

e. Raw Material--Manufacturer--Wholesaler--Retailer--Customer

Question 92

What is Relational Model disadvantage?

Выберите один ответ.

a. can be

b. hardware overheads

c. data can

d. relationships between tables can

Question 93

IS Development Challenges:

Выберите по крайней мере один ответ:

a. Information overload

b. Employee low qualification

c. Workforce downsizing

d. High costs

e. Workforce upsizing

Question 94

With SQL, how can you delete the records where the "Price" is less than average price in the Purchase Table?

Выберите один ответ.

a. DELETE FROM Purchase AS x, Purchase AS y WHERE x.Price < AVG(y.Price)

b. DELETE Price < AVG(Price) FROM Purchase

c. DELETE ROW Price < AVG(Price) FROM Purchase

d. DELETE FROM Purchase AS x WHERE x.Price < (SELECT AVG(x.Price) FROM Purchase AS x)

e. DELETE FROM Purchase WHERE Price < SELECT AVG(Price) FROM PURCHASE

Question 95

XSLT. Processing always starts at the root. Is it right?

Выберите один ответ.

a. True

b. False

Question 96

DBMS. Query is..

Выберите один ответ.

a. a collection of related tables and objects

b. simplifies data entry by displaying one record at a time

c. a collection of records for a single subject

d. selects data based on selection criteria

e. formatted information suitable for distribution

Question 97

Select which two of the following are described as the top-level element in an XSLT stylesheet. The XSLT namespace prefix is “xsl”.

Выберите по крайней мере один ответ:

a. xsl:transform

b. xsl:template

c. xsl:stylesheet

d. xsl:output

Question 98

Vendors release small pieces of software to repair flaws. However exploits often created faster than patches be released and implemented

Выберите один ответ.

a. False

b. True

Question 99

Management Support System are

Выберите по крайней мере один ответ:

a. Office automation systems

b. Decision support systems

c. Executive information systems

d. Transaction processing systems

e. Process control systems

Question 100

Information Tecnologies are

Выберите по крайней мере один ответ:

a. Network System

b. Software System

c. Hardware System

d. Inventory System

e. Database System

Question 101

With SQL, how can you insert a new record into the "Students" table?

Выберите один ответ.

a. INSERT VALUES ('Jimmy', 'Jackson') INTO Students

b. INSERT VALUES ('Jimmy', 'Jackson') Students

c. INSERT ('Jimmy', 'Jackson') VALUES INTO Students

d. INSERT INTO Students VALUES ('Jimmy', 'Jackson')

e. INSERT ('Jimmy', 'Jackson') INTO Students

Question 102

Types of Information Systems:

Выберите по крайней мере один ответ:

a. Informal Information System

b. Management Support System

c. Operations Support System

d. Formal Information System

e. Executive Information System

Question 103

This markup language is considered to be extensible because of its unlimited and self-defining markup symbols.

Выберите один ответ.

a. XML;

b. XHTML;

c. W3C;

d. HTML;

Question 104

Can an attribute be specified in an element's closing tag?

Ответ:

Верно Неверно

Question 105

What will be the result of this SQL query:

SELECT pname

FROM product

WHERE pname LIKE ‘_k%’;

Выберите один ответ.

a. pNames containing "k" as second char

b. None of the listed

c. pNames starting with “kR

d. pNames starting with “k”

e. pNames starting with “_k”

Question 106

System Vulnerability and Abuse. Phishing is

Выберите один ответ.

a. Redirects users to a bogus Web page, even when individual types correct Web page address into his or her browser

b. Setting up fake Web sites or sending e-mail messages that look like legitimate businesses to ask users for confidential personal data

c. Wireless networks that pretend to offer trustworthy Wi-Fi connections to the Internet

d. Steal of personal Information (social security id, driver

e. Occurs when individual or computer program fraudulently clicks on online ad without any intention of learning more about the advertiser or making a purchase

Question 107

People who use USE CASE diagrams:

Выберите по крайней мере один ответ:

a. Customers

b. Testers

c. Use-case designers

d. Admin

e. Programmers

Question 108

Which syntax of XML Namespaces is right?

Выберите один ответ.

a. xmln::f="http://www.w3schools.com/furniture"

b. xmlns:f="http://www.w3schools.com/furniture"

c. xmln:f="http://www.w3schools.com/furniture"

d. xmlns:f=http://www.w3schools.com/furniture

e. xmlns::f="http://www.w3schools.com/furniture"

Question 109

What does not belong to Authentication?

Выберите один ответ.

a. Tokens

b. Encryption

c. Password systems

d. Biometric authentication

e. Smart cards

Question 110

Which Operator is used in character comparisons with pattern matching?

Выберите один ответ.

a. in

b. set

c. equal

d. between... and

e. like

Question 111

XSL. How do you divide 10 by 5?

Выберите один ответ.

a. 10 / 5

b. 10 mod 5

c. 10 div 5

d. 10 // 5

e. 10 % 5

Question 112

System Vulnerability and Abuse. Phishing is

Выберите один ответ.

a. Email designed to fool recipients into divulging personal information

b. A type of computer network

c. A type of computer virus

d. A Farmville application

e. An example of a security method to protect computers

Question 113

Which XQuery's agregator computes the number of elements?

Выберите один ответ.

a. count

b. sum

c. avg

d. distinct-values

e. round

Question 114

Can you use an XSL style sheet to convert an HTML document to valid XML?

Ответ:

Верно Неверно

Question 115

IS Development. Choose the most right order of steps

Выберите один ответ.

a. Analysis -> Investigation -> Design -> Implementation -> Maintenance&Review

b. Analysis -> Design -> Investigation -> Implementation -> Maintenance&Review

c. Investigation -> Design -> Analysis -> Implementation -> Maintenance&Review

d. Investigation -> Analysis -> Design -> Implementation -> Maintenance&Review

e. Investigation -> Analysis -> Implementation -> Design -> Maintenance&Review

Question 116

WSDL is used for describing the services available.

Выберите один ответ.

a. True

b. False

c. Not all

d. Not always

Question 117

Which SQL statement is used to insert new data in a database?

Выберите один ответ.

a. ADD NEW

b. PUT INTO

c. INSERT

d. ADD RECORD

e. ADD INTO

Question 118

Web Services. What is SOAP:

Выберите один ответ.

a. Simplified Object Access Protocol

b. Specified Simple Object Access Protocol

c. Not all

d. Simple Object Access Protocol

Question 119

SSL is:

Выберите один ответ.

a. Software Sockets Layer

b. Special Sockets Level

c. Special Sockets Layer

d. Secure Sockets Layer

e. Secure Sockets Level

Question 120

System Vulnerability and Abuse. Identity theft is

Выберите один ответ.

a. Occurs when individual or computer program fraudulently clicks on online ad without any intention of learning more about the advertiser or making a purchase

b. Wireless networks that pretend to offer trustworthy Wi-Fi connections to the Internet

c. Redirects users to a bogus Web page, even when individual types correct Web page address into his or her browser

d. Setting up fake Web sites or sending e-mail messages that look like legitimate businesses to ask users for confidential personal data

e. Steal of personal Information (social security id, driver

Question 121

System Vulnerability and Abuse. "Evil twins" is

Выберите один ответ.

a. Wireless networks that pretend to offer trustworthy Wi-Fi connections to the Internet

b. Occurs when individual or computer program fraudulently clicks on online ad without any intention of learning more about the advertiser or making a purchase

c. Redirects users to a bogus Web page, even when individual types correct Web page address into his or her browser

d. Setting up fake Web sites or sending e-mail messages that look like legitimate businesses to ask users for confidential personal data

e. Steal of personal Information (social security id, driver

Question 122

Choose the false statement.

Выберите один ответ.

a. XSLT is not a W3C Recommendation

b. XSLT uses XPath

c. XSLT is a subset of XSL

d. XSLT is written in XML

Question 123

There are three ways of applying an XSLT to an XML document. Which is NOT this way?

Выберите один ответ.

a. Applying

b. Calling

c. Editing

d. Adding

Question 124

According lectures Information Systems are NOT used to

Выберите по крайней мере один ответ:

a. Create New products & services

b. Improve operations

c. Increase customer solvency

d. Remote control of computers

e. Improve decision making

Question 125

DBMS. Report is..

Выберите один ответ.

a. a collection of related tables and objects

b. formatted information suitable for distribution

c. simplifies data entry by displaying one record at a time

d. a collection of records for a single subject

e. selects data based on selection criteria

Question 126

What will be the result of the following statement?

SELECT ROUND(431.68, 0)

Ответ:

Question 127

Sometimes the expression "select count(*)" will return fewer rows than the expression "select count(value)".

Ответ:

Верно Неверно

Question 128

What will be the result of the following statement?

SELECT 100 + NULL

Выберите один ответ.

a. all answers aren't right

b. NULL

c. error

d. 100

e. 100+NULL

Question 129

What is right for "cookie"?

Выберите по крайней мере один ответ:

a. a small piece of text containing identifying information

b. Sent by server to browser on first interaction

c. Sent by driver to the OS that created the cookie on further interactions

d. Server cleans information about cookies it issued, and can't use it when serving a request

e. can be stored permanently or for a limited time

Question 130

Using a ______ you can do exchange the data between the different applications and different platforms.

Выберите один ответ.

a. Web application;

b. Not all;

c. Web services;

d. Web pages;

Question 131

Use case diagram "Hairdressing salon" has 2 actors: client & haircutter and 4 use cases: "make apoinment", "wash head", ""take haircut" and ""pay". Some use cases are extend or include and others just use cases. What combination of use cases is right for Use case diagram "Hairdressing salon"?

Выберите один ответ.

a. make & take are just, wash is include to take, pay is extend to take

b. take is just, make & wash are inlcude to take, pay is extend to take

c. make, pay & take are just, wash is inlcude to take

d. take is just, make & wash are extend to take, pay is include to take

e. make & take are just, wash is extend to take, pay is include to take

Question 132

What is Difference Between UNION and UNION ALL?

Выберите один ответ.

a. UNION ALL is faster then UNION

b. UNION is faster then UNION ALL

c. None of the listed

d. Both are same

e. UNION combine all row of both table, while UNION ALL select only atomic rows of both table

Question 133

What does Identity management software?

Выберите один ответ.

a. Checks computers for presence of malware and can often eliminate it as well

b. Examines events as they are happening to discover attacks in progress

c. Authenticates users, protecting identities, controlling access

d. Proxy filtering

e. Port blocking

Question 134

Is the following text valid XML?

<employee id="4"> <name>Teo Leo</employee> </name>

Ответ:

Верно Неверно

Question 135

DBMS. What Hierarchy of Data is right?

Выберите один ответ.

a. Tables--Record--Fields--File--Characters

b. Tables--File--Record--Fields--Characters

c. File--Tables--Record--Fields--Characters

d. File--Tables--Fields--Record--Characters

e. Tables--Record--Fields--Characters--File

Question 136

What does not belong to Digital certificate?

Выберите один ответ.

a. Uses a trusted third party, certification authority (CA), to validate a user

b. Use of public key cryptography working with certificate authority

c. CA verifies user

d. Data file used to establish the identity of users and electronic assets for protection of online transactions

Question 137

What does Intrusion detection systems?

Выберите один ответ.

a. Port blocking

b. Proxy filtering

c. Checks computers for presence of malware and can often eliminate it as well

d. Examines events as they are happening to discover attacks in progress

e. Automates keeping track of all users and privileges

Question 138

SOAP is used to transfer the:

Выберите один ответ.

a. Not all

b. control

c. output

d. data

Question 139

Which of the following statements gets the total value of the column Salary in the Employees table?

Выберите по крайней мере один ответ:

a. SELECT SUM(Salary) FROM Employees

b. SELECT SUM(Salary) WHERE Employees

c. SELECT ADD(Salary) FROM Employees

d. SELECT SUM(Salary) FROM Employees order by 1

e. SELECT TOTAL(Salary) FROM Employees

Question 140

DBMS is..

Выберите один ответ.

a. Data Bussiness Management Systems

b. Database Management Systems

c. Data Bussiness Manager Systems

d. Database Manager Software

e. Database Management Software

Question 141

Conceptual Modelling issues such as:

Выберите по крайней мере один ответ:

a. What entities to model

b. How to create a database

c. Decide which part of reality is represented in a database

d. Agree on structure of the DB before deciding on a particular implementation

e. How entities are related

Question 142

XQuery. Which order of clauses is right?

Выберите один ответ.

a. WHERE-RETURN-FOR-LET

b. LET-FOR-WHERE-RETURN

c. FOR-WHERE-LET-RETURN

d. FOR-RETURN-LET-WHERE

e. FOR-LET-WHERE-RETURN

Question 143

Can you use the SQL JOIN and SQL HAVING clauses in one SQL statement?

Выберите один ответ.

a. It depends

b. All answers are incorrect

c. No

d. Yes

e. only in WHERE clause

Question 144

Why systems are vulnerable? Select right options

Выберите по крайней мере один ответ:

a. Failed portable devices

b. Accessibility of networks

c. Disasters

d. Computers outside of firm control

e. New employee

Question 145

Web Services define a platform-independent standard based on XML to communicate within distributed systems.

Выберите один ответ.

a. Not always true

b. True

c. Not all

d. False

Question 146

Web Services. UDDI is used for listing what ______ are available.

Выберите один ответ.

a. services;

b. data;

c. control;

d. programs;

Question 147

What is the File Management System?

Выберите один ответ.

a. Phar Manager

b. Folder Commander

c. Volkov Commander

d. Total Explorer

e. Norton Explorer

Question 148

Information Systems are

Выберите по крайней мере один ответ:

a. Inventory System

b. Database System

c. Payroll System

d. Hardware System

e. Network System

Question 149

Considering the following XML and XSLT documents, what is the output?

<?xml version="1.0"?>

<staff>

<employee id="45">

<name>John</name>

<salary>$100,000</salary>

</employee>

</staff>

<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform">

<xsl:template match="/">

<xsl:if test="employee/name = 'John'">

true

</xsl:if>

</xsl:template>

</xsl:stylesheet>

Выберите один ответ.

a. The transformation will throw an error

b. The transformation will not output anything

c. The output will be true

Question 150

How many DOCTYPE declarations can be in a well-formed XML document?

Выберите один ответ.

a. 2

b. 0

c. 3

d. 1

e. unlimited

Question 151

Which of the following tags are invalid? (check all invalid options)

Выберите по крайней мере один ответ:

a. </OperatingSystem_CP/M>

b. <Value$>

c. < CELL >

d. <CP/M>

e. < /CELL>

Question 152

IS Development Opportunities:

Выберите по крайней мере один ответ:

a. Support advanced help for users

b. Enhanced global competitiveness

c. Support corporate strategy

d. Improve speed of processes

e. Capture market opportunities

Question 153

Which way of numbering in XSL is right?

Выберите один ответ.

a. <xsl:number>

b. <xsl:count/>

c. <xsl:count>

d. <xsl:number/>

e. <xsl:order/>

Question 154

What isn't right for Public key encryption?

Выберите один ответ.

a. Sender and receiver use single, shared key

b. Recipient decrypts with private key

c. Uses two, mathematically related keys: Public key and private key

d. Sender encrypts message with recipient

Question 155

Please select right way of applying an XSLT to an XML document

Выберите один ответ.

a. Transforming

b. Calling

c. Editing

d. Letting

Question 156

Business IS. What is B2C:

Выберите один ответ.

a. Business to Customer

b. Bank to Client

c. Not all

d. Business to Client

Question 157

XML storage: XML --> relational data. Is it right?

Выберите один ответ.

a. True

b. False

Question 158

Given an employees table as follows: empid name managerid a1 bob NULL b1 jim a1 B2 tom a1 What value will select count(managerid) from employees return?

Выберите один ответ.

a. 3

b. 2

c. NULL

d. 1

e. None of the listed

Question 159

Is the follwing DTD definition valid?

<!ELEMENT

RPLClient

(TestSession)?

>

Ответ:

Верно Неверно

Question 160

What isn't right for Manual Global Integration?

Выберите один ответ.

a. Automaticaly merge multiple databases into a new global database

b. Does not scale with number of databases

c. Local autonomy lost

d. Time consuming and error prone

e. Static solution

Question 161

Is the following text valid XML?

<employee id="4"> <phone>00234567</phone type="work"> <phone>00434656</phone type="home"> </employee>

Ответ:

Верно Неверно

Question 162

Web Services. The WSDL is:

Выберите один ответ.

a. Web Services Developing Language;

b. Web Servers Definition Language;

c. Not all;

d. Web Services Definition Language;

Question 163

What technologies does not include Firewall?

Выберите один ответ.

a. Application proxy filtering

b. Authenticates users, protecting identities, controlling access

c. Static packet filtering

d. Port blocking

e. Network address translation (NAT)

Question 164

XSLT is a...

Выберите один ответ.

a. high-level transformation language;

b. query and functional programming language;

c. query language for selecting nodes;

d. a markup language that defines a set of rules for encoding documents;

Question 165

HTTP is the ubiquitous protocol, which is running practically everywhere on:

Выберите один ответ.

a. Internet;

b. pages;

c. systems;

d. networks;

Question 166

When the same DTD declaration is found in the internal and external subset, which one has priority? The one from the external subset or the one from the internal subset?

Выберите один ответ.

a. external subset

b. internal subset

c. all answers not right

d. none of them

e. both of them

Question 167

What does not belong to Ensuring software quality?

Выберите один ответ.

a. Walkthrough: Review of specification or design document

b. Early and regular testing

c. Software classification

d. Debugging: Process by which errors are eliminated

e. Software metrics

Question 168

Is the following xml file well-formed?

<!-- comment -->

<?xml version="1.0"?>

<root>

</root>

Ответ:

Верно Неверно

Question 169

Encryption: Transforming text or data into cipher text that cannot be read by unintended recipients

Выберите один ответ.

a. False

b. True

Question 170

What does this instruction mean?

<xsl:apply-templates select="//div" />

Выберите один ответ.

a. This means "Find all the

elements which are children of the current context node, and process them according to any applicable templates".

b. This is a template that should contain instructions for how to render a

element.

c. This means "Find all the

elements in the document, and process them according to any applicable templates".

Question 171

The left outer join is one type of outer join. Another one is the.

Выберите один ответ.

a. full

b. right outer

c. full outer

d. all answers are right

e. right

Question 172

Which XQuery's agregator computes the sum?

Выберите один ответ.

a. avg

b. sum

c. round

d. distinct-values

e. count

Question 173

Which XQuery's agregator computes the average?

Выберите один ответ.

a. sum

b. distinct-values

c. avg

d. count

e. round

Question 174

System Vulnerability and Abuse. Trojan is

Выберите один ответ.

a. Eavesdropping program that monitors information traveling over network

b. Small programs install themselves surreptitiously on computers to monitor user Web surfing activity and serve up advertising

c. Rogue software program that attaches itself to other software programs or data files in order to be executed

d. Independent computer programs that copy themselves from one computer to other computers over a network

e. Software program that appears to be benign but then does something other than expected

Question 175

Web Services. The UDDI is:

Выберите один ответ.

a. United Description, Discovery and the Integration Service;

b. Universal Description, Discovery and the Integration Service;

c. Unidirectional Description, Discovery and the Integration Service;

d. Universal Discovery, Description and the Integration Service;

Question 176

Hackers and Crackers. Are they different?

Выберите один ответ.

a. None difference. They are totaly the same.

b. All answers are wrong

c. Yes. They are opposite to each other. Hackers are "good guys" and Crackers are "bad guys".

d. Yes. They are opposite to each other. Hackers are "bad guys" and Crackers are "good guys".

Question 177

System Vulnerability and Abuse. Pharming is

Выберите один ответ.

a. Steal of personal Information (social security id, driver

b. Setting up fake Web sites or sending e-mail messages that look like legitimate businesses to ask users for confidential personal data

c. Occurs when individual or computer program fraudulently clicks on online ad without any intention of learning more about the advertiser or making a purchase

d. Wireless networks that pretend to offer trustworthy Wi-Fi connections to the Internet

e. Redirects users to a bogus Web page, even when individual types correct Web page address into his or her browser

Question 178

The Web services can not offer the application components like:

Выберите один ответ.

a. weather reports;

b. web browsers;

c. the currency conversion;

d. the language translation;

Question 179

System Vulnerability and Abuse. SQL injection is

Выберите один ответ.

a. Software program that appears to be benign but then does something other than expected

b. Hackers submit data to Web forms that exploits site

c. Small programs install themselves surreptitiously on computers to monitor user Web surfing activity and serve up advertising

d. Independent computer programs that copy themselves from one computer to other computers over a network

e. Rogue software program that attaches itself to other software programs or data files in order to be executed

Question 180

XML publishing: XML --> relational data. Is it right?

Выберите




double arrow
Сейчас читают про: