Skip to content
  • 0 Votes
    1 Posts
    213 Views
    No one has replied
  • 0 Votes
    14 Posts
    4k Views
    M

    XML Quiz
    For each question, choose the best choice out of the given choices.

    What does XML stand for?
    A. X-Markup Language
    B. eXtra Modern Link
    C. Example Markup Language
    D. eXtensible Markup Language

    XML’s goal is to replace HTML
    A. True
    B. False

    What does DTD stand for?
    A. Direct Type Definition
    B. Document Type Definition
    C. Document Type Declaration

    Is this a correct XML document?

    Students
    Teacher
    Reminder

    We are at Software Park, Thailand A. Yes **B. No**

    Which statement is true?
    A. All XML elements must have a closing tag
    B. All XML documents must have a DTD or an XML schema
    C. All XML elements must be lowercase
    D. All of the statements are true

    Which statement is true?
    A. XML tags are case sensitive
    B. XML elements must be properly nested
    C. XML documents must have the root element
    D. All the statements are true

    XML preserves white spaces
    A. True
    B. False

    Is this a correct XML document?

    Students Teacher

    A. No
    B. Yes

    XML elements cannot be empty
    A. True
    B. False

    Which is not a correct name for an XML element?
    A.
    B.
    C. <1dollar>
    D. All 3 names are incorrect

    Which is not a correct name for an XML element?
    A.
    B.
    C.
    D. All 3 names are incorrect

    Which is not a correct name for an XML element?
    A.
    B.
    C.

    For the XML parser to ignore a certain section of your XML document, which syntax is correct?
    A. <xml:CDATA[ Text to be ignored]>
    B. Text to be ignored
    C.

    XML is a subset of SGML
    A. True
    B. False

    XML attributes must be in double quotes
    A. True
    B. False

    XML attributes must be assigned values
    A. True
    B. False

    The Document Type Definition must be stored in an external file
    A. True
    B. False

    What can XML do?
    A. The standard for automating data exchange between systems
    B. The standard for displaying data on the Web
    C. The standard for a cross-platform programming language

    Which is false?
    A. XML is used to describe only structured data
    B. XML is used to only on the Internet
    C. XML is used to represent only simple data
    D. All of the above

    Which of the following comments are not well formed?
    A.
    B.
    C. <!-- declaration — 10.27.2004 -->
    D.

    Provided that the file x.dtd has the following contents. Which of the xml files are valid?

    a.



    text

    b.


    Element can
    contain

    c.

    Sample

    How can you declare in a DTD that the element x contains either the element a or the element b, but not both of them
    a)
    b)
    c)
    d) It is not possible to declare in a DTD that one element contains either the element a or the element b, but not both of them

    How can you declare in a DTD that the element x contains the element a, or the element b, or both of them in the sequence a b.
    a)
    b)
    c)
    d) None of the declarations above does solve the problem.

    How can you declare in a DTD that the empty element x has either the attribute a or the attribute b (or both of them). The attributes contain any value.
    a)

    b)

    c)

    d) It is not possible to make the presence of one attribute depend on another attribute

    How can you in a DTD declare that the element x contains both attributes a and b and that the order of them has to be ab? The attributes can contain any value
    a)

    b)

    c)

    b CDATA #REQUIRED>

    d) It is not possible to specify the order of attributes in a DTD. The order of attributes does not matter in XML.

    e) It is not possible to specify the order of attributes in a DTD. The order of attributes can be specified only in an XML schema.

    Valid names of elements and attributes start with a letter, an underscore or a colon, the following allowed characters are letters, numeric characters, colon, underscore, dot and hyphen (minus). Names which start with “xml” (in any case) are reserverd for W3C. The colon has a special meaning with namespaces and should not be used with any other semantic.

  • 0 Votes
    10 Posts
    517 Views
    zaasmiZ

    What SQL clause is used to restrict the rows returned by a query?
    55244ad6-5866-47d3-910c-3b933ed475c1-image.png

  • 0 Votes
    2 Posts
    1k Views
    mehwishM

    Qno 1: Function Overloading Mean…

    1 ) The name of the function will Remain the same but its behavior may change.

    The Name of the Function will not remain same but its bahavior will not be change.

    Making a function inline.

    Function Name can be change.

    Qno 2: sorry i forget.

    Qno 3: For accessing data member we use … operator.

    Plus+. Multiplication* Dot. Division/.

    Qno4: Constructor has…

    No name. The same name as of class. The same Name as Data Member. Return type.

    Qno5: Free Function is Avaliable in… header file.

    Conio.h Iostream.h String.h Stdlib.h

    Qno6: New operator can Be used for…

    Only integer Data type. Only char and integer data type. Integer, flot, char and double data type. Dot operator.

    Qno7: The Malloc function takes…Arguments.

    Two Three Four One.

    Qno8: Macros are categorized into…types.

    One Four Two None of the given options.

    Qno9: class can be define as…

    A class include both data member as well as Function to manipulate that data. A class include only object, A class include both object and structure. A class does not include Data member and Function.

    Qno10: A class is…

    A built in Function. A user Define data type. An Array. A member function.
  • 0 Votes
    1 Posts
    85 Views
    No one has replied
  • 0 Votes
    1 Posts
    146 Views
    No one has replied
  • 0 Votes
    1 Posts
    97 Views
    No one has replied
  • 0 Votes
    1 Posts
    92 Views
    No one has replied
  • 0 Votes
    1 Posts
    85 Views
    No one has replied
  • 0 Votes
    3 Posts
    229 Views
    Khuram ShahzadK

    Thanks for shairing

  • 1 Votes
    6 Posts
    704 Views
    zareenZ

    @zareen said in CS403 GDB1 Solution and discussion:

    Now would you normalize the database or keep your database in de-normalized form.

    Although, denormalized schema can greatly improve performance under extreme read-loads but the updates and inserts become complex as the data is duplicate and hence has to be updated/inserted in more than one places.

    One clean way to go about solving this problem is through the use of triggers. For example in our case where the orders table has the product_name column as well, when the value of product_name has to be updated, then it can simply be done in the following way:

    Have a trigger setup on the products table that updates the product_name on any update to the products table. Execute the update query on the products table. The data would automatically be updated in the orders table because of the trigger.

    However, when de-normalizing the schema, do take into consideration, the number of times you would be updating records compared to the number of times you would be executing SELECTs. When mixing normalization and de-normalization, focus on de-normalizing tables that are read intensive, while tables that are write intensive keep them normalized.

    link text

  • 0 Votes
    3 Posts
    2k Views
    M

    The large energy cost of memory fetches limits the overallefficiency of applications no matter how efficient the ac-celerators are on the chip. As a result the most importantoptimization must be done at the algorithm level, to reduce off-chip memory accesses, to createDark Memory. The algorithmsmust first be (re)written for both locality and parallelism beforeyou tailor the hardware to accelerate them.Using Pareto curves in theenergy/opandmm2/(op/s)spaceallows one to quickly evaluate different accelerators, memorysystems, and even algorithms to understand the trade-offsbetween performance, power and die area. This analysis isa powerful way to optimize chips in the Dark Silicon era.

  • 0 Votes
    5 Posts
    913 Views
    zaasmiZ

    Actually, it’s difficult to compare the cryptographic strengths of symmetric and asymmetric key encryptions. Even though asymmetric key lengths are generally much longer (e.g. 1024 and 2048) than symmetric key lengths (e.g. 128 and 256), it doesn’t, for example, necessarily follow that a file encrypted with a 2048-bit RSA key (an asymmetric key) is already tougher to crack than a file encrypted with a 256-bit AES key (a symmetric key).

    Instead, it would be more appropriate to compare asymmetric and symmetric encryptions on the basis of two properties:

    Their computational requirements, and

    Their ease of distribution

    Symmetric key encryption doesn’t require as many CPU cycles as asymmetric key encryption, so you can say it’s generally faster. Thus, when it comes to speed, symmetric trumps asymmetric. However, symmetric keys have a major disadvantage especially if you’re going to use them for securing file transfers.

    Because the same key has to be used for encryption and decryption, you will need to find a way to get the key to your recipient if he doesn’t have it yet. Otherwise, your recipient won’t be able to decrypt the files you send him. However way you do it, it has to be done in a secure manner or else anyone who gets a hold of that key can simply intercept your encrypted file and decrypt it with the key.

    The issue of key distribution becomes even more pronounced in a file transfer environment, which can involve a large number of users and likely distributed over a vast geographical area. Some users, most of whom you may never have met, might even be located halfway around the world. Distributing a symmetric key in a secure manner to each of these users would be nearly impossible.

    Asymmetric key encryption doesn’t have this problem. For as long as you keep your private key secret, no one would be able to decrypt your encrypted file. So you can easily distribute the corresponding public key without worrying about who gets a hold of it (well, actually, there are spoofing attacks on public keys but that’s for another story). Anyone who holds a copy of that public key can encrypt a file prior to uploading to your server. Then once the file gets uploaded, you can decrypt it with your private key.

  • 0 Votes
    5 Posts
    195 Views
    zareenZ

    @zareen said in CS202 GDB1 Solution and discussion:

    Use AJAX

    AJAX is a technique for creating fast and dynamic web pages. AJAX allows web pages to be updated asynchronously by exchanging small amounts of data with the server behind the scenes. This means that it is possible to update parts of a web page, without reloading the whole page.

  • 0 Votes
    4 Posts
    269 Views
    M

    A nanopore is a nano-scale hole. In its devices, Oxford Nanopore passes an ionic current through nanopores and measures the changes in current as biological molecules pass through the nanopore or near it. The information about the change in current can be used to identify that molecule.

    Holes can be created by proteins puncturing membranes (biological nanopores) or in solid materials (solid-state nanopores).

  • 0 Votes
    2 Posts
    136 Views
    M

    Methods for Protein Analysis

    Protein Separation Methods Western Blotting Protein Identification Methods
    3A. Edman degradation
    3B. Mass spectrometry

    However, and perhaps remarkably, if as shown above we digest samples of ourprotein with as few as two or three different endoproteases with different
    specificities, we can usually use the resulting digestion patterns (again, analyzedby mass spectrometry to provide highly accurate determination of the fragmentmolecular weights) to produce a unique identification of our unknown protein:Again, mass spectrometry is uniquely well-suited for such analyses because itcan yield very accurate determinations of molecular weights from very even verysmall amounts of fragments resulting from the digestion of a particular protein.Techniques have now been developed by which proteins separated in two-dimensional gels can be digested within the gels and then injected directly into amass spectrometer for analysis of the resulting fragments.