A user is reporting that access to a file server is much slower than it has been. The system administrator completes a test of the server using a system monitoring tool and compares it to the previously taken baseline. The comparison shows that there are no significant changes in the use ofsystem resources.  Which of the following actions should be taken to resolve this users problem?()A、 Add additional RAM to the users PCB、 Troubleshoot the users PCC、 Add additional RAM to the serverD、 Add additional hard drive space to the server

A user is reporting that access to a file server is much slower than it has been. The system administrator completes a test of the server using a system monitoring tool and compares it to the previously taken baseline. The comparison shows that there are no significant changes in the use ofsystem resources.  Which of the following actions should be taken to resolve this users problem?()

  • A、 Add additional RAM to the users PC
  • B、 Troubleshoot the users PC
  • C、 Add additional RAM to the server
  • D、 Add additional hard drive space to the server

相关考题:

在智能业务呼叫中,当用户挂机后,SSAP向SCP发送()给操作码通知该挂机事件。() A. Collected User InformationB. Request Report BCSM EventC. Event Report BCSMD. Initiate DP

Which three statistics does the Executive report summarize?() (Choose three.) A. latency and lossB. compression resultsC. traffic (by application)D. CRC and alignment errorsE. user access (by username)

A technician has identified prohibited content on a user’s hard drive. Which of the following should be done NEXT?() A. Warn the userB. Report through proper channelsC. Wipe the driveD. Give the computer back to the user

Whichreportwillprovideinformationonthemostrecentlycompletedplan?() A.Report08-JobHistogramB.Report07-JobHistoryListingC.Report10B-ActualProductionDetailD.Report11-PlannedProductionSchedule

Which three statistics does the Executive report summarize?() (Choose three.)A、latency and lossB、compression resultsC、traffic (by application)D、CRC and alignment errorsE、user access (by username)

You design a Business Intelligence (BI) solution by using SQL Server 2008.  The solution includes a SQL Server 2008 Reporting Services (SSRS) infrastructure in a scale-out deployment. All reports use a SQL Server 2008 relational database as the data source. You implement row-level security. You need to ensure that all reports display only the expected data based on the user who is viewing the report. What should you do?()A、 Store the credential of a user in the data source.B、 Configure the infrastructure to support Kerberos authentication.C、 Configure the infrastructure to support anonymous authentication by using a custom authentication extension.D、 Ensure that all report queries add a filter that uses the User.UserID value as a hidden parameter.

下面哪些CAP操作是与SCP下发给MSC/SSP/IP的?()A、Disconnect Forward ConnectB、PPrompt And Collect User InformationC、AcitivityTestD、Request Report BCSM Event

A technician has identified prohibited content on a user’s hard drive. Which of the following should be done NEXT?()A、Warn the userB、Report through proper channelsC、Wipe the driveD、Give the computer back to the user

A user calls the system administrator and states that they can no longer access the file server they had been working on all morning. To trouble shoot this problem,  which step should the administrator take FIRST?()A、 Reboot the file server.B、 Ask the user what they were doing when they noticed the problem.C、 Ask the user to reboot their PC.D、 Ask the user to ping the default gateway and report the response times back to the administrator.

Which two applications can be used by a user to report emergency work, if the user at least wants to report downtime, classify the request, and report actuals?()A、 Job PlanB、 Quick ReportingC、 Labor ReportingD、 Work Order TrackingE、 Assignment Manager

Which command is issued on an IBM Tivoli Workload Scheduler master  to determine link status and collect into a user created report? ()A、 netstat -rn  B、 conman "sc"  C、 conman "show links"  D、 conman "disp lnk status"

A user calls to report they are getting I/O errors on a file system. Which of the following tools should be used to isolate this problem?()A、dfB、diagrptC、errmsgD、errpt

Which of the following commands will fail?()  A、 report schemaB、 report need backupC、 report need backup days 3D、 report userE、 report obsolete

Your business has departmental reports that are generated every day. Each department must use the same set of queries, but access a different subset of data in the tables, depending on which department generates the report. The format of the reports is being developed; currently, the format changes daily. How would you configure the database to ensure that each department generates its report (based on its target data) using the most recent report format every day?()A、 By having each user run the report generation procedure at the scheduled time, supplying the necessary input variables.B、 By creating a program using DBMS_JOB that accepts one or more variables, and creating a job that calls this program using DBMS_JOB.C、 By having each user schedule a job using DBMS_JOB that accepts one or more input variables and calls a procedure that generates the report.D、 By having each user create a job using DBMS_SCHEDULER that includes all the information and commands necessary to generate the report.E、 By creating a program using DBMS_SCHEDULER that accepts one or more variables, and creating a job that calls this program using DBMS_SCHEDULER.

You have a server that runs Windows Server 2003 Service Pack 2 (SP2). A server application creates report files. The application saves the report files in a folder named Report. A service account is listed as the owner of all report files. You need to assign ownership of the report files to a user in a department named Audit. You must achieve this goal by using the minimum amount of administrative effort. What should you do? ()A、Rewrite the application.B、Create a scheduled task to run Attrib.exe.C、Create a scheduled task to run Icacls.exe.D、Use the Advanced Security settings to change the owner of each file.

Your network contains two Active Directory forests. One forest contains two domains named  contoso.com and na.contoso.com. The other forest contains a domain named nwtraders.com. A forest  trust is configured between the two forests.  You have a user named User1 in the na.contoso.com domain.  User1 reports that he fails to log on to a computer in the nwtraders.com domain by using the user name  NA/User1.  Other users from na.contoso.com report that they can log on to the computers in the nwtraders.com  domain.  You need to ensure that User1 can log on to the computer in the nwtraders.com domain.  What should you do()A、Enable selective authentication over the forest trust.B、Create an external one-way trust from na.contoso.com to nwtraders.com.C、Instruct User1 to log on to the computer by using his user principal name (UPN).D、Instruct User1 to log on to the computer by using the user name nwtraders/User1.

You are a database administrator for your company. A user named Susan belongs to the Windows SalesManagers group. Susan needs a Reporting Services report to display annual sales information by territory. A user named Joe reports to Susan and belongs to the Windows Sales group. He needs a report that is limited to his sales territory, but still displays the same detailed sales data that is on Susan’s report. You need to design a secure solution that meets the reporting needs of the users and that consumes the minimal amount of server resources.  What should you do?()A、Design a report for Susan that includes two data regions. One data region is used for summary sales data. The other data region is used for the detailed sales data for each sales representative. Then, design a report for Joe that displays the detailed sales data.B、Design two reports for Susan. One report includes the territory information, and one report includes the detailed sales data. Then, design a report for Joe that displays the detailed sales data for his territories.C、Design a report for Susan that includes the territory information. Then, design a report for Joe that includes detailed sales data for his territories. Finally, configure Susans report so that it includes the data in Joes report.D、Design a parameterized report for Susan that includes all territory information. Then, design a linked report for Joe that links to Susans report.

You create 200 new user accounts. The users are located in six different sites. New users report that they receive the following error message when they try to log on: "The username or password is incorrect." You confirm that the user accounts exist and are enabled. You also confirm that the user name and password information supplied are correct. You need to identify the cause of the failure. You also need to ensure that the new users are able to log on Which utility should you run()A、RsdiagB、RstoolsC、RepadminD、Active Directory Domains and Trusts

单选题Your business has departmental reports that are generated every day. Each department must use the same set of queries, but accesses a different subset of data in the tables, depending on which department generates the report. The format of the reports is being developed; currently, the format changes daily.  How would you configure the database to ensure that each department generates its report (based on its target data) using the most recent report format every day?()Aby having each user run the report generation procedure at the scheduled time, supplying the necessary input variablesBby creating a program using DBMS_JOB that accepts one or more variables, and creating a job that calls this program using DBMS_JOBCby having each user schedule a job using DBMS_JOB that accepts one or more input variables and calls a procedure that generates the reportDby having each user create a job using DBMS_SCHEDULER that includes all the information and commands necessary to generate the reportEby creating a program using DBMS_SCHEDULER that accepts one or more variables, and creating a job that calls this program using DBMS_SCHEDULER

单选题You design a Business Intelligence (BI) solution by using SQL Server 2008.  The solution includes a SQL Server 2008 Reporting Services (SSRS) infrastructure in a scale-out deployment. All reports use a SQL Server 2008 relational database as the data source. You implement row-level security. You need to ensure that all reports display only the expected data based on the user who is viewing the report. What should you do?()A Store the credential of a user in the data source.B Configure the infrastructure to support Kerberos authentication.C Configure the infrastructure to support anonymous authentication by using a custom authentication extension.D Ensure that all report queries add a filter that uses the User.UserID value as a hidden parameter.

多选题Which two applications can be used by a user to report emergency work, if the user at least wants to report downtime, classify the request, and report actuals?()AJob PlanBQuick ReportingCLabor ReportingDWork Order TrackingEAssignment Manager

单选题You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as a database administrator for your company. There is a user in the Windows SalesManagers group, and he is called Simon. A Reporting Services report is required by Simon to have annual sales information displayed by territory. There is another user in the Windows Sales group, and he is called Jack. He is responsible to report to Simon. A report is required by Jack, and the report is limited to his sales territory, but the same detailed sales data is still displayed, and the detailed sales data is on Simon’s report. A secure solution should be designed to meet the requirements of the users listed above, and the least amount of server resources should be utilized.  Which action should be performed?()AFirst, all territory information should be contained by a parameterized report which is designed for Simon. Second, a linked report that links to Simons report should be designed for Jack.BFirst, two data regions should be contained by a report which is designed for Simon. Second, one data region should be utilized for summary sales data. Third, the other data region should be utilized for the detailed sales data for each sales representative. Four, a report that displays the detailed sales data should be designed for Jack.CFirst, two reports should be designed for Simon. Second, the territory information should be contained by one, and the detailed sales data should be contained by another. At last, a report that displays the detailed sales data for Jack’s territories should be designed for Jack.DFirst, the territory information should be contained by a report which is designed for Simon. Second, a report which detailed sales data for Jack’s territories is contained should be designed for Jack. Third, Simon’s report should be set to have the data in Jacks report contained.

单选题Which command is issued on an IBM Tivoli Workload Scheduler master  to determine link status and collect into a user created report? ()A netstat -rn  B conman sc  C conman show links  D conman disp lnk status

单选题在智能业务呼叫中,当用户挂机后,SSAP向SCP发送()给操作码通知该挂机事件。()ACollected User InformationBRequest Report BCSM EventCEvent Report BCSMDInitiate DP

单选题Which of the following commands will fail?()A report schemaB report need backupC report need backup days 3D report userE report obsolete

单选题You are working as a DBA at NetFx Corporation. A user, Scott, is maintaining the records of all the employees in the EMPLOYEEtable. Initially, the salary of the employee, ’E0025’, was $1800. On 1 May 2004, the salary of the employee, ’E0025’, was increased by $200.   The user, Scott, issued the following statement to modify the record of the employee, ’E0025’:   SQLUPDATE EMPLOYEE  SET SALARY = 2000   WHERE EMPNO = ’E0025’;   SQLCOMMIT;   On December 1, 2004, the salary of the employee, ’E0025’, was increased by $400. The user, Scott, issued the following statement to modify the record of the employee, ’E0025’:   SQLUPDATE EMPLOYEE  SET SALARY = 2400   WHERE EMPNO = ’E0025’;   SQLCOMMIT;   On July 1, 2005, the salary of the employee, ’E0025’, was increased by $500. The user, Scott, issued the following statement to modify the record of the employee, ’E0025’   SQLUPDATE EMPLOYEE  SET SALARY = 2900   WHERE EMPNO = ’E0025’;   SQLCOMMIT;   On July 5, 2005, the HR manager asked you to generate the increment report of the employee, ’E0025’, for the period between 1 May 2004 and 1 July 2005. Which flashback feature will you use to generate the increment report?()A Flashback DropB Flashback TableC Flashback DatabaseDFlashback Version Query

多选题You need to create a trigger to locate the Product report in the Rpt_Server, run the report, and test the status of the report. Which three built-ins would you use to accomplish this task?()ARUN_PRODUCTBSET_REPORT_OBJECT_PROPERTYCRUN_REPORT_OBJECTDFIND_REPORT_OBJECTEREPORT_OBJECT_STATUSFCOPY_REPORT_OBJECT_OUTPUT

单选题A user calls the system administrator and states that they can no longer access the file server they had been working on all morning. To trouble shoot this problem,  which step should the administrator take FIRST?()A Reboot the file server.B Ask the user what they were doing when they noticed the problem.C Ask the user to reboot their PC.D Ask the user to ping the default gateway and report the response times back to the administrator.