21. | Which of the following statements are true with reference to the way of describing XML data ?
(a) XML uses DTD to describe the data (b) XML uses XSL to describe the data (c) XML uses a description node to describe the data |
a. | (a) only |
b. | (b) only |
c. | (a) and (b) |
d. | (a) and (c) |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (d).(a) and (c)
|
22. | ............... tag is an extension to HTML that can enclose any number of Javascript statements. |
a. | < SCRIPT > |
b. | < BODY > |
c. | < HEAD > |
d. | < TITLE > |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (a).< SCRIPT >
|
23. | The ............... language was originally designed as the Transformation Language for Style Sheet facility. |
a. | XSTL |
b. | XML |
c. | XQuery |
d. | XPath |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (a).XSTL
|
24. | A method to provide secure transmission of email is called ................. |
a. | TLS |
b. | SA |
c. | IPSec |
d. | PGP |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (d).PGP
|
25. | HTML is defined using SGML – an ……………. standard, information processing-text and office systems (SGML) for text information processing. |
a. | ISO – 8878 |
b. | ISO – 8879 |
c. | ISO – 8880 |
d. | ISO – 8881 |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (b).ISO – 8879
|
26. | BCC in the internet refers to |
a. | Black carbon copy |
b. | Blind carbon copy |
c. | Blank carbon copy |
d. | Beautiful carbon copy |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (b).Blind carbon copy
|
27. | To compare, overlay or cross analyze to maps in GIS |
a. | both maps must be in digital form |
b. | both maps must be at the same equivalent scale |
c. | both maps must be on the same coordinate system |
d. | All of the above |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (d).All of the above
|
28. | Web Mining is not used in which of the following areas? |
a. | Information filtering |
b. | Crime fighting on the internet |
c. | Online transaction processing |
d. | Click stream analysis |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (b).Crime fighting on the internet
|
29. | What does the URL need to access documents?
I. Path name II. Host name III. DNS IV. Retrieval method V. Server port number |
a. | I, II, III |
b. | I, III, V |
c. | I, II, IV |
d. | III, IV, V |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (b).I, III, V
|
30. | An example of a file extension is: |
a. | text |
b. | pict |
c. | mp3 |
d. | web |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (c).mp3
|