Your application must access data that is located on two SQL Server 2005 computers. One of these servers is named SQL1 and the other is SQL2. You have permissions to create a stored procedure on SQL1 to support your application. However,on SQL2 you only have permissions to select data. You write the stored procedure on SQL1. The stored procedure accesses SQL2 by using the OPENQUERY Transact-SQL statement. However,the query fails when executed.You need to troubleshoot the cause of the error. What should you do?()A、Join the two servers by using the four-part syntax of server.database.schema.table.B、Reference SQL2 by using an alias.C、Add SQL2 as a remote server to SQL1.D、Add SQL2 as a linked server to SQL1.

Your application must access data that is located on two SQL Server 2005 computers. One of these servers is named SQL1 and the other is SQL2. You have permissions to create a stored procedure on SQL1 to support your application. However,on SQL2 you only have permissions to select data. You write the stored procedure on SQL1. The stored procedure accesses SQL2 by using the OPENQUERY Transact-SQL statement. However,the query fails when executed.You need to troubleshoot the cause of the error. What should you do?()

  • A、Join the two servers by using the four-part syntax of server.database.schema.table.
  • B、Reference SQL2 by using an alias.
  • C、Add SQL2 as a remote server to SQL1.
  • D、Add SQL2 as a linked server to SQL1.

相关考题:

An application writes to a log file in the /logs filesystem that is full. After the log file is deleted, 'df' still shows the filesystem as 100% full. What is the likely cause of the problem and what will resolve it?()A、The deleted file is still open by the application.The system must be rebooted before'df' will show the reduction in the filesystem.B、The deleted file is still open by the application.The application must be stoppedbefore 'df' will show the reduction in the filesystem.C、The filesystem is still marked as full in the /etc/fs.status file.The system must be rebooted before 'df' will show the reduction in the filesystem.D、The filesystem is still marked as full in the /etc/fs.status file.The application must be stopped before 'df' will show the reduction in the filesystem.

Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows Vista computers.  You are planning to deploy Windows 7 and a custom application.   You have the following requirements:   The application must be available to only a specific group of users. You must be able to monitor application usage.   You need to design a deployment method for the custom application that meets the requirements.  Which deployment method should you use in your design?()A、software installation in Group PolicyB、startup scripts in Group PolicyC、Microsoft Application Virtualization (App-V)D、baseline Windows 7 image that includes the custom application

What is a prerequisite for using the application availability analysis tool in HACMP?()  A、 Tivoli is required to generate reports from the data collected.B、 An application monitor must be associated with the application to monitor.C、 An "aaatd" daemon must be started and added in as a post event to "node_up_complete".D、 Resource group is present on all of the systems in the cluster that have the desired application.

You want to create a valid directory structure for your Java EE web application, and your application usestag files and a JAR file. Which three must be located directly in your WEB-INF directory(NOT in asubdirectory of WEB-INF)?()A、The JAR fileB、A directory called libC、A directory called tagsD、A directory called TLDsE、A directory called classesF、A directory called META-INF

You want to create a filter for your web application and your filter will implement javax.servlet.Filter. Which two statements are true?()A、Your filter class must implement an init method and a destroy method.B、Your filter class must also implement javax.servlet.FilterChain.C、When your filter chains to the next filter, it should pass the same arguments it received in its doFiltermethod.D、The method that your filter invokes on the object it received that implements javax.servlet.FilterChaincan invoke either another filter or a servlet.E、Your filter class must implement a doFilter method that takes, among other things, anHTTPServletRequest object and an HTTPServletResponse object.

You recently installed an application on your computer. The application is configured to automatically start. This application might cause your computer to run slower.  You need to prevent the application from auto starting without uninstalling the application.  What should you do?()A、Use the Microsoft Windows Task Manager application to end the task for the application.B、Use the Control Panel application to uninstall the application. Reboot the computer.C、Use the Software Explorer application to disable the application. Reboot the computer.D、Use the Services application to disable the Application Experience service, and then launch the application.

You are 1 of 75 consultants employed by an IT services company named Contoso.com. As part of your job,you and other team members provide network support for over 150 businesses in your city. Your company is about to implement a business process in which consultants must connect to an application server on the Contoso.com network while working at customer premises. When connected tothe application server, consultants provide critical information about each assignment in the field. Toconnect to the Contoso.com application server, consultants are expected to use Remote DesktopConnection on customer computers running Windows XP or Windows Vista. You have been asked todetermine whether your company needs to purchase client access licenses (CALs) for Terminal Services. Which of the following options best suits the needs of your organization?()A、Use Remote Desktop for Administration on the application server, and purchase per user CALs.B、Use Remote Desktop for Administration on the application server, but do not purchase any CALs.C、Install Terminal Services on the application server, and purchase per device CALs.D、Install Terminal Services on the application server, and purchase per user CALs.

You create a large, n-tier Web application that has a custom event tracking system. You need to create a custom event type that enables your event tracking system to record all relevant event details for all types of events. The events must be stored in Microsoft SQL Server. From which base type should your custom event type inherit? ()A、IWebEventCustomEvaluatorB、WebEventProviderC、WebBaseEventD、WebAuditEvent

Your network has client computers that run Windows XP.  All users access a custom line-of- business application.   The line-of-business application is not compatible with Windows 7. You are planning to deploy Windows 7.   You have the following requirements:   The application must run on all client computers.   The application executable must reside on each client computer.    You need to manage application compatibility to meet the requirements.   What should you do?()A、Install the application on a Remote Desktop Services server.B、Install a shim for the application on each client computer.C、Install the Windows Compatibility Evaluator on each client computer.D、Virtualize the application by using Microsoft Application Virtualization (App-V).

Your network consists of a single Active Directory domain. All domain controllers run Windows Server 2008 R2. All client computers run Windows 7. All user accounts are stored in an organizational unit (OU) named Staff. All client computer accounts are stored in an OU named Clients.  You plan to deploy a new application. You need to ensure that the application deployment meets the following requirements: èUsers must access the application from an icon on the Start menu. èThe application must be available to remote users when they are offline. What should you do?()A、Publish the application to users in the Staff OU.B、Publish the application to users in the Clients OU.C、Assign the application to computers in the Staff OU.D、Assign the application to computers in the Clients OU.

单选题You create a multiple form application- Which built-in must you use to invoke the form modules to enable you to programmatically control navigation between the multiple forms in your application?()ANEW_FORM BOPEN_FORM CCALL_FORM DCLOSE_FORM

单选题Your network contains an Active Directory domain. You have a server that runs Windows Server 2008 R2 and has the Remote Desktop Services server role enabled. All client computers run Windows 7. You need to plan the deployment of a new line-of-business application to all client computers. The  deployment must meet the following requirements:   èUsers must access the application from an icon on their desktops.   èUsers must have access to the application when they are not connected to the network. What should you do?()APublish the application as a RemoteApp.BPublish the application by using Remote Desktop Web Access (RD Web Access).CAssign the application to the Remote Desktop Services server by using a Group Policy object (GPO).DAssign the application to all client computers by using a Group Policy object (GPO).

单选题You are developing a Web application. Your code restricts access to some pages based on the users credentials. You need to configure IIS to supply the user's Windows credentials to your Web application. These credentials must be encrypted. What should you do? ()AEnable Anonymous access. Enable Integrated Windows authentication.BEnable Anonymous access. Enable Basic authentication.CDisable Anonymous access. Enable Integrated Windows authentication.DDisable Anonymous access. Enable Basic authentication.

多选题Which two about WAR files are true?()AWAR files must be located in the web application library directory.BWAR files must contain the web application deployment descriptor.CWAR files must be created by using archive tools designed specifically for that purpose.DThe web container must serve the content of any META-INF directory located in a WAR file.EThe web container must allow access to resources in JARs in the web application library directory.

单选题Your company has 1,000 client computers.  You are planning to deploy Windows 7 and a new line-of-business application.   You have the following requirements:   Install the application as part of the standard Windows 7 deployment. Use a single Windows 7 image for the deployment.  The application must be available for use on client computers that are not connected to the network.   You need to ensure that the application is installed on all new client computers.   What should you do?()APublish the application by using Group Policy Software Installation.BDeploy the application by using Windows Server Update Services (WSUS).CService an online image of Windows 7 to add the new application.DService an offline image of Windows 7 to add the new application.

单选题Your virtual environment includes Windows Server 2008 R2 Hyper-V servers. The test and development teams are developing a distributed application. The application requires a domain controller, a server that runs Microsoft SQL Server, an application server, and a client computer. The application uses pass-through authentication. You need to ensure that at the time of a failure, the test team can reproduce the error and provide the application in the state in which it existed when the error occurred to the development team for continued analysis. You must achieve this goal while minimizing storage requirements.    What should you do?()ASnapshot and export all serversBSnapshot and export only the application serverCSnapshot the application server, and back up the SQL Server databaseDSnapshot and export only the domain controller and the client computer

多选题You want to create a valid directory structure for your Java EE web application, and your application usestag files and a JAR file. Which three must be located directly in your WEB-INF directory(NOT in asubdirectory of WEB-INF)?()AThe JAR fileBA directory called libCA directory called tagsDA directory called TLDsEA directory called classesFA directory called META-INF

单选题Your company has a main office in New York and branch offices in Chicago and Los Angeles. You plan to use Microsoft Application Virtualization (App-V) 4.5 with SP1.  You install an Application Virtualization Management Server in the New York office. You need to provide application virtualization with active upgrade support in the Chicago and Los Angeles offices. You must design your App-V solution so that it minimizes WAN traffic.  What should you do?()AInstall Application Virtualization Streaming Servers in the Chicago and Los Angeles officesBInstall Application Virtualization Management Servers in the Chicago and Los Angeles officesCInstall the Application Virtualization /CONTENT folder on file shares in the Chicago and Los Angeles officesDInstall the Application Virtualization /CONTENT folder on IIS 7 servers in the Chicago and Los Angeles offices

单选题Your network contains an Active Directory forest. The functional level of the forest is Windows Server  2008 R2.   Your companys corporate security policy states that the password for each user account must be  changed at least every 45 days.   You have a user account named Service1. Service1 is used by a network application named Application1.   Every 45 days, Application1 fails.   After resetting the password for Service1, Application1 runs properly.   You need to resolve the issue that causes Application1 to fail. The solution must adhere to the corporate  security policy.   What should you do()ARun the Set-ADAccountControl cmdlet.BRun the Set-ADServiceAccount cmdlet.CCreate a new password policy.DCreate a new Password Settings object (PSO).

多选题You want to create a filter for your web application and your filter will implement javax.servlet.Filter. Which two statements are true?()AYour filter class must implement an init method and a destroy method.BYour filter class must also implement javax.servlet.FilterChain.CWhen your filter chains to the next filter, it should pass the same arguments it received in its doFiltermethod.DThe method that your filter invokes on the object it received that implements javax.servlet.FilterChaincan invoke either another filter or a servlet.EYour filter class must implement a doFilter method that takes, among other things, anHTTPServletRequest object and an HTTPServletResponse object.

单选题You are creating an online catalog application that will display product information on the company Web site. The product data is stored in a SQL Server 2005 database. The data is stored as relational data but must be passed to the application as an XML document by using FOR XML. You test your application and notice that not all of the items matching your query appear in the XML document. Only those products that have values for all elements in the schema appear.   You need to modify your Transact-SQL statement so that all products matching your query appear in the XML document. What should you do?()AAdd an XML index to the table that contains the product data.BAdd the XSINIL argument to the ELEMENTS directive in the query.CAdd a HAVING clause to the query.DAdd the replace value of clause to the query.

单选题Your network consists of a single Active Directory domain. Your network contains 10 servers and 500 client computers. All domain controllers run Windows Server 2008 R2. A Windows Server 2008 R2 server  has Remote Desktop Services installed. All client computers run Windows XP Service Pack 3.  Youplan to deploy a new line-of-business application. The application requires desktop themes to be  enabled.   You need to recommend a deployment strategy that meets the following requirements: èOnly authorized users must be allowed to access the application.   èAuthorized users must be able to access the application from any client computer. èYour strategy must minimize changes to the client computers.  èYour strategy must minimize software costs. What should you recommend?()AMigrate all client computers to Windows 7. Deploy the application to all client computers by using a Group Policy object (GPO).BMigrate all client computers to Windows 7. Deploy the application to the authorized users by using a Group Policy object (GPO).CDeploy the Remote Desktop Connection (RDC) 7.0 software to the client computers. Install the  application on the Remote Desktop Services server. Implement Remote Desktop Connection Broker (RD Connection Broker).DDeploy the Remote Desktop Connection (RDC) 7.0 software to the client computers. Enable the  Desktop Experience feature on the Remote Desktop Services server. Install the application on the  Remote Desktop Services server.

单选题A customer needs to ensure that the number of threads servicing an application does not exceed the number of database connections available to the application. What step must you take to address this situation?()AConfigure a Max Threads Constraint and add your application to the list of applications for the  Constraint.BConfigure a Work Manager with a Maximum Threads Constraint tied to the Connection Pool and  configuration your application to use the Work Manager.CConfigure a Work Manager with a Minimum Threads Constraint tied to the Connection Pool and  configure your application to use the Work Manager.DConfigure a global MaxThreads constraint and target it to the server or clusters where your  application is deployed.EConfigure the startup parameter -Dwls-maxThreads to be the same as the number of  database connections configured.

单选题Your company’s network has client computers that run Windows 7.   A software vendor releases version 2 of an application that your company uses.  Your company currently uses version 1.  Version 1 and version 2 are not compatible. You plan to deploy version 2 of the application.   You have the following requirements:Users must be able to run both versions of the application on their computers.   Version 2 must be available when a client computer is not connected to the network.  You need to plan a software deployment process that meets the requirements.   What should you do?()A Deploy version 2 of the application by using Microsoft Application Virtualization (App-V). B Deploy version 2 of the application as a Remote Desktop Services RemoteApp.C Deploy version 2 of the application by using a Group Policy Software Installation policy.D Deploy version 2 of the application by using a Microsoft System Center Configuration Manager package.