SD3 - Parent Directory

advertisement
SD3
1.
2.
3.
4.
5.
6.
7.
8.
_____ in XML means that the language
can be extended & adopted to meet
any difference needs
(a) Extra
(b) Extended
(c) Extensible
(d) All of the above
_____ for XML documents is specific
enough to allow development of XML
parsers
(a) Text data
(b) Attributes
(c) Language compiler
(d) Grammar
XML documents that satisfy the
grammar are called as _____
(a) type 4 grammar
(b) well fared grammar
(c) structured grammar
(d) None of the above
The _____ in an XML document
describes the documents structure
(a) Data
(b) text data
(c) markup
(d) attributes
_____ lists all the legal markup &
specifies where & how the markup may
be included in a document
(a) XLT
(b) DTD
(c) XTD
(d) None of the above
_____ is responsible for dividing the
document into individual attributes &
other pieces
(a) Compiler
(b) Parser
(c) Interpreter
(d) Co-processor
SGML stands for ________
(a) Standard Generalized ML
(b) Secured General ML
(c) Stored Genuine ML
(d) None of the above
XML 1.0 was invented in ________
(a) 1999
(b) 2000
(c) 996
(d) 1998
XIX
9.
10.
11.
12.
13.
14.
15.
16.
XSLT stands for ________
(a) Extensible Style sheet Language
Transformations
(b) Extensible Spreadsheet Language
Table
(c) Extensible Smart Language Theory
(d) Extensible Secure Language Table
To enhance interoperability, individuals
or organizations may agree to use only
certain tags called as _____
(a) Standard tags
(b) XML applications
(c) XML text tags
(d) DTD
________ is an XML application that
describes the layout of both printed &
web pages
(a) XSLT
(b) XSL-FO
(c) CSS
(d) XSLM
CSS stands for ________
(a) Cascading Spread Server
(b) Cascading Super Server
(c) Cascaded Secure Server
(d) None of the above
________ is an effect to make sense
out of XML document pieces that may
not be considered well formed
documents in isolation
(a) XML schema
(b) X Fragments
(c) XHTML
(d) XSL
________ is a reformulation of HTML
as a well fared, modular, potentially,
valid XML application
(a) XHTML
(b) XSL
(c) XSLT
(d) XSL-FO
All XML documents must be ________
(a) edited
(b) well fared
(c) syntactically correct
(d) All of the above
The start tag & end tag jointly are called
as ________
(a) delimiter
(b) markup
(c) syntax
(d) All of the above
(1)
SD3
17. The start tag & end tag ends with ____
(a) //>
(b) />
(c) >
(d) >>
18. ________ is case sensitive
(a) HTML
(b) XML
(c) Both (a) and (b)
(d) BML
19. Each element in an XML document has
exactly ________ parent element
(a) 2
(b) 3
(c) 4
(d) 5
20. If an elements start tag is inside an
element then its end tag must be
________ that element
(a) Inside
(b) Outside
(c) cannot say
(d) no need to put the tag
21. Overlapping tags are ________ in XML
(a) prohibited
(b) allowed
(c) cannot say
(d) in same versions are allowed
22. The dictionary between elements that
contains only character data &
elements that contain only child
elements is seen in ________
(a) data oriented document
(b) object oriented document
(c) class oriented document
(d) None of the above
23. XML elements can have ________
(a) parameters
(b) value
(c) name value
(d) attribute
24. ________ are enclosed in single of
double quotation marks
(a) Name value
(b) Attributes
(c) Value
(d) All of the above
25. Elements & other XML names may
contain any ________
(a) ASCII
(b) UNICODE
(c) Alphanumeric
(d) All of the above
XIX
26. XML names cannot start with ________
(a) number
(b) hyphen
(c) period
(d) All of the above
27. XML predefines exactly ________
number of entity reference
(a) 5
(b) 6
(c) 10
(d) None of the above
28. ________
always
replaces
the
particular markup with the actual
characters the entity reference refers to
(a) Compiler
(b) Editor
(c) Parser
(d) All of the above
29. Entity reference _____ is replaced by &
(a) & lt
(b) & gt
(c) & amp
(d) & apos
30. Entity reference & quote is replaced by
________
(a) `
(b) :
(c) “
(d) :31. The only thing that cannot appear in a
CDATA section is the ________
(a) CDATA section
(b) Delimiter ]]
(c) Both (a) and (b)
(d) Elements
32. A CDATA section is set of t by a _____
(a) <! [CDATA [and]] >
(b) <! [CDATA [and]] />
(c) </ [CDATA [and]] \>
(d) [</ [CDATA] > \ ]
33. In CDATA sections everything is simply
________ not ________
(a) markup, character data
(b) character data, markup
(c) both (a) and (b)
(d) None of the above
34. The comments that are intended for the
computer programs are called as ____
(a) processing parameters
(b) attributes
(c) name value
(d) processing instructions
(2)
SD3
35. The Apache Web Server parser
comments in ______ files to recognizes
server side includes
(a) Html
(b) Stml
(c) Shtml
(d) All of the above
36. Processing instructions certain ______
amount of text
(a) Limited
(b) unlimited
(c) cannot say
(d) depends upon the elements data
type
37. XML documents should, but do not
have to, begin with an ________
(a) XML declamations
(b) XML comments
(c) Both (a) and (b)
(d) XML CDATA
38. ________ are written in a formal syntax
that explains precisely which elements
& entities elements contents &
attributes are
(a) SVG
(b) DTD
(c) STD
(d) P3P
39. ________ is an optional step in
processing XML
(a) Validation
(b) Parsing
(c) Interpretation
(d) Compilation
40. ________ may list items the documents
does not use
(a) DTD
(b) XML-names
(c) CDATA
(d) PCDATA
41. A DTD never says about the ________
of an elements text content
(a) length
(b) structure
(c) meaning
(d) All of the above
42. #PCDATA, key wards stands for _____
(a) parsed character data
(b) pre created data
(c) pre counted data
(d) None of the above
XIX
43. _____ is everything in the XML document
before the root element start tag
(a) PCDATA
(b) Prolog
(c) CDATA
(d) None of the above
44. Internal & External DTD subsets _____
override the element or attribute
declarations the other makes
(a) cannot
(b) can
(c) cannot say
(d) sometimes allowed
45. Suffixes can be affixed to an element
name in a content model to indicate
(a) number of instances that element
are expected
(b) number of XML-names it can
attached with
(c) Both (a) and (b)
(d) formatting
46. _____ can be combined in arbitrarily
complex fashions to describe essentially
any reasonable content model
(a) choices
(b) sequences
(c) suffixes
(d) All of the above
47. _____ provide much stranger data
typing for attribute values such as
URI’S prices and addresses that DTD’S
that DTD’S have to lump together as
CDATA
(a) XML-names
(b) XML-schema
(c) Both (a) and (b)
(d) Tags
48. Different attribute type exists in XML
are _____
(a) ENTITY
(b) ID
(c) IDEF
(d) All of the above
49. _____ is an interpreted flavor of Java,
which means that the web browser
interprets and executes each live in the
script
(a) VB-script
(b) Java-swing
(c) Java script
(d) All of the above
(3)
SD3
50. Perl programs are not compiled, which
is why they are called as _____
(a) interpreted
(b) scripts
(c) markup
(d) None of the above
51. Which of the following file systems
allows for both file and folder level
permissions?
(a) FAT
(b) FAT16
(c) FAT32
(d) NTFS
52. Which of the following steps might be
appropriate to harden your network
system? (Select all that apply.)
(a) Configure ACL settings on select
servers
(b) Configure your servers to have
unused services disabled
(c) Both (a) and (b)
(d) Configure your servers to all run in
promiscuous mode
53. You have added a new Web server to
your network. Which of the following
are sound practices when checking a
Web server for security features?
(Select all that apply.)
(a) Check with the vendor for the latest
security patches for the Web
software
(b) Check the Web Server for any
additional unused services
(c) Check the Internet for any reports of
software vulnerabilities
(d) All of the above
54. Which of the following is frequently
used to send and receive text-based
files and messages, including router
configurations and ACL information?
(a) File Transport Protocol (FTP)
(b) Trivial File Transfer Protocol (TFTP)
(c) Fast File Transfer Protocol
(d) Trivial Transport Protocol
XIX
55. Which of the following is considered a
Directory Service?
(a) Lightweight Directory Access Protocol
(b) Heavyweight Directory Access Protocol
(c) Hierarchical Directory Access Protocol
(d) Local Directory Access Protocol
56. The non-linearities cause signal
spreading in the frequency domain and
generate ________ frequency
(a) Inter domain
(b) Inter modulation
(c) Inter mode
(d) All of the above
57. ____________ must be used with
TDMA
(a) Digital data
(b) Digital modulation
(c) Both (a) and (b)
(d) Demodulation
58. Which of the following are true
statements about Network Address
Translation? (Select all that apply.)
(a) Provides for private addressing
ranges for internal network
(b) Hides the true IP addresses of
internal computer systems
(c) Translates private IP addresses into
registered Internet IP addresses
(d) All of the above
59. Which of the following terms relates to
sending an ICMP request to each IP
address on a subnet and waiting for
replies?
(a) Port scanning
(b) Echo scanning
(c) Ping scanning
(d) Node scanning
60. Your company receives Internet access
through a network or gateway server. Which
of the following devices is best suited to
protect resources and subnet your LAN
directly on the network server?
(a) DSL modem
(b) A multi-homed firewall
(c) VLAN
(d) A router that acts both as a bridge
and a router
(4)
SD3
61. Remember, routers work at the
Network Layer of the International
Standards Organization/Open Systems
Interconnection (ISO/OSI) established
sequence of OSI Layers. What is the
correct and complete OSI sequence in
order from user interface (Layer 7) to
the delivery of binary bits (Layer 1)?
(a) Physical Layer, Network Layer,
Data Link Layer, Transport Layer,
Session Layer, Presentation Layer,
Application Layer
(b) Application Layer, Presentation
Layer, Session Layer, Transport
Layer, Network Layer, Data Link
Layer, Physical Layer
(c) Application Layer, Physical Layer,
Session Layer, Transport Layer,
Network Layer, Data Link Layer,
Presentation Layer
(d) Physical Layer, Data Link Layer,
Network Layer, Session Layer,
Transport
Layer,
Presentation
Layer, Application Layer
62. SMTP stands for
(a) Send Mail Transfer Protocol
(b) Send Mail Transport Party
(c) Simple Mail Transfer Protocol
(d) None of the above
63. The procedure name that should be
used for most messages generating
from mailing list, is _________
(a) First class
(b) List
(c) Bulk
(d) Junk
64. Worthless e-mail that is possibly the
output of program or a test message,
will have the precedence name as
(a) Bulk
(b) Junk
(c) List
(d) First class
XIX
65. The timeout event ________ gives the
acknowledgement of the Mail command
(a) Smail
(b) Mail
(c) Connect
(d) Received
66. The results of a host status check is
given by the timeout event_______
(a) Status
(b) Hoststatus
(c) Host
(d) Helo
67. The send mail program Heet is used to
handle the incoming mails vis UUCp is
(a) Smail
(b) Vmail
(c) Smrch
(d) Uucp
68. for ($count=1:$count<11:$count++)
{
print “cool\n”
}
gives result
(a) print “cool” 11 times
(b) print “cool” 10 times
(c) gives error
(d) None of the above
69. To get a portion of a string value we
use
(a) substr($value)
(b) substring($value,start
number,length)
(c) substr($value,start number,length)
(d) substring($value)
70. Contextual selector are merely strings
of two or more simple selectors
separated by?
(a) White space
(b) Underscore
(c) Comma
(d) Astrick
(5)
Download