Your application must access data that is located on two SQL Server 2005 computers. One of these servers is named SQL1 and the other is SQL2. You have permissions to create a stored procedure on SQL1 to support your application. However,on SQL2 you only 

题目

Your application must access data that is located on two SQL Server 2005 computers. One of these servers is named SQL1 and the other is SQL2. You have permissions to create a stored procedure on SQL1 to support your application. However,on SQL2 you only have permissions to select data. You write the stored procedure on SQL1. The stored procedure accesses SQL2 by using the OPENQUERY Transact-SQL statement. However,the query fails when executed.You need to troubleshoot the cause of the error. What should you do?()

  • A、Join the two servers by using the four-part syntax of server.database.schema.table.
  • B、Reference SQL2 by using an alias.
  • C、Add SQL2 as a remote server to SQL1.
  • D、Add SQL2 as a linked server to SQL1.

相似考题
参考答案和解析
正确答案:D
更多“Your application must”相关问题
  • 第1题:

    You want to create a filter for your web application and your filter will implement javax.servlet.Filter. Which two statements are true?()

    • A、Your filter class must implement an init method and a destroy method.
    • B、Your filter class must also implement javax.servlet.FilterChain.
    • C、When your filter chains to the next filter, it should pass the same arguments it received in its doFiltermethod.
    • D、The method that your filter invokes on the object it received that implements javax.servlet.FilterChaincan invoke either another filter or a servlet.
    • E、Your filter class must implement a doFilter method that takes, among other things, anHTTPServletRequest object and an HTTPServletResponse object.

    正确答案:A,D

  • 第2题:

    You are 1 of 75 consultants employed by an IT services company named Contoso.com. As part of your job,you and other team members provide network support for over 150 businesses in your city. Your company is about to implement a business process in which consultants must connect to an application server on the Contoso.com network while working at customer premises. When connected tothe application server, consultants provide critical information about each assignment in the field. Toconnect to the Contoso.com application server, consultants are expected to use Remote DesktopConnection on customer computers running Windows XP or Windows Vista. You have been asked todetermine whether your company needs to purchase client access licenses (CALs) for Terminal Services. Which of the following options best suits the needs of your organization?()

    • A、Use Remote Desktop for Administration on the application server, and purchase per user CALs.
    • B、Use Remote Desktop for Administration on the application server, but do not purchase any CALs.
    • C、Install Terminal Services on the application server, and purchase per device CALs.
    • D、Install Terminal Services on the application server, and purchase per user CALs.

    正确答案:D

  • 第3题:

    Your network has client computers that run Windows XP.  All users access a custom line-of- business application.   The line-of-business application is not compatible with Windows 7. You are planning to deploy Windows 7.   You have the following requirements:   The application must run on all client computers.   The application executable must reside on each client computer.    You need to manage application compatibility to meet the requirements.   What should you do?()

    • A、Install the application on a Remote Desktop Services server.
    • B、Install a shim for the application on each client computer.
    • C、Install the Windows Compatibility Evaluator on each client computer.
    • D、Virtualize the application by using Microsoft Application Virtualization (App-V).

    正确答案:B

  • 第4题:

    单选题
    You create a multiple form application- Which built-in must you use to invoke the form modules to enable you to programmatically control navigation between the multiple forms in your application?()
    A

    NEW_FORM 

    B

    OPEN_FORM 

    C

    CALL_FORM 

    D

    CLOSE_FORM


    正确答案: D
    解析: 暂无解析

  • 第5题:

    单选题
    You are developing a Web application. Your code restricts access to some pages based on the users credentials. You need to configure IIS to supply the user's Windows credentials to your Web application. These credentials must be encrypted. What should you do? ()
    A

    Enable Anonymous access. Enable Integrated Windows authentication.

    B

    Enable Anonymous access. Enable Basic authentication.

    C

    Disable Anonymous access. Enable Integrated Windows authentication.

    D

    Disable Anonymous access. Enable Basic authentication.


    正确答案: A
    解析: 暂无解析

  • 第6题:

    单选题
    Your company has 1,000 client computers.  You are planning to deploy Windows 7 and a new line-of-business application.   You have the following requirements:   Install the application as part of the standard Windows 7 deployment. Use a single Windows 7 image for the deployment.  The application must be available for use on client computers that are not connected to the network.   You need to ensure that the application is installed on all new client computers.   What should you do?()
    A

    Publish the application by using Group Policy Software Installation.

    B

    Deploy the application by using Windows Server Update Services (WSUS).

    C

    Service an online image of Windows 7 to add the new application.

    D

    Service an offline image of Windows 7 to add the new application.


    正确答案: A
    解析: 暂无解析

  • 第7题:

    多选题
    You want to create a valid directory structure for your Java EE web application, and your application usestag files and a JAR file. Which three must be located directly in your WEB-INF directory(NOT in asubdirectory of WEB-INF)?()
    A

    The JAR file

    B

    A directory called lib

    C

    A directory called tags

    D

    A directory called TLDs

    E

    A directory called classes

    F

    A directory called META-INF


    正确答案: F,D
    解析: 暂无解析

  • 第8题:

    单选题
    Your network contains an Active Directory forest. The functional level of the forest is Windows Server  2008 R2.   Your companys corporate security policy states that the password for each user account must be  changed at least every 45 days.   You have a user account named Service1. Service1 is used by a network application named Application1.   Every 45 days, Application1 fails.   After resetting the password for Service1, Application1 runs properly.   You need to resolve the issue that causes Application1 to fail. The solution must adhere to the corporate  security policy.   What should you do()
    A

    Run the Set-ADAccountControl cmdlet.

    B

    Run the Set-ADServiceAccount cmdlet.

    C

    Create a new password policy.

    D

    Create a new Password Settings object (PSO).


    正确答案: D
    解析: 暂无解析

  • 第9题:

    单选题
    You are creating an online catalog application that will display product information on the company Web site. The product data is stored in a SQL Server 2005 database. The data is stored as relational data but must be passed to the application as an XML document by using FOR XML. You test your application and notice that not all of the items matching your query appear in the XML document. Only those products that have values for all elements in the schema appear.   You need to modify your Transact-SQL statement so that all products matching your query appear in the XML document. What should you do?()
    A

    Add an XML index to the table that contains the product data.

    B

    Add the XSINIL argument to the ELEMENTS directive in the query.

    C

    Add a HAVING clause to the query.

    D

    Add the replace value of clause to the query.


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    A customer needs to ensure that the number of threads servicing an application does not exceed the number of database connections available to the application. What step must you take to address this situation?()
    A

    Configure a Max Threads Constraint and add your application to the list of applications for the  Constraint.

    B

    Configure a Work Manager with a Maximum Threads Constraint tied to the Connection Pool and  configuration your application to use the Work Manager.

    C

    Configure a Work Manager with a Minimum Threads Constraint tied to the Connection Pool and  configure your application to use the Work Manager.

    D

    Configure a global MaxThreads constraint and target it to the server or clusters where your  application is deployed.

    E

    Configure the startup parameter -Dwls-maxThreads to be the same as the number of  database connections configured.


    正确答案: B
    解析: 暂无解析

  • 第11题:

    You recently installed an application on your computer. The application is configured to automatically start. This application might cause your computer to run slower.  You need to prevent the application from auto starting without uninstalling the application.  What should you do?()

    • A、Use the Microsoft Windows Task Manager application to end the task for the application.
    • B、Use the Control Panel application to uninstall the application. Reboot the computer.
    • C、Use the Software Explorer application to disable the application. Reboot the computer.
    • D、Use the Services application to disable the Application Experience service, and then launch the application.

    正确答案:C

  • 第12题:

    You create a large, n-tier Web application that has a custom event tracking system. You need to create a custom event type that enables your event tracking system to record all relevant event details for all types of events. The events must be stored in Microsoft SQL Server. From which base type should your custom event type inherit? ()

    • A、IWebEventCustomEvaluator
    • B、WebEventProvider
    • C、WebBaseEvent
    • D、WebAuditEvent

    正确答案:C

  • 第13题:

    Your network consists of a single Active Directory domain. All domain controllers run Windows Server 2008 R2. All client computers run Windows 7. All user accounts are stored in an organizational unit (OU) named Staff. All client computer accounts are stored in an OU named Clients.  You plan to deploy a new application. You need to ensure that the application deployment meets the following requirements: èUsers must access the application from an icon on the Start menu. èThe application must be available to remote users when they are offline. What should you do?()

    • A、Publish the application to users in the Staff OU.
    • B、Publish the application to users in the Clients OU.
    • C、Assign the application to computers in the Staff OU.
    • D、Assign the application to computers in the Clients OU.

    正确答案:D

  • 第14题:

    单选题
    Your network contains an Active Directory domain. You have a server that runs Windows Server 2008 R2 and has the Remote Desktop Services server role enabled. All client computers run Windows 7. You need to plan the deployment of a new line-of-business application to all client computers. The  deployment must meet the following requirements:   èUsers must access the application from an icon on their desktops.   èUsers must have access to the application when they are not connected to the network. What should you do?()
    A

    Publish the application as a RemoteApp.

    B

    Publish the application by using Remote Desktop Web Access (RD Web Access).

    C

    Assign the application to the Remote Desktop Services server by using a Group Policy object (GPO).

    D

    Assign the application to all client computers by using a Group Policy object (GPO).


    正确答案: A
    解析: 暂无解析

  • 第15题:

    多选题
    Which two about WAR files are true?()
    A

    WAR files must be located in the web application library directory.

    B

    WAR files must contain the web application deployment descriptor.

    C

    WAR files must be created by using archive tools designed specifically for that purpose.

    D

    The web container must serve the content of any META-INF directory located in a WAR file.

    E

    The web container must allow access to resources in JARs in the web application library directory.


    正确答案: E,D
    解析: 暂无解析

  • 第16题:

    单选题
    Your virtual environment includes Windows Server 2008 R2 Hyper-V servers. The test and development teams are developing a distributed application. The application requires a domain controller, a server that runs Microsoft SQL Server, an application server, and a client computer. The application uses pass-through authentication. You need to ensure that at the time of a failure, the test team can reproduce the error and provide the application in the state in which it existed when the error occurred to the development team for continued analysis. You must achieve this goal while minimizing storage requirements.    What should you do?()
    A

    Snapshot and export all servers

    B

    Snapshot and export only the application server

    C

    Snapshot the application server, and back up the SQL Server database

    D

    Snapshot and export only the domain controller and the client computer


    正确答案: A
    解析: 暂无解析

  • 第17题:

    单选题
    Your company has a main office in New York and branch offices in Chicago and Los Angeles. You plan to use Microsoft Application Virtualization (App-V) 4.5 with SP1.  You install an Application Virtualization Management Server in the New York office. You need to provide application virtualization with active upgrade support in the Chicago and Los Angeles offices. You must design your App-V solution so that it minimizes WAN traffic.  What should you do?()
    A

    Install Application Virtualization Streaming Servers in the Chicago and Los Angeles offices

    B

    Install Application Virtualization Management Servers in the Chicago and Los Angeles offices

    C

    Install the Application Virtualization /CONTENT folder on file shares in the Chicago and Los Angeles offices

    D

    Install the Application Virtualization /CONTENT folder on IIS 7 servers in the Chicago and Los Angeles offices


    正确答案: B
    解析: 暂无解析

  • 第18题:

    多选题
    You want to create a filter for your web application and your filter will implement javax.servlet.Filter. Which two statements are true?()
    A

    Your filter class must implement an init method and a destroy method.

    B

    Your filter class must also implement javax.servlet.FilterChain.

    C

    When your filter chains to the next filter, it should pass the same arguments it received in its doFiltermethod.

    D

    The method that your filter invokes on the object it received that implements javax.servlet.FilterChaincan invoke either another filter or a servlet.

    E

    Your filter class must implement a doFilter method that takes, among other things, anHTTPServletRequest object and an HTTPServletResponse object.


    正确答案: C,B
    解析: 暂无解析

  • 第19题:

    单选题
    Your network consists of a single Active Directory domain. Your network contains 10 servers and 500 client computers. All domain controllers run Windows Server 2008 R2. A Windows Server 2008 R2 server  has Remote Desktop Services installed. All client computers run Windows XP Service Pack 3.  Youplan to deploy a new line-of-business application. The application requires desktop themes to be  enabled.   You need to recommend a deployment strategy that meets the following requirements: èOnly authorized users must be allowed to access the application.   èAuthorized users must be able to access the application from any client computer. èYour strategy must minimize changes to the client computers.  èYour strategy must minimize software costs. What should you recommend?()
    A

    Migrate all client computers to Windows 7. Deploy the application to all client computers by using a Group Policy object (GPO).

    B

    Migrate all client computers to Windows 7. Deploy the application to the authorized users by using a Group Policy object (GPO).

    C

    Deploy the Remote Desktop Connection (RDC) 7.0 software to the client computers. Install the  application on the Remote Desktop Services server. Implement Remote Desktop Connection Broker (RD Connection Broker).

    D

    Deploy the Remote Desktop Connection (RDC) 7.0 software to the client computers. Enable the  Desktop Experience feature on the Remote Desktop Services server. Install the application on the  Remote Desktop Services server.


    正确答案: D
    解析: 暂无解析

  • 第20题:

    单选题
    Your company’s network has client computers that run Windows 7.   A software vendor releases version 2 of an application that your company uses.  Your company currently uses version 1.  Version 1 and version 2 are not compatible. You plan to deploy version 2 of the application.   You have the following requirements:Users must be able to run both versions of the application on their computers.   Version 2 must be available when a client computer is not connected to the network.  You need to plan a software deployment process that meets the requirements.   What should you do?()
    A

     Deploy version 2 of the application by using Microsoft Application Virtualization (App-V). 

    B

     Deploy version 2 of the application as a Remote Desktop Services RemoteApp.

    C

     Deploy version 2 of the application by using a Group Policy Software Installation policy.

    D

     Deploy version 2 of the application by using a Microsoft System Center Configuration Manager package.


    正确答案: A
    解析: 暂无解析