网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You need to call an unmanaged function from your managed code by using platform invoke services. What should you do?()
A

Create a class to hold DLL functions and then create prototype methods by using managed code.

B

Register your assembly by using COM and then reference your managed code from COM

C

Export a type library for your managed code.

D

Import a type library as an assembly and then create instances of COM object.


参考答案

参考解析
解析: 暂无解析
更多 “单选题You need to call an unmanaged function from your managed code by using platform invoke services. What should you do?()A Create a class to hold DLL functions and then create prototype methods by using managed code.B Register your assembly by using COM and then reference your managed code from COMC Export a type library for your managed code.D Import a type library as an assembly and then create instances of COM object.” 相关考题
考题 Part A51. Directions:You are preparing to ask for some help from your teacher, write a letter that:1) detail what you want him or she does for you,2) express your thanks to your teacher,You should write about i00 words on ANSWER SHEET II. Do not sign your own name at the end of the letter. You do not need to write the address.

考题 You share your portable computer with a co-worker. You use separate user accounts to log on. A wireless netework is available to you and your co-worker. You need to prevent your co-worker from modifying your wireless network profile.What should you do?()A.AB.BC.CD.D

考题 You have an Exchange Server 2010 organization.You need to prevent internal users from sending messages that contains the phrase °Company Confidentia?± to external use.What should you create?()A、a Transport ruleB、a managed folder mailbox policyC、a message classificationD、a Send connector

考题 You have an Exchange Server 2010 server.You need to prevent users from accessing public folders by using Outlook Web App (OWA).Your solution must not prevent users from accessing public folders by using Office Outlook. Which two actions should you perform?()A、Create a managed folder mailbox policy.B、Modify the properties of the OWA virtual directory.C、Modify the default Outlook Web App Mailbox policy.D、Modify the properties of the public folder database.

考题 请选择合适的选项,补充下列英文句子: Thank you for your() to my store, you can find the products you need from my store.A、visittedB、visitedC、visitsD、visiting

考题 You are the network consultant from passguide.com. In which situation you will advice your customer to implement data centers?()A、Protecting the business from information outagesB、Optimizing the efficiency with which IT operatesC、An increased need for specialized IT silosD、IT systems grow fast

考题  You work with a SQL Server 2005 database that provides banking information for customers. You want customers to see banking reports that combine data that is retrieved from the database with real-time investment information that comes from a Web service provided by a third party. The investment information must be current when the reports are executed. You need to create the appropriate objects that support the reports.  What should you do?()A、 Publish the data in the database as an XML Web service by using the FOR XML AUTO clause. B、 Create a table to store the banking information for each customer. Create a trigger that fires when data is inserted into the table that joins with the data coming from the Web service. C、 Create a Transact-SQL stored procedure that uses a temporary table to store the banking information for each customer. Update the table with the values from the Web service. D、 Have a developer in your company create an assembly that calls the remote Web service. Create aCLR function by using the assembly. Call the CLR function and combine the results with banking information in the database.

考题 You are creating a Windows application for graphical image processing by using the .NET Framework 3.5. You create an image processing function and a delegate.You plan to invoke the image processing function by using the delegate.You need to ensure that the calling thread meets the following requirements:  (1)It is not blocked when the delegate is running   (2)It is notified when the delegate is complete What should you do?()A、Call the Invoke method of the delegate.B、Call the BeginInvoke and EndInvoke methods of the delegate in the calling thread.C、Call the BeginInvoke method by specifying a callback method to be executed when the delegate is complete.Call the EndInvoke method in the callback method.D、Call the BeginInvoke method by specifying a callback method to be executed when the delegate is complete.Call the EndInvoke method of the delegate in the calling thread.

考题 You are creating a templated Web control for use in your Web application. You need to add the Web control to your Web application pages without compiling your control into a .dll file. What should you do?()A、Ensure that the Web control inherits from the WebControl class.B、Ensure that the Web control inherits from the Control class.C、Ensure that the Web control inherits from the CompositeControl class.D、Ensure that the Web control inherits from the UserControl class.

考题 You need to call an unmanaged function from your managed code by using platform invoke services. What should you do?()A、Create a class to hold DLL functions and then create prototype methods by using managed code.B、Register your assembly by using COM and then reference your managed code from COMC、Export a type library for your managed code.D、Import a type library as an assembly and then create instances of COM object.

考题 Your network contains Mailbox servers that run Exchange Server 2007 and Exchange Server 2010.You need to ensure that all e-mail messages located in the Inbox folders of all users are deleted after 120 days.What should you create first?()A、a new managed custom folderB、a new message classificationC、a new retention policyD、new managed content settings

考题 You work as a Web Developer at Certkiller.com. You are in the process of creating a Webapplication using Microsoft ASP.NET 3.5.  You need to ensure that the application is able to load staff information from an XML file into aDataSet instance. The XML file contains an inline schema. You have to call a method of theDataSet class in order to load the information.  Identify how you can accomplish this?()A、You should call the ReadXml method with the ReadSchema XML read mode.B、You should call the ReadXml method with the InferTypedSchema XML read mode.C、You should call the ReadXmlSchema method.D、You should call the ReadXml method with the InferSchema XML read mode.

考题  Application developers in your company create an assembly that contains a CLR function. This CLR function reads data from a spreadsheet, performs some calculations, and returns the data to a SQL Server 2005 computer. You need to register the assembly with SQL Server 2005 by using the CREATE ASSEMBLY statement and the least privileged security permission set.  Which permission set should you use? ()A、 Default B、 SAFE C、 EXTERNAL_ACCESS D、 UNSAFE

考题 You are responsible for managing a SQL Server 2005 database that stores sales information. Many values in nchar columns in the database tables contain preceding or trailing spaces. You need to implement a mechanism that selects the data from the tables without leading and trailing spaces. Your solution must be available for reuse in Transact-SQL statements and views. What should you do?()A、Create DML triggers that query the inserted and deleted tables.B、Create a stored procedure that calls the LTRIM and RTRIM built-in functions.C、Create a Transact-SQL function that calls the LTRIM and RTRIM built-in functions.D、Call the TRIM built-in function.

考题 单选题You have an Exchange Server 2010 organization.You need to ensure that items in a user’s Inboxfolder that are older than 60 days are moved to a custom folder.What should you do first?()A Create a managed custom folder.Create a transport ruleB Create a new mail folder by using Microsoft Office Outlook.Create a journal ruleC Create a managed custom folder.Run the Managed Content Settings wizard from the Inbox managed default folderD Create a new mail folder by using Microsoft Office Outlook.Run the Managed Content Settings wizard from the Inbox managed default folder

考题 多选题In your database, all the tablespaces are locally managed. You started Recovery Manager (RMAN) using recovery catalog and restored the control file by using the following command:  RMAN RESTORE CONTROLFILE;  Which two operations do you need to perform after restoring the control file from backup?()Ashut down and restart the instanceBadd new tempfiles to the temporary tablespaces after recoveryCperform a media recovery and open the database with the RESETLOGS optionDperform a media recovery and bring the database to NOARCHIVELOG mode

考题 单选题You have an Exchange Server 2010 organization.You need to prevent internal users from sending messages that contains the phrase °Company Confidentia?± to external use.What should you create?()A a Transport ruleB a managed folder mailbox policyC a message classificationD a Send connector

考题 单选题You need to design the retrieval of advertising statistics without compromising security. What should you do?()A Design a Notification Services solution that sends the advertising statistics to specified subscribers by e-mail.B Design a SQL Server Web service that runs a stored procedure to return the statistics on a call from the advertisers application.C Design a Database Mail solution that sends the advertising statistics to e-mail addresses that are specified in a table.D Design a stored procedure to return the statistics on a call from the advertisers application.E Design a user-defined function to return the statistics on a call from the advertisers application.

考题 单选题The CALC function is used several times within the sales report. To simplify maintenance you want to store the function in one place and call it from within your PL/SQL trigger code. Which node would you use in object navigator to create a report level programme unit to store the function?()A Programme units. B PL/SQL libraries. C Database object. D Built in packages.

考题 单选题Application developers in your company create an assembly that contains a CLR function. This CLR function reads data from a spreadsheet, performs some calculations, and returns the data to a SQL Server 2005 computer. You need to register the assembly with SQL Server 2005 by using the CREATE ASSEMBLY statement and the least privileged security permission set.  Which permission set should you use? ()A  Default B  SAFE C  EXTERNAL_ACCESS D  UNSAFE

考题 单选题You run a Windows Defender scan on your computer.  You notice a valid program listed in Quarantined Items.  You need to use this program on your computer.  What should you do?()A Reinstall the application to another location.B Restore the program from the Quarantined Items list.C Remove the program from the Quarantined Items list.D Repair the program from the Programs option in Control Panel.

考题 多选题Your company uses SQL Server 2005. You are implementing a series of views that are used in ad hoc queries. The views are used to enforce your companys security policy of abstracting data.  Some of these views perform slowly. You create indexes on those views to increase performance, while still maintaining the companys security policy. One of the views returns the current date as one of the columns. The view returns the current date by using the GETDATE( ) function. This view does not allow you to create an index. You need to create an index on the view.  Which two actions should you perform?()ARemove all deterministic function calls from within the view.BRemove all nondeterministic function calls from within the view.CSchema-bind all functions that are called from within the view.DCreate the view and specify the WITH CHECK OPTION clause.

考题 单选题You run a Windows Defender scan on your computer system. The scan identifies one of your applications as having potentially unwanted behavior.  You need to continue to use the application. You also need to stop Windows Defender from alerting you about this application.  Which Windows Defender option should you use? ()A IgnoreB RemoveC QuarantineD Always Allow

考题 多选题You write a logging function for a Web Form. You call the logging function from the Page_Unload event handler. You test the Web Form and notice that the Page_Unload event handler does not call the logging function. You need to ensure that the logging function is called. What are two possible ways to achieve this goal? ()ASet the Page attribute to AutoEventWireup=False. Remove the attribute onunload=Page_Unload from the Web Form element.BSet the Page attribute to AutoEventWireup=False. Add the attribute OnUnload=Page_Unload to the Web Form element.CSet the Page attribute to AutoEventWireup=False. Add the Web Form attribute autocomplete=on.DSet the Page attribute to AutoEventWireup=True.

考题 单选题You are developing a class library. Portions of your code need to access system environment variables. You need to force a runtime SecurityException only when callers that are higher in the call stack do not have the necessary permissions. Which call method should you use?()A set.Demand();B set.Assert();C set.PermitOnly();D set.Deny();

考题 单选题Your company uses Remote Desktop Services (RDS). You install and configure the Remote Desktop Gateway (RD Gateway) role service on a server that runs Windows Server 2008 R2. Employees connect to RDS from unmanaged remote computers. Employees are unable to access the RD Gateway server from the unmanaged remote computers.You need to ensure that employees can access the RD Gateway server. What should you do?()A Create a Remote Desktop resource authorization policy (RD RAP).B Create a Remote Desktop connection authorization policy (RD CAP).C On the RD Gateway server, open port 3389 on the Windows Firewall.D On the RD Gateway server, configure Network Access Protection (NAP) health policy checking.

考题 多选题You are the network consultant from passguide.com. In which situation you will advice your customer to implement data centers?()AAn increased need for specialized IT silosBProtecting the business from information outagesCIT systems grow fastDOptimizing the efficiency with which IT operates