网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Application developers in TestKing.com create an assembly that contains a CLR function.This CLR function reads data from a spreadsheet, performs some calculations, and returns the data to a SQL Server 2005 computer. You need to register the assembly with SQL Server 2005 by using the CREATE ASSEMBLY statement and the least privileged security permission set. Which permission set should you use?()
A

Default

B

SAFE

C

EXTERNAL ACCESS

D

UNSAFE


参考答案

参考解析
解析: 暂无解析
更多 “单选题Application developers in TestKing.com create an assembly that contains a CLR function.This CLR function reads data from a spreadsheet, performs some calculations, and returns the data to a SQL Server 2005 computer. You need to register the assembly with SQL Server 2005 by using the CREATE ASSEMBLY statement and the least privileged security permission set. Which permission set should you use?()A DefaultB SAFEC EXTERNAL ACCESSD UNSAFE” 相关考题
考题 John Steven, an American entrepreneur in the late 19th century, was the first to use assembly line for manufacturing cars.() 此题为判断题(对,错)。

考题 You are writing an application that uses isolated storage to store user preferences.The application uses multiple assemblies.Multiple users will use this application on the same computer.You need to create a directory named Preferences in the isolated storage area that is scoped to the current Microsoft Windows identity and assembly.Which code segment should you use?()A.B.C.D.

考题 Windows Communication Foundation (WCF) service will be hosted in Microsoft Internet Information Services (IIS).You create a new application in IIS to host this service and copy the service DLL to the bin directory of the application.You need to complete the deployment of this service to IIS. What should you do next?()A. Create an asmx file and add a @ServiceHost directive to this file. Copy the file to the root of the application directory.B. Create an .asmx file and add a @Register directive to this file. Copy the file to the bin directoyy of the application.C. Create a svc file and add a @ServiceHost directive to this file. Copy the file to the root of the application directory.D. Create a .svc file and add a @Register directive to this file. Copy the file to the bin directory of the application.

考题 A client has a temporary deployment of a new static application that needs to run for a short period of time and is not going to change.How can this deployment be achieved with a minimum of effort and time?()A.Run a system WPAR and deploy the application.B.Create a new LPAR and deploy the application.C.Create an application WPAR to deploy the application.D.Create an LPAR hosted by a VIO server and deploy the application.

考题 Structured programming practices(1)rise to Pascal, in which constructs were introduced to make programs more readable and better(2).(3)provided a combination of assembly language and high-level structure to create a general-purpose language that could be used from system to application programming. Next came object orientation, which is(4)of a methodology and design philosophy than a language issue. This is(5)by the addition of so-called OO extensions to current languages, such as application.A.givingB.givenC.gaveD.gives

考题 You are creating a Windows Forms Application by using the .NET Framework 3.5.You plan to create a Windows Installer package for a Windows Forms application. The package will be deployed on Windows Vista computers.You need to ensure that during deployment the installation does not elevate privileges of the user installing the application.What should you do?()A、Create a custom action and set the NoImpersonate property to trueB、Create a custom action and set the NoImpersonate property to falseC、Create a manifest and set the RequestedExecutionLevel level attribute to AsInvokerD、Create a manifest and set the RequestedExecutionLevel level attribute to AsAdministrator

考题 A client has a temporary deployment of a new static application that needs to run for a short period of time and is not going to change. How can this deployment be achieved with a minimum of effort and time?()A、Run a system WPAR and deploy the application.B、Create a new LPAR and deploy the application.C、Create an application WPAR to deploy the application.D、Create an LPAR hosted by a VIO server and deploy the application.

考题 What three tasks are required to add a CRS application?()A、create a trigger  B、create an application  C、restart the CRS engine  D、upload script to repository  E、configure default session timeout 

考题 What is a rotating item?()A、A rotating item is an individual item that is defined with a common item number. An item is designated as rotating because one wants to be able to create individual asset records by using the information (Classification, Specification,and Item Assembly Structure) contained on the item record.B、A rotating item is a set of items that are defined with a specific code. An item is designated as rotating because one does not want to be able to create individual asset records by using the information (Classification, Specification, and Item Assembly Structure) contained on the item record.C、A rotating item is a set of kits that are defined with a specific description and GL. An item is designated as rotating because one has the single cost to manage prefers to be able to create individual asset records by using the information (Classification, Specification, and Item Assembly Structure) contained on the assembly record.D、A rotating item is an individual item that is defined with a common item number and can be a spare part. An item is designated as rotating because one wants to be able to create multiple asset records by using the information (Classification, Specification, and Item Assembly Structure) contained on the item set records.

考题 You need to call an unmanaged function from your managed code by using platform invoke services. What should you do?()A、Create a class to hold DLL functions and then create prototype methods by using managed code.B、Register your assembly by using COM and then reference your managed code from COMC、Export a type library for your managed code.D、Import a type library as an assembly and then create instances of COM object.

考题 You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named DB01 in the instance. The company CIO wants all the application developers can capture traces to troubleshoot the application that uses the database DB1, and they can perform this by using SQL Server Profiler. But they have to be given as little permission as possible. The company CIO assigns this task to you.  So what action should you perform to achieve this goal?()  A、All the SQL Server logins of the application developers have to be added to a fixed server role. B、All the database users of the application developers have to be added to a fixed database role C、All SQL Server logins of the application developers should be given the appropriate server-level permissions. D、All database users of the application developers should be given the appropriate database-level permissions. 

考题 You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. TestKing.com is configured to run an exchange 2010 environment.  TestKing.com contains an Exchange Server 2010 Hub Transport server named TESTKING-EX10 and athird party server TESTKING-EX11 that host a mission critical application. However, during a routinemonitoring you become aware of that the mission critical application is not able to authenticate to remoteservers. You have received instructions form the CIO to make sure that the mission critical application cansend e-mail messages with the use of TESTKING-EX10. What should you do?()A、The best option is to create a new Receive connector and put the TCP/IP adress of TESTKING-EX11 to the Receive connector.Thereafter, change the Receive connector’s permissions.B、The best option is to add the TCP/IP address of TESTKING-EX11 to the default Receive connector.Thereafter you need to set up a message classification and a transport rule.C、The best option is to add the TCP/IP address of TESTKING-EX11 to the client Receive connector.Thereafter you need to set up a remote domain and a transport rule.D、The best option is to create a new Send connector and put the TCP/IP address of TESTKING-EX11 to the Send connector.Thereafter, change the Send connector’s permissions.

考题 You create Windows Forms applications by using the .NET Framework 3.5.You plan to deploy a new application by using the ClickOnce deployment technology.  The application is signed by using a certificate obtained from a trustworthy authority. You need to ensure that the application can be deployed as a trusted application to Windows Vista client computers on a corporate network.What should you do?()A、Create a manifest and set the RequestedExecutionLevel level attribute to AsInvoker.B、Create a manifest and set the RequestedExecutionLevel level attribute to AsAdministrator.C、Create a new certificatetrust list (CTL).Install the CTL on the server that has the ClickOnce application published.D、Create a new certificate trust list (CTL).Request the network administrator to deploy the CTL by using Group Policy.

考题 You work as an application developer at Certkiller .com. You are required to dynamically load assemblies into an application domain. You are using the Load method of the AppDomain class. What types of files can you this use method for?()A、 Library application files (.dll).B、 All assembly files, no matter what there file extensions are.C、 Application configuration files (.config).D、 Standalone application files (.exe).

考题  Application developers in your company create an assembly that contains a CLR function. This CLR function reads data from a spreadsheet, performs some calculations, and returns the data to a SQL Server 2005 computer. You need to register the assembly with SQL Server 2005 by using the CREATE ASSEMBLY statement and the least privileged security permission set.  Which permission set should you use? ()A、 Default B、 SAFE C、 EXTERNAL_ACCESS D、 UNSAFE

考题 You work with a SQL Server 2005 database that provides banking information for customers. You want customers to see banking reports that combine data that is retrieved from the database with real-time investment information that comes from a Web service provided by a third party. The investment information must be current when the reports are executed. You need to create the appropriate objects that support the reports. What should you do?()A、Publish the data in the database as an XML Web service by using the FOR XML AUTO clause.B、Create a table to store the banking information for each customer. Create a trigger that fires when data is inserted into the table that joins with the data coming from the Web service.C、Create a Transact-SQL stored procedure that uses a temporary table to store the banking information for each customer. Update the table with the values from the Web service.D、Have a developer in TestKing.com create an assembly that calls the remote Web service.Create a CLR function by using the assembly. Call the CLR function and combine the results with banking information in the database.

考题 单选题You are developing an application that dynamically loads assemblies from an application directory. You need to write a code segment that loads an assembly named Company1.dll into the current application domain. Which code segment should you use?()A AB BC CD D

考题 单选题You need to call an unmanaged function from your managed code by using platform invoke services. What should you do?()A Create a class to hold DLL functions and then create prototype methods by using managed code.B Register your assembly by using COM and then reference your managed code from COMC Export a type library for your managed code.D Import a type library as an assembly and then create instances of COM object.

考题 单选题You work as an application developer at Certkiller .com. You are currently in the process of creating a shared assembly.  You are required to perform many integration tests to make sure the assembly works properly with multiple applications. You want to avoid constantly updating each application’s reference when the assembly is updated.  You have set the DEVPATH environmental variable to the default build location for the shared assembly.  You need to ensure that the Common Language Runtime (CLR) uses DEVPATH to locate the shared assembly. What should you do?()A AB BC CD D

考题 单选题You work as an application developer at Certkiller .com. You have been asked by you superiors at Certkiller .com to create a child application domain.  The new child application domain has to specify a different assembly path than that of the parent application domain.You need to ensure that your solution meets Certkiller .com’s requirements.What should you do?()A AB BC CD D

考题 单选题You work as an application developer at Certkiller .com. You have recently created a business application, which requires complex installation logic. You add the following code to your project after electing to create a custom installer for the business application. public class ApplicationInstaller : Intaller { public override void Install (IDictionary stateSaver) { //Install the application Base.Install (stateSaver); } public override void Commit (IDictionary savedState) { //Commit the application Base.Commit (savedState); } public override void Rollback (IDictionary savedState) { //Rollback the application Base.Rollback (savedState); } public override void Uninstall (IDictionary savedState) { //UnInstall the application Base.Uninstall (savedState); } } What should be done NEXT?()A  The assembly should be compiled and the Install.exe tool should be run.B  The RunInstaller attribute should be added to the business application assembly and it should be set to true.C  The assembly should be compiled and should be run as normal.D  The RunInstaller attribute should be added to the ApplicationInstaller class and it should be set to true.

考题 单选题You work with a SQL Server 2005 database that provides banking information for customers. You want customers to see banking reports that combine data that is retrieved from the database with real-time investment information that comes from a Web service provided by a third party. The investment information must be current when the reports are executed. You need to create the appropriate objects that support the reports. What should you do?()A Publish the data in the database as an XML Web service by using the FOR XML AUTO clause.B Create a table to store the banking information for each customer. Create a trigger that fires when data is inserted into the table that joins with the data coming from the Web service.C Create a Transact-SQL stored procedure that uses a temporary table to store the banking information for each customer. Update the table with the values from the Web service.D Have a developer in TestKing.com create an assembly that calls the remote Web service.Create a CLR function by using the assembly. Call the CLR function and combine the results with banking information in the database.

考题 单选题Application developers in your company create an assembly that contains a CLR function. This CLR function reads data from a spreadsheet, performs some calculations, and returns the data to a SQL Server 2005 computer. You need to register the assembly with SQL Server 2005 by using the CREATE ASSEMBLY statement and the least privileged security permission set.  Which permission set should you use? ()A  Default B  SAFE C  EXTERNAL_ACCESS D  UNSAFE

考题 单选题You have created an ASP.NET server control named ShoppingCart for use by other developers. Some developers report that the ShoppingCart control does not function properly with ViewState disabled. You want to ensure that all instances of the ShoppingCart control work even if ViewState is disabled. What should you do?()A Require developers to set EnableViewStateMac to true.B Store state in ControlState instead of ViewState.C Serialize the state into an Application state entry called MyControlD Require developers to change the session state mode to SQL Server.

考题 多选题You create a Microsoft ASP.NET Web application by using the Microsoft .NET Framework version 3.5.  When you review the application performance counters, you discover that there is an unexpected increase in the value of the Application Restarts counter. You need to identify the reasons for this increase.  What are three possible reasons that could cause this increase?()ARestart of the Microsoft IIS 6.0 host.BRestart of the Microsoft Windows Server 2003 that hosts the Web application.CAddition of a new assembly in the Bin directory of the application.DAddition of a code segment that requires recompilation to the ASP.NET Web application.EEnabling of HTTP compression in the Microsoft IIS 6.0 manager for the application.FModification to the Web.config file in the system.web section for debugging the application.

考题 单选题You use Microsoft .NET Framework 4 to create an application. The application contains a partially trusted client assembly and a server assembly. You create a custom sandboxed application domain. You need to ensure that the application can be executed in a partial-trust environment. What should you do?()A Apply the following attribute to the server assembly. [assembly: AllowPartiallyTrustedCallers(PartialTrustVisibilityLevel=VisibleToAllHosts)]B Apply the following attribute to the server assembly. [assembly: AllowPartiallyTrustedCallers(PartialTrustVisibilityLevel=NotVisibleByDefault)]C Apply the following attribute to the client assembly. [assembly: AllowPartiallyTrustedCallers(PartialTrustVisibilityLevel=VisibleToAllHosts)]D Apply the following attribute to the client assembly. [assembly: AllowPartiallyTrustedCallers(PartialTrustVisibilityLevel=NotVisibleByDefault)]

考题 单选题You are loading a new assembly into an application. You need to override the default evidence for the assembly. You require the common language runtime (CLR) to grant the assembly a permission set,as if the assembly were loaded from the local intranet zone.  You need to build the evidence collection. Which code segment should you use?()A AB BC CD D