网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
You create a data block based on a relational table containing a REF column. You select the REF column for your form module. What is true about the items based on the REF column attributes?()
- A、The Query Only property is set to Yes.
- B、The Conceal Data property is set to Yes.
- C、The Insert Allowed property is set to Yes.
- D、The Update Allowed property is set to Yes.
参考答案
更多 “You create a data block based on a relational table containing a REF column. You select the REF column for your form module. What is true about the items based on the REF column attributes?()A、The Query Only property is set to Yes. B、The Conceal Data property is set to Yes. C、The Insert Allowed property is set to Yes. D、The Update Allowed property is set to Yes.” 相关考题
考题
You would like to create a custom performance counter for an application that you created recently.To do this, you decide to create a custom category named ApplicationPerformance and a performance counter named HitNumber.You need to ensure that this counter is shared across numerous applications.What should you do?()A.B.C.D.
考题
You create a Web application for your company‘s intranet. You want to enable users to customize their versions of the intranet home page. You create sections of content as Web Parts. You need to ensure that users can customize content at any time.Which two code segments should you use?()A.B.C.D.
考题
You have a file serve that runs windows server 2008. The serve has a shared folder. You need to receive a notification when a user stores more than 500MB of data in the shared folder. You must allow users to store more than 500MB of data in the shared folder.What should you do?()A.Create a soft quota.B.Create a hard quota.C.Create an active screening file screen.D.Create a passive screening file screen.
考题
Examine the statement: Create synonym emp for hr. employees; What happens when you issue the statement? ()
A. An error is generated.B. You will have two identical tables in the HR schema with different names.C. You create a table called employees in the HR schema based on you EMP table.D. You create an alternative name for the employees table in the HR schema in your own schema.
考题
You are granted the CREATE VIEW privilege. What does this allow you to do? ()
A. Create a table view.B. Create a view in any schema.C. Create a view in your schema.D. Create a sequence view in any schema.E. Create a view that is accessible by everyone.F. Create a view only of it is based on tables that you created.
考题
You are granted the CREATE VIEW privilege. What does this allow you to do?()A、Create a table view.B、Create a view in any schema.C、Create a view in your schema.D、Create a sequence view in any schema.E、Create a view that is accessible by everyone.F、Create a view only of it is based on tables that you created.
考题
You are designing an application for a telecom company and you have been asked to design a database table to facilitate monthly bill generation. The bill would include details of customer calls, listed in chronological order. Which method would you follow to achieve this objective without increasing the overhead of sorting the rows?()A、create a hash cluster to store the dataB、create an index cluster to store the dataC、create a partitioned table to store the dataD、create a sorted hash cluster to store the dataE、create a heap table with rowid to store the data
考题
You are creating a Windows Forms Application by using the .NET Framework 3.5.You plan to create a Windows Installer package for a Windows Forms application. The package will be deployed on Windows Vista computers.You need to ensure that during deployment the installation does not elevate privileges of the user installing the application.What should you do?()A、Create a custom action and set the NoImpersonate property to trueB、Create a custom action and set the NoImpersonate property to falseC、Create a manifest and set the RequestedExecutionLevel level attribute to AsInvokerD、Create a manifest and set the RequestedExecutionLevel level attribute to AsAdministrator
考题
You are creating a Windows Forms Application by using the .NET Framework 3.5.You plan to create a Windows Installer package for a Windows Forms application.The package will be deployed on Windows Vista computers.You need to ensure that during deployment the installation does not elevate privileges of the user installing the application.What should you do?()A、Create a custom action and set the NoImpersonate property to trueB、Create a custom action and set the NoImpersonate property to falseC、Create a manifest and set the RequestedExecutionLevel level attribute to AsInvoker.D、Create a manifest and set the RequestedExecutionLevel level attribute to AsAdministrator.
考题
You work as a database administrator for Certkiller .com. You added atablespaceto your database. Because of the changes to the physical structure of your database, you performed a backup of the control file to trace. After this, you lost only the control files and the instance aborted due to a hardware failure. How would you proceed to recover the database?()A、Start the instance and open the database, instance recovery automatically recovers control files B、Create a file based on the contents of the trace file and save it to the control file locations and start the database C、Re-create the database (The recovery of the control file is not possible because you have lost all the control files.) D、Start the instance, in the NOMOUNTstate,re-create the control file using the CREATE CONTROLFILE command stored in the trace file. E、Start the instance and MOUNT the database, then re-create the control file using the CREATE CONTROLFILE command stored in the trace file.
考题
Which command do you use to create a recovery-catalog schema? ()A、create recovery catalog B、create catalogC、build catalog D、catalog create E、mount catalog
考题
You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services,and configuring aweb services infrastructure. You have the Windows Deployment Services (WDS) role installed on a serverthat runs Windows Server 2008. You plan to install Windows Vista on a computer that does not supportPreboot Execution Environment (PXE). You have a Windows Vista image that is stored on the WDS server. You have to start the computer and install the image that is stored on the WDS server. What should you create?()A、You should create a discover imageB、You should create an install imageC、You should create a capture imageD、You should create a CD-ROM that contains PXE drivers
考题
You are a network administrator for The network contains a Windows Server 2003 computer named Testking1. You need to install an application on Testking1. The installation will cause several changes to the registry. You plan to use the Backup utility to create a backup that will enable you to restore the registry. TestKing requirements for network management state that all backups must be performed during an eight-hour period at night. Because of this time constraint, you need to ensure that the backup can be recovered as quickly as possible. You need to create a backup that meets the requirements. What should you do?()A、Create a backup of the system partition.B、Create a backup of the boot partition.C、Create a backup of the System State.D、Create an Automated System Recovery (ASR) backup.E、Create a backup of the Systemroot/System32/Config folder.
考题
You have a file server that runs Windows Server 2008. The server has a shared folder. You need to receive a notification when a user stores more than 500 MB of data in the shared folder. You must allow users to store more than 500 MB of data in the shared folder. What should you do? ()A、Create a soft quota.B、Create a hard quota.C、Create an Active Screening File Screen.D、Create a Passive Screening File Screen.
考题
You have a computer that runs Windows 7. You install a second internal hard disk drive in the computer.You attempt to create a system image and discover that the new disk is not listed as a backup destination.You need to ensure that you can use the new disk as a backup destination for system images. What should you do?()A、Create a NTFS partition.B、Create a mirrored volume.C、Create a system repair disc.D、Log on to the computer by using a different account.
考题
You are designing a Windows Azure application that will use a worker role. The worker role will create temporary files. You need to recommend an approach for creating the temporary files that minimizes storage transactions. What should you recommend?()A、 Create the files on a Windows Azure Drive.B、 Create the files in Windows Azure local storage.C、 Create the files in Windows Azure Storage page blobs.D、 Create the files in Windows Azure Storage block blobs.
考题
You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a management data warehouse that uses the data collector to collect performance data. You intend to maintain the management data. You want to implement a data collection process. The process can gather and upload data in the management data warehouse on different schedules. What process should you implement?() A、You should create a cached data collectionB、You should create an on-demand non-cached data collection C、You should create a scheduled non-cached data collection D、You should create two different SQL Agent jobs that are scheduled stimultaneously
考题
You have an Exchange Server 2010 organization.You need to create a resource record in DNS to support Autodiscover from the Internet.What type of resource record should you create?()A、Host(A)B、Text(TXT)C、Pointer(PTR)D、Mail exchange(MX)
考题
You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.The Xxx network contains a Mailbox server named XXX-EX10.What action must you take to have mailboxes retained for 8 weeks after deletion?()A、You must create a legal hold.B、You must change the mailbox database properties.C、You must create Transport Protection Rules.D、You must create Personal archives.
考题
You have a file server that runs Windows Server 2008. The server has a shared folder. You need to receive a notifcation when a user stores more than 500MB of data int he shared folder. You must allow users to store more than 500MB of data in the shared folder. What should you do()? A、Create a soft quotaB、Create a hard quotaC、create an active screening file screenD、create a passive screening file screen
考题
You need to implement an authentication method on SQL4. The TravelOnline database will be accessed through a Web services application. You need to make the authentication method as secure as possible.What should you do?()A、Create an HTTP endpoint with NTLM authentication, and create a service principal name (SPN).B、Create an HTTP endpoint with digest authentication, and create a service principal name (SPN).C、Create an HTTP endpoint with integrated authentication, and create a service principal name (SPN).D、Create an HTTP endpoint with Kerberos authentication.
考题
You need to ensure that you can recover system configuration and data if your computer hard disk fails. What should you do? ()A、Create a system restore point.B、Create a backup of all file categories.C、Create a Complete PC Backup and Restore image.D、Perform an Automated System Recovery (ASR) backup.
考题
You are developing an application to create a new file on the local file system.You need to define specific security settings for the file. You must deny the file inheritance of any default security settings during creation.What should you do?()A、Create the file by using a new FileStream object by passing the FileSecurity object as a parameter to the FileStream constructor.B、Create a new FileSecurity object.C、Apply the permissions by using the File class.D、Create a new FileSystem Access Rule object for each permission that you need,and add each rule to the FileSecurity object.E、Create a new FileSystem Audit Rule object and add it to the FileSecurity object.
考题
You have an Exchange Server 2003 organization. You install an Exchange Server 2010 Service Pack 1 (SP1) Edge Transport server on the network. You need to ensure that the Edge Transport server can send and receive e-mail messages from the Internet for the organization. You configure the Exchange Server 2003 servers to send all e-mail for external recipients to the Edge Transport servers. What should you do on the Edge Transport servers?()A、Create and configure a Send connector.Create and configure a Receive connector.Create and configure an Accepted domain.B、Create an Edge Subscription file. Create and configure a Send connector.Create and configure a Receive connector.C、Create an Edge Subscription file. Create and configure a Send connector.Create and configure an Accepted domain.D、Create and configure a Send connector.Create and configure an Accepted domain.install the Exchange Server 2010 schema extensions.
考题
单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services,and configuring aweb services infrastructure. You have the Windows Deployment Services (WDS) role installed on a serverthat runs Windows Server 2008. You plan to install Windows Vista on a computer that does not supportPreboot Execution Environment (PXE). You have a Windows Vista image that is stored on the WDS server. You have to start the computer and install the image that is stored on the WDS server. What should you create?()A
You should create a discover imageB
You should create an install imageC
You should create a capture imageD
You should create a CD-ROM that contains PXE drivers
考题
单选题You are employed as the senior administrator at Certkiller.com. You make use of Microsoft .NETFramework v3.5 to create a Microsoft ASP.NET application. You make use of ASP.NET AJAX create a Web form. The code fragment below exists in the Webfrom. (The line numbers is included for reference purposes) 01 10 11 13 You make use of the initComponents function to create and start a user behavior. This userbehavior is named CKBehavior. You have to make sure that CKBehavior is attached to CKTextBoxA. You should determine the appropriate code segment you need to add in line 6 toaccomplish this. What should you identify?()A
Your best option would be to insert Sys.Component.create(CKBehavior, $get('CKTextBoxA'),null, null, null)B
Your best option would be to insert Sys.Component.create(CKBehavior, 'CKTextBoxA', null,null, null)C
Your best option would be to insert $create(CKBehavior, null, null, null, $get('CKTextBoxA'))D
Your best option would be to insert $create(CKBehavior, null, null, null, 'CKTextBoxA')
考题
单选题You are designing a Windows Azure application that will use a worker role. The worker role will create temporary files. You need to recommend an approach for creating the temporary files that minimizes storage transactions. What should you recommend?()A
Create the files on a Windows Azure Drive.B
Create the files in Windows Azure local storage.C
Create the files in Windows Azure Storage page blobs.D
Create the files in Windows Azure Storage block blobs.
考题
单选题You have an Exchange Server 2010 organization.You plan to enable Federated Sharing.You need to create a DNS record to store the Application Identifier (AppID) of the domain for the federated trust. Which type of record should you create?()A
AB
CNAMEC
SRVD
TXT
热门标签
最新试卷