jayne has asked her domino server administrator to enable doc locking on the server. which one of the following must she do to enable it for her application?()A、 enable the “allow doc locking “ db property B、 create a view column for the locked doc view icon C、 add a profile doc to the db to manage the locked doc D、 enable doc locking at the view level for each view in the db
jayne has asked her domino server administrator to enable doc locking on the server. which one of the following must she do to enable it for her application?()
- A、 enable the “allow doc locking “ db property
- B、 create a view column for the locked doc view icon
- C、 add a profile doc to the db to manage the locked doc
- D、 enable doc locking at the view level for each view in the db
相关考题:
There was nothing to ________ so. A、keep her from doingB、keep her doC、prevent her doingD、stop her do
A PC administrator is trying to implement BitLocker full disk encryption but the PC reports that asecurity module is not found. Which of the following should the administrator do to correct this?() A. Enable the BIOS passwordB. Turn UAC offC. Create a separate partition with EFSD. Enable TPM in the BIOS
When configuring role-based CLI on a Cisco router,which action will be taken first ?()A、Create a parser view called "root view."B、Log in to the router as the root user.C、Enable the root view on the router.D、Enable role-based CLI globally on the router using the privileged EXEC mode Cisco IOS command.
Derek has created a view in the sales.nsf db. Derek wants the sales value column in the view to be punctuated to display two decimal places . which one of the following should he do?()A、 use the @function @decimal in the column formula in the view B、 select decimal on the numbers tab in the view properties box C、 select decimal on the numbers tab in the column properties boxD、 use the @function @decimal to format the value in the field on the form that will display in the view
A PC administrator is trying to implement BitLocker full disk encryption but the PC reports that asecurity module is not found. Which of the following should the administrator do to correct this?()A、Enable the BIOS passwordB、Turn UAC offC、Create a separate partition with EFSD、Enable TPM in the BIOS
Ariel is designing an application and would like to create response documents with a copy of the original doc in a collapsible section, one of the following @command, provided with the correct parameters, will allow her to do this ()A、 @command ([compose with copy]) B、 @command ([compose with section]) C、 @command ([compose with reference]) D、 @command ([compose with referencesection])
cindy has created a private agent. she wants her colleagues to be able to use it. which one of the following should she do to achieve this?()A、 change the agent property to shared B、 copy the agent to a domino 6 server C、 change the agent property to shared code D、 delete the agent. She must create it again as a shared agent
An administrator is attempting to use the Tivoli Performance Viewer to see the average response time for a WebSphere Commerce command, which of the following must be done in order to be successful?()A、Enable performance monitoring of the WebSphere Application Server through the WebSphere Application Server Administrative ConsoleB、Enable performance monitoring of the WebSphere Commerce application through the WebSphere Commerce Administration ConsoleC、Install and configure Tivoli Performance Viewer on a separate machine and configure it to connect to the Application Server.D、Install and configure DB2 Intelligent Miner for Data to support the appropriate closed-loop analytics
which one of the following types of actions can be used on unopened doc?()A、 form action B、 view action C、 hotspot action D、 db action
tony would like to make it easier for users of the video application to enter new doc using the “video form”, he’d like users to be able to create new “video” doc form within the view. Which one of the following should tony so to build this interface?()A、create a view action that has the following formula:@command([create];”video”)B、create a form action that has the following formula:@command([compose];”video”)C、create a view action that has the following formula:@command([compose];”video”)D、create a database action that has the following formula:@command([compose];”video”)
norma has a form action that will allow users to create comments to the existing doc. When Norma views the form in her web browser, she sees the action. but when she opens the form in her notes client she cannot see the action . which one of the following should she do to correct the problom? ()A、delete old action and create a new one on the formB、Make sure the comments form is available for notes clients useC、Make the action a shared action and disable the hide-when setting for “web borwsers”D、Check the actions hide-when setting to make sure the action is available for “notes 4.6 later”
management has asked bob to post an introductory welcome page when notes users first open the video application in which one of the following places should bob put the welcome message?()A、 in a document named welcome B、 in the database about doc C、 in the database using doc D、 in the first page in the database design
You are the network administrator for The network consists of a single Active Directory domain All network servers run Windows Server 2003, and all client computers run Windows XP Professional. All users in the sales department are members of a group names Sales. Tess, a member of Sales, creates a custom document named Salescustom.doc. She is responsible for making all required changes to this file. Tess places the file in a shared folder named TessDocs on a member server named TestKingA. Then she goes on vacation. When users from the sales department try to open Salescustom.doc, they receive the following error message: 'Access is denied'. You log on to the console of TestKingA and try to open Salescustom.doc. You receive the same error message. You need to ensure that members of Sales have read-only access to Salescustom.doc. You must not affect Tess's permissions on Salescustom.doc or on any other files in TessDocs. You must not grant access to Salescustom.doc to any other users. First, you log on to TestKingA as an administrator. What should you do next?()A、Take ownership of TessDocs and select the Replace owner on subcontainers and objects check box. Configure the NTFS permissions to assign the Allow - Modify permissions on the folder to Sales.B、Take ownership of Salescustom.doc.Configure the NTFS permissions to assign the Allow - Create Files/Write Data permissions on the file to Sales.C、Take ownership of Salescustom.doc. Configure the NTFS permissions to assign the Allow - Read permissions on the file to Sales.D、Take ownership of TessDocs and select the Replace owner on subcontainers and Object check box. Configure the NTFS permissions to assign the Allow - Read permissions on the folder to Sales.
You need to provide ad hoc reporting capabilities to fulfill business requirements. What should you do?()A、Create a SQL Server Reporting Services (SSRS) report. Enable customers to modify the report by using Report Builder.B、Create an ASP.NET application that will enable customers to view and modify reports by calling the SQL Server Reporting Services (SSRS) API.C、Create an ASP.NET application that will enable customers to view and modify reports by using a SQL Server Reporting Services (SSRS) ActiveX control.D、Create a SQL Server Reporting Services (SSRS) Report Model. Enable customers to modify reports based on the model by using Report Builder.
You are the administrator of a Windows 2000 network. You need to store secured files for your company’s Accounting and Legal departments on a Windows 2000 Professional computer. You want to accomplish the following goals: • Enable users in both departments to access their own files from the network • Enable users in the Accounting department to view the Legal department’s documents • Prevent users in the Legal department from being able to view the Accounting department’s documents • Enable managers within the company to access and modify both the Accounting and the Legal department’s files You take the following actions: • Create two shared folders named Accounting and Legal • Create three groups named Accounting, Legal, and Management • Allow the Accounting group Modify permission on the Accounting folder • Allow the Accounting group Read permissions on the Legal folders. • Allow the Management group Modify permission on both the Accounting and Legal folders. Which result or results do these actions produce?()A、Users in both departments can access to their own files from the network.B、Users in the Accounting department can view the Legal department’s documents.C、Users in the Legal department cannot view the Accounting department’s documents.D、Company managers can access and modify both departments’ files.
Recently traffic to the company web server has more than doubled, resulting in slower response times from the server. An administrator has decided to add a second, identical 10/100/1000 NIC to the server. The server is presently connected to a 10/100/1000 switch, with four open ports on the switch. Which of the following is the BEST solution to speed up web traffic?()A、Free up more ports on the switchB、Enable server load balancingC、Move the second network adapter to a new subnetD、Enable network adapter teaming
单选题Derek has created a view in the sales.nsf db. Derek wants the sales value column in the view to be punctuated to display two decimal places . which one of the following should he do?()A use the @function @decimal in the column formula in the view B select decimal on the numbers tab in the view properties box C select decimal on the numbers tab in the column properties boxD use the @function @decimal to format the value in the field on the form that will display in the view
单选题management has asked bob to post an introductory welcome page when notes users first open the video application in which one of the following places should bob put the welcome message?()A in a document named welcome B in the database about doc C in the database using doc D in the first page in the database design
单选题You need to provide ad hoc reporting capabilities to fulfill business requirements. What should you do?()ACreate a SQL Server Reporting Services (SSRS) report. Enable customers to modify the report by using Report Builder.BCreate an ASP.NET application that will enable customers to view and modify reports by calling the SQL Server Reporting Services (SSRS) API.CCreate an ASP.NET application that will enable customers to view and modify reports by using a SQL Server Reporting Services (SSRS) ActiveX control.DCreate a SQL Server Reporting Services (SSRS) Report Model. Enable customers to modify reports based on the model by using Report Builder.
单选题jayne has asked her domino server administrator to enable doc locking on the server. which one of the following must she do to enable it for her application?()A enable the “allow doc locking “ db property B create a view column for the locked doc view icon C add a profile doc to the db to manage the locked doc D enable doc locking at the view level for each view in the db
单选题tony would like to make it easier for users of the video application to enter new doc using the “video form”, he’d like users to be able to create new “video” doc form within the view. Which one of the following should tony so to build this interface?()Acreate a view action that has the following formula:@command([create];”video”)Bcreate a form action that has the following formula:@command([compose];”video”)Ccreate a view action that has the following formula:@command([compose];”video”)Dcreate a database action that has the following formula:@command([compose];”video”)
多选题You are the administrator of a Windows 2000 network. You need to store secured files for your company’s Accounting and Legal departments on a Windows 2000 Professional computer. You want to accomplish the following goals: • Enable users in both departments to access their own files from the network • Enable users in the Accounting department to view the Legal department’s documents • Prevent users in the Legal department from being able to view the Accounting department’s documents • Enable managers within the company to access and modify both the Accounting and the Legal department’s files You take the following actions: • Create two shared folders named Accounting and Legal • Create three groups named Accounting, Legal, and Management • Allow the Accounting group Modify permission on the Accounting folder • Allow the Accounting group Read permissions on the Legal folders. • Allow the Management group Modify permission on both the Accounting and Legal folders. Which result or results do these actions produce?()AUsers in both departments can access to their own files from the network.BUsers in the Accounting department can view the Legal department’s documents.CUsers in the Legal department cannot view the Accounting department’s documents.DCompany managers can access and modify both departments’ files.
单选题You are the network administrator for The network consists of a single Active Directory domain All network servers run Windows Server 2003, and all client computers run Windows XP Professional. All users in the sales department are members of a group names Sales. Tess, a member of Sales, creates a custom document named Salescustom.doc. She is responsible for making all required changes to this file. Tess places the file in a shared folder named TessDocs on a member server named TestKingA. Then she goes on vacation. When users from the sales department try to open Salescustom.doc, they receive the following error message: 'Access is denied'. You log on to the console of TestKingA and try to open Salescustom.doc. You receive the same error message. You need to ensure that members of Sales have read-only access to Salescustom.doc. You must not affect Tess's permissions on Salescustom.doc or on any other files in TessDocs. You must not grant access to Salescustom.doc to any other users. First, you log on to TestKingA as an administrator. What should you do next?()ATake ownership of TessDocs and select the Replace owner on subcontainers and objects check box. Configure the NTFS permissions to assign the Allow - Modify permissions on the folder to Sales.BTake ownership of Salescustom.doc.Configure the NTFS permissions to assign the Allow - Create Files/Write Data permissions on the file to Sales.CTake ownership of Salescustom.doc. Configure the NTFS permissions to assign the Allow - Read permissions on the file to Sales.DTake ownership of TessDocs and select the Replace owner on subcontainers and Object check box. Configure the NTFS permissions to assign the Allow - Read permissions on the folder to Sales.
单选题Ariel is designing an application and would like to create response documents with a copy of the original doc in a collapsible section, one of the following @command, provided with the correct parameters, will allow her to do this ()A @command ([compose with copy]) B @command ([compose with section]) C @command ([compose with reference]) D @command ([compose with referencesection])
单选题which one of the following types of actions can be used on unopened doc?()A form action B view action C hotspot action D db action
单选题cindy has created a private agent. she wants her colleagues to be able to use it. which one of the following should she do to achieve this?()A change the agent property to shared B copy the agent to a domino 6 server C change the agent property to shared code D delete the agent. She must create it again as a shared agent