多选题TestKing.com has a SQL Server 2005 computer. You have been assigned the task of retrieving information about a user who is currently logged in. You need to create a function that returns scalar information about the activity time for a particular user. What are two possible ways to achieve this goal?()ACreate a function that returns a list of values that represent the login times for the given user.BCreate a function that returns a list of values that represent the people who have logged more hours than the current user has logged.CCreate a function that returns a numeric value that represents the number of hours that a user has logged for the current day.DCreate a function that returns a numeric value that represents the number of hours that a user has logged for the current month.

多选题
TestKing.com has a SQL Server 2005 computer. You have been assigned the task of retrieving information about a user who is currently logged in. You need to create a function that returns scalar information about the activity time for a particular user. What are two possible ways to achieve this goal?()
A

Create a function that returns a list of values that represent the login times for the given user.

B

Create a function that returns a list of values that represent the people who have logged more hours than the current user has logged.

C

Create a function that returns a numeric value that represents the number of hours that a user has logged for the current day.

D

Create a function that returns a numeric value that represents the number of hours that a user has logged for the current month.


参考解析

解析: 暂无解析

相关考题:

You are the administrator of two Microsoft Windows 2000 computers. One computer is running Internet Information Services (IIS), and the other is running SQL Server 2000. Company partners need to connect by means of the Internet and query data stored on the SQL Server computer. Some of these partners have computers that do not use Microsoft operating systems or Web browsers.You need to configure the IIS and SQL Server 2000 computers to allow access to data by means of the IIS virtual directory. IIS uses Basic Authentication to allow access to the virtual directory.Only company partners should have access to the SQL Server computer by means of the Internet. The partners should not be allowed to make ad hoc queries. You want to be able to audit successful and failed logins to the SQL Server computer.You want to allow the partners access to the SQL Server computer while keeping your security scheme as simple as possible. Which two actions should you take? (Each correct answer represents part of the solution. Choose two.)A.Configure the IIS virtual directory to allow URL queries.B.Configure the IIS virtual directory to allow template queries.C.Create a new Windows user account. Create a corresponding Windows Authenticated login on the SQL Server computer. Configure the IIS virtual directory to always use this login when connecting to the SQL Server computer.D.Create a Windows Authenticated login on the SQL Server computer for the IIS Internet Guest Account. Configure the IIS virtual directory to always use the Internet Guest Account when connecting to the SQL Server computer.E.Create a Windows Authenticated login for each company partner on the SQL Server computer. Configure the IIS virtual directory to use Windows Integrated Authentication when connecting to the SQL Server computer.

You are the administrator of several SQL Server 2000 computers. You want to retrieve information from an archived inventory database. You have a full tape backup of the database. The backup’s header information shows that the backup uses the SQL_Latin1_General_CR437_BIN collation.However, the existing SQL server computers in your office are configured to use theSQL_Latin1_General_CP1_CI_AS collation.You do not want to join tables in the inventory database with tables in other databases. You need to restore the inventory database to a SQL Server 2000 computer by using the least amount of administrative effort.What should you do?A.Use the rebuildm utility to rebuild the system database on an existing SQL server computer. Configure all the databases on that server to use the SQL_Latin1_General_CR437_BIN collation. Restore the inventory database to the server.B.Restore the inventory database to an existing SQL server computer. Accept the SQL_Latin1_General_CR437_BIN collation for that database.C.Install a new named instance of SQL Server 2000 on an existing SQL Server 2000 computer. Configure the named instance to use the SQL_Latin1_General_CR437_BIN collation. Restore the inventory database to the named instance.D.Install SQL Server 2000 on a new computer. Configure the new server to use the SQL_Latin1_General_CR437_BIN collation. Restore the inventory database to the new server.

TestKing.com has a server named SQL1 that runs SQL Server 2005 Enterprise Edition.SQL1 has 2 GB of RAM, 1.6 GB of which are used by the default SQL Server database engine instance. The average data growth of all databases combined is 100 MB a month. Users state that report execution times are increasing. You want to assess whether more RAM is needed. You need to use System Monitor to create a counter log that will help you decide whether to add RAM. Which performance object should you add to the counter log?()A、MSAS 2005:CacheB、MSAS 2005:MemoryC、MSAS 2005:Proactive CachingD、SQLServer:Buffer Manager

You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a computer which hosts several applications in your company. The instance runs on the computer. A job named DiliveryList is created by you. This job requires a file to be written to a file server. But because the job cannot access the file server, it fails to run. You intend to configure the SQL Server Agent service so that only the SQL Server Agent service has read and write access to the file server. Which account type should you use? () A、You should use local Service accountB、You should use network Service accountC、You should use domain accountD、You should use local System account

TestKing.com has multiple servers in a distributed environment. You work with two SQL Server 2005 computers named SQL1 and SQL2. Each server uses SQL Server Authentication and they use different logins.You need to write a distributed query that joins the data on SQL1 with the data on SQL2. What should you do?()A、Ensure that both SQL1 and SQL2 use the same login name as the security context for each server.B、Configure SQL2 as a remote server. Write the query on SQL1.C、Configure SQL2 as a linked server to impersonate the remote login.D、Configure SQL2 as a distributed server. Use pass-through authentication.

You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named named Dworks in the instance. The Dworks database has a table named Bills which contains several indexes and a great amount of rows. An enterprise Web environment is supported by the database. Onthe Bills table 28% of the indexes have been fragmented. You have to defragment the indexes, making sure that you reduce the effect on database availability to the least.  In the ALTER INDEX statement, which option should be included?()A、Sort in tempdb B、Online C、Fill factor D、Pad index

You need to design a strategy for identifying the number of instances that any one SQL Server 2005 computer will support. What should you do?()A、Specify that each server must have one instance for each customer.B、Specify that each server must each have only one instance.C、Specify that each server must have one instance for each database that is hosted on that server.D、Specify that each server must have one instance for each customer who has one or more databases that are hosted on that server.

Application developers in your company create an assembly that contains a CLR function. This CLR function reads data from a spreadsheet, performs some calculations, and returns the data to a SQL Server 2005 computer. You need to register the assembly with SQL Server 2005 by using the CREATE ASSEMBLY statement and the least privileged security permission set.  Which permission set should you use? ()A、 Default B、 SAFE C、 EXTERNAL_ACCESS D、 UNSAFE

TestKing.com uses SQL Server 2005. Users report with increasing frequency that they receive deadlock error messages in an order processing application.   You need to monitor which objects and SQL Server session IDs are involved when deadlock conditions occur. You want information about each participant in the deadlock. What should you do?()A、Trace the Lock:Timeout event by using SQL Server Profiler.B、Observe the SQLServer:Locks - Number of Deadlocks/sec counter by using System Monitor.C、Trace the Lock:Deadlock event by using SQL Server Profiler.D、Trace the Lock:Deadlock Chain event by using SQL Server Profiler.

ou work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now for a new application, a SQL Server 2008 instance has to be installed on an existing server. The server contains a default SQL Server 2005 instance. Your company CIO wants their corresponding certified third-party applications can access to both database instances. The company assigns this task to you. You must achieve this by using as little database administrative effort as possible, and never change the existing application environments. What should you do? () A、You should install SQL Server 2008 as the default instance, and configure the new application to use the default instance B、You should upgrade the SQL Server 2005 application to use SQL Server 2008 C、You should upgrade the SQL Server 2005 instance to a SQL Server 2008 instance D、You should install SQL Server 2008 as a named instance, and make the new application use the new instance.

You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as a database administrator for your company. A SQL Server 2005 computer is managed by you, and a database named Customers is included by the SQL Server 2005 computer. A table named CustInfo is included by the database. An identity column named CustID and an nvarchar column named CustName are included by the table. According to the company requirement, rows which duplicate CustName values are included should be moved from the CustInfo table every year. However, the company requests to have rows removed from the CustInfo table after the rows have been manually examined and verified as being duplicates. Since you are the technical support, you are required to think out a method to have potential duplicate rows identified for manual examination. The minimum amount of administrative effort should be utilized.  Which action should be performed to finish the task?()A、A trigger should be created for the CustInfo table so as to roll back INSERT queries that duplicate data is included.B、A new unique index should be created on the CustName column. And then, IGNORE_DUP_KEY = ON should be specified when creating index.C、On the CustName column, a foreign key constraint should be created, and a distinct list of CustName values is referenced by the foreign key constraint.D、A SELECT INTO query should be utilized, and GROUP BY and HAVING clauses should be included by the query to create a new table that contains duplicate rows from the CustInfo table.

You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance on the same physical computer. Now users report that they are unable to connect to the named instances. You check and verify that they can only connect to the default instance. You also ensure that all SQL Server instances run normally. You have to start the service which is required to connect to the named instances.  Which service should you start?()  A、Server B、SQL Server Agent C、SQL Server Browser D、SQL Active Directory Helper

You work in a company which uses SQL Server 2008. You are the administrator of the company database. In your company there is a server which contains a default SQL Server 2005 instance. For a new application, you have to install a SQL Server 2008 instance on the server. Your company CIO assigns a task to you. You must make sure that the respective certified third-party applications have access to both database instances. You have to achieve this goal without changing the existing application environments. So what should you do to achieve this by using as little database administrative effort as possible?()A、You should install SQL Server 2008 as a named instance, and make the new application to use the new instance. B、You should install SQL Server 2008 as the default instance, and make the new application to use the default instance. C、You should upgrade the SQL Server 2005 application to use SQL Server 2008. D、You should upgrade the SQL Server 2005 instance to a SQL Server 2008 instance.

You are the administrator of a SQL Server 2005 computer named SQL1. SQL1 is a member of a Microsoft Active Directory domain. You do not have any rights or privileges to perform domain administration. However, you have been granted membership in the local Administrators group on SQL1. You perform most of the management of SQL1 from your administrative workstation. However, for security reasons, you want to track all attempts for interactive logons and network connections to SQL1. What should you do?()A、Create a Group Policy object (GPO) that is configured for success and failure auditing of the Audit account logon events setting. Ask the domain administrator to link the GPO to the object containing SQL1.B、Configure the SQL Server service on SQL1 to audit all successful and failed logon attempts.C、Edit the local security policy of SQL1. Then, configure success and failure auditing on the Audit logon events setting.D、Run the SQL Server Profiler and use a standard default template.

单选题Your company has two SQL Server 2005 computers named SQL1 and SQL2. A user in your company named Eric writes many ad hoc queries against the company databases. Eric has access to the Customer database on SQL1. He does not have access to the Sales database on SQL2. You need to ensure that Eric can write queries that join information from both servers. What should you do first?()ACreate a linked server on SQL1 to SQL2. Configure the linked server to use impersonation. BCreate a linked server on SQL1 to SQL2. Configure the linked server to use mapped logins. CInstruct Eric to write the queries on SQL2 by using the OPENQUERY statement and specifying SQL1 as the server name. DInstruct Eric to specify SQL Server object names by using four-part notation.

多选题You need to ensure that the company’s standard password policy is enforced for all logins that areused to access SQL Server 2005.Which two actions should you perform?()ASet the appropriate local password policies for all computers on which SQL Server is installed.BSet the server authentication mode of all SQL Server instances to Windows Authentication mode.CInstall all instances of SQL Server 2005 on computers that run Windows Server 2003 or later.DCreate SQL Server logins that have CHECK_POLICY enabled.

单选题You need to select the appropriate edition of SQL Server 2005 for the portable computers that are used in the Mortgage Data Cleansing project. Which edition should you use?()AMicrosoft SQL Server 2005 Mobile EditionBMicrosoft SQL Server 2005 Express EditionCMicrosoft SQL Server 2005 Standard EditionDMicrosoft SQL Server 2005 Workgroup Edition

单选题You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work a database administrator for your company. There is a Data Transformation Services (DTS) package, and the DTS package is stored in SQL Server 2000. And you plans to have the SQL Server 2000 migrated into SQL Server 2005. The DTS package dynamically configures precedence constraints by utilizing complex Microsoft Visual Basic Scripting Edition (VBScript). The SQL Server 2005 Package Migration Wizard is run by you, but the wizard cannot convert the package from SQL Server 2000 to SQL Server 2005. You are required to make sure that the DTS package runs in SQL Server 2005. And the package should be run in the shortest time.  Which action should be utilized?()AThe SQL Server 2000 Data Transformation Services (DTS) package should be wrapped in an Execute DTS 2000 Package task.BThe SQL Server 2000 Data Transformation Services (DTS) package should be manually recreated as a SQL Server Integration Services (SSIS) package.CThe SQL Server 2000 Data Transformation Services (DTS) task should be configured to not utilize precedence constraints. Then, the SQL Server 2005 Package Migration Wizard should be run again.DThe SQL Server 2005 Package Migration Wizard should be run. And when the upgrade fails, a Transfer SQL Server Objects task should be run.

单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. In your company there is a server which contains a default SQL Server 2005 instance. For a new application, you have to install a SQL Server 2008 instance on the server. Your company CIO assigns a task to you. You must make sure that the respective certified third-party applications have access to both database instances. You have to achieve this goal without changing the existing application environments. So what should you do to achieve this by using as little database administrative effort as possible?()AYou should install SQL Server 2008 as a named instance, and make the new application to use the new instance. BYou should install SQL Server 2008 as the default instance, and make the new application to use the default instance. CYou should upgrade the SQL Server 2005 application to use SQL Server 2008. DYou should upgrade the SQL Server 2005 instance to a SQL Server 2008 instance.

单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance on the same physical computer. Now users report that they are unable to connect to the named instances. You check and verify that they can only connect to the default instance. You also ensure that all SQL Server instances run normally. You have to start the service which is required to connect to the named instances.  Which service should you start?()AServer BSQL Server Agent CSQL Server Browser DSQL Active Directory Helper

单选题Application developers in your company create an assembly that contains a CLR function. This CLR function reads data from a spreadsheet, performs some calculations, and returns the data to a SQL Server 2005 computer. You need to register the assembly with SQL Server 2005 by using the CREATE ASSEMBLY statement and the least privileged security permission set.  Which permission set should you use? ()A Default B SAFE C EXTERNAL_ACCESS D UNSAFE

单选题Application developers in TestKing.com create an assembly that contains a CLR function.This CLR function reads data from a spreadsheet, performs some calculations, and returns the data to a SQL Server 2005 computer. You need to register the assembly with SQL Server 2005 by using the CREATE ASSEMBLY statement and the least privileged security permission set. Which permission set should you use?()ADefaultBSAFECEXTERNAL ACCESSDUNSAFE

单选题You are a database administrator of two SQL Server 2005 computers named SQL1 and SQL2. You have a Microsoft .NET application that has been modified so that it now accesses a database on SQL2 in addition to SQL1. You do not want the user application to connect directly to SQL2. You need to enable the data retrieval from SQL2 while maintaining the ability to assign different permissions to different users who use the .NET application. What should you do?()AChange the .NET application to define a new server connection to SQL2.BConfigure a linked server on SQL1 to point to SQL2.CConfigure a linked server on SQL2 to point to SQL1.DChange the stored procedures called by the .NET application to include the OPENXML command.

单选题ou work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now for a new application, a SQL Server 2008 instance has to be installed on an existing server. The server contains a default SQL Server 2005 instance. Your company CIO wants their corresponding certified third-party applications can access to both database instances. The company assigns this task to you. You must achieve this by using as little database administrative effort as possible, and never change the existing application environments. What should you do? ()AYou should install SQL Server 2008 as the default instance, and configure the new application to use the default instance BYou should upgrade the SQL Server 2005 application to use SQL Server 2008 CYou should upgrade the SQL Server 2005 instance to a SQL Server 2008 instance DYou should install SQL Server 2008 as a named instance, and make the new application use the new instance.

单选题You need to design the consolidation plan for SQL1, SQL2, and SQL3. You need to identify the appropriate combination of SQL Server instances and SQL Server 2005 computers that are needed to fulfill the company’s consolidation plans and security requirements.Which combination should you use?()Aone SQL Server 2005 computer with one instanceBtwo SQL Server 2005 computers, each with two instancesCtwo SQL Server computers, one with one instance and one with three instancesDone SQL Server 2005 computer with two instances

单选题You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as a database administrator for your company. A SQL Server 2005 computer is managed by you, and a database named Customers is included by the SQL Server 2005 computer. A table named CustInfo is included by the database. An identity column named CustID and an nvarchar column named CustName are included by the table. According to the company requirement, rows which duplicate CustName values are included should be moved from the CustInfo table every year. However, the company requests to have rows removed from the CustInfo table after the rows have been manually examined and verified as being duplicates. Since you are the technical support, you are required to think out a method to have potential duplicate rows identified for manual examination. The minimum amount of administrative effort should be utilized.  Which action should be performed to finish the task?()AA trigger should be created for the CustInfo table so as to roll back INSERT queries that duplicate data is included.BA new unique index should be created on the CustName column. And then, IGNORE_DUP_KEY = ON should be specified when creating index.COn the CustName column, a foreign key constraint should be created, and a distinct list of CustName values is referenced by the foreign key constraint.DA SELECT INTO query should be utilized, and GROUP BY and HAVING clauses should be included by the query to create a new table that contains duplicate rows from the CustInfo table.

单选题TestKing.com has two SQL Server 2005 computers named SQL1 and SQL2. A user in TestKing.com named Eric writes many ad hoc queries against the company databases.Eric has access to the Customer database on SQL1. He does not have access to the Sales database on SQL2. You need to ensure that Eric can write queries that join information from both servers. What should you do first?()ACreate a linked server on SQL1 to SQL2. Configure the linked server to use impersonation.BCreate a linked server on SQL1 to SQL2. Configure the linked server to use mapped logins.CInstruct Eric to write the queries on SQL2 by using the OPENQUERY statement and specifying SQL1 as the server name.DInstruct Eric to specify SQL Server object names by using four-part notation.