多选题You are creating a custom user control. The custom user control will be used on 10 Web Forms for an ASP.NET Web site that allows users to register and log on to a personalized experience. The custom user control uses two TextBox controls and two Button

题目
多选题
You are creating a custom user control. The custom user control will be used on 10 Web Forms for an ASP.NET Web site that allows users to register and log on to a personalized experience. The custom user control uses two TextBox controls and two Button controls. You need to ensure that the controls are visible only when users are not logged on to the Web site. You also need to minimize the amount of effort in development and maintenance for the Web site. Which two actions should you perform?()
A

Add the OnClick event handler for the Login button to the code used in the custom user control.

B

Add the OnClick event handler for the Login button to the code used in the Web Form where the control is added.

C

In the Page_Load method of the Web Form, add a code segment to set the visibility of the TextBox and Button controls where the control is added.

D

In the Page_Load method of the custom user control, add a code segment to set the visibility of the TextBox and Button controls.


相似考题
更多“You are creating a custom user control. The custom user cont”相关问题
  • 第1题:

    A user logs in and is mapped to two roles. The first role has a maximum timeout value of 600 minutes and the default Juniper Networks logo on the user interface page. The second role has a maximum timeout value of 1200 minutes and a custom logo on the user interface page. Based on the merging of these two roles, which two will be applied?()

    • A、A custom logo on the user interface page
    • B、A maximum timeout value of 600 minutes
    • C、A maximum time out value of 1200 minutes
    • D、A default Juniper Networks logo on the user interface page

    正确答案:C,D

  • 第2题:

    An administrator created a .env file in a user’s home directory to configure a number of custom environment variables for a local application. However, after the user logs out and then logs back into the system, the custom variables are not being set What is the most likely reason that the custom .env file is being ignored?()

    • A、A shell other than ksh is being used by the user.
    • B、The line ’export ENV=$HOME/.env’ is missing from /etc/profile.
    • C、The line ’export ENV=$HOME/.env’ is missing from the user’s .profile.
    • D、The env_profile attribute is not defined for the user within /etc/security/user.

    正确答案:C

  • 第3题:

    You are the administrator of your company’s network. You configure a local group named accounting to have a mandatory user profile. The mandatory profile has been configured to include a custom logo that was saved with 16-bit color and 1025x768 resolution. Some of the Windows 2000 Professional computers in the accounting department have standard VGA video adapters, and others have SVGA video adapters. Several users report that when they log on to certain Windows 2000 Professional computers, the custom bitmap becomes very pixilated and distorted, and does not reflect the proper color depth. You want users to be able to correctly view the custom bitmap on any computer in the accounting department. What should you do? ()

    • A、Configure a roaming user profile for each user in the accounting group
    • B、Configure a separate user profile for each user in the accounting Group
    • C、Change the custom bitmap to a 16-color bitmap that has 640x480 resolution, and reconfigure  the mandatory user profile
    • D、Reinstall the appropriate WDM-compliant drivers for the computers that do not display the  custom bitmap correctly.

    正确答案:C

  • 第4题:

    Your network contains an Active Directory forest. The forest schema contains a custom attribute for  user objects.   You need to modify the custom attribute value of 500 user accounts.   Which tool should you use()

    • A、Csvde
    • B、Dsmod
    • C、Dsrm
    • D、Ldifde

    正确答案:D

  • 第5题:

    You create a Web application. The Web application enables users to change fields in their personal profiles. Some of the changes are not persisting in the database. You need to raise a custom event to track each change that is made to a user profile so that you can locate the error. Which event should you use?()

    • A、WebAuditEvent
    • B、WebEventManager
    • C、WebBaseEvent
    • D、WebRequestEvent

    正确答案:C

  • 第6题:

    多选题
    A user logs in and is mapped to two roles. The first role has a maximum timeout value of 600 minutes and the default Juniper Networks logo on the user interface page. The second role has a maximum timeout value of 1200 minutes and a custom logo on the user interface page. Based on the merging of these two roles, which two will be applied?()
    A

    A custom logo on the user interface page

    B

    A maximum timeout value of 600 minutes

    C

    A maximum time out value of 1200 minutes

    D

    A default Juniper Networks logo on the user interface page


    正确答案: B,D
    解析: 暂无解析

  • 第7题:

    单选题
    You are creating a Windows Forms Application by using the .NET Framework 3.5.You plan to design a new control that will be used on multiple forms in the app.You need to ensure that the control meets the following requirement:   (1)It retrieves data from a MSSQL Server 2008 database instance.   (2)It uses WPF classes to display data.   (3)It uses user-customizable actions when the control is first painted on the form.    What should you do?()
    A

    Create a new custom class for the control that is derived from the Control class.

    B

    Create a new custom class for the control that is derived from the UserControl class.

    C

    Create a new custom class for the control that is derived from the ContentControl class.

    D

    Create a new custom class for the control that is derived from the ContentPresenter class.


    正确答案: B
    解析: 暂无解析

  • 第8题:

    单选题
    Your network contains an Active Directory forest. The forest schema contains a custom attribute for  user objects.   You need to give the human resources department a file that contains the last logon time and the custom  attribute values for each user in the forest.   What should you use()
    A

    the Dsquery tool

    B

    the Export-CSV cmdlet

    C

    the Get-ADUser cmdlet

    D

    the Net.exe user command


    正确答案: C
    解析: 暂无解析

  • 第9题:

    单选题
    An administrator created a .env file in a user’s home directory to configure a number of custom environment variables for a local application. However, after the user logs out and then logs back into the system, the custom variables are not being set What is the most likely reason that the custom .env file is being ignored?()
    A

    A shell other than ksh is being used by the user.

    B

    The line ’export ENV=$HOME/.env’ is missing from /etc/profile.

    C

    The line ’export ENV=$HOME/.env’ is missing from the user’s .profile.

    D

    The env_profile attribute is not defined for the user within /etc/security/user.


    正确答案: C
    解析: 暂无解析

  • 第10题:

    单选题
    An administrator created a .env file in a user's home directory to configure a number of custom environment variables for a local application. However, after the user logs out and then logs back into the system, the custom variables are not being set. What is the most likely reason that the custom .env file is being ignored?()
    A

    A shell other than ksh is being used by the user.

    B

    The line 'export ENV=$HOME/.env' is missing from /etc/profile.

    C

    The line 'export ENV=$HOME/.env' is missing from the user's .profile.

    D

    The env_profile attribute is not defined for the user within /etc/security/user.


    正确答案: B
    解析: 暂无解析

  • 第11题:

    If you want to use the Java EE platform’s built-in type of authentication that uses a custom HTML page for authentication. Which two statements are true?()

    • A、Your deployment descriptor will need to contain this tag: CUSTOM.
    • B、The related custom HTML login page must be named loginPage.html.
    • C、When you use this type of authentication, SSL is turned on automatically.
    • D、You must have a tag in your deployment descriptor that allows you to point to both a login HTML pageand an HTML page for handling any login errors.
    • E、In the HTML related to authentication for this application, you must use predefined variable names fort he variables that store the user and password values.

    正确答案:D,E

  • 第12题:

    Your network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2003. You extend the Active Directory Schema to support a custom user attribute. You need to assign the same value to the custom attribute for 1,500 users. You must achieve this goal by using the minimum amount of administrative effort. Which tool should you use? ()

    • A、Adsiedit.msc
    • B、Csvde.exe
    • C、Dsmod.exe
    • D、Ldifde.exe

    正确答案:D

  • 第13题:

    You are creating a custom user control. The custom user control will be used on 10 Web Forms for an ASP.NET Web site that allows users to register and log on to a personalized experience. The custom user control uses two TextBox controls and two Button controls. You need to ensure that the controls are visible only when users are not logged on to the Web site. You also need to minimize the amount of effort in development and maintenance for the Web site. Which two actions should you perform? ()

    • A、Add the OnClick event handler for the Login button to the code used in the custom user control.
    • B、Add the OnClick event handler for the Login button to the code used in the Web Form where the control is added.
    • C、In the Page_Load method of the Web Form, add a code segment to set the visibility of the TextBox and Button controls where the control is added.
    • D、In the Page_Load method of the custom user control, add a code segment to set the visibility of the TextBox and Button controls.

    正确答案:A,D

  • 第14题:

    Your network contains a computer that runs Windows XP Professional. Multiple users share the computer. You create a custom user profile on the computer. You need to ensure that all new users of the computer receive the custom user profile. What should you do?() 

    • A、Run the Files and Settings Transfer Wizard.
    • B、At the command prompt, run scanstate.exe. 
    • C、Use the Copy To function from the User Profiles settings. 
    • D、Rename the folder that contains the custom user profile to winnt_user. 

    正确答案:C

  • 第15题:

    单选题
    You have an Exchange Server 2010 organization.You need to ensure that items in a user’s Inboxfolder that are older than 60 days are moved to a custom folder.What should you do first?()
    A

    Create a managed custom folder.Create a transport rule

    B

    Create a new mail folder by using Microsoft Office Outlook.Create a journal rule

    C

    Create a managed custom folder.Run the Managed Content Settings wizard from the Inbox managed default folder

    D

    Create a new mail folder by using Microsoft Office Outlook.Run the Managed Content Settings wizard from the Inbox managed default folder


    正确答案: C
    解析: 暂无解析

  • 第16题:

    单选题
    You are the administrator of your company’s network. You configure a local group named accounting to have a mandatory user profile. The mandatory profile has been configured to include a custom logo that was saved with 16-bit color and 1025x768 resolution. Some of the Windows 2000 Professional computers in the accounting department have standard VGA video adapters, and others have SVGA video adapters. Several users report that when they log on to certain Windows 2000 Professional computers, the custom bitmap becomes very pixilated and distorted, and does not reflect the proper color depth. You want users to be able to correctly view the custom bitmap on any computer in the accounting department. In addition to this, you also want to allow the users to modify, change and save their desktop settings. What should you do?()
    A

    Configure a roaming user profile for each user in the accounting group

    B

    Configure a separate user profile for each user in the accounting Group. 

    C

    Change the custom bitmap to a 16-color bitmap that has 640x480 resolution, and reconfigure the mandatory user profile 

    D

    Reinstall the appropriate WDM-compliant drivers for the computers that do not display the custom bitmap correctly. 


    正确答案: D
    解析: 暂无解析

  • 第17题:

    单选题
    Your network consists of a single Active Directory domain. The functional level of the domain isWindows Server 2003.You extend the Active Directory Schema to support a custom user attribute.You need to assign the same value to the custom attribute for 1,500 users. You must achieve this goal byusing the minimum amount of administrative effort.Which tool should you use? ()
    A

    Adsiedit.msc

    B

    Csvde.exe

    C

    Dsmod.exe

    D

    Ldifde.exe


    正确答案: D
    解析: 暂无解析

  • 第18题:

    单选题
    You are creating a Windows Forms Application by using the .NET Framework 3.5.You plan to create a Windows Installer package for a Windows Forms application. The package will be deployed on Windows Vista computers.You need to ensure that during deployment the installation does not elevate privileges of the user installing the application.What should you do?()
    A

    Create a custom action and set the NoImpersonate property to true

    B

    Create a custom action and set the NoImpersonate property to false

    C

    Create a manifest and set the RequestedExecutionLevel level attribute to AsInvoker

    D

    Create a manifest and set the RequestedExecutionLevel level attribute to AsAdministrator


    正确答案: A
    解析: 暂无解析

  • 第19题:

    单选题
    You are creating a Windows Forms Application by using the .NET Framework 3.5.You plan to create a Windows Installer package for a Windows Forms application.The package will be deployed on Windows Vista computers.You need to ensure that during deployment the installation does not elevate privileges of the user installing the application.What should you do?()
    A

    Create a custom action and set the NoImpersonate property to true

    B

    Create a custom action and set the NoImpersonate property to false

    C

    Create a manifest and set the RequestedExecutionLevel level attribute to AsInvoker.

    D

    Create a manifest and set the RequestedExecutionLevel level attribute to AsAdministrator.


    正确答案: D
    解析: 暂无解析

  • 第20题:

    单选题
    You are the desktop administrator for your company's sales department. The IT manager for the sales department needs to distribute a custom application to the Windows XP Professional computers in the sales department. He deploys the software by using Group Policy. Susan is a user in the sales department. She reports that the custom application is not available. You examine her computer, and you verify that the application is not present on her computer. You want to ensure that the software is deployed the next time Susan logs on. Which command should you run?()
    A

    Secedit /refreshpolicy user_policy /enforce

    B

    Secedit /refreshpolicy machine_policy /enforce

    C

    Gpupdate /target:computer /sync

    D

    Gpupdate /target:user /sync


    正确答案: D
    解析: 暂无解析