网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Your application must access data that is located on two SQL Server 2005 computers. One of these servers is named SQL1 and the other is SQL2. You have permissions to create a stored procedure on SQL1 to support your application. However,on SQL2 you only have permissions to select data. You write the stored procedure on SQL1. The stored procedure accesses SQL2 by using the OPENQUERY Transact-SQL statement. However,the query fails when executed.You need to troubleshoot the cause of the error. What should you do?()
A

Join the two servers by using the four-part syntax of server.database.schema.table.

B

Reference SQL2 by using an alias.

C

Add SQL2 as a remote server to SQL1.

D

Add SQL2 as a linked server to SQL1.


参考答案

参考解析
解析: 暂无解析
更多 “单选题Your application must access data that is located on two SQL Server 2005 computers. One of these servers is named SQL1 and the other is SQL2. You have permissions to create a stored procedure on SQL1 to support your application. However,on SQL2 you only have permissions to select data. You write the stored procedure on SQL1. The stored procedure accesses SQL2 by using the OPENQUERY Transact-SQL statement. However,the query fails when executed.You need to troubleshoot the cause of the error. What should you do?()A Join the two servers by using the four-part syntax of server.database.schema.table.B Reference SQL2 by using an alias.C Add SQL2 as a remote server to SQL1.D Add SQL2 as a linked server to SQL1.” 相关考题
考题 Which two requirements would lead towards a high availability solution?() A.When uptime is criticalB.When data must be refactoredC.When application concurrency is staticD.When data loss is unacceptableE.When application is a single point of failure

考题 You want to create a valid directory structure for your Java EE web application, and your application usestag files and a JAR file. Which three must be located directly in your WEB-INF directory(NOT in asubdirectory of WEB-INF)?()A、The JAR fileB、A directory called libC、A directory called tagsD、A directory called TLDsE、A directory called classesF、A directory called META-INF

考题 Your database supports an online transaction processing (OLTP) application. The application is undergoing some major schema changes, such as addition of new indexes and materialized views. You want to check the impact of these changes on workload performance. What should you use to achieve this?()A、Database replayB、SQL Tuning AdvisorC、SQL Access AdvisorD、SQL Performance AnalyzerE、Automatic Workload Repository compare reports

考题 Which two requirements would lead towards a high availability solution?()A、When uptime is criticalB、When data must be refactoredC、When application concurrency is staticD、When data loss is unacceptableE、When application is a single point of failure

考题 You are a database administrator for your company. The company uses a vendor company’s application that is based on a proprietary database. You query data from the application database and import the data into a SQL Server 2005 database. The application vendor provides you with a new OLE DB driver to be used when querying the application database. Company policy prohibits connections between the SQL Server database and the application database, except when querying this data. You need to provide a way to query data from the application database. What should you?()A、Configure a Linked Server connection to the application database.B、Write a query that uses an OPENDATASOURCE command.C、Write a query that uses an OPENQUERY command.D、Configure a Remote Server connection to the application database.

考题 You have a Web application that is configured for personalization. You need to access personalization data from one of the pages of the Web application by using the minimum amount of administrative effort. What should you do? ()A、Access the personalization data from the Session property of the HttpContext object.B、Access the personalization data from the Application property of the HttpContext object.C、Access the personalization data from the Cache property of the HttpContext object.D、Access the personalization data from the Profile property of the HttpContext object.

考题 An application connects to a SQL Azure database.  The application occasionally loses the connection to the SQL Azure database.   You need to recommend an approach for reliably completing data access operations.  What should you recommend?()  A、 Use Microsoft ADO.NET connection pooling.B、 Pass exceptions to the user interface layer.C、 Implement a retry policy in the data access layer.D、 Begin a transaction before each data access operation.

考题 You develop a Web application that writes data to a file on a server. You restrict access to the file to specific Windows users. The Web application runs as CONTOSO/ASPNET. You deny anonymous access to the application in IIS. You add the following XML segment in the Web.config file.You need to ensure that the application meets the following requirements:It must impersonate the user when it writes data to the file.It must run as CONTOSO/ASPNET when a user does not access the file. Which two actions should you perform? ()A、Use the following XML segment in the Web.config file. identity impersonate="false"/B、Use the following XML segment in the Web.config file. identity impersonate="true"/C、Use the following code segment to access the file. Dim wp As WindowsPrincipal = _CType(HttpContext.Current.User, WindowsPrincipal) Dim wi As WindowsIdentity = WindowsIdentity.GetCurrent() Dim wic As WindowsImpersonationContext = wi.Impersonate()' Access the file herewic.Undo()D、Use the following code segment to access the file. Dim wi As WindowsIdentity = WindowsIdentity.GetCurrent()Dim wic As WindowsImpersonationContext = _WindowsIdentity.Impersonate(wi.Token)' Access the file herewic.Undo()

考题 Your company has a main office and a branch office. Your network contains a single Active Directory domain. The functional level of the domain is Windows Server 2008 R2. An Active Directory site exists for each office. All servers run Windows Server 2008 R2. You plan to deploy file servers in each office.   You need to design a file sharing strategy to meet the following requirements: èUsers in bothoffices must be able to access the same files.   èUsers in both offices must use the same Universal Naming Convention (UNC) path to access files.   èThe design must reduce the amount of bandwidth used to access files. èUsers must be able to access files even if a server fails. What should you include in your design?()A、A stand-alone DFS namespace that uses replication.B、A domain-based DFS namespace that uses replication.C、A multi-site failover cluster that contains a server located in the main office and another server located in the branch office.D、A Network Load Balancing cluster that contains a server located in the main office and another server  located in the branch office.

考题  Application developers in your company create an assembly that contains a CLR function. This CLR function reads data from a spreadsheet, performs some calculations, and returns the data to a SQL Server 2005 computer. You need to register the assembly with SQL Server 2005 by using the CREATE ASSEMBLY statement and the least privileged security permission set.  Which permission set should you use? ()A、 Default B、 SAFE C、 EXTERNAL_ACCESS D、 UNSAFE

考题 单选题You are a database administrator for your company. The company has two SQL Server 2005 computers named SQL1 and SQL2. SQL1 is located on the local network. SQL2 is located at a vendors site and is connected by using a VPN over the Internet. You need to write heterogeneous queries on SQL1 that access data from both SQL1 and SQL2. To ensure that your queries are functional, you must configure access to the vendors site. What should you do?()A Configure an HTTP endpoint for SQL2 on SQL1.B Configure SQL2 as a linked server on SQL1.C Configure an HTTP endpoint for SQL1 on SQL2.D Configure SQL1 as a linked server on SQL2.

考题 多选题For which two tasks would it be best NOT to use the utility SQL*Loader?()AWhen loading selected rows into each table.BWhen loading data from an export dump file.CWhen loading data from disk, tape, or named pipes.DWhen your data is NOT being inserted from a flat file.EWhen using a record management system to access data files.

考题 单选题Your network contains an Active Directory domain. You have a server that runs Windows Server 2008 R2 and has the Remote Desktop Services server role enabled. All client computers run Windows 7. You need to plan the deployment of a new line-of-business application to all client computers. The  deployment must meet the following requirements:   èUsers must access the application from an icon on their desktops.   èUsers must have access to the application when they are not connected to the network. What should you do?()A Publish the application as a RemoteApp.B Publish the application by using Remote Desktop Web Access (RD Web Access).C Assign the application to the Remote Desktop Services server by using a Group Policy object (GPO).D Assign the application to all client computers by using a Group Policy object (GPO).

考题 单选题You are developing a Web application. Your code restricts access to some pages based on the users credentials. You need to configure IIS to supply the user's Windows credentials to your Web application. These credentials must be encrypted. What should you do? ()A Enable Anonymous access. Enable Integrated Windows authentication.B Enable Anonymous access. Enable Basic authentication.C Disable Anonymous access. Enable Integrated Windows authentication.D Disable Anonymous access. Enable Basic authentication.

考题 多选题Which two about WAR files are true?()AWAR files must be located in the web application library directory.BWAR files must contain the web application deployment descriptor.CWAR files must be created by using archive tools designed specifically for that purpose.DThe web container must serve the content of any META-INF directory located in a WAR file.EThe web container must allow access to resources in JARs in the web application library directory.

考题 单选题ou have a large amount of historical data in a flat file. Some analysts in your organization need to query thisdata in the file. The file is too large to load the data in it into your current database.  Which is the most effectivemethod to access this data in your database()A Use the database link.B Use the SQL*Loader utility.C Use the Oracle Data Pump utility.D Create an external table and leave the data in the flat file

考题 多选题You want to create a valid directory structure for your Java EE web application, and your application usestag files and a JAR file. Which three must be located directly in your WEB-INF directory(NOT in asubdirectory of WEB-INF)?()AThe JAR fileBA directory called libCA directory called tagsDA directory called TLDsEA directory called classesFA directory called META-INF

考题 单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. In your company there is a server which contains a default SQL Server 2005 instance. For a new application, you have to install a SQL Server 2008 instance on the server. Your company CIO assigns a task to you. You must make sure that the respective certified third-party applications have access to both database instances. You have to achieve this goal without changing the existing application environments. So what should you do to achieve this by using as little database administrative effort as possible?()A You should install SQL Server 2008 as a named instance, and make the new application to use the new instance. B You should install SQL Server 2008 as the default instance, and make the new application to use the default instance. C You should upgrade the SQL Server 2005 application to use SQL Server 2008. D You should upgrade the SQL Server 2005 instance to a SQL Server 2008 instance. 

考题 单选题You have a large amount of historical data in a flat file. Some analysts in your organization need toquery this data in the file. The file is too large to load the data in it into your current database.  Which is the most effective method to access this data in your database()A Use the database link.B Use the SQL*Loader utility.C Use the Oracle Data Pump utility.D Create an external table and leave the data in the flat file

考题 多选题You are planning the migration of a Microsoft SQL Server 2008 database to SQL Azure.   You need to recommend an approach for ensuring that database connectivity does not degrade.   Which two actions should you recommend?()AImplement transactions for database queries.BClose database connections in the application.CUse Microsoft ADO.NET in the data access layer.DImplement a retry policy in the data access layer.

考题 单选题Application developers in your company create an assembly that contains a CLR function. This CLR function reads data from a spreadsheet, performs some calculations, and returns the data to a SQL Server 2005 computer. You need to register the assembly with SQL Server 2005 by using the CREATE ASSEMBLY statement and the least privileged security permission set.  Which permission set should you use? ()A  Default B  SAFE C  EXTERNAL_ACCESS D  UNSAFE

考题 单选题You are creating an online catalog application that will display product information on the company Web site. The product data is stored in a SQL Server 2005 database. The data is stored as relational data but must be passed to the application as an XML document by using FOR XML. You test your application and notice that not all of the items matching your query appear in the XML document. Only those products that have values for all elements in the schema appear.   You need to modify your Transact-SQL statement so that all products matching your query appear in the XML document. What should you do?()A Add an XML index to the table that contains the product data.B Add the XSINIL argument to the ELEMENTS directive in the query.C Add a HAVING clause to the query.D Add the replace value of clause to the query.

考题 单选题ou work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now for a new application, a SQL Server 2008 instance has to be installed on an existing server. The server contains a default SQL Server 2005 instance. Your company CIO wants their corresponding certified third-party applications can access to both database instances. The company assigns this task to you. You must achieve this by using as little database administrative effort as possible, and never change the existing application environments. What should you do? ()A You should install SQL Server 2008 as the default instance, and configure the new application to use the default instance B You should upgrade the SQL Server 2005 application to use SQL Server 2008 C You should upgrade the SQL Server 2005 instance to a SQL Server 2008 instance D You should install SQL Server 2008 as a named instance, and make the new application use the new instance. 

考题 单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. Now your company CIO assigns a task to you. The company CIO wants you to configure FILESTREAM data and the two requirements below must be met: you must enable FILESTREAM for file I/O streaming access; remote client computers must be able to have streaming access to FILESTREAM data. You must make sure that FILESTREAM data is enabled. Which service should you configure? ()A You should configure SQL Server VSS Writer B You should configure Distributed File System C You should configure SQL Server D You should configure SQL Server Full Text

考题 多选题Which two requirements would lead towards a high availability solution?()AWhen uptime is criticalBWhen data must be refactoredCWhen application concurrency is staticDWhen data loss is unacceptableEWhen application is a single point of failure