Your application uses two threads, named threadOne and threadTwo. You need to modify the code to prevent the execution of threadOne until threadTwo completes execution. What should you do?()A、 Configure threadOne to run at a lower priority.B、 Configure threadTwo to run at a higher priority.C、 Use a WaitCallback delegate to synchronize the threads.D、 Call the Sleep method of threadOne. E、 Call the SpinLock method of threadOne.

Your application uses two threads, named threadOne and threadTwo. You need to modify the code to prevent the execution of threadOne until threadTwo completes execution. What should you do?()

  • A、 Configure threadOne to run at a lower priority.
  • B、 Configure threadTwo to run at a higher priority.
  • C、 Use a WaitCallback delegate to synchronize the threads.
  • D、 Call the Sleep method of threadOne. 
  • E、 Call the SpinLock method of threadOne.

相关考题:

Your company has an Active Directory Domain Services (AD DS) domain. You virtualize applications by using Microsoft Application Virtualization (App-V).You are creating an application virtualization package.Which should you use?()A.Microsoft Application Virtualization SequencerB.Microsoft Application Virtualization Desktop ClientC.Microsoft System Center Application Virtualization Streaming ServerD.Microsoft System Center Application Virtualization Management Server

What are some of the questions you should ask yourself when analyzing your existing Domino NSF application for modernizing with XPages?()A、All of the belowB、How much UI code do you have?C、How complex are your subs and functions?D、How do you use Rich Text, if any at all?

Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows Vista computers.  You are planning to deploy Windows 7 and a custom application.   You have the following requirements:   The application must be available to only a specific group of users. You must be able to monitor application usage.   You need to design a deployment method for the custom application that meets the requirements.  Which deployment method should you use in your design?()A、software installation in Group PolicyB、startup scripts in Group PolicyC、Microsoft Application Virtualization (App-V)D、baseline Windows 7 image that includes the custom application

You develop a service application that needs to be deployed. Your network administrator creates a specific user account for your service application.You need to configure your service application to run in the context of this specific user account. What should you do?()A、Prior to installation,set the StartType property of the ServiceInstaller class.B、Prior to installation,set the Account,Username,and Password properties of theServiceProcessInstaller class.C、Use the CONFIG option of the net.exe command-line tool to install the service.D、Use the installutil.exe command-line tool to install the service.

You are creating a templated Web control for use in your Web application. You need to add the Web control to your Web application pages without compiling your control into a .dll file. What should you do?()A、Ensure that the Web control inherits from the WebControl class.B、Ensure that the Web control inherits from the Control class.C、Ensure that the Web control inherits from the CompositeControl class.D、Ensure that the Web control inherits from the UserControl class.

You need to design a permission structure for registry objects that enables the legacy application at the resorts to run. Your solution must comply with the written security policy.  What should you do?()A、Create a GPO. Link the GPO to the OUs that contain computer accounts for computers that run the legacy application, Use the GPO to give the Domain Users security group full control on the partitions of the registry that the legacy application usesB、Create a GPO. Link the GPO to the OUs that contain computer accounts for computers that run the legacy application. Use the GPO to give the Domain Users security group full control on the HKEY_USERS partition of the registryC、Create a GPO. Link the GPO to the OUs that contain computer accounts for computers that run the Legacy application. Use the GPO to make all users who require access to the application members of Local Administrators group on each computerD、Create a GPO. Link the GPO to the OUs that contain computer accounts for computers that run the Legacy application. Use the GPO to give all users who require access to the application full control for the Ntuser.dat file

You recently installed an application on your computer. The application is configured to automatically start. This application might cause your computer to run slower.  You need to prevent the application from auto starting without uninstalling the application.  What should you do?()A、Use the Microsoft Windows Task Manager application to end the task for the application.B、Use the Control Panel application to uninstall the application. Reboot the computer.C、Use the Software Explorer application to disable the application. Reboot the computer.D、Use the Services application to disable the Application Experience service, and then launch the application.

Your company has a server that runs an instance of Active Directory Lightweight Directory Services   (AD LDS).    You need to create new organizational units in the AD LDS application directory partition.  What should you do()A、Use the Active Directory Users and Computers snap-in to create the organizational units on the AD  LDS application directory partition.B、Use the ADSI Edit snap-in to create the organizational units on the AD LDS application directory  partition.C、Use the dsadd OU  command to create the organizational units.D、Use the dsmod OU  command to create the organizational units.

You are 1 of 75 consultants employed by an IT services company named Contoso.com. As part of your job,you and other team members provide network support for over 150 businesses in your city. Your company is about to implement a business process in which consultants must connect to an application server on the Contoso.com network while working at customer premises. When connected tothe application server, consultants provide critical information about each assignment in the field. Toconnect to the Contoso.com application server, consultants are expected to use Remote DesktopConnection on customer computers running Windows XP or Windows Vista. You have been asked todetermine whether your company needs to purchase client access licenses (CALs) for Terminal Services. Which of the following options best suits the needs of your organization?()A、Use Remote Desktop for Administration on the application server, and purchase per user CALs.B、Use Remote Desktop for Administration on the application server, but do not purchase any CALs.C、Install Terminal Services on the application server, and purchase per device CALs.D、Install Terminal Services on the application server, and purchase per user CALs.

All client computers in your network run Windows 7 Enterprise.    You need to prevent all standard user accounts from running programs that are signed by a specific publisher.   What should you do?()A、Use software restriction policies. Create a path rule.B、Use software restriction policies. Create a hash rule.C、Use AppLocker application control policies. Create an Executable rule.D、Use AppLocker application control policies. Create a Windows Installer rule.

You are creating a shared Internet connection on your Windows 2000 Professional computer.  You want to enable other computers on the LAN to be able to access only HTTP and FTP sites on the Internet.   What should you do?()A、Configure your shared Internet connection to disable LCP extensions.B、Configure you shared Internet connection to disable on-demand dialing.C、Create an Internet Connection Sharing application type for HTTP to use remote server port 25.D、Create an Internet Connection Sharing application type for HTTP to use remote server port 80.E、Create an Internet Connection Sharing application type for FTP to use remote server port 21.F、Create an Internet Connection Sharing application type for FTP to use remote server port 72.

Your network has 1,000 client computers that run Windows 7.   You plan to deploy a new application.   You need to ensure that the application deploys only during non-business hours.   What should you do?()A、Use Group Policy.B、Use Windows Deployment Services with a schedule cast.C、Use Microsoft System Center Configuration Manager.D、Use a logon script.

Your company has an Active Directory Domain Services (AD DS) domain. You virtualize applications by using Microsoft Application Virtualization (App - V). You are creating an application virtualization package. Which sh ould you use?()A、Microsoft Application Virtualization SequencerB、Microsoft Application Virtualization Desktop ClientC、Microsoft System Center Application Virtualization Streaming ServerD、Microsoft System Center Application Virtualization Management Server

You are a desktop administrator for your company. You need to deploy a new application. The application is packaged in an .msi file. The application will be used by only a small number of users. You plan to install the application by using the Msiexec.exe program. You need to ensure that the installation process does not display a user interface. What should you do?()A、Manually perform a passive installation of the application.B、Manually perform a quiet installation of the application.C、Use a logon script to run the Msiexec.exe program.D、Use the Runas utility to run the Msiexec.exe program.

Your company is planning to deploy Windows 7 to all client computers.   You have the following requirements:   Test an application to detect potential compatibility issues caused by User Account Control (UAC). Monitor an application’s operating system use.   You need to select the appropriate method to detect application compatibility issues.   What should you do?()A、Use the Standard User Analyzer tool.B、Use the Standard User Analyzer Wizard.C、Use the standalone Setup Analysis Tool.D、Use the Setup Analysis Tool in a virtual environment.

You are a desktop administrator for your company. You are responsible for deploying a new application. The application is packaged in an .msi file. You need to deploy the application to only three users in the company. The .msi file contains all of the information necessary to correctly install the application. You need to install the application so that users see information about the installation progress, but no other user interface is displayed during the installation. What should you do?()A、Use the Msiexec.exe program to perform a quiet installation of the application.B、Use the Msiexec.exe program to perform a passive installation of the application. C、Create a Group Policy object (GPO) that assigns the application. Link the GPO to the site containing the users who will use the application. D、Create a Group Policy object (GPO) that advertises the application. Link the GPO to the domain.

You use Microsoft .NET Framework 4 to create a Windows Presentation Foundation (WPF) application. The application requires frequent updates. You want to use the ClickOnce technology to distribute the application to Internet users. You need to ensure that the application is automatically updated without requiring user intervention. You also need to ensure that the users execute the most recent version of the application. What should you do when you publish the application? ()A、Use Install the application from a file share. Select the Application is available online and offline option.B、Use Install the application from CD-ROM or a DVD-ROM. Select the Application will not check for updates option.C、Use Install the application from a Web site. Select the Application is available online only option.D、Use Install the application from a Web site. Select the Application is available online and offline option.

Your company has a server that runs an instance of Active Directory Lightweight Directory  Services (AD LDS).     You need to create new organizational units in the AD LDS application directory partition.     What should you do()A、Use the Active Directory Users and Computers snap-in to create the organizational units on the AD LDS applicationB、Use the ADSI Edit snap-in to create the organizational units on the AD LDS application directory partition.C、Use the dsadd OU  command to create the organizational units.D、Use the dsmod OU  command to create the organizational units.

Your company has a server that runs an instance of Actrve Directory Lightweight Directory Service (AD LDS) You need to create new organizational units in the AD LDS application directory partition What should you do()A、Use the Actrve Directory Users and Computers snap-in to create the organizational units on the AD LDS application directory partitionB、Use the ADSI Edit snap-in to create the organizational units on the AD LDS application directory partitionC、Use the dsadd OU  command to create the organizational unitsD、Use the dsmod OU  command to create the organizational units

多选题You are creating a shared Internet connection on your Windows 2000 Professional computer.  You want to enable other computers on the LAN to be able to access only HTTP and FTP sites on the Internet.   What should you do?()AConfigure your shared Internet connection to disable LCP extensions.BConfigure you shared Internet connection to disable on-demand dialing.CCreate an Internet Connection Sharing application type for HTTP to use remote server port 25.DCreate an Internet Connection Sharing application type for HTTP to use remote server port 80.ECreate an Internet Connection Sharing application type for FTP to use remote server port 21.FCreate an Internet Connection Sharing application type for FTP to use remote server port 72.

单选题You create a multiple form application- Which built-in must you use to invoke the form modules to enable you to programmatically control navigation between the multiple forms in your application?()ANEW_FORM BOPEN_FORM CCALL_FORM DCLOSE_FORM

单选题You use Microsoft Visual Studio 2010 and Microsoft .NET Framework 4 to create a Windows Presentation Foundation (WPF) application. You plan to use a PresentationTraceSources object when the application is executed by users. When the application is executed in a test environment, all debug information is successfully captured. You need to be able to capture debug information when the application is deployed. What should you do?()AEnable WPF tracing in the registry.Restart the application.BEnable tracing by modifying local Group Policy.Restart the application.COpen the XML configuration file for your application on the user's computer.Set tracing to a verbose level.Restart the application.DOpen the XML configuration file for your application on the user's computer.Add a trace listener.Restart the application.

单选题Your company has 1,000 client computers.  You are planning to deploy Windows 7 and a new line-of-business application.   You have the following requirements:   Install the application as part of the standard Windows 7 deployment. Use a single Windows 7 image for the deployment.  The application must be available for use on client computers that are not connected to the network.   You need to ensure that the application is installed on all new client computers.   What should you do?()APublish the application by using Group Policy Software Installation.BDeploy the application by using Windows Server Update Services (WSUS).CService an online image of Windows 7 to add the new application.DService an offline image of Windows 7 to add the new application.

问答题Practice 1  You have read the following advertisement on the Morning Post, an English newspaper.  Write an application letter to the hotel manager. Your letter should include:  (1) reasons for your application  (2) a request for an interview  You should write approximately 100 words. Do not sign your own name at the end of your letter. Use “Wang Lin” instead. You do not need to write the address.

单选题You run a Windows Defender scan on your computer system. The scan identifies one of your applications as having potentially unwanted behavior.  You need to continue to use the application. You also need to stop Windows Defender from alerting you about this application.  Which Windows Defender option should you use? ()AIgnoreBRemoveCQuarantineDAlways Allow

单选题A customer needs to ensure that the number of threads servicing an application does not exceed the number of database connections available to the application. What step must you take to address this situation?()AConfigure a Max Threads Constraint and add your application to the list of applications for the  Constraint.BConfigure a Work Manager with a Maximum Threads Constraint tied to the Connection Pool and  configuration your application to use the Work Manager.CConfigure a Work Manager with a Minimum Threads Constraint tied to the Connection Pool and  configure your application to use the Work Manager.DConfigure a global MaxThreads constraint and target it to the server or clusters where your  application is deployed.EConfigure the startup parameter -Dwls-maxThreads to be the same as the number of  database connections configured.

多选题You work as a Web Developer at Certkiller.com. You are in the process of creating a Webapplication using Microsoft ASP.NET 3.5.  You host the Web application in Microsoft Internet Information Services (IIS) 6.0. You browse theapplication and receive the following error message:  Server Application Unavailable  The web application you are attempting to access on this web server is currently unavailable.Please hit the "Refresh" button in your web browser to retry your request.  You view the Application event log and discover the following message:  It is not possible to run two different versions of ASP.NET in the same IIS process. Please use theIIS Administration Tool to reconfigure your server to run the application in a separate process.  To ensure productivity you need to solve this problem as quick as possible.  What should you do?()AYou should change the IIS isolation mode.BYou should assign the application to another application pool.CYou should configure all applications that are part of your application's application pool in orderto use the same version of ASP.NET.DYou should run the Aspnet_regiis.exe Tool.EYou should restart the application pool that hosts the application.

单选题In one of your online transaction processing (OLTP) applications, most users frequently modify the values, including the key values, of the application tables. Some users generate application reports by using multiple application tables.  What is the best table structure that you can use to gain optimal performance?()Aheap tableBobject tableCexternal tableDclustered tableEglobal temporary tableFindex­organized table (IOT)