Bissoy
Login
Get Advice on Live Video Call
Earn $ Cash $ with
consultations on Bissoy App
In an Enterprise-class database system, business users interact directly with database applications that interact with the DBMS, which directly accesses the database data.
A
True
B
False
Correct Answer:
True
In an enterprise-class database system, business users interact directly with database applications, which directly access the database data.
A
True
B
False
A Windows 2000 Server computer named server2 runs numerous 32bit applications and two 16bit applications. Users start the 16bit applications by running APP1.EXE for one application and APP2.EXE for another application. The 16bit applications are configured to run in the separate memory space. You want to create a performance base like chart in the system monitor for all the applications on server2. You add all of 32bit applications and now you want to add two 16bit applications. What should you do?
A
Add the APP1 and APP2 instances to the processor time counter for the process object
B
Add the NTVDM, APP1 and APP2 instances for the processor time counter for the process object
C
Add only the NTVDM instance for the percent processor time counter for the process object
D
Add the NTVDM 1 and NTVDM #2 instances for processor time counter for the process object
E
None of above
Which of the following is not an agreement in restraint of trade?
1. A sells the goodwill of his business with an agreement not to carry on a similar business within specified local limits, so long as the buyer carries on a similar business.
2. A sells the goodwill of his business with an agreement not to carry on a similar business within India, so long as the buyer carries on a similar business.
3. A sells the goodwill of his business with an agreement not to practice the same trade for 25 years.
4. A sells the goodwill of his business with an agreement not to engage in any business competing or liable to compete in any way with the business for the time being carried on by the buyer.
A
1, 3 and 4
B
2, 3 and 4
C
3 and 4
D
1 and 3
The three language components of a database management system (DBMS) like DDL, DCL, DML. Two different types of people (users and practitioners) are concerned with them. Which of them do users of a DBMS usually deal with?
A
DDL
B
DML
C
DDL and DCL
D
DCL and DML
Which of the following statements are true?
Statement I Big data refers to no precise quantity, but generally refers to data in the range of Petabytes and Exabyte, i.e. billions to trillions of records, all from various sources. Big data is generated much faster. than traditional data in much larger quantities.
Statement II Big data interests industries because they are able to learn more patterns and curious variances than smaller data sets, with the capability to provide valuable insights into consumer behaviour, weather systems, financial market activity, or other phenomena.
Statement III Various departments and product lines use various applications within most organisations and store data in separate datasets. These separate databases may contain similar data, but data from one data base to another is not always consistent. This is called data silo.
A
Both statements I and II
B
Both statements II and III
C
Both statements I and III
D
All of the above
Five Lakes Publishing has a Windows 2000 network serving 200 users. A server named User_srv is used to hold users' files. User_srv is configured with a single, large NTFS volume. Every user has a home folder on User_srv. Users can also use a shared folder named IN_PROGRESS to store files for books that are being prepared. The network administrator at Five Lakes Publishing configured disk quotas for the NTFS volume on User_srv. All users have a default limit of 100 MB, and the option to deny space to users who exceed their limit has been enabled. When a user named Amy Jones attempts to save a chapter of a new book to her home folder on the server, she receives the following error message: "The disk is full or too many files are open." What should Amy do to allow this document to be saved?
A
Compress the files in her home folder to save disk space
B
Change the security setting of some of the files in her home folder to grant Full Control permission to a user who has not reached the quota level
C
Move some of the files from her home folder to the IN_PROGRESS shared folder
D
Remove files from her home folder until the total uncompressed file size is less than 100 MB
E
None of above
You are a Web developer for XYZ. You create an ASP.NET application that accesses sales and marketing data. The data is stored in a Microsoft SQL Server 2000 database on a server named XYZ01.
The company purchases a factory automation software application. The application is installed on XYZ01, where it creates a second instance of SQL Server 2000 named Factory and a database named FactoryDB. You connect to FactoryDB by using Windows Integrated authentication.
You want to add a page to your ASP.NET application to display inventory data from FactoryDB. You use a SqlConnection object to connect to the database. You need to create a connection string to FactoryDB in the instance of SQL Server named Factory on XYZ01. Which string should you use?
A
?Server=XYZ01;Data Source=Factory; Initial Catalog=FactoryDB;Integrated Security=SSPI?
B
?Server=XYZ01;Data Source=Factory; Database=FactoryDB;Integrated Security=SSP1?
C
?Data Source=XYZ01\\Factory; Initial Category=Factory; Integrated Security=SSP1?
D
?Data Source=XYZ01\\Factory; Database=FactoryDB; Integrated Security=SSP1?
You develop an enterprise application, called XYZApplication that includes a Windows Form presentation layer, middle-tier components for business logic and data access, and a Microsoft SQL Server database.
You are in the process of creating a middle-tier component that will execute the data access routines in your application. When data is passed to this component, the component will call several SQL Server stored procedures to perform database updates. All of these procedure calls run under the control of a single transaction.
The code for the middle-tier component will implement the following objects:
SqlConnection cn = new SqlConnection();
SqlTransaction tr;
If two users try to update the same data concurrently, inconsistencies such as phantom reads will occur. You must now add code to your component to specify the highest possible level of protection against such inconsistencies.
Which code segment should you use?
A
tr = cn.BeginTransaction(?ReadCommitted?);
B
tr = cn.BeginTransaction(IsolationLevel.ReadCommitted);
C
tr = cn.BeginTransaction(IsolationLevel.Serializable);
D
tr = cn.BeginTransaction(?Serializable?);
You are the administrator of the Windows 2000 Server network shown in the exhibit. Users in the Research group and the Executive group have permission to access the Internet through a Windows 2000 Server computer running Microsoft Proxy Server. These users must enter their proxy server user names and passwords to connect to the proxy server, to the Internet, and to your local intranet server. The users who do not access the Internet do not have user accounts on the proxy server and, therefore, cannot connect to the intranet server. You want all users to be able to connect to the intranet server without entering a separate user name and password. What should you do?
A
Move the intranet server to the client segment of the network
B
Move the proxy server to the server segment of the network
C
Configure each client computer to bypass the proxy server for local addresses
D
Configure each client computer to use port 81 for the proxy server
E
None of above
You are the administrator of a Windows 2000 Server computer named Intra. Intra is a member of an Active Directory domain and hosts an Intranet Web-Ske for your company. Company policy requires that only authenticated users have access to the intranet site. All company users have a user account in the Active Directory domain. You configure directory security for the Web Site to use integrated security. However, you discover that users can access the Web Site without authentication. You need to ensure that only authenticated users can access the web site. What should you do?
A
Install Active Directory on the server
B
Select Basic Authentication check box
C
Clear the Allow Anonymous Connection check box
D
Disable the IUSE_inta user account on Intra
E
Clear the Allow IIS to Control Password check box