(вопросы к спец экзамену)
Каримжан Н.Б.
Кол-во заданий: 188
Question 1
Is the follwing DTD definition valid?
<! ELEMENT RPLClient (TestSession)?>
Ответ:
Верно Неверно
Question 2
Are DTDs well formed XML documents?
Ответ:
Верно Неверно
Question 3
Select which of the following XML documents are well-formed XML documents.
Выберите один ответ.
a. <productname>Dehumidifier "XZ001" </productname>
b. <productname/ >
c. <productname>”Water Purifier(<<6>>)”</productname>
d. <productname>Electric Water Heater&piccoro_</productname>
Question 4
It can convert your applications into Web-applications
Выберите один ответ.
a. Web programs;
b. Not all;
c. Web;
d. Web Services;
Question 5
What will be the result of the following statement?
SELECT ROUND(123.895, 2)
Ответ:
Question 6
XSLT is:
Выберите один ответ.
a. Extended Stylesheet Language Transformation;
b. Extensible Style Language Transformation;
c. Extensible Stylesheet Language Translators;
d. Extensible Stylesheet Language Transformation;
Question 7
XPath expressivity sufficient...
Выберите один ответ.
a. no changes to the XML structure possible
b. no quantifiers (as in SQL)
c. no join queries (as in SQL)
d. no aggregation and functions
e. no simple navigation through the tree
Question 8
Difference between IS & IT. What statement is right?
Выберите по крайней мере один ответ:
a. IS falls under the IT's umbrella
b. IT falls under the IS's umbrella
c. No difference, they are synonymous
d. Web-server and OS is IS
e. Pencil and paper is writing IS
Question 9
When creating a DTD for an existing XML document, when should you determine the root element? Please select all the correct answers.
Выберите по крайней мере один ответ:
a. Before you determine the document tree structure for the elements
b. As the first step
c. As the final step
d. After you list all the elements used in the document
e. Only if your document will not render the document in a browser
Question 10
Which one of the following represents a correct order for
Выберите один ответ.
a. INSERT, INTO, WHERE, AND, VALUES
b. INSERT, INTO, SELECT, FROM, WHERE
c. INSERT, INTO, VALUES, FROM, WHERE
d. INTO, INSERT, VALUES, FROM, WHERE
e. SELECT, FROM, WHERE, INSERT, INTO
Question 11
Write a query that will find all of the fields in the car table for those cars that were sold. Use a SUBQUERY with IN.
Car(carid, name, model, year, maker)
Carsale(carid, stickerprice, dealercost)
Ответ:
Question 12
Which clause specifies conditions that determines the groups included in the query?
Выберите один ответ.
a. exists
b. where
c. having
d. distinct
e. union
Question 13
Why Use a DTD? Select wrong sentence:
Выберите один ответ.
a. With a DTD, independent groups of people can agree to use a standard DTD for interchanging data.
b. With a DTD, we can keep information about foreign references to outside data files
c. With a DTD, each of your XML files can carry a description of its own format.
d. You can also use a DTD to verify your own data.
e. Your application can use a standard DTD to verify that the data you receive from the outside world is valid.
Question 14
Which clause you can use to restrict groups returned by a grouped query.
Выберите один ответ.
a. WHERE
b. DISTINCT
c. RESTRICT
d. HAVING
e. DISTINCTROW
Question 15
DBMS. Form is..
Выберите один ответ.
a. a collection of records for a single subject
b. simplifies data entry by displaying one record at a time
c. selects data based on selection criteria
d. formatted information suitable for distribution
e. a collection of related tables and objects
Question 16
DTD comments are in the same format as XML comments?
Ответ:
Верно Неверно
Question 17
What is result of Global Integration? If a.R1(prof, course, university) and b.R2(title, prof, course)
Выберите один ответ.
a. Global(prof,course,title,university)
b. Global(a.prof,a.course,b.title,a.university)
c. Global(b.title,a.university)
d. Global(title,university)
Question 18
Operations Support Systems are
Выберите по крайней мере один ответ:
a. Executive information systems
b. Process control systems
c. Office automation systems
d. Transaction processing systems
e. Management information systems
Question 19
If the DTD is included in your XML source file, it should be wrapped in a DOCTYPE definition with the following syntax:
Выберите один ответ.
a. <DOCTYPE root-element (element-declarations)>
b. <!DOCTYPE [element-declarations]>
c. <DOCTYPE root-element [element-declarations]>
d. <!DOCTYPE root-element [element-declarations]>
Question 20
Zero defects cannot be achieved because complete testing is not possible with large programs
Выберите один ответ.
a. True
b. False
Question 21
Which two of the following are correct when including “&” character within an element value?
Выберите по крайней мере один ответ:
a. The “&” character cannot be included within an element value
b. Enclose the “&” character in single quotes (‘’) <Element1>you'&'me</element>
c. Use a CDATA section <Element1><![CDATA[you&me]]></Element1>
d. Use the predefined entity reference “&аmр;” for the “&” character <Element1>you&me</Element1>
e. Enclose the “&” character in double quotes (“”) <Element1>you"&"me</element>
Question 22
System Vulnerability and Abuse. Spyware is
Выберите один ответ.
a. Software program that appears to be benign but then does something other than expected
b. Small programs install themselves surreptitiously on computers to monitor user Web surfing activity and serve up advertising
c. Rogue software program that attaches itself to other software programs or data files in order to be executed
d. Independent computer programs that copy themselves from one computer to other computers over a network
e. Eavesdropping program that monitors information traveling over network
Question 23
Denial-of-service attack is
Выберите один ответ.
a. Eavesdropping program that monitors information traveling over network
b. Flooding server with thousands of false requests to crash the network.
c. Enabling hackers to steal proprietary information such as e-mail, company files, etc.
d. Using of numerous computers to launch a DoS
e. Misrepresenting oneself by using fake e-mail addresses or masquerading as someone else
Question 24
DBMS. Tabel is..
Выберите один ответ.
a. selects data based on selection criteria
b. simplifies data entry by displaying one record at a time
c. formatted information suitable for distribution
d. a collection of records for a single subject
e. a collection of related tables and objects
Question 25
Which is the correct way to use the union operator:
Выберите один ответ.
a. <xsl:apply-templates select='/CD/Artist & /Tape/Artist' />
b. <xsl:apply-templates select='/CD/Artist AND /Tape/Artist' />
c. <xsl:apply-templates select='/CD/Artist OR /Tape/Artist' />
d. <xsl:apply-templates select='/CD/Artist | /Tape/Artist' />
e. <xsl:apply-templates select='/CD/Artist & /Tape/Artist' />
Question 26
File Management System - limitations:
Выберите по крайней мере один ответ:
a. Will require programming to create relationships and random access
b. Import controls
c. Ad-hoc queries are almost impossible
d. The operating system knows which files are related to each other
e. User manually creates folders and files
Question 27
Which XQuery's agregator eliminates duplicates?
Выберите один ответ.
a. distinct-values
b. count
c. avg
d. round
e. sum
Question 28
What isn't right for MIS audit?
Выберите один ответ.
a. Lists and ranks all program protocols
b. Assesses financial and organizational impact of each threat
c. Observe documentation, training, technologies, personnel, and procedures
d. Tests company
e. May even simulate disaster to test response of technology, IS staff, other employees
Question 29
XQuery. How many clauses in “Flower” Expressions?
Ответ:
Question 30
How data is processing? Choose the most right pathway
Выберите один ответ.
a. Input -> Output -> Feedback
b. Processing -> Output -> Feedback
c. Feedback -> Input -> Output
d. Input -> Processing -> Feedback
e. Processing -> Input -> Feedback
Question 31
XML. An element declaration has the following syntax:
Выберите один ответ.
a. <ELEMENT element-name category>
b. <!ELEMENT element-name category>
c. <!ELE element-name category>
d. <!element-name ELEMENT category>
Question 32
A NULL value is treated as a blank or 0.
Ответ:
Верно Неверно
Question 33
With SQL, how do you select a column named "Version" from a table named "Software" and a column named "Version" from a table named "Automobile"?
Выберите один ответ.
a. SELECT Software.Version, Automobile.Version FROM Software AND Automobile
b. SELECT s.Version AS 'softVer', a.Version AS 'autoVer' FROM Software AS s AND Automobile AS a
c. SELECT Version, Version FROM Software, Automobile
d. EXTRACT Version AS 'softVer', Version AS 'autoVer' FROM Software AND Automobile
e. SELECT Software.Version, Automobile.Version FROM Software, Automobile
Question 34
What actions does not belong to Security policy
Выберите один ответ.
a. Make complicated password
b. Change password per month
c. Update software
d. Install several antivirus programs
e. Encrypt data
Question 35
What isn't right for Indexed File Organization?
Выберите один ответ.
a. Data is directly accessed using the key
b. Records stored sequentially, but file contains an index for direct access
c. Combines elements of sequential and direct methods
d. Index is sorted and contains record key
e. Go directly to desired record by using a key
Question 36
What does enable hackers to steal proprietary information such as e-mail, company files, etc.?
Выберите один ответ.
a. Distributed denial-of-service attacks
b. Denial-of-service attacks
c. Botnets
d. Sniffer
e. Spoofing
Question 37
Design Principles. What ER diagram is right? ("---" - many to many, "-->" - many to one)
Выберите один ответ.
a. [Product] --- <Purchase> --> [Person]
b. [Product] <-- <Purchase> --- [Person]
c. [Product] --- <Purchase> --- [Person]
d. [Product] <-- <Purchase> --> [Person]
Question 38
Which is definition of Information System wrong?
Выберите один ответ.
a. IS an integrated set of components for collecting, storing, and processing data and for delivering information, knowledge, and digital products
b. IS a manual or computerized collection, storage, processing, and presentation system of data and other knowledge for decision making, progress reporting, planning and evaluation
c. IS is typically considered to be a set of interrelated elements or components that collect, manipulate, and disseminate data and information and provide a feedback mechanism to meet an objective
d. IS is the system consisting of the network of all communication channels used within an organization
e. IS is the tool used to store, manipulate, distribute or create information
Question 39
The method of joining two tables together in SQL is:
Выберите один ответ.
a. Where
b. Having
c. Join
d. Union
e. Add
Question 40
Select which of the following is a correct element type declaration for the occurrence of the “FirstName” element and the “LastName” element in that order as the child element of “Name” Element.
Выберите один ответ.
a. <!ELEMENT Name (FirstName, LastName)>
b. <!ELEMENT Name (FirstName)> <!ELEMENT Name (LastName)>
c. <!ELEMENT Name (FirstName | LastName)>
d. <!ELEMENT Name (FirstName / LastName)>
Question 41
How do you specify that child elements contained in an element must appear in the same order specified by the DTD file? Please select the best answer.
Выберите один ответ.
a. Add a plus sign (+) after the child elements in the element declaration
b. Use vertical slashes (|) to separate ordered child elements in the element declaration
c. Add a forward slash (/) before the closing bracket of the child element declaration
d. Use commas (,) to separate ordered child elements in the element declaration
Question 42
System Vulnerability and Abuse. Virus is
Выберите один ответ.
a. Eavesdropping program that monitors information traveling over network
b. Small programs install themselves surreptitiously on computers to monitor user Web surfing activity and serve up advertising
c. Independent computer programs that copy themselves from one computer to other computers over a network
d. Rogue software program that attaches itself to other software programs or data files in order to be executed
e. Software program that appears to be benign but then does something other than expected
Question 43
XML. PCDATA means:
Выберите один ответ.
a. parsed and compiled data
b. private character data
c. public character data
d. parsed character data
Question 44
What is right for Actor?
Выберите по крайней мере один ответ:
a. Someone or something that interacts with the system
b. Use case is always initiated by an actor
c. A single user may play only one role
d. Typically, an actor represents a role that a human, a hardware device, or even another system plays with a system
e. Finding the actors also means that you enlarge the boundaries of the system
Question 45
System Vulnerability and Abuse. Key logger is
Выберите один ответ.
a. Record every keystroke on computer to steal serial numbers, passwords, launch Internet attacks
b. Independent computer programs that copy themselves from one computer to other computers over a network
c. Small programs install themselves surreptitiously on computers to monitor user Web surfing activity and serve up advertising
d. Software program that appears to be benign but then does something other than expected
e. Rogue software program that attaches itself to other software programs or data files in order to be executed
Question 46
TLS is:
Выберите один ответ.
a. Tunel Layer Security
b. Transport Layer Soft
c. Tunel Level Security
d. Transport Layer Security
e. Transport Level Security
Question 47
What does use of numerous computers to launch a DoS?
Выберите один ответ.
a. Botnets
b. Distributed denial-of-service attacks
c. Sniffer
d. Denial-of-service attacks
e. Spoofing
Question 48
Business IS. What is C2C:
Выберите один ответ.
a. Client to Client
b. Not all
c. Customer to Customer
d. Company to Company
Question 49
Considering the following XML document, what is the result of count(//*):
<?xml version="1.0" encoding="UTF-8"?>
<root>
<employee id="45">
<name>John</name>
<salary>$100,000</salary>
</employee>
</root>
Выберите один ответ.
a. 0
b. 1
c. 5
d. 2
e. 4
f. 8
Question 50
What does the following SQL statement do: SELECT Customer, COUNT(Order) FROM Sales GROUP BY Customer HAVING
COUNT(Order) >5
Выберите один ответ.
a. All answers are incorrect
b. Selects all Customers from the Sales table
c. Selects the total number of orders from the Sales table, if this number is less than 5
d. Selects all customers from table Sales that have made more than 5 orders.
e. Selects the total number of orders from the Sales table, if this number is greater than 5
Question 51
Which of the following are not a group function?
Выберите по крайней мере один ответ:
a. sqrtegg
b. maxegg
c. sumegg
d. avgegg
e. round()
Question 52
In a DTD, Attributes are declared with an _______ declaration
Выберите один ответ.
a. ATTLIST
b. ALIST
c. ATTRIBUTELIST
d. All the above
Question 53
What is right for Random File Organization?
Выберите по крайней мере один ответ:
a. If a particular record is desired, all prior records must be read first
b. Organization may be Direct/Indexed
c. Records are stored in the order they were entered
d. Tape storage uses sequential organization
e. Go directly to desired record by using a key
Question 54
Write a query that will find all of the fields in the car table for those cars that were sold. Use EXISTS.
Car(carid, name, model, year, maker)
Carsale(carid, stickerprice, dealercost)
Ответ:
Question 55
What is the non-system vulnerability?
Выберите один ответ.
a. Revolution
b. Theft of portable devices
c. Accessibility of networks
d. Software problems
e. Hardware problems
Question 56
What is ER Model? ER model..
Выберите один ответ.
a. is a low-level data model that is useful in developing a conceptual design for a inventory systems
b. is a way of graphically representing the logical relationships of entities (or objects) in order to create a database
c. is an abstract and conceptual representation of processed information
Question 57
Which of the following are valid XML names? (check all valid options)
Выберите по крайней мере один ответ:
a. R&T
b. Size-
c. data-xml
d. Value$
Question 58
XML is case-sensitive?
Ответ:
Верно Неверно
Question 59
What can't harm an information system?
Выберите один ответ.
a. Trojan horses
b. Malware
c. Tokens
d. Viruses
e. Updates
Question 60
What does Antivirus and antispyware software?
Выберите один ответ.
a. Examines events as they are happening to discover attacks in progress
b. Port blocking
c. Checks computers for presence of malware and can often eliminate it as well
d. Proxy filtering
e. Authenticates users, protecting identities, controlling access
Question 61
System Vulnerability and Abuse. Spoofing is
Выберите один ответ.
a. Eavesdropping program that monitors information traveling over network
b. Using of numerous computers to launch a DoS
c. Flooding server with thousands of false requests to crash the network.
d. Enabling hackers to steal proprietary information such as e-mail, company files, etc.
e. Misrepresenting oneself by using fake e-mail addresses or masquerading as someone else
Question 62
System Vulnerability and Abuse. Worm is
Выберите один ответ.
a. Software program that appears to be benign but then does something other than expected
b. Independent computer programs that copy themselves from one computer to other computers over a network
c. Rogue software program that attaches itself to other software programs or data files in order to be executed
d. Eavesdropping program that monitors information traveling over network
e. Small programs install themselves surreptitiously on computers to monitor user Web surfing activity and serve up advertising
Question 63
Which of the following SQL statements is correct?
Выберите по крайней мере один ответ:
a. SELECT CustomerName, COUNT(customer_id) FROM Orders GROUP BY CustomerName
b. SELECT CustomerName, COUNT(CustomerName) FROM Orders
c. SELECT CustomerName, COUNT(CustomerName) FROM Orders ORDER BY CustomerName
d. SELECT CustomerName, COUNT(CustomerName) FROM Orders GROUP BY CustomerName
e. SELECT CustomerName, COUNT(*) FROM Orders GROUP BY CustomerName
Question 64
Can you associate many DTDs with an XML document?
Ответ:
Верно Неверно
Question 65
What is right for Sequential File Organization?
Выберите по крайней мере один ответ:
a. Records are stored in the order they were entered
b. Go directly to desired record by using a key
c. Tape storage uses sequential organization
d. If a particular record is desired, all prior records must be read first
e. Organization may be Direct/Indexed
Question 66
What is right for Use case model?
Выберите по крайней мере один ответ:
a. Illustrate a system
b. Use cases are usually described in a textual document that accompanies a use case diagram; the combination of these use case diagrams & their supporting documentation is known as a use case model
c. A single user may play only one role
d. Are used to communicate
e. Provide a union of testers & developers to discuss the database stability
Question 67
What is redirecting Web link to address different from intended one, with site masquerading as intended destination?
Выберите один ответ.
a. Denial-of-service attacks
b. Distributed denial-of-service attacks
c. Spoofing
d. Botnets
e. Sniffer
Question 68
With SQL, how do you select all the records from a table named "Persons" where the "LastName" is alphabetically between (and including) "Hansen" and "Pettersen"?
Выберите один ответ.
a. SELECT LastName>'Hansen' AND LastName<'Pettersen' FROM Persons
b. SELECT * FROM Persons WHERE LastName>'Hansen' AND LastName<'Pettersen'
c. SELECT LastName BETWEEN 'Hansen' AND 'Pettersen' FROM Persons
d. SELECT LastName>='Hansen' AND LastName<='Pettersen' FROM Persons
e. SELECT * FROM Persons WHERE LastName BETWEEN 'Hansen' AND 'Pettersen'
Question 69
Database is..
Выберите один ответ.
a. simplifies data entry by displaying one record at a time
b. formatted information suitable for distribution
c. a collection of records for a single subject
d. a collection of related tables and objects
e. selects data based on selection criteria
Question 70
XML. Elements with only character data are declared with
Выберите один ответ.
a. #TEXT
b. #CDATA
c. #CHAR
d. #PCDATA
Question 71
What is right for Disaster recovery and Business continuity planning?
Выберите один ответ.
a. All are right
b. Management must determine which systems restored first
c. None of these
d. Both types of plans needed to identify firm
e. Business impact analysis to determine impact of an outage
Question 72
Select which of the following is a correct XML declaration description.
Выберите один ответ.
a. <?xml encoding="UTF-8" version="1.0"?>
b. <?xml version="1.0"?>
c. <?xml version="1.0" encoding="">
d. <?xml encoding="UTF-8">
Question 73
Which of the following declarations must every XML document that uses a DTD have? Please select the best answer.
Выберите один ответ.
a. A <DOCTYPE> declaration
b. A <!DTD> declaration
c. A <STANDALONE> declaration
d. A <!DOCTYPE> declaration
Question 74
Is the follwing DTD definition valid?
<
!ELEMENT RPLClient (TestSession)?>
Ответ:
Верно Неверно
Question 75
What does this XSLT output:
<xsl:text disable-output-escaping="yes">
<!-- hello -->
</xsl:text>
Выберите один ответ.
a. <!-- hello -->
b. It will not output anything
c. hello
d. <!-- hello -->
Question 76
Is the following XML valid?
<AnElement some_attribute="<UpperCase>">Yes</AnElement>
Ответ:
Верно Неверно
Question 77
This XML extension is a standard way to describe how to transform the structure of an XML document into an XML document with a different structure.
Выберите один ответ.
a. tree structure;
b. extract, transform, load;
c. phase change;
d. XSLT;
Question 78
What is the difference between the WHERE and HAVING SQL clauses?
Выберите по крайней мере один ответ:
a. The HAVING SQL clause condition(s) is applied to all rows in the result set before the WHERE clause is applied (if present).
b. The WHERE and the HAVING clauses are identical.
c. The WHERE clause is used only with SELECT SQL statements and specifies a search condition for an aggregate or a group.
d. The WHERE SQL clause condition(s) is applied to all rows in the result set before the HAVING clause is applied (if present).
e. The HAVING clause is used with SELECT SQL statements and specifies a search condition for an aggregate or a group.
Question 79
XML. CDATA means:
Выберите один ответ.
a. common data
b. computer data
c. character data
d. None of these
Question 80
XSL. LET - Binds collection variables --> one value. Is it right?
Выберите один ответ.
a. True
b. False
Question 81
Business IS. What is B2B:
Выберите один ответ.
a. Business to Bank
b. Bank to Business
c. Business to Business
d. Not all
Question 82
XSL. How do you select all the og attributes in the document?
Выберите один ответ.
a. /@og
b. /og
c. /../og
d. //og
e. //@og
Question 83
Is the following text valid XML?
<employee id="4" phone="00234567" phone="00434656">Teo Leo</employee>
Ответ:
Верно Неверно
Question 84
How many root elements can be found in a proper XML document?
Выберите один ответ.
a. 0
b. unlimited
c. 1
d. 3
e. 2
Question 85
Classification of IS. Information Sytems have two subclasses
Выберите по крайней мере один ответ:
a. Management Support System
b. Executive Information System
c. Informal Information System
d. Operations Support System
e. Formal Information System
Question 86
What is the non-system vulnerability?
Выберите один ответ.
a. Accessibility of networks
b. Hardware problems
c. Theft of portable devices
d. Revolution
e. Software problems
Question 87
XQuery. “Flower” Expressions are:
Выберите по крайней мере один ответ:
a. LET
b. RETURN
c. WHERE
d. IN
e. FOR
Question 88
Which of these are not valid path expressions of XPath?
Выберите один ответ.
a. //
b. $
c. /
d.../
e. @
Question 89
Given an employees table as follows: empid name managerid a1 bob NULL b1 jim a1 B2 tom a1 What value will select count(*) from employees return?
Выберите один ответ.
a. 3
b. 1
c. None of the listed
d. NULL
e. 2
Question 90
What will be the result of the following SQL statement: SELECT * FROM Table1 HAVING Column1 > 10
Выберите один ответ.
a. All answers are incorrect
b. The result will be empty data set.
c. The result will be all rows from Table1 which have Column1 values less than 10.
d. The SQL statement will generate an error.
e. The result will be all rows from Table1 which have Column1 values greater than 10.
Question 91
Business IS. Which is Supply Chain correct?
Выберите один ответ.
a. Manufacturer--Wholesaler--Raw Material--Retailer--Customer
b. Raw Material--Manufacturer--Retailer--Wholesaler--Customer
c. Manufacturer--Raw Material--Wholesaler--Retailer--Customer
d. Raw Material--Wholesaler--Manufacturer--Retailer--Customer
e. Raw Material--Manufacturer--Wholesaler--Retailer--Customer
Question 92
What is Relational Model disadvantage?
Выберите один ответ.
a. can be
b. hardware overheads
c. data can
d. relationships between tables can
Question 93
IS Development Challenges:
Выберите по крайней мере один ответ:
a. Information overload
b. Employee low qualification
c. Workforce downsizing
d. High costs
e. Workforce upsizing
Question 94
With SQL, how can you delete the records where the "Price" is less than average price in the Purchase Table?
Выберите один ответ.
a. DELETE FROM Purchase AS x, Purchase AS y WHERE x.Price < AVG(y.Price)
b. DELETE Price < AVG(Price) FROM Purchase
c. DELETE ROW Price < AVG(Price) FROM Purchase
d. DELETE FROM Purchase AS x WHERE x.Price < (SELECT AVG(x.Price) FROM Purchase AS x)
e. DELETE FROM Purchase WHERE Price < SELECT AVG(Price) FROM PURCHASE
Question 95
XSLT. Processing always starts at the root. Is it right?
Выберите один ответ.
a. True
b. False
Question 96
DBMS. Query is..
Выберите один ответ.
a. a collection of related tables and objects
b. simplifies data entry by displaying one record at a time
c. a collection of records for a single subject
d. selects data based on selection criteria
e. formatted information suitable for distribution
Question 97
Select which two of the following are described as the top-level element in an XSLT stylesheet. The XSLT namespace prefix is “xsl”.
Выберите по крайней мере один ответ:
a. xsl:transform
b. xsl:template
c. xsl:stylesheet
d. xsl:output
Question 98
Vendors release small pieces of software to repair flaws. However exploits often created faster than patches be released and implemented
Выберите один ответ.
a. False
b. True
Question 99
Management Support System are
Выберите по крайней мере один ответ:
a. Office automation systems
b. Decision support systems
c. Executive information systems
d. Transaction processing systems
e. Process control systems
Question 100
Information Tecnologies are
Выберите по крайней мере один ответ:
a. Network System
b. Software System
c. Hardware System
d. Inventory System
e. Database System
Question 101
With SQL, how can you insert a new record into the "Students" table?
Выберите один ответ.
a. INSERT VALUES ('Jimmy', 'Jackson') INTO Students
b. INSERT VALUES ('Jimmy', 'Jackson') Students
c. INSERT ('Jimmy', 'Jackson') VALUES INTO Students
d. INSERT INTO Students VALUES ('Jimmy', 'Jackson')
e. INSERT ('Jimmy', 'Jackson') INTO Students
Question 102
Types of Information Systems:
Выберите по крайней мере один ответ:
a. Informal Information System
b. Management Support System
c. Operations Support System
d. Formal Information System
e. Executive Information System
Question 103
This markup language is considered to be extensible because of its unlimited and self-defining markup symbols.
Выберите один ответ.
a. XML;
b. XHTML;
c. W3C;
d. HTML;
Question 104
Can an attribute be specified in an element's closing tag?
Ответ:
Верно Неверно
Question 105
What will be the result of this SQL query:
SELECT pname
FROM product
WHERE pname LIKE ‘_k%’;
Выберите один ответ.
a. pNames containing "k" as second char
b. None of the listed
c. pNames starting with “kR
d. pNames starting with “k”
e. pNames starting with “_k”
Question 106
System Vulnerability and Abuse. Phishing is
Выберите один ответ.
a. Redirects users to a bogus Web page, even when individual types correct Web page address into his or her browser
b. Setting up fake Web sites or sending e-mail messages that look like legitimate businesses to ask users for confidential personal data
c. Wireless networks that pretend to offer trustworthy Wi-Fi connections to the Internet
d. Steal of personal Information (social security id, driver
e. Occurs when individual or computer program fraudulently clicks on online ad without any intention of learning more about the advertiser or making a purchase
Question 107
People who use USE CASE diagrams:
Выберите по крайней мере один ответ:
a. Customers
b. Testers
c. Use-case designers
d. Admin
e. Programmers
Question 108
Which syntax of XML Namespaces is right?
Выберите один ответ.
a. xmln::f="http://www.w3schools.com/furniture"
b. xmlns:f="http://www.w3schools.com/furniture"
c. xmln:f="http://www.w3schools.com/furniture"
d. xmlns:f=http://www.w3schools.com/furniture
e. xmlns::f="http://www.w3schools.com/furniture"
Question 109
What does not belong to Authentication?
Выберите один ответ.
a. Tokens
b. Encryption
c. Password systems
d. Biometric authentication
e. Smart cards
Question 110
Which Operator is used in character comparisons with pattern matching?
Выберите один ответ.
a. in
b. set
c. equal
d. between... and
e. like
Question 111
XSL. How do you divide 10 by 5?
Выберите один ответ.
a. 10 / 5
b. 10 mod 5
c. 10 div 5
d. 10 // 5
e. 10 % 5
Question 112
System Vulnerability and Abuse. Phishing is
Выберите один ответ.
a. Email designed to fool recipients into divulging personal information
b. A type of computer network
c. A type of computer virus
d. A Farmville application
e. An example of a security method to protect computers
Question 113
Which XQuery's agregator computes the number of elements?
Выберите один ответ.
a. count
b. sum
c. avg
d. distinct-values
e. round
Question 114
Can you use an XSL style sheet to convert an HTML document to valid XML?
Ответ:
Верно Неверно
Question 115
IS Development. Choose the most right order of steps
Выберите один ответ.
a. Analysis -> Investigation -> Design -> Implementation -> Maintenance&Review
b. Analysis -> Design -> Investigation -> Implementation -> Maintenance&Review
c. Investigation -> Design -> Analysis -> Implementation -> Maintenance&Review
d. Investigation -> Analysis -> Design -> Implementation -> Maintenance&Review
e. Investigation -> Analysis -> Implementation -> Design -> Maintenance&Review
Question 116
WSDL is used for describing the services available.
Выберите один ответ.
a. True
b. False
c. Not all
d. Not always
Question 117
Which SQL statement is used to insert new data in a database?
Выберите один ответ.
a. ADD NEW
b. PUT INTO
c. INSERT
d. ADD RECORD
e. ADD INTO
Question 118
Web Services. What is SOAP:
Выберите один ответ.
a. Simplified Object Access Protocol
b. Specified Simple Object Access Protocol
c. Not all
d. Simple Object Access Protocol
Question 119
SSL is:
Выберите один ответ.
a. Software Sockets Layer
b. Special Sockets Level
c. Special Sockets Layer
d. Secure Sockets Layer
e. Secure Sockets Level
Question 120
System Vulnerability and Abuse. Identity theft is
Выберите один ответ.
a. Occurs when individual or computer program fraudulently clicks on online ad without any intention of learning more about the advertiser or making a purchase
b. Wireless networks that pretend to offer trustworthy Wi-Fi connections to the Internet
c. Redirects users to a bogus Web page, even when individual types correct Web page address into his or her browser
d. Setting up fake Web sites or sending e-mail messages that look like legitimate businesses to ask users for confidential personal data
e. Steal of personal Information (social security id, driver
Question 121
System Vulnerability and Abuse. "Evil twins" is
Выберите один ответ.
a. Wireless networks that pretend to offer trustworthy Wi-Fi connections to the Internet
b. Occurs when individual or computer program fraudulently clicks on online ad without any intention of learning more about the advertiser or making a purchase
c. Redirects users to a bogus Web page, even when individual types correct Web page address into his or her browser
d. Setting up fake Web sites or sending e-mail messages that look like legitimate businesses to ask users for confidential personal data
e. Steal of personal Information (social security id, driver
Question 122
Choose the false statement.
Выберите один ответ.
a. XSLT is not a W3C Recommendation
b. XSLT uses XPath
c. XSLT is a subset of XSL
d. XSLT is written in XML
Question 123
There are three ways of applying an XSLT to an XML document. Which is NOT this way?
Выберите один ответ.
a. Applying
b. Calling
c. Editing
d. Adding
Question 124
According lectures Information Systems are NOT used to
Выберите по крайней мере один ответ:
a. Create New products & services
b. Improve operations
c. Increase customer solvency
d. Remote control of computers
e. Improve decision making
Question 125
DBMS. Report is..
Выберите один ответ.
a. a collection of related tables and objects
b. formatted information suitable for distribution
c. simplifies data entry by displaying one record at a time
d. a collection of records for a single subject
e. selects data based on selection criteria
Question 126
What will be the result of the following statement?
SELECT ROUND(431.68, 0)
Ответ:
Question 127
Sometimes the expression "select count(*)" will return fewer rows than the expression "select count(value)".
Ответ:
Верно Неверно
Question 128
What will be the result of the following statement?
SELECT 100 + NULL
Выберите один ответ.
a. all answers aren't right
b. NULL
c. error
d. 100
e. 100+NULL
Question 129
What is right for "cookie"?
Выберите по крайней мере один ответ:
a. a small piece of text containing identifying information
b. Sent by server to browser on first interaction
c. Sent by driver to the OS that created the cookie on further interactions
d. Server cleans information about cookies it issued, and can't use it when serving a request
e. can be stored permanently or for a limited time
Question 130
Using a ______ you can do exchange the data between the different applications and different platforms.
Выберите один ответ.
a. Web application;
b. Not all;
c. Web services;
d. Web pages;
Question 131
Use case diagram "Hairdressing salon" has 2 actors: client & haircutter and 4 use cases: "make apoinment", "wash head", ""take haircut" and ""pay". Some use cases are extend or include and others just use cases. What combination of use cases is right for Use case diagram "Hairdressing salon"?
Выберите один ответ.
a. make & take are just, wash is include to take, pay is extend to take
b. take is just, make & wash are inlcude to take, pay is extend to take
c. make, pay & take are just, wash is inlcude to take
d. take is just, make & wash are extend to take, pay is include to take
e. make & take are just, wash is extend to take, pay is include to take
Question 132
What is Difference Between UNION and UNION ALL?
Выберите один ответ.
a. UNION ALL is faster then UNION
b. UNION is faster then UNION ALL
c. None of the listed
d. Both are same
e. UNION combine all row of both table, while UNION ALL select only atomic rows of both table
Question 133
What does Identity management software?
Выберите один ответ.
a. Checks computers for presence of malware and can often eliminate it as well
b. Examines events as they are happening to discover attacks in progress
c. Authenticates users, protecting identities, controlling access
d. Proxy filtering
e. Port blocking
Question 134
Is the following text valid XML?
<employee id="4"> <name>Teo Leo</employee> </name>
Ответ:
Верно Неверно
Question 135
DBMS. What Hierarchy of Data is right?
Выберите один ответ.
a. Tables--Record--Fields--File--Characters
b. Tables--File--Record--Fields--Characters
c. File--Tables--Record--Fields--Characters
d. File--Tables--Fields--Record--Characters
e. Tables--Record--Fields--Characters--File
Question 136
What does not belong to Digital certificate?
Выберите один ответ.
a. Uses a trusted third party, certification authority (CA), to validate a user
b. Use of public key cryptography working with certificate authority
c. CA verifies user
d. Data file used to establish the identity of users and electronic assets for protection of online transactions
Question 137
What does Intrusion detection systems?
Выберите один ответ.
a. Port blocking
b. Proxy filtering
c. Checks computers for presence of malware and can often eliminate it as well
d. Examines events as they are happening to discover attacks in progress
e. Automates keeping track of all users and privileges
Question 138
SOAP is used to transfer the:
Выберите один ответ.
a. Not all
b. control
c. output
d. data
Question 139
Which of the following statements gets the total value of the column Salary in the Employees table?
Выберите по крайней мере один ответ:
a. SELECT SUM(Salary) FROM Employees
b. SELECT SUM(Salary) WHERE Employees
c. SELECT ADD(Salary) FROM Employees
d. SELECT SUM(Salary) FROM Employees order by 1
e. SELECT TOTAL(Salary) FROM Employees
Question 140
DBMS is..
Выберите один ответ.
a. Data Bussiness Management Systems
b. Database Management Systems
c. Data Bussiness Manager Systems
d. Database Manager Software
e. Database Management Software
Question 141
Conceptual Modelling issues such as:
Выберите по крайней мере один ответ:
a. What entities to model
b. How to create a database
c. Decide which part of reality is represented in a database
d. Agree on structure of the DB before deciding on a particular implementation
e. How entities are related
Question 142
XQuery. Which order of clauses is right?
Выберите один ответ.
a. WHERE-RETURN-FOR-LET
b. LET-FOR-WHERE-RETURN
c. FOR-WHERE-LET-RETURN
d. FOR-RETURN-LET-WHERE
e. FOR-LET-WHERE-RETURN
Question 143
Can you use the SQL JOIN and SQL HAVING clauses in one SQL statement?
Выберите один ответ.
a. It depends
b. All answers are incorrect
c. No
d. Yes
e. only in WHERE clause
Question 144
Why systems are vulnerable? Select right options
Выберите по крайней мере один ответ:
a. Failed portable devices
b. Accessibility of networks
c. Disasters
d. Computers outside of firm control
e. New employee
Question 145
Web Services define a platform-independent standard based on XML to communicate within distributed systems.
Выберите один ответ.
a. Not always true
b. True
c. Not all
d. False
Question 146
Web Services. UDDI is used for listing what ______ are available.
Выберите один ответ.
a. services;
b. data;
c. control;
d. programs;
Question 147
What is the File Management System?
Выберите один ответ.
a. Phar Manager
b. Folder Commander
c. Volkov Commander
d. Total Explorer
e. Norton Explorer
Question 148
Information Systems are
Выберите по крайней мере один ответ:
a. Inventory System
b. Database System
c. Payroll System
d. Hardware System
e. Network System
Question 149
Considering the following XML and XSLT documents, what is the output?
<?xml version="1.0"?>
<staff>
<employee id="45">
<name>John</name>
<salary>$100,000</salary>
</employee>
</staff>
<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform">
<xsl:template match="/">
<xsl:if test="employee/name = 'John'">
true
</xsl:if>
</xsl:template>
</xsl:stylesheet>
Выберите один ответ.
a. The transformation will throw an error
b. The transformation will not output anything
c. The output will be true
Question 150
How many DOCTYPE declarations can be in a well-formed XML document?
Выберите один ответ.
a. 2
b. 0
c. 3
d. 1
e. unlimited
Question 151
Which of the following tags are invalid? (check all invalid options)
Выберите по крайней мере один ответ:
a. </OperatingSystem_CP/M>
b. <Value$>
c. < CELL >
d. <CP/M>
e. < /CELL>
Question 152
IS Development Opportunities:
Выберите по крайней мере один ответ:
a. Support advanced help for users
b. Enhanced global competitiveness
c. Support corporate strategy
d. Improve speed of processes
e. Capture market opportunities
Question 153
Which way of numbering in XSL is right?
Выберите один ответ.
a. <xsl:number>
b. <xsl:count/>
c. <xsl:count>
d. <xsl:number/>
e. <xsl:order/>
Question 154
What isn't right for Public key encryption?
Выберите один ответ.
a. Sender and receiver use single, shared key
b. Recipient decrypts with private key
c. Uses two, mathematically related keys: Public key and private key
d. Sender encrypts message with recipient
Question 155
Please select right way of applying an XSLT to an XML document
Выберите один ответ.
a. Transforming
b. Calling
c. Editing
d. Letting
Question 156
Business IS. What is B2C:
Выберите один ответ.
a. Business to Customer
b. Bank to Client
c. Not all
d. Business to Client
Question 157
XML storage: XML --> relational data. Is it right?
Выберите один ответ.
a. True
b. False
Question 158
Given an employees table as follows: empid name managerid a1 bob NULL b1 jim a1 B2 tom a1 What value will select count(managerid) from employees return?
Выберите один ответ.
a. 3
b. 2
c. NULL
d. 1
e. None of the listed
Question 159
Is the follwing DTD definition valid?
<!ELEMENT
RPLClient
(TestSession)?
>
Ответ:
Верно Неверно
Question 160
What isn't right for Manual Global Integration?
Выберите один ответ.
a. Automaticaly merge multiple databases into a new global database
b. Does not scale with number of databases
c. Local autonomy lost
d. Time consuming and error prone
e. Static solution
Question 161
Is the following text valid XML?
<employee id="4"> <phone>00234567</phone type="work"> <phone>00434656</phone type="home"> </employee>
Ответ:
Верно Неверно
Question 162
Web Services. The WSDL is:
Выберите один ответ.
a. Web Services Developing Language;
b. Web Servers Definition Language;
c. Not all;
d. Web Services Definition Language;
Question 163
What technologies does not include Firewall?
Выберите один ответ.
a. Application proxy filtering
b. Authenticates users, protecting identities, controlling access
c. Static packet filtering
d. Port blocking
e. Network address translation (NAT)
Question 164
XSLT is a...
Выберите один ответ.
a. high-level transformation language;
b. query and functional programming language;
c. query language for selecting nodes;
d. a markup language that defines a set of rules for encoding documents;
Question 165
HTTP is the ubiquitous protocol, which is running practically everywhere on:
Выберите один ответ.
a. Internet;
b. pages;
c. systems;
d. networks;
Question 166
When the same DTD declaration is found in the internal and external subset, which one has priority? The one from the external subset or the one from the internal subset?
Выберите один ответ.
a. external subset
b. internal subset
c. all answers not right
d. none of them
e. both of them
Question 167
What does not belong to Ensuring software quality?
Выберите один ответ.
a. Walkthrough: Review of specification or design document
b. Early and regular testing
c. Software classification
d. Debugging: Process by which errors are eliminated
e. Software metrics
Question 168
Is the following xml file well-formed?
<!-- comment -->
<?xml version="1.0"?>
<root>
</root>
Ответ:
Верно Неверно
Question 169
Encryption: Transforming text or data into cipher text that cannot be read by unintended recipients
Выберите один ответ.
a. False
b. True
Question 170
What does this instruction mean?
<xsl:apply-templates select="//div" />
Выберите один ответ.
a. This means "Find all the
elements which are children of the current context node, and process them according to any applicable templates".
b. This is a template that should contain instructions for how to render a
element.
c. This means "Find all the
elements in the document, and process them according to any applicable templates".
Question 171
The left outer join is one type of outer join. Another one is the.
Выберите один ответ.
a. full
b. right outer
c. full outer
d. all answers are right
e. right
Question 172
Which XQuery's agregator computes the sum?
Выберите один ответ.
a. avg
b. sum
c. round
d. distinct-values
e. count
Question 173
Which XQuery's agregator computes the average?
Выберите один ответ.
a. sum
b. distinct-values
c. avg
d. count
e. round
Question 174
System Vulnerability and Abuse. Trojan is
Выберите один ответ.
a. Eavesdropping program that monitors information traveling over network
b. Small programs install themselves surreptitiously on computers to monitor user Web surfing activity and serve up advertising
c. Rogue software program that attaches itself to other software programs or data files in order to be executed
d. Independent computer programs that copy themselves from one computer to other computers over a network
e. Software program that appears to be benign but then does something other than expected
Question 175
Web Services. The UDDI is:
Выберите один ответ.
a. United Description, Discovery and the Integration Service;
b. Universal Description, Discovery and the Integration Service;
c. Unidirectional Description, Discovery and the Integration Service;
d. Universal Discovery, Description and the Integration Service;
Question 176
Hackers and Crackers. Are they different?
Выберите один ответ.
a. None difference. They are totaly the same.
b. All answers are wrong
c. Yes. They are opposite to each other. Hackers are "good guys" and Crackers are "bad guys".
d. Yes. They are opposite to each other. Hackers are "bad guys" and Crackers are "good guys".
Question 177
System Vulnerability and Abuse. Pharming is
Выберите один ответ.
a. Steal of personal Information (social security id, driver
b. Setting up fake Web sites or sending e-mail messages that look like legitimate businesses to ask users for confidential personal data
c. Occurs when individual or computer program fraudulently clicks on online ad without any intention of learning more about the advertiser or making a purchase
d. Wireless networks that pretend to offer trustworthy Wi-Fi connections to the Internet
e. Redirects users to a bogus Web page, even when individual types correct Web page address into his or her browser
Question 178
The Web services can not offer the application components like:
Выберите один ответ.
a. weather reports;
b. web browsers;
c. the currency conversion;
d. the language translation;
Question 179
System Vulnerability and Abuse. SQL injection is
Выберите один ответ.
a. Software program that appears to be benign but then does something other than expected
b. Hackers submit data to Web forms that exploits site
c. Small programs install themselves surreptitiously on computers to monitor user Web surfing activity and serve up advertising
d. Independent computer programs that copy themselves from one computer to other computers over a network
e. Rogue software program that attaches itself to other software programs or data files in order to be executed
Question 180
XML publishing: XML --> relational data. Is it right?
Выберите






