单选题Using the reports server how would you force the orders report in the orders entry application to run every six hours?()ASchedule the report's execution in the queue manager. BSchedule the reports execution using the R30RQM command line with scheduled parameter. CCreate a trigger in the application to execute the report every six hours. DYou cannot schedule a reports execution.
单选题
Using the reports server how would you force the orders report in the orders entry application to run every six hours?()
A
Schedule the report's execution in the queue manager.
B
Schedule the reports execution using the R30RQM command line with scheduled parameter.
C
Create a trigger in the application to execute the report every six hours.
D
You cannot schedule a reports execution.
参考解析
解析:
暂无解析
相关考题:
You are the administrator of an Active Directory domain named Auser reports that he cannot log on to a Windows Server 2003 computer that containsa critical application.You discover that the organizational unit (OU) in which the server is located wasdeleted. You discover that the user rights for this server are controlled by GroupPolicy.You need to restore access to the server. You need to achieve this goal by using theminimum amount of administrative effort.What should you do?()A. Perform a normal restoration of the System State data for the domain controller. Force replication.B. Perform an authoritative restoration of the System State data for the domain controller. Mark the OU for replication.C. Re-create the OU that was deleted. Reapply Group Policy, and then add the computer account and any necessary users or groups.D. Perform an Automated System Recovery (ASR) restoration on the domain controller.
You design a Business Intelligence (BI) solution by using SQL Server 2008. The solution includes a SQL Server 2008 Reporting Services (SSRS) infrastructure in a scale-out deployment. All reports use a SQL Server 2008 relational database as the data source. You implement row-level security. You need to ensure that all reports display only the expected data based on the user who is viewing the report. What should you do?()A、 Store the credential of a user in the data source.B、 Configure the infrastructure to support Kerberos authentication.C、 Configure the infrastructure to support anonymous authentication by using a custom authentication extension.D、 Ensure that all report queries add a filter that uses the User.UserID value as a hidden parameter.
You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis. How would you achieve this?()A、by using triggersB、by using external tablesC、by using anonymous PL/SQL blocksD、by auditing all DML operations on the table
Using the reports server how would you force the orders report in the orders entry application to run every six hours?()A、Schedule the report's execution in the queue manager. B、Schedule the reports execution using the R30RQM command line with scheduled parameter. C、Create a trigger in the application to execute the report every six hours. D、You cannot schedule a reports execution.
You suspect unauthorized data manipulation language (DML) operations on a particular table. Youwant to track users who are performing the transactions and the values used in the transactions. You alsoplan to transfer these values to another table for analysis. How would you achieve this()A、by using triggersB、by using Data PumpC、by using external tablesD、by using anonymous PL/SQL blocks
You design a Business Intelligence (BI) solution by using SQL Server 2008. You plan to design the report strategy for a new report project that will be used by a financial application. The application uses five calculations that are implemented in Microsoft .NET Framework 3.5 assemblies. The assemblies are written in the C# language and use the static methods. You need to ensure that the calculations can be used by the expressions in all reports. You also need to ensure consistency within the reports by using the least amount of development effort. What should you do?()A、 Add a reference to the assemblies in the Report Properties References tab. B、 Write the calculation logic used by the calculations by using T-SQL functions. C、 Write the code of the calculation logic into the Report Properties Custom Code tab.D、 Write the calculation logic in each report by using the mathematical functions available natively to SQL Server 2008 Reporting Services (SSRS).
You need to provide ad hoc reporting capabilities to fulfill business requirements. What should you do?()A、Create a SQL Server Reporting Services (SSRS) report. Enable customers to modify the report by using Report Builder.B、Create an ASP.NET application that will enable customers to view and modify reports by calling the SQL Server Reporting Services (SSRS) API.C、Create an ASP.NET application that will enable customers to view and modify reports by using a SQL Server Reporting Services (SSRS) ActiveX control.D、Create a SQL Server Reporting Services (SSRS) Report Model. Enable customers to modify reports based on the model by using Report Builder.
You design a Business Intelligence (BI) solution by using SQL Server 2008. You create a SQL Server 2008 Reporting Services (SSRS) solution. You create reports by using Microsoft Visual Studio .NET 2008. The development team of your company must create 50 SSRS reports. You need to ensure that the company logo and the company name are included in the page header of all the reports. What should you do?()A、 Create an SSRS report and include the required page header in the report. Use the report as a template for all the reports.B、 Create an SSRS report and include the required page header in the report. Create a subreport that refers to the report. Include the subreport to all the reports.C、 Create a SSRS report and include the required page header in the report. Copy the report definition to an XML file.Add the XML file as a data source for all the reports.D、 Create a SSRS report and include the required page header in the report. Create a class library that includes the report.Add the class library as an assembly reference for all the reports.
You design a Business Intelligence (BI) solution by using SQL Server 2008. You plan to create a SQL Server 2008 Reporting Services (SSRS) solution that contains five sales dashboard reports. Users must be able to manipulate the reports’ parameters to analyze data. You need to ensure that the following requirements are met: Users can manipulate the parameters for data analysis in a single trip to the data source. Reports are automatically rendered as soon as they are accessed for the first time. Which two tasks should you perform?()A、 Filter data by using expressions.B、 Specify the default values for each parameter.C、 Create an available values list for each parameter.D、 Create report parameters by using query parameters to filter data at the data source.
You have a file server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). You enable Shadow Copies on all drives by using the default options. You run a full backup every Monday at 02:00. You run an incremental backup every day at 02:00, except on Monday. On Thursday at 14:00, a user reports that he accidentally deleted a file named File1.doc in a shared folder named //Server1/Data/. The user reports that the file was last updated at 09:00 on Thursday. You need to restore the latest version of File1.doc. What should you restore? ()A、the file by using the Previous Versions ClientB、the file from the full backup performed on MondayC、the file from the incremental backup performed on ThursdayD、the user’s computer by using Automated System Recovery (ASR)
You are the administrator of an Active Directory domain named A user reports that he cannot log on to a Windows Server 2003 computer that contains a critical application. You discover that the organizational unit (OU) in which the server is located was deleted. You discover that the user rights for this server are controlled by Group Policy. You need to restore access to the server. You need to achieve this goal by using the minimum amount of administrative effort. What should you do?()A、Perform a normal restoration of the System State data for the domain controller. Force replication.B、Perform an authoritative restoration of the System State data for the domain controller. Mark the OU for replication.C、Re-create the OU that was deleted. Reapply Group Policy, and then add the computer account and any necessary users or groups.D、Perform an Automated System Recovery (ASR) restoration on the domain controller.
You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. You need to update six high-visibility servers with critical updates by using Windows Server Update Services (WSUS). You approve all of the updates.You need to ensure that the updates are applied within one hour. What should you do?()A、On the WSUS server, type the gpupdate /force command at the command prompt.B、On the WSUS server, type the wuauclt /detectnow command at the command prompt.C、On each of the six servers, type the gpupdate /force command at the command prompt.D、On each of the six servers, type the wuauclt /detectnow command at the command prompt.
You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a single Database Mail profile. Reports are sent to all the company employees by using the Mail profile. During office hours, a large volume of reports are sent by the sp_send_dbmail stored procedure. Now you notice that it takes a long time for the reports to be sent to the company manager. As the technical support, you have to speed up the delivery. So what action should you perform to achieve this goal?() A、Another SMTP account should be added to the existing Database Mail profile B、When you send the reports to the manager, you should use the @importance = high parameter. C、You should change the Account Retry Attempts option of the Database Mail system properties D、You should configure a new Database Mail profile. The new one will be used for sending the reports to the manager.
单选题You suspect unauthorized data manipulation language (DML) operations on a particular table. Youwant to track users who are performing the transactions and the values used in the transactions. You alsoplan to transfer these values to another table for analysis. How would you achieve this()Aby using triggersBby using Data PumpCby using external tablesDby using anonymous PL/SQL blocks
单选题Following a server crash, the automatic recovery of InnoDB fails. How would you begin to manually repair the InnoDB tables?()AStart the server with the – innodb_recover_options option set to FORCEBStart the server with the – innodb_force_recovery option set to a non-zero valueCStart the server as usual, and then execute the REPAIR TABLE commandDStart the server as usual, and then execute the CHECK TABLE command
单选题In your datawarehousing application, you generate reports frequently. The data is static in the tables being used to generate reports. You are currently using joins, resulting in a large performance overhead. What kind of database structure would you use to reduce the response time of the query?()Ahash clustersBindex clustersCpartitioned tablesDindexorganized table (IOT)
多选题You manage a server that runs Windows Server 2008. The server has the Web Server (IIS) role installed. The server hosts an Internet-accessible Web site that has a virtual directory named /orders/. A Web server certificate is installed and an SSL listener has been configured for the Web site. The /orders/ virtual directory must meet the following company policy requirements: Be accessible to authenticated users only. Allow authentication types to support all browsers. Encrypt all authentication traffic by using HTTPS. All other directories of the Web site must be accessible to anonymous users and be available withoutSSL. You need to configure the /orders/ virtual directory to meet the company policy requirements. Which two actions should you perform?()AConfigure the Web site to the Require SSL setting.BConfigure the /orders/ virtual directory to the Require SSL setting.CConfigure the Digest Authentication setting to Enabled for the /orders/ virtual directory.DConfigure the Basic Authentication setting to Enabled and the Anonymous Authentication setting to Disabled for the Web site.EConfigure the Basic Authentication setting to Enabled and the Anonymous Authentication setting to Disabled for the /orders/ virtual directory.
单选题You query the ORDERS table and discover that order number 1101 is missing. One of your reports, generated at 5:00 A.M. on April 23, 2005 using Oracle Reports, includes this order number in the output. You have inserted 100 new orders into the ORDERS table since generating this report. Which flashback technology would you use to recover order number 1101 into the ORDERS table without losing the 100 orders that you added after the report was generated?()A Flashback TableB Flashback QueryCFlashback Version QueryD Flashback Transaction Query
单选题You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis. How would you achieve this?()Aby using triggersBby using external tablesCby using anonymous PL/SQL blocksDby auditing all DML operations on the table
单选题You have a file server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). You enable Shadow Copies on all drives by using the default options. You run a full backup every Monday at 02:00. You run an incremental backup every day at 02:00, except on Monday. On Thursday at 14:00, a user reports that he accidentally deleted a file named File1.doc in a shared folder named //Server1/Data/. The user reports that the file was last updated at 09:00 on Thursday. You need to restore the latest version of File1.doc. What should you restore? ()Athe file by using the Previous Versions ClientBthe file from the full backup performed on MondayCthe file from the incremental backup performed on ThursdayDthe user’s computer by using Automated System Recovery (ASR)
单选题You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. You need to update six high-visibility servers with critical updates by using Windows Server Update Services (WSUS). You approve all of the updates. You need to ensure that the updates are applied within one hour. What should you do?()AOn the WSUS server, type the gpupdate /force command at the command prompt.BOn the WSUS server, type the wuauclt /detectnow command at the command prompt.COn each of the six servers, type the gpupdate /force command at the command prompt.DOn each of the six servers, type the wuauclt /detectnow command at the command prompt.
单选题You want a record of all queries that are not using indexes. How would you achieve this?()ABy enabling the Slow Query Log because all queries that are not using indexes will be logged automaticallyBBy enabling the Error Log because not using indexes is an errorCBy enabling the Slow Query Log and using the – log-queries-not-using-indexes optionDBy enabling the Error Log and using the – log-queries-not-using-indexes option
单选题You design a Business Intelligence (BI) solution by using SQL Server 2008. You create a SQL Server 2008 Reporting Services (SSRS) solution. You create reports by using Microsoft Visual Studio .NET 2008. The development team of your company must create 50 SSRS reports. You need to ensure that the company logo and the company name are included in the page header of all the reports. What should you do?()A Create an SSRS report and include the required page header in the report. Use the report as a template for all the reports.B Create an SSRS report and include the required page header in the report. Create a subreport that refers to the report. Include the subreport to all the reports.C Create a SSRS report and include the required page header in the report. Copy the report definition to an XML file.Add the XML file as a data source for all the reports.D Create a SSRS report and include the required page header in the report. Create a class library that includes the report.Add the class library as an assembly reference for all the reports.
单选题Which of the following options would you choose to implement controlled access using remote authentication for your networks?()AOiDBRADIUSCWallet ManagerDOracle Names Server
单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a single Database Mail profile. Reports are sent to all the company employees by using the Mail profile. During office hours, a large volume of reports are sent by the sp_send_dbmail stored procedure. Now you notice that it takes a long time for the reports to be sent to the company manager. As the technical support, you have to speed up the delivery. So what action should you perform to achieve this goal?()AAnother SMTP account should be added to the existing Database Mail profile BWhen you send the reports to the manager, you should use the @importance = high parameter. CYou should change the Account Retry Attempts option of the Database Mail system properties DYou should configure a new Database Mail profile. The new one will be used for sending the reports to the manager.