不凡考网

You are the administrator of a SQL Server 2000 computer. One

  • 下载次数:
  • 支持语言:
  • 1193
  • 中文简体
  • 文件类型:
  • 支持平台:
  • pdf文档
  • PC/手机
  • 【名词&注释】

    正确答案:D。A.The customer service manager discovers that some customer complaints are marked as closed before they are resolved to the customer’s satisfaction. B.You need to notify the customer service manager whenever a complaint is marked as closed. You do not want to make any changes to the client applications. C.What should you do? D.Create an UPDATE trigger that sends an e-mail message. E.Create a stored procedure that sends an e-mail message. Use the stored procedures to make changes to the data. F.Create a user-defined function that sends an e-mail message. Use the function to make changes to the data. G.Create a rule that validates data entry. Bind the rule to the CompliantClosed column. 更多微软认证的考试资料下载及答案解析请访问不凡考网计算机类考试考试频道。

  • [单选题]You are the administrator of a SQL Server 2000 computer. One of the databases on the server contains a table named complaints. This table is used to store information about customer complaints.The customer service representatives in your company add and edit the information in the complaints table. They work with this table by using a number of client applications, including a web-based application and a Microsoft Windows 32-bit application.

  • A. The customer service manager discovers that some customer complaints are marked as closed before they are resolved to the customer’s satisfaction.
    B. You need to notify the customer service manager whenever a complaint is marked as closed. You do not want to make any changes to the client applications.
    C. What should you do?
    D. Create an UPDATE trigger that sends an e-mail message.
    E. Create a stored procedure that sends an e-mail message. Use the stored procedures to make changes to the data.
    F. Create a user-defined function that sends an e-mail message. Use the function to make changes to the data.
    G. Create a rule that validates data entry. Bind the rule to the CompliantClosed column.

  • 查看答案&解析
  • 举一反三:
  • [单选题]You are configuring 5 computers to use both Windows NT workstation 4.0 and Windows 2000 Professional. Each computer has an 8GB hard disk. You configure that hard disk on each computer to have two 4GB partitions. Windows NT workstation is installed on drive C. Windows 2000 Professional is installed on drive D. In Windows 2000 Professional you configure a disk quota on drive D to prevent users from saving work files on the disk. You restart the computer and load Windows NT workstation.You notice that users can still save files to drive D.
  • A. You want to prevent users from saving files to drive D in either operating system. You also want to ensure that users can access both drives using either operating system. What should you do on each computer?
    B. Use Windows 2000 Professional to configure drive D as a dynamic volume.
    C. Use Windows 2000 Professional to enable Encrypting File System (EFS) on drive D.
    D. Use Windows NT workstation to configure NTFS permission on drive D to deny the users write permission.
    E. Reinstall Windows NT workstation after configuring the disk code task.

  • [单选题]You want to upgrade 400 computers from Windows 95 to Windows 2000 Professional. Most of the computers in your company use the same hardware. However, several different peripheral devices are used throughout the company.You want to verify that the hardware in use is compatible with Windows 2000 Professional. You want to accomplish this with least amount of administrative effort.
  • A. What should you do?
    B. Create several different computer configurations. Install Windows 2000 Professional and enable driver signing.
    C. Create a bootable floppy disk that contains and automatically runsWinNT32.exe/CheckUpgradeOnlyQ. Send the floppy disk to each user on the network.
    D. Copy the contents of Windows 2000 Professional CD-ROM to a network share. From the network, modify your network logon scripts to runWinNT32.exe/Unattended:ReportOnly.
    E. Use Setup Manager to create a Setup.inf file. Add the entryReportOnly=Yes to the [Win9xUpg] section of the answer file. RunWinnt32.exe /Unattended:Setup.infon all of the different computer configurations.

  • [单选题]You are upgrading a computer from Windows 98 to Windows 2000 Professional. The computer is a 400-Mhz Pentium III, and has 128 MB of RAM and a 10-GB hard disk. You are performing the installation by using the Windows 2000 Professional CD-ROM. After the text mode installation portion is complete, you restart the computer. The BIOS virus checker on your computer indicates you're your computer is infected with a Master Boot Record virus.What should you do before you continue the installation?
  • A. Remove the virus checker in Windows 98.
    B. Disable the BIOS virus checker and restart the computer.
    C. Run Fixmbr.Exe from the Windows 2000 Professional CD-ROM.
    D. Modify the Boot.ini file to include a signature parameter on the ARC path of the system partition.

  • [多选题]You are the administrator of several SQL Server 2000 computers. A data Transformation Services (DTS) package uses native OLE DB providers to transfer data between the servers. Connection details for the servers are specified in .udl files. The .udl files are frequently updated as connection details change.You want to distribute the DTS package as a file to developers in your company. You want to make sure connection details are available to developers who receive the DTS package.
  • A. Which two tasks should you perform? (Each correct answer presents part of the solution. Choose two)
    B. Enable the Always read properties from UDL file option in the Connection Properties dialog box.
    C. Disable the Always read properties from UDL file option in the Connection Properties dialog box.
    D. Delete the .udl files and store connection details in the registry by using system data source names.
    E. Delete the .udl files, and store connection details in the registry by using user data source names.
    F. Make the .udl files available on a network share.

  • [单选题]You are upgrading computer1 and computer2 from Windows NT Workstation 4.0 to Windows 2000 Professional. You successfully upgrade computer1. During the upgrade of computer2, a series of power outages interrupts the upgrade.You discover that the upgrade of computer2 is incomplete. Furthermore, you find that computer2 can no longer run Windows NT workstation 4.0. Computer2 does not support booting from the Windows 2000 Professional CD-ROM. You decide to use computer1 to help recover the failed upgrade.
  • A. What should you do?
    B. On computer1, copy the CD-ROM driver and system files named ntdetect, ntbootdd.sys, Ntdll.dll and Setupldr.bin to a formatted floppy disk. On computer2, restart the computer by using the floppy disk. Then run WinNT32/debug from the Windows 2000 Professional CD-ROM.
    C. From computer1, copy the CD-ROM driver and system files named Ntdetect, Ntbootdd.sys, Ntdll.dll, and Setupldr.bin to a formatted floppy disk. On the computer2, restart the upgrade by using the floppy disk. Then run WinNT32/rx from the Windows 2000 Professional CD-ROM.
    D. On the computer1, run Makebt32.exe from the Bootdisk folder on the Windows 2000 Professional CD-ROM. On computer2, restart the upgrade by using the newly created floppy disks.
    E. On computer1, perform. a remote installation from a network share. On computer2, when the text portion of setup has completed, resume the installation by using the Setup Manager.

  • [单选题]You are the network administrator for Ezonexam.Your Windows 2000 Server computer named Ezonexam1 contains two 36-GB hard disks. Disk 0 and Disk 1. Each disk is configured as a basic disc and has a single 36-GB NTFS partition. Both partitions are backed up to a tape each night. The partition on Disk 1 stores user data. Most users at Ezonexam encrypt their files. Disk 1 fails. You replace it with a new hard disk and create a single NTFS partition.
  • A. You need to recover the data as quickly as possible while maintaining the security of the files on Disk 1.
    B. What should you do?
    C. Restore the contents of Disk 1 from the most recent tape backup to a second file server. Instruct users to copy their files from the second file server to the new partition.
    D. Restore the contents of Disk 1 from the most recent tape backup to a second file server. Log on to Ezonexam1 console as a recovery agent. Copy the files from the second file server to the new partition.
    E. Restore the contents of Disk 1 from the most recent tape backup to the new partition on Ezonexam1. Instruct the users to verify the integrity of their files.
    F. Restore the contents of Disk 1 from the most recent tape backup to the new partition on Ezonexam1. Run the cipher command to decrypt the files.

  • 本文链接:https://www.zhukaozhuanjia.com/download/j789gv.html
  • 推荐阅读
    @2019-2026 不凡考网 www.zhukaozhuanjia.com 蜀ICP备20012290号-2