网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
多选题
You need to create a column that allows you to createa unique constraint. Which two column definitions should you choose?()
A
nvarchar(100) NULL
B
nvarchar(max) NOT NULL
C
nvarchar(100) NOT NULL
D
nvarchar(100) SPARSE NULL
参考答案
参考解析
解析:
暂无解析
更多 “多选题You need to create a column that allows you to createa unique constraint. Which two column definitions should you choose?()Anvarchar(100) NULLBnvarchar(max) NOT NULLCnvarchar(100) NOT NULLDnvarchar(100) SPARSE NULL” 相关考题
考题
You would like to create a custom performance counter for an application that you created recently.To do this, you decide to create a custom category named ApplicationPerformance and a performance counter named HitNumber.You need to ensure that this counter is shared across numerous applications.What should you do?()A.B.C.D.
考题
You create a Web site that is for members only. The Web site allows members to create lists of users that have access to information about member profiles. The name of the list is stored in the listName variable. The user name of the user to whom access is given is stored in the username variable.You need to enable members to manage their lists of users.Which code segment should you use?()A.B.C.D.
考题
Network access protection (NAP) is configured for the corporate network. Users connect to the corporate network by using portable computers. The command policy required confidentiality of data when is in transmit between the portable computers and the servers. You need to ensure that users can access network resources only from computers that comply with the company policy. What should you do?()A.Create an Ipsec enforcement network policy.B.Create an 802.1xenforcemen tnetwork policy.C.Createa wired network(IEEE802.3)Group policy.D.Create an extensible authentication protocol(EAP)enforcement network policy.
考题
Your company Web site includes a page that customers use to send feedback about the company and its products. You use a SQL Server 2005 database to store the comments in the Comments column of a table named Feedback. You need to implement full-text searching so that you can run reports on the comments. Which two actions should you perform? ()A、 Create a nonclustered index on the Comments column. B、 Execute the USE Master Transact-SQL statement. C、 Create a full-text catalog. D、 Create a full-text index on the Comments column.
考题
You are planning to import customer data from the Customer table and the Country table in your SQL Server 2000 database into a SQL Server 2005 database. You want to ensure that during the import process,each value in the CountryCode column of the Customer table has a corresponding record in the CountryCode column in the Country table of the SQL Server 2005 database. You define a foreign key between these two tables. Thus,referential integrity will guarantee that the import routine fails if there are any records where a CountryCode value does not exist in the Country table but does exist in the Customer table. You need to ensure that the import process does not fail if records are encountered that do not exist in the Country table. What should you do?()A、Drop the foreign key. Import the data by using the script. Re-create the foreign key.B、Create a CHECK constraint.C、Create a DML INSTEAD OF trigger that writes the failed records to a file or table.D、Create a DML AFTER trigger that writes the failed records to a file or table.
考题
You need to specify the changes to the existing firewall configuration settings that are required by the HTTP endpoint that will be used by the proseware_projects database. What should you do?()A、Create a Web publishing rule on ISA2 that allows HTTP traffic on port 5017 from IIS1 to the SQL Server computer.B、Create a Web publishing rule on ISA1 that allows HTTP traffic on port 5017 from IIS1 to the SQL Server computer.C、Create a Web publishing rule on ISA2 that allows HTTPS traffic on port 5017 from IIS1 to the SQL Server computer.D、Create a Web publishing rule on ISA1 that allows HTTPS traffic on port 5017 from IIS1 to the SQL Server computer.
考题
You are a database administrator for your company. The company uses a SQL Server 2005 database that includes a table named Inventory. The table contains a column named Price. A company policy states that the value in the Price column cannot be decreased by more than 10 percent in any single database operation. Updates to the Price column are made by various means, including by using ad hoc queries. You need to ensure that this company policy is enforced. What should you do?()A、Create a trigger that rolls back changes to the Price column that violate company policy.B、Create a stored procedure that disallows changes to the Price column that violate company policy.C、On the Price column, create a check constraint that requires a specified minimum value.D、On the Price column, create a foreign key constraint to a table that contains valid prices.
考题
You deploy a windows server 2008 VPN server behind a firewall. Remote uses connect to the VPN by using portable computers that run windows vista with the latest service pack. The firewall is configured to allows only secured web communications. You need to enable remote users to connect as securely as possible. You must achieve this goal without opening any additional ports on the firewall. What should you do?()A、Create an IPsec tunnel.B、Create an SSTP VPN connection.C、Create a PPTP VPN connection.D、Create a L2tp VPN connection.
考题
You have lost all your database control files. To recover them, you are going to use the results of the alter database backup controlfile to trace command. Your datafiles and your online redo logs are all intact. Which of the following is true regarding your recovery?() A、 You will need to open the database with the resetlogs command.B、 All you need to do is execute the trace file from SQL*Plus and it will perform the recovery for you.C、 You will use the resetlogs version of the create controlfile command.D、 You will use the noresetlogs version of the create controlfile command.E、 You will use the trace file to create a backup control file, and then you will recover the database with the recover database using backup controlfile command
考题
You are responsible for managing the database schema for an order entry application in a SQL Server 2005 database. After a design review, a member of the development staff asks you to add a new column named CommissionRate to the Product table. Because the actual commission rates for all products are not known at this time, each product has a default commission rate of 12 percent. The rate can be modified as necessary. You add the new column. You need to configure the table to assign the default value as efficiently as possible. What should you do?()A、 Create an INSERT trigger to assign the default value to each item in the table. B、 Create a CHECK constraint to validate the data and to assign the default value to each item in the table. C、 Create an UPDATE trigger to update the default value for each new item in the table. D、 Create a DEFAULT constraint to assign the default value specifying the WITH VALUES argument.
考题
You are a network administrator for The network contains a Windows Server 2003 computer named Testking1. You need to install an application on Testking1. The installation will cause several changes to the registry. You plan to use the Backup utility to create a backup that will enable you to restore the registry. TestKing requirements for network management state that all backups must be performed during an eight-hour period at night. Because of this time constraint, you need to ensure that the backup can be recovered as quickly as possible. You need to create a backup that meets the requirements. What should you do?()A、Create a backup of the system partition.B、Create a backup of the boot partition.C、Create a backup of the System State.D、Create an Automated System Recovery (ASR) backup.E、Create a backup of the Systemroot/System32/Config folder.
考题
You create a Web Form that allows users to create a new account. You add a CreateUserWizard control by using the following code segment. You need to ensure that the wizard automatically sends an e-mail message to users when they finish creating their accounts. You add a valid element to the Web.config file. Which code segment should you add to the Page_Load event? ()A、Wizard1.RequireEmail = TrueB、Wizard1.Email = "user@address.com"C、Wizard1.MailDefinition.From = "registration@mysite.com"D、SmtpMail.SmtpServer = "mail.contoso.com"
考题
You work for a bank that uses a SQL Server 2005 database to store line items from customer banking transactions. The bank processes 50,000 transactions every day. The application requires a clustered index on the TransactionID column. You need to create a table that supports an efficient reporting solution that queries the transactions by date. What are the two ways to achieve this goal?()A、Place a nonclustered index on the date column.B、Add a unique clustered index on the date column.C、Map each partition to a filegroup, with each filegroup accessing a different physical drive.D、Create a partitioning scheme that partitions the data by date.
考题
You perform a security audit on a server named Server1. You install the Microsoft Network Monitor 3.0 application on Server1.You find that only some of the captured frames display host mnemonic names in the Source column and the Destination column. All other frames display IP addresses.You need to display mnemonic host names instead of IP addresses for all the frames. What should you do? ()A、Create a new display filter and apply the filter to the capture.B、Create a new capture filter and apply the filter to the capture.C、Populate the Aliases table and apply the aliases to the capture.D、Configure the Network Monitor application to enable the Enable Conversations option. Recapture the data to a new file.
考题
You have a computer that runs Windows 7. You install a second internal hard disk drive in the computer.You attempt to create a system image and discover that the new disk is not listed as a backup destination.You need to ensure that you can use the new disk as a backup destination for system images. What should you do?()A、Create a NTFS partition.B、Create a mirrored volume.C、Create a system repair disc.D、Log on to the computer by using a different account.
考题
You perform a security audit on a server named server1. You install the Microsoft network monitor 3.0 application on server1. You find that only some of the captured frames dsplay host mnemonic names in the source column and the destination column. All other frames display ip addresses. You need to display mnemonic host names instead of ip addresses for all the frames what should you do?()A、Create a new display filter and apply the filter to the capture.B、Create a new capture filter and apply the filter to the capture.C、Populate the aliases table and apply the aliases to the capture.D、Configure the network monitor application to enable the enable converstations option, recapture the data to a new file.
考题
You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database which is named Sellings in the instance. The Sellings database contains a table named Productions. The table is used to stores information about all types of products. The Productions table is often queried by users on the basis of the RadioSize column. The RadioSize column contains the NULL value for all products other than Radios. Currently no index exists on the RadionSize column. According to the requirement of the company CIO, you have to optimize the query performance and reduce the effect on the disk space to the least. So what action should you perform to achieve this goal?() A、On the Products table, you should create a view. B、On the RadioSize column, you should create a clustered index C、On the RadioSize column, you should create a filtered index D、On the RadioSize column, you should create a unique clustered index
考题
You need to implement an authentication method on SQL4. The TravelOnline database will be accessed through a Web services application. You need to make the authentication method as secure as possible.What should you do?()A、Create an HTTP endpoint with NTLM authentication, and create a service principal name (SPN).B、Create an HTTP endpoint with digest authentication, and create a service principal name (SPN).C、Create an HTTP endpoint with integrated authentication, and create a service principal name (SPN).D、Create an HTTP endpoint with Kerberos authentication.
考题
单选题You are a database administrator for your company. The company uses a SQL Server 2005 database that includes a table named Inventory. The table contains a column named Price. A company policy states that the value in the Price column cannot be decreased by more than 10 percent in any single database operation. Updates to the Price column are made by various means, including by using ad hoc queries. You need to ensure that this company policy is enforced. What should you do?()A
Create a trigger that rolls back changes to the Price column that violate company policy.B
Create a stored procedure that disallows changes to the Price column that violate company policy.C
On the Price column, create a check constraint that requires a specified minimum value.D
On the Price column, create a foreign key constraint to a table that contains valid prices.
考题
单选题Using the report wizard you create a tabular report to display all the columns in the EMP table. The records are ordered by the deptname and job columns. You need to create a hierarchical report that breaks on the deptname and job values. Using the data model how would you create this break structure?()A
Specify the break order on the gemp group Property palette. B
Specify a break order on the dept_name and job columns property palettes. C
Click and drag the dept_name and jobs column out and above of the gemp group to create a new parent group. D
Change the position of the dept_name and the job columns within the gemp group.
考题
单选题You use Microsoft .NET Framework 4 to create a Windows Forms application. You have a DataGridView that is bound to a DataTable containing a column named ProductName. The ProductName column can contain any valid string, except "ProductX," "ProductY," "ProductZ." You need to ensure that only valid entries for ProductName are saved when users edit the DataGridView. Which DataGridView event should you use?()A
CellBeginEditB
InvalidatedC
ValidatedD
Validating
考题
单选题You use Microsoft .NET Framework 4 to create a Windows Presentation Foundation (WPF) application that allows users to arrange images. You need to ensure that users can arrange child elements in a panel without affecting the size of the elements. You also need to ensure that child elements are oriented horizontally. Which control should you use?()A
ListBoxB
DockPanelC
WrapPanelD
StackPanel
考题
单选题You create a Web Form that allows users to create a new account. You add a CreateUserWizard control by using the following code segment.You need to ensure that the wizard automatically sends an e-mail message to users when they finish creating their accounts. You add a valid element to the Web.config file. Which code segment should you add to the Page_Load event?()A
Wizard1.RequireEmail = TrueB
Wizard1.Email = user@address.comC
Wizard1.MailDefinition.From = registration@mysite.comD
SmtpMail.SmtpServer = mail.contoso.com
考题
单选题36 You are creating a report wizard to create a matrix report. The query build, you select the patient_name column from the patient table; the doctor_name from the doctors table; and the doctor_ID, patient_ID and ID columns from the procedure table. In the report wizard you select patient_name as the row value, doctor_ID as the column values and the count as the cell values. You need to add a total for each doctors column. In the wizard report which tab will allow you to create the summary column?()A
Rows B
Totals C
Columns D
Cells E
Data
考题
单选题You have an Exchange Server 2010 organization.You plan to enable Federated Sharing.You need to create a DNS record to store the Application Identifier (AppID) of the domain for the federated trust. Which type of record should you create?()A
AB
CNAMEC
SRVD
TXT
考题
单选题You create a salary report to display employee salaries grouped by the dept column. You need to change the break order from ascending to descending using the model. How would you reverse the display order of the department? ()A
Double click the dept column in the group to alter the property palette and change the break out order value. B
Double click the dept column in the group to open the property palette and change the set break order value. C
Double click the g_dept group object to change the break order. D
Click the dept column in the group to change the break order.
考题
单选题You need to create a class definition that is interoperable along with COM.You need to ensure that COM applications can create instances of the class and can call the GetAddress method. Which code segment should you use?()A
AB
BC
CD
D
热门标签
最新试卷