Bissoy
Login
Get Advice on Live Video Call
Earn $ Cash $ with
consultations on Bissoy App
In an enterprise-class database system, business users interact directly with database applications, which directly access the database data.
A
True
B
False
Correct Answer:
In an Enterprise-class database system, business users interact directly with database applications that interact with the DBMS, which directly accesses the database data.
A
True
B
False
A Windows 2000 Server computer named server2 runs numerous 32bit applications and two 16bit applications. Users start the 16bit applications by running APP1.EXE for one application and APP2.EXE for another application. The 16bit applications are configured to run in the separate memory space. You want to create a performance base like chart in the system monitor for all the applications on server2. You add all of 32bit applications and now you want to add two 16bit applications. What should you do?
A
Add the APP1 and APP2 instances to the processor time counter for the process object
B
Add the NTVDM, APP1 and APP2 instances for the processor time counter for the process object
C
Add only the NTVDM instance for the percent processor time counter for the process object
D
Add the NTVDM 1 and NTVDM #2 instances for processor time counter for the process object
E
None of above
Which of the following is not an agreement in restraint of trade?
1. A sells the goodwill of his business with an agreement not to carry on a similar business within specified local limits, so long as the buyer carries on a similar business.
2. A sells the goodwill of his business with an agreement not to carry on a similar business within India, so long as the buyer carries on a similar business.
3. A sells the goodwill of his business with an agreement not to practice the same trade for 25 years.
4. A sells the goodwill of his business with an agreement not to engage in any business competing or liable to compete in any way with the business for the time being carried on by the buyer.
A
1, 3 and 4
B
2, 3 and 4
C
3 and 4
D
1 and 3
You are the administrator of a Windows 2000 Server computer named Intra. Intra is a member of an Active Directory domain and hosts an Intranet Web-Ske for your company. Company policy requires that only authenticated users have access to the intranet site. All company users have a user account in the Active Directory domain. You configure directory security for the Web Site to use integrated security. However, you discover that users can access the Web Site without authentication. You need to ensure that only authenticated users can access the web site. What should you do?
A
Install Active Directory on the server
B
Select Basic Authentication check box
C
Clear the Allow Anonymous Connection check box
D
Disable the IUSE_inta user account on Intra
E
Clear the Allow IIS to Control Password check box
You develop an enterprise application, called XYZApplication that includes a Windows Form presentation layer, middle-tier components for business logic and data access, and a Microsoft SQL Server database.
You are in the process of creating a middle-tier component that will execute the data access routines in your application. When data is passed to this component, the component will call several SQL Server stored procedures to perform database updates. All of these procedure calls run under the control of a single transaction.
The code for the middle-tier component will implement the following objects:
SqlConnection cn = new SqlConnection();
SqlTransaction tr;
If two users try to update the same data concurrently, inconsistencies such as phantom reads will occur. You must now add code to your component to specify the highest possible level of protection against such inconsistencies.
Which code segment should you use?
A
tr = cn.BeginTransaction(?ReadCommitted?);
B
tr = cn.BeginTransaction(IsolationLevel.ReadCommitted);
C
tr = cn.BeginTransaction(IsolationLevel.Serializable);
D
tr = cn.BeginTransaction(?Serializable?);
Which of the following statements are true?
Statement I Big data refers to no precise quantity, but generally refers to data in the range of Petabytes and Exabyte, i.e. billions to trillions of records, all from various sources. Big data is generated much faster. than traditional data in much larger quantities.
Statement II Big data interests industries because they are able to learn more patterns and curious variances than smaller data sets, with the capability to provide valuable insights into consumer behaviour, weather systems, financial market activity, or other phenomena.
Statement III Various departments and product lines use various applications within most organisations and store data in separate datasets. These separate databases may contain similar data, but data from one data base to another is not always consistent. This is called data silo.
A
Both statements I and II
B
Both statements II and III
C
Both statements I and III
D
All of the above
You are the administrator of the Windows 2000 Server network shown in the exhibit. Users in the Research group and the Executive group have permission to access the Internet through a Windows 2000 Server computer running Microsoft Proxy Server. These users must enter their proxy server user names and passwords to connect to the proxy server, to the Internet, and to your local intranet server. The users who do not access the Internet do not have user accounts on the proxy server and, therefore, cannot connect to the intranet server. You want all users to be able to connect to the intranet server without entering a separate user name and password. What should you do?
A
Move the intranet server to the client segment of the network
B
Move the proxy server to the server segment of the network
C
Configure each client computer to bypass the proxy server for local addresses
D
Configure each client computer to use port 81 for the proxy server
E
None of above
Five Lakes Publishing has a Windows 2000 network serving 200 users. A server named User_srv is used to hold users' files. User_srv is configured with a single, large NTFS volume. Every user has a home folder on User_srv. Users can also use a shared folder named IN_PROGRESS to store files for books that are being prepared. The network administrator at Five Lakes Publishing configured disk quotas for the NTFS volume on User_srv. All users have a default limit of 100 MB, and the option to deny space to users who exceed their limit has been enabled. When a user named Amy Jones attempts to save a chapter of a new book to her home folder on the server, she receives the following error message: "The disk is full or too many files are open." What should Amy do to allow this document to be saved?
A
Compress the files in her home folder to save disk space
B
Change the security setting of some of the files in her home folder to grant Full Control permission to a user who has not reached the quota level
C
Move some of the files from her home folder to the IN_PROGRESS shared folder
D
Remove files from her home folder until the total uncompressed file size is less than 100 MB
E
None of above
You are the administrator of a SQL Server 2000 computer. The server contains a database named FinanceData that is used by a client/server application. Each employee has a SQL Server login that the application uses to access the server.Your company hires a new employee named Andrew. You create a SQL Server login named Andrew. You also create a database user named Andrew in the database and grant the database user full permissions in the database.Whenever Andrew runs the client/server application, he receives the following error message: "Invalid object name." Andrew also reports that he cannot access the database by using the application.You need to ensure that Andrew can use the application. Which Transact-SQL statement should you execute?
A
EXEC sp_defaultdb 'Andrew','FinanceData'
B
GRANT ALL ON FinanceData TO Andrew
C
EXEC sp_addlogin 'Andrew'
D
EXEC sp_grantdbaccess 'FinanceData','Andrew'GOsp_addrolemember 'db_datareader','Andrew'
You use Visual Studio .NET to create a Windows-based application. The application includes a form named XYZProcedures (EXP). EXP allows users to enter very lengthy text into a database. When users click the Print button located on EXP, this text must be printed by the default printer. You implement the printing functionality by using the native .NET System Class Libraries with all default settings. Users report that only the first page of the text is being printed. How should you correct this problem?
A
In the BeginPrint event, set the HasMorePages property of the PrintEventArgs object to True.
B
In the EndPrint event, set the HasMorePages property of the PrintEventArgs object to True.
C
In the PrintPage event, set the HasMorePages property of the PrintPageEventArgs object to True.
D
In the QueryPageSettings event, set the HasMorePages property of the QueryPageSettingEventArgs object to True.