Test4pass Microsoft 70-513 exam dumps vce

合集下载

微软70536认证题库Web订单服务试题综合题

微软70536认证题库Web订单服务试题综合题

第一组题(1,2,4不确定)背景信息:您正在开发一项订单处理Web服务:可供多个国家/地区的客户端使用。

业务要求:为遵守服务级别协议(SLA),订单处理服务必须在处理每份订单时更新以下性能指标:处理的订单总数平均处理时间(以秒为单位)在Applicationservices类中创建性能计数器,并提供一个方法来收集数据。

技术要求:客户端将通过使用.NET Framework调用订单处理服务。

订单处理服务要求将订单日期存储为UTC DateTime值。

如果客户端提供的DateTime值不是UTC DataTime值,则必须假定DateTime值为订单处理服务所在的时区的本地值。

有效的电子邮件地址必须符合以下要求:●电子邮件地址必须以至少三个字母数字字符开头,后跟@符号,然后是域。

●域必须以至少两个字母数字字符开产学研,后跟一个句点(.),然后是至少两个字母数字字符。

订单处理服务必须能够记录对已提交订单执行的所有步骤。

应用程序结构:备注图片隐藏文字(订单处理服务可接受由客户定义的自定义步骤。

)(并且行号中的由两个字符组成的前缀标识这些代码所属的特定文件)Order.CSOrderProcessor.csOP01 public class ProcessCompleteOP02 {OP03 public Order order;OP04 Public OrderProcessor Processor;OP05 }OP06OP07 public class OrderProcessorOP08 {OP09 public event EventHandler ProcessiongComplete;OP10 public delegate bool ProcessOrderStep(Order order);OP11OP12 private event ProcessOrderStep OrderProcesses;OP13OP14 public void SubmitOrder(string email,int cartId,DateTime orderDate) OP15 {OP16 if(!IsValidEmail(email))OP17 throw new ApplicationException(“Invalid Email address”); OP18OP19 var order =new Order();OP20 order.Email =email;OP21 order.CartId=cartId;OP22 Order.OrderDate=NormalizedOrderDate(orderDate);OP23 ProcessOrder(order);OP24OP25 if(order.Error)OP26 throw new ApplicationException(“Error processing order”);OP27OP28 ApplicationServices.LogOrderFinished(order);OP29 }OP30OP31 private DateTime NormalizedOrderDate(DateTime inputOrderDate)OP32 {OP33 return DateTime.Now;OP34 }OP35OP36 public void AddOrderProcessStep(ProcessOrderStep newOrderStepProcess) OP37 {OP38 OrderProcesses +=newOrderStepProcess;OP39 }OP40OP41 private bool RunCutomerStep(Order order)OP42 {OP43 return true;OP44 }OP45OP46 private void ProcessOrder(Order order)OP47 {OP48 OrderProcesses.Invoke(order);OP49 order.Error=RunCustomerStep(order);OP50OP51 ProcessingComplete.Invoke(…);OP52 }OP53OP54 private bool IsValidEmail(string email)OP55 {OP56 if(email.IndexOf(“@”)>0)OP57 {OP58 return true;OP59 }OP60 return false;OP61 }OP62 }OrderRepository.csOrderProcessingSteps.csApplicationServices.cs1.按客户和订单日期从用久性存储中检索特定报告所需的订单,然后将其序列化为流。

Test4pass Microsoft 70-518 exam dumps vce

Test4pass Microsoft 70-518 exam dumps vce

Test4pass E xpert In IT Certification E xamsExam : Microsoft 70-518Title : Design & Develop WindowsApps Using MS .NETFrmwk 4Version : DemoTest4pass E xpert In IT Certification E xamsTop 3 Customers in Test4passs - Best IT certifications TeamHOT Certifications On Test4passCisco CertificationsCCNA CCDA CCNP CCDP CCVP CCSP CCIP CCIE CCDE Data Center Sales ExpertMicrosoft CertificationsMCP MCSE MCITP MCTS MCSE2003MCPD MCDST TS Exchange Server2007 MCSE2003 Security MCSE2003 Messaging Microsoft Business SolutionsIBM CertificationsCertified Administrator Certified Systems Expert Solutions Expert System AdministatorDB2Certified Advanced Technical Expert Certified Advanced System AdministratorLotus Certification WebSphere Cognos 8 BI Certified Associate Developer Tivoli SoftwareCompTIA CertificationsA+CDIA+CTT+e-Biz+CompTIA HTI+i-NET+ Linux+Network+Project+RFID+Security+ Server+PDI+Convergence+Visual Studio 2010.The business logic layer of the application is implemented by using Windows Communication Foundation (WCF).You write the following code segment in the middle tier of the application:[ServiceContract]public interface IWcfService{[OperationContract][FaultContract(typeof(ApplicationException))]void ProcessData(Data d);}The ProcessData service method is a long-running operation.You need to ensure that the application meets the following requirements:"Users can continue to use the user interface while the ProcessData service method is running. "Message delivery is reliable.What should you use?A. a Sessionful One-Way operation on ProcessData along with a proxy-based synchronous class invocationB. a Sessionful Request-Reply operation on ProcessData along with a proxy-based asynchronous invocationC. a Sessionless One-Way operation of ProcessData along with a proxy-based synchronous class invocationD. a Sessionless Request-Reply operation on ProcessData along with a proxy-based asynchronous invocationAnswer: C2. You are designing a Windows Presentation Foundation (WPF) application by using Microsoft .NET Framework 4 and Microsoft Visual Studio 2010.The application will consist of a user interface (UI) tier and a middle tier. The middle tier will be implementedEach method in the middle tier will contain the following catch block.Catch (ArgumentNullException e){throw e;}When testing the application, you discover that all ArgumentNullExceptions exceptions that occur in the middle tier do not contain accurate stack trace information.You need to design the exception handling strategy for the application.What should you do?A. Create an ArgumentNullExceptionhandler in the UI tier.B. Use a DispatcherUnhandledExceptionEvent handler in the UI tier.C. Use a DispatcherUnhandledExceptionEvent handler in the middle tier.D. Remove the exception parameter from the ArgumentNullException handler.Answer: D3. You are designing an n-tier Windows application by using Microsoft .NET Framework 4, Microsoft Visual Studio 2010, and Microsoft SQL Server 2008.The application will replace an existing client/server application. The existing application was created by using Microsoft Visual Basic 6.0 and consists of a series of COM components that access aSQL Server database.You plan to move the existing COM components into a Windows Communication Foundation (WCF) tier. You need to ensure that the COM components can be replaced without impacting the existing user interface (UI) tier. You also need to ensure that the COM components can be replaced separately.What should you do?A. Create a common assembly on the UI tier of the new application to interface with the COM components.B. Create a common assembly on the WCF tier of the new application to interface with the COM components.C. Use .NET COM Interop on the client tier to interact directly with the COM components until they are replaced by the managed code.these code components on the client/server application until they are replacedindividually with the new permanent managed code functionality.Answer: B4. You are creating a Windows application by using Microsoft .NET Framework 4 and Microsoft Visual Studio 2010.The business logic layer of the application is implemented by using Windows Communication Foundation (WCF).You create a WCF service that contains a single operation to upload large binary data files. You configure the binding of the WCF service to enable data streaming.You need to ensure that the WCF service operation receives binary data files along with a string parameter that contains the description of each file.You create a service operation that receives a single parameter. What should you do next?A. Implement the service parameter as a Serializable class that contains a property for the description of the file and another property for the content of the data fileB. Implement the service parameter as a DataContract class that contains a DataMember property for the description of the file and another DataMember property for the content of the data file.C. Implement the service parameter as a MessageContract class that contains a MessageHeader property for the description of the file and a MessageBodyMember property for the content ofthe data file.D. Implement the service parameter as a MessageContract class that contains a MessageBodyMember property for the description of the file and another MessageBodyMember property for thecontent of the data file.Answer: C5. You are designing a Windows Presentation Foundation (WPF) application for your company by using Microsoft .NET Framework 4 and Microsoft Visual Studio 2010.The business layer of the application is implemented by using Windows Communication Foundation (WCF).You need to design the security strategy for the application.What should you do?A. Attach a digital signature to the WCF messages.B. Encrypt the WCF messages by using the Secure Sockets Layer (SSL) protocol.C. Encrypt the WCF messages by using the Internet Protocol Security (IPSec) protocol.D. Implement message-level security by using digital certificates as client computer credentials. Answer: A6. You are designing a Windows Presentation Foundation (WPF) application for your company by using Microsoft .NET Framework 4 and Microsoft Visual Studio 2010.The user interface (UI) tier of the application will be developed by using Windows Presentation Foundation (WPF).The middle tier of the application will be developed by using Windows Communication Foundation (WCF). You plan to use several legacy third-party COM components. You do not have access to the source code of these components.You need to ensure that the following requirements are met:"The middle tier can use the COM components."Application developers can debug the application."The application must allow for a gradual migration away from the COM components.What should you do?A. Add references to the COM components in the UI tier.B. Design a thin interface layer assembly that uses COM Callable Wrappers (CCWs) to dynamically access the COM components.C. Design a new Primary Interop Assembly (PIA) by using appropriate source attributes for the COM components. In the PIA, expose selected elements of the components that can be used by developers.D. Design a custom wrapper assembly that uses the methods of the TypeLibConverter class to load and interface to the COM components. Expose managed .NET methods that dynamicallyaccess the corresponding COM methods.Answer: C7. You are designing a Windows Presentation Foundation (WPF) application by using Microsoft .NET Framework 4 and Microsoft Visual Studio 2010.The application accesses a Windows Communication Service (WCF) service on a middle-tier server to retrieve sales invoice information.The information consists of a master record and several detail records that are displayed by the application. The source data frequently changes.You need to ensure that the design meets the following requirements:"Minimizes the amount of network traffic."Ensures that UI responsiveness is not impacted by WCF calls."Ensures that data is always up-to-date.What should you do?A. Use multi-thread in the application.B. Use data caching at the client application.C. Use the Dispatcher.Invoke method when making WCF calls.D. Use the Dispatcher.BeginInvoke method when making WCF calls.Answer: A8. You are designing a Windows Presentation Foundation (WPF) application by using Microsoft .NET Framework 4 and Microsoft Visual Studio 2010.The application will be deployed on Windows 7 computers in the United States and Europe.You need to ensure that array data is sorted based on the culture of the operating system.What should you do?A. Add a configuration setting to the appSettings section of the App.config file.B. Use a comparison method to compare ASCII values.C. Use the Resource Manager to create culture-sorted lists.D. Use a comparison method that specifies a CultureInfo class or the CompareOptions enumeration parameter.Answer: DFramework 4.The application contains multiple forms that are loaded into a parent Multiple Document Interface (MDI) form. Your company policy does not allow the use of third-party controls.You need to ensure that the new feature meets the following requirements:"It provides a three-dimensional scale model."It allows users to change the colors of the model and communicates the color selections back to the application."It allows the model to scale, based on the user's client computer display resolution."It is a child form in the MDI application.What should you do?A. "Design the new feature in the existing Windows Forms application as a Windows form."Add the form as a child form to the MDI window.B. "Design the new feature in a new application by using Windows Presentation Foundation (WPF). "Invoke the new WPF application from the existing Windows Forms application.C. "Design the new feature in a new Windows Presentation Foundation (WPF) application."Host the existing application inside the new WPF application by using the WindowsFormsHost class.D. "Design the new feature by using a Windows Presentation Foundation (WPF) user control."Use the ElementHost class to host the WPF user control in the existing Windows Forms application. Answer: D10. You are designing an application by using Windows Presentation Foundation (WPF) and Microsoft .NET Framework 4.The user interface (UI) tier of the application will be implemented by using WPF.The middle tier of the application will be implemented by using Windows Communication Foundation (WCF). The middle tier will contain several methods that update data in a remote database. Tmiddle tier will also contain a long-running method named ProcessData. The ProcessData method performs database operations and can take several minutes to complete.You need to ensure that the UI of the application can continue to call other methods while the ProcessData method is running.A. Implement the ProcessData method by using Windows Workflow Foundation (WF).B. Implement the ProcessData method by using the Invoke method on the Dispatcher class.C. Call the Run method of the Dispatcher class before invoking the ProcessData method.D. Call the DoEvents method of the Application class before invoking the ProcessData method. Answer: AC o n t a c t T e s t4p a s sWe are proud of our high-quality customer service, which serves you around the clock 24/7. To get your problem resolved instantly, live supportRead Our Frequently Asked Questions (FAQs)We have gathered the most frequently asked questions for you. Please read our list of FAQs. Contact us by Live MessengerSales:Test4pass(at)You can reach us at any of the email addresses listed below Please allow up to 24 hours for us to respond•MSN: Test4pass@。

最新微软70-680认证考题赏析

最新微软70-680认证考题赏析

最新微软70-680认证考题赏析凡具有DOS﹑Windows和一定英语水平的在职人员﹑各大专院校在校学生及要求获得网络技术知识的人员均可报名参加微软认证。

学习本专业者需有一定计算机基础和英文基础,计算机方面应有Dos和Windows基础,要求会编制批处理文件,对系统配置文件的部分参数有一定的了解.可以看出微软认证对其报考者要求很低。

微软认证是微软公司设立的推广微软技术,培养系统网络管理和应用开发人才的完整技术金字塔证书体系,在全世界90多个国家认可有效,并且可以作为薪资职位变迁的有效证明,公司资质实力证明和移民加分等多项益处!微软认证从1992年设立至今,在业界的影响力也越来越大,全球共计有8万位MCSE2003和3万多位MCSD产生,是具备相当含金量和实用价值的高端证书。

70-680考试是Microsoft 公司的TS:Windows 7,Configuring 认证考试官方代号,TestInside70-680权威考试题库软件是Microsoft 认证厂商的授权产品,TestInside 保证第一次参加70-680考试的考生即可顺利通过,否则其承诺全额退款!获得70-680认证的技术人员意味着微软承认你已具备高水平的产品专业技能与知识。

您将充分展示在系统管理、部署与维护软方面的专业技能,或展示在采用BizTalk Server进行业务流程开发与解决方案集成方面出色的专业技术。

这里给出下载TestInside 测试引擎---下载通道部分考题赏析:Exam : Microsoft 70-680Title : TS: Windows 7, Configuring1. You have a computer that runs Windows 7. The computer has two volumes named volume C and volume D.You create a document on volume D.You manually create a restore point and modify the document.You view the properties of the document as shown in the exhibit. (Click the Exhibit button.)You need to ensure that you can restore the current version of the document if the document is modified.What should you do first?A. Run Disk Cleanup on volume D.B. Enable auditing on the document.C. Turn on System Protection for volumeD.D. Start the Volume Shadow Copy Service (VSS).Answer: C2. You have a computer that runs Windows 7.You need to view the processes that currently generate network activity.What should you do?A. Open Resource Monitor and click the Network tab.B. Open Windows Task Manager and click the Networking tab.C. Open Event Viewer and examine the NetworkProfile Operational log.D. Open Performance Monitor and add all the counters for network interface.Answer: A3. You need to increase the size of a paging file.What should you do?A. From Disk Management, shrink the boot partition.B. From Disk Management, shrink the system partition.C. From System, modify the Advanced system settings.D. From System, modify the System protection settings.Answer: C4. Y ou have a computer that runs Windows 7.You need to configure system image backups to meet the following requirements: Automatically create a system image every day without user interventionRetain multiple copies of the system imageWhich type of backup destination should you use?A. external hard disk driveB. network locationC. USB flash driveD. writeable D VDAnswer: A5. You have a computer that runs Windows 7.You run the Configure Backup wizard as shown in the exhibit. (Click the Exhibit button.) You need to ensure that you can back up the computer to a local disk drive.What should you do before you run the Configure Backup wizard?A. Connect a removable disk.B. Log on as an administrator.C. Start the Volume Shadow Copy Service (VSS).D. Add your user account to the Backup O perators group.Answer: A。

70-529考试资料

70-529考试资料

70-529考试资料 Framework 2.0 - Distributed Appl Development科目编号: 70-529科目名称: Framework 2.0 - Distributed Appl Development语言(s):英语,法语,德语,日语考生:开发人员技术:微软Visual Studio 2005类型:监考考试相关:Testinside题库价格:¥272.4070-529 考试是Microsoft 公司的 Framework 2.0 - Distributed Appl Development 认证考试官方代号, Framework 2.0 - Distributed Appl Development 认证作为全球IT 领域专家Microsoft 热门认证之一,是许多大中IT企业选择人才标准的必备条件。

70-529考试概述:About this ExamWhen the exam begins, you can choose the programming language in which the code segments will appear. The available code languages for this exam are:Microsoft Visual Basic 2005Microsoft Visual C# 2005Audience ProfileCandidates for this exam work on a team in a medium or large development environment that uses Microsoft V isual Studio .NET 2003 Enterprise Developer or Visual Studio 2005. Candidates should have at least one year of experience developing distributed applications by using the Microsoft .NET Framework. Candidates should have a working knowledge of V isual Studio 2005. Credit Toward CertificationExam 70-529: TS: Microsoft .NET Framework 2.0 - Distributed Application Development: counts as credit toward the following certification(s):Microsoft Certified Technology Specialist: .NET Framework 2.0 Distributed App lications70-529考试大纲:Creating and Accessing XML Web ServicesCreate and configure an XML Web service method.Create a public method.Attach the WebMethodAttribute attribute.Create a OneWay Web method.Configure a Web service method.Configure a Web service method by using the properties of the WebMethodAttribute attribute. Use discovery files to publish a list of Web services that are installed on a Web server.Build and deploy a Web service application.Configuring and Customizing a Web Service ApplicationConfigure SOAP messages.Configure the formatting of SOAP messages for a Web service method.Specify the basic information for a Web service application.Specify the bindings of a Web service application by using the WebServiceBindingAttribute attribute.Configure a Web service application by using a Machine.config file.Configure a Web service application by using a Web.config file.Configure the Web services communication protocol.Select the formatting of SOAP messages.Specify the parameter formatting.Specify the parameter style.Manage session state in Web services.Implement session state by using the Application object.Implement session state by using cookies.Implement session state by using the Session object.Implement SOAP headers.Add a custom SOAP header class.Create a public instance of the custom SOAP header class in a Web service class. Apply a SoapHeader attribute to a Web method.Access and process a SOAP header in a Web method.Set the direction of a SOAP header.Handle unknown SOAP headers.Implement SOAP extensions.Create a custom SOAP extension.Configure a SOAP extension.Process a SOAP header in a client application.Creating, Configuring, and Deploying Remoting ApplicationsCreate and configure a server application.Create a server application domain.Configure a server application programmatically.Configure a server application by using configuration files.Compile and build a server application.Create a client application to access a remote object.Create a remote object.Configure a client application programmatically.Configure a client application manually by using configuration files.Access the remoting service by calling a remote method.Call a remote method synchronously in a client application.Debug and deploy a remoting application.Use performance counters to monitor a remoting application.Debug a remoting application.Host and deploy a remoting application.Create and serialize remotable types.Create a remotable type.Create generic types.Configure a serialization formatter programmatically.Configure a binary formatter.Configure a SOAP formatter.Implement V ersion Tolerant Serialization (VTS).Manage the lifetime of remote objects.Initialize the lifetime of a remote object.Renew the lifetime of a remote object.Implementing Asynchronous Calls and Remoting EventsCall Web methods asynchronously.Call a Web method.Poll for the completion of a Web method.Get Web method results.Implement callback.Call a OneWay Web method.Call remoting methods asynchronously.Implement one-way methods by using the OneWay attribute.Call a remote method asynchronously.Implement callback.Implement events in remoting applications.Create and fire events.Implement event handler for the events of a remote object.Implementing Web Services Enhancements (WSE) 3.0Enable WSE in client and server applications.Add references to WSE assemblies in client applications.Edit the Web service proxy class to derive from the WebServicesClientProtocol class.Add a element under the element in a configuration file.Add a element to add the section to a configuration file.Add a digital signature to a SOAP message and verify an existing SOAP message signature. Sign a SOAP message digitally.V erify a signed SOAP message.Encrypt and decrypt a SOAP message.Encrypt a SOAP message.Decrypt an encrypted SOAP message.Implement a policy for a Web service application.Create a policy file manually.Declare the set of policies in a policy file.Map policies to SOAP endpoints.Configure a policy file in a configuration file.Create and enforce a custom policy.Create a policy file by using the WseConfigEditor3 tool.Set a policy in a client application and in a client computer.Implement filters in a Web service application.Add a filter.Remove a filter.Shuffle the order of the filters.Enable the Trace filter.Create custom input and output filters.Implement WSE SOAP messaging.Select a protocol.Implement one-way SOAP messaging.Implement bidirectional SOAP messaging.Send the attachments from a Web service application.Receive attachments in a client application.Route SOAP messages by using a WSE router.Create a WSE router application.Configure a WSE router application.Configure a referral cache for routing.Add and verify security credentials.Add security credentials to a SOAP message.V erify security credentials.Creating and Accessing a Serviced Component and Using Message Queuing Create, configure, and access a serviced component.Add a reference to a serviced component in an application.Create an instance of a serviced component.Call the methods of a serviced component.Create a serviced component.Add attributes to a serviced component.Register a serviced component.Implement security.Create, delete, and set permissions on a message queue.Create a message queue manually.Create a message queue programmatically.Delete a message queue.Set permissions for a message queue programmatically.Send messages to a message queue and delete messages from a message queue. Create a message.Post a message.Receive a message synchronously.Decide which formatter to use.Read a message body.Delete queued messages.Sign and encrypt messages.Sign a message.Encrypt a message by using UseEncryption and EncryptionAlgorithm properties. Handle acknowledgments.Receive messages.Peek at messages.Enumerate messages.Receive a message asynchronously.Use BeginReceive/BeginPeek methods.Respond to a ReceiveCompleted or PeekCompleted event.Process messages.V erify a message source by using a certificate.Decrypt a message.Extract response queue details from a message.Compose and send a response to a response queue.Apply a rule to a message queue.70-529考试题库:Exam : Microsoft 70-529Title : Framework 2.0 - Distributed Appl Development1. A Web Services Enhancements (WSE) 3.0 router application uses a referral cache to make routing decisions.When a client application sends a SOAP message to the WSE router application, the following exception isthrown.Microsoft.Web.Services3.Addressing.AddressingFault: MessageInformation Header RequiredThe referral cacheused by the WSE router application is as follows:<?xml version="1.0" ?><r:referralsxmlns:r="/ws/2001/10/referral"> <r:ref> <r:for> <r:exact>/WSERouter/Service.asmx </r:exact> </r:for> <r:if /> <r:go><r:via>/WSEService/Service.asmx</r:via> </r:go> <r:refId>uuid:fa469956-0057-4e77-962a-81c5e292f2ae</r:refId> </r:ref></r:referrals>Y ou need to ensure that a SOAP message can be sent to the WSErouter application without throwing the AddressingFault exception. What should you do?A. Set the AllowAutoRedirect property on the Web service client proxy to True.B. Change the Web service client proxy class definition so that it is derived from the Microsoft.Web.Services3.WebServicesClientProtocol class.C. Set the ConnectionGroupName property on the Web service client proxy to Allow Routing.D. Set the UserAgent property on the Web service client proxy to WSE 3.0.Answer: B2. Y ou are converting an application to use .NET Framework remoting. The server portion of the application monitorsstock prices and contains a class named StockPriceServer, which is a Server Activated Object (SAO). The clientcomputer interacts with the server using a common assembly. When the server attempts to raise an event on theclient computer, the server throws the following exception.System.IO.FileNotFoundException.Y ou discover that theevent delegate is not being called on the client computer. Y ou need to ensure that the server application can raise theevent on the client computer. What should you do?A. Add the Serializable attribute to the StockPriceServer class and change the event to use one of the standardcommon language runtime (CLR) delegates.B. In the common assembly, add an interface that contains the event and a method to raise the event. Implement thatinterface in the StockPriceServer class and use the interface's event to register the delegate message on the clientcomputer.C. Add the event delegate to the common assembly. Implement the Add delegate and the Remove delegate methodsof the event in the StockPriceServer class to reference the delegate method in the client application.D. Raise the event using the BeginInvoke method and pass a reference to the client computer. Answer: B3. A file named Util.asmx contains the following code segment. (Line numbers are included for reference only.)01 <%@ WebService Language="C#" class="Exam.Util" %>02 namespace Exam {03 public class Util {04 public stringGetData() {05 return "data";06 }07 }08 }Y ou need to expose the GetData method through a Web service. What shouldyou do?A. Insert the following line of code between lines 02 and 03.[System.Web.Services.WebService()]B. Replace line 03 with the following line of code.public class Util : System.Web.Services.WebServiceC. Insert the following line of code between lines 03 and 04.[System.Web.Services.WebMethod()]D. Replace line 01 with the following line of code.<%@ WebService Language="C#"class="System.Web.Services.WebService" %>Answer: C4. A Web service exposes a method named GetChart that returns an image. The data used to generate the imagechanges in one-minute intervals. Y ou need to minimize the average time per request for CPU processing. Whatshould you do?A. Set the BufferResponse property on the WebMethod attribute of the GetChart method to True.B. Set the BufferResponse property on the WebMethod attribute of the GetChart method to False.C. Set the CacheDuration property on the WebMethod attribute of the GetChart method to 60.D. Set the CacheDuration property on the WebMethod attribute of the GetChart method to 1. Answer: C5. An assembly named SimpleMathLib is deployed to the Bin folder that is under a virtual directory namedSimpleMathHost, which is on an IIS server named SERVER1. The SimpleMathLib assembly contains the followingspace SimpleMath{ public class SimpleMathClass : MarshalByRefObject{ public double Add(double x,double y) { return x + y; }}The Web.config file under the SimpleMathHost virtual directory contains the properconfiguration to host SimpleMath as a remoting object. Y ou write a client Console Application and add a reference tothe SimpleMathLib assembly. Y ou need to ensure that the client Console Application calls the Addmethod onSERVER1 and returns the correct sum of the parameters to the Console Application. What should you do?A. Write the following code in the client application.TcpChannel chan = new TcpChannel();ChannelServices.RegisterChannel(chan, false);SimpleMath.SimpleMathClass sm = new SimpleMathClass();Console.WriteLine(sm.Add(2, 2).ToString());B. Write the following code in the client application.SimpleMathClass sm = (SimpleMathClass) Activator.GetObject(typeof(SimpleMathClass), "http: //server1:80/SimpleMathHost/SimpleMath.rem");Console.WriteLine(sm.Add(2,2).ToString());C. Write the following code in the client application.SimpleMath.SimpleMathClass sm = (SimpleMathClass)Activator.GetObject(typeof(SimpleMathClass),"tcp: //server1:80/SimpleMathHost/SimpleMath.rem");Console.WriteLine(sm.Add(2,2).ToString());D. Write the following code in the client application.SimpleMath.SimpleMathClass sm = (SimpleMathClass)Activator.CreateInstance(typeof(SimpleMathClass), new string[]{"http: //server1:80/SimpleMathHost/SimpleMath.rem", "SimpleMath.SimpleMathClass, SimpleMathLib"});Console.WriteLine(sm.Add(2, 2).ToString());Answer: B最新活动:Testinside考题大师权威微软,思科,太阳,CIW中,IBM公司,北电网络,惠普,甲骨文等各大的IT认证题库,最新考题售价仅180元起。

计算机四级信息安全工程师真题第三套

计算机四级信息安全工程师真题第三套

第三套系统操作——单选题1.现代操作系统最基本的特征是A) 并发性B) 顺序性C) 封闭性D) 并行性A【解析】现代操作系统基本的特征是并发、共享、虚拟和异步,其中并发性是最基本的特性。

故选择A选项。

2. 组成操作系统的主要部分通常是进程线程管理、内存管理、设备管理和A) 文件管理B) P、V操作管理C) 死锁管理D) 备份管理A 【解析】操作系统位于底层硬件与用户之间,是两者沟通的桥梁。

用户可以通过操作系统的用户界面,输入命令。

操作系统则对命令进行解释,驱动硬件设备,实现用户要求。

以现代观点而言,一个标准个人电脑的OS应该提供以下的功能:进程管理(Processing management);内存管理(Memory management);文件系统(File system);网络通讯(Networking);安全机制(Security);用户界面(User interface);驱动程序(Device drivers)。

故选择A选项。

3. 下列程序中,哪一个不属于操作系统内核程序?A) 进程调度程序B) 中断服务程序C) 设备驱动程序D) 用户应用程序D【解析】“内核”指的是一个提供硬件抽象层、磁盘及文件系统控制、多任务等功能的系统软件。

一个内核不是一套完整的操作系统。

它负责管理系统的进程、中断、内存、设备驱动程序、文件和网络系统,决定着系统的性能和稳定性。

故选择D选项。

4.用户进程从用户态转变为内核态时,使用的指令是A) 访管指令B) I/O指令C) 页保护指令D) 压栈指令A【解析】用户程序不能直接使用特权指令。

如果用户程序在用户态转换为内核态,使用访管指令,这是CPU由用户态向核心态转换的方法。

故选择A选项。

5. 用户编写程序时调用fork()创建进程,其使用的是操作系统提供给用户的什么接口?A) 系统调用B) 命令控制语言C) 作业控制语言D) 应用编程接口A【解析】操作系统提供了3类型的接口供用户使用:命令接口:提供一组命令供用户直接或间接操作。

微软 70-646

微软 70-646

ExamKingsEasy way pass your IT certificationEXAM : Microsoft 70-646TITLE : PRO: Windows Server 2008,Server AdministratorVersion : V3.21一年的免费升级服务1. Your network contains three servers that run Windows 2000 Server. Each server has a custom application installed. The applications:Are incompatible with each otherAre incompatible with Windows Server 2008Consume less than 10 percent of the system resourcesA company policy states that all new physical servers must run Windows Server 2008.You need to plan the migration of the applications to new Windows Server 2008 servers. You want to achieve this goal while minimizing hardware costs.What actions should you include in your plan?A. Deploy three new servers that run Windows Server 2008 Standard. Configure Windows 2000 compatibility mode for each application.B. Deploy one new server that runs Windows Server 2008 Datacenter. Install the Desktop Experience feature.C. Deploy one new server that runs Windows Server 2008 Enterprise. Install the Windows System Resource Manager (WSRM) feature on the new server.D. Deploy one new server that runs Windows Server 2008 Enterprise. Install the Hyper-V feature on the new server. Create three virtual machines.Answer: D2. You need to recommend a Windows Server 2008 server configuration that meets the following requirements:Supports the installation of Microsoft SQL Server 2005Provides redundancy for SQL services if a single server failsWhat should you recommend?A. Install a Server Core installation of Windows Server 2008 Enterprise on two servers. Configure the servers in a failover cluster.B. Install a full installation of Windows Server 2008 Standard on two servers. Configure Network Load Balancing on the two servers.C. Install a full installation of Windows Server 2008 Enterprise on two servers. Configure Network Load Balancing on the two servers.D. Install a full installation of Windows Server 2008 Enterprise on two servers. Configure the servers in a failover cluster.Answer: D3. Your network consists of a single Active Directory domain. Your main office has an Internet connection. Your company plans to open a branch office. The branch office will connect to the main office by using a WAN link. The WAN link will have limited bandwidth. The branch office will not have access to the Internet. The branch office will contain 30 Windows Server 2008 servers.You need to plan the deployment of the servers in the branch office. The deployment must meet the following requirements:Installations must be automated.Computers must be automatically activated.Network traffic between the offices must be minimized.What should you include in your plan?A. In the branch office, implement Key Management Service (KMS), a DHCP server, and Windows Deployment Services (WDS).B. Use Multiple Activation Key (MAK) Independent Activation on the servers. In the main office, implement a DHCP server and Windows Deployment Services (WDS).C. In the main office, implement Windows Deployment Services (WDS). In the branch office, implement a DHCP server and implement the Key Management Service (KMS).D. Use Multiple Activation Key (MAK) Independent Activation on the servers. In the main office, implement a DHCP server. In the branch office, implement Windows Deployment Services (WDS).Answer: A4. Your network contains a Web-based application that runs on Windows Server 2003.You plan to migrate the Web-based application to Windows Server 2008.You need to recommend a server configuration to support the Web-based application. The server configuration must meet the following requirements:Ensure that the application is available to all users if a single server?failsSupport the installation of .NET applicationsMinimize software costsWhat should you recommend?A. Install the Server Core installation of Windows Server 2008 Standard on two servers. Configure the servers in a Network Load Balancing cluster.B. Install the full installation of Windows Server 2008 Web on two servers. Configure the servers in a Network Load Balancing cluster.C. Install the full installation of Windows Server 2008 Enterprise on two servers. Configure the servers in a failover cluster.D. Install the full installation of Windows Server 2008 Datacenter on two servers. Configure the servers in a failover cluster.Answer: B5. Your network has two servers that run Windows Server 2003. One server hosts an application named App1. The other server hosts an application named App2.App1 requires the 32-bit installation of Windows Server 2003. App2 requires the 64-bit installation of Windows Server 2003.You need to recommend a solution for replacing the servers that host App1 and App2. Your solution must be based on Windows Server 2008 and must minimize costs.What should you recommend?A. Install a new server that runs a 64-bit version of Windows Server 2008 Enterprise. Install the Hyper-V feature on the new server. Install App1 and App2 in separate virtual machines.B. Install a new server that runs a 64-bit version of Windows Server 2008 Datacenter. Install Windows System Resource Manager (WSRM) on the new server. Install App1 and App2 on the new server.C. Install two new servers that run 64-bit versions of Windows Server 2008 Enterprise. On both servers, install the Hyper-V feature. Install App1 as a virtual machine on one server. Install App2 as a virtual machine on the other server.D. Install two new servers. Install the 32-bit version of Windows Server 2008 Enterprise on one server. Install the 64-bit version of Windows Server 2008 Enterprise on the other server. Install Windows System Resource Manager (WSRM) on both servers. Install App1 on the 32-bit server. Install App2 on the 64-bit server.Answer: A6. Your network contains a single Active Directory site. You have a server named Server1 that runs Windows Server 2008. Server1 is a DHCP server for the network.You need to plan the automated deployment of operating systems. Your plan must meet the following requirements:Support Windows Vista deploymentsSupport Windows Server 2008 deploymentsSupport computers that start from a Pre-boot Execution Environment (PXE) network adapterMinimize the number of servers installedWhat should you include in your plan?A. Deploy Windows Automated Installation Kit (Windows AIK) on Server1.B. Deploy Windows Automated Installation Kit (Windows AIK) on a new server.C. Deploy the Windows Deployment Services (WDS) server role on Server1.D. Deploy the Windows Deployment Services (WDS) server role on a new server.Answer: C7. Your network contains a single Active Directory site.You plan to deploy 1,000 new computers that will run Windows Vista Enterprise. The new computers have Pre-boot Execution Environment (PXE) network adapters.You need to plan the deployment of the new computers to meet the following requirements:Support 50 simultaneous installations of Windows VistaMinimize the impact of network operations during the deployment of the new computersMinimize the amount of time required to install Windows Vista on the new computersWhat should you include in your plan?A. Deploy the Windows Deployment Services (WDS) server role. Configure the IP Helper tables on all routers.B. Deploy the Windows Deployment Services (WDS) server role. Configure each WDS server by using native mode.C. Deploy the Windows Deployment Services (WDS) server role and the Transport Server feature.Configure the Transport Server to use a custom network profile.D. Deploy the Windows Deployment Services (WDS) server role and the Transport Server feature. Configure the Transport Server to use a static multicast address range.Answer: D8. Your network has a DHCP server that runs the 64-bit version of Windows Server 2008. The network only uses IPv4.You plan to deploy 50 new Windows Server 2008 servers. Some of the new servers contain 64-bit hardware and some of the servers contain 32-bit hardware. All of the new server hardware supports Pre-Boot Execution Environment (PXE).You need to plan for the automated deployment of the new servers. You want to achieve this goal while minimizing hardware costs.What should you include in your plan?A. Deploy Windows Deployment Services (WDS) on the DHCP server.B. Deploy Remote Installation Services (RIS) on a 64-bit server that runs Windows Server 2003.C. Deploy Windows Deployment Services (WDS) on two servers that run Windows Server 2008. One of the servers is a 64-bit server, and the other server is a 32-bit server.D. Deploy Remote Installation Services (RIS) on two servers that run Windows Server 2003 Service Pack2. One of the servers is a 64-bit server, and the other server is a 32-bit server.Answer: A9. Your company has 250 branch offices.Your network contains an Active Directory domain. The domain controllers run Windows Server 2008. You plan to deploy Read-only Domain Controllers (RODCs) in the branch offices.You need to plan the deployment of the RODCs to meet the following requirements:Build each RODC at the designated branch office.Ensure that the RODC installation source files do not contain cached secrets.Minimize the bandwidth used during the initial synchronization of Active Directory Domain Services (AD?DS).What should you include in your plan?A. Use Windows Server Backup to perform a full backup of an existing domain controller. Use the backup to build the new RODCs.B. Use Windows Server Backup to perform a custom backup of the critical volumes of an existing domain controller. Use the backup to build the new RODCs.C. Create a DFS namespace that contains the Active Directory database from one of the existing domain controllers. Build the RODCs by using an answer file.D. Create an RODC installation media. Build the RODCs from the RODC installation media.Answer: D10. Your network consists of a single Active Directory forest that contains multiple domains. The domain controllers run Windows Server 2008 and have the DNS Server server role installed.For name resolution, you plan to replace a legacy Windows Internet Name Service (WINS) environment with a DNS-only environment.You need to plan the infrastructure for name resolution to meet the following requirements:Support IPv4 and IPv6 environmentsAllow single-label name resolution across all domainsMinimize the amount of NetBIOS over TCP/IP (NetBT) traffic on the networkWhat should you include in your plan?A. Configure a GlobalNames zone on each domain controller.B. Modify each DNS zone to perform a WINS forward lookup.C. Configure each DNS zone to replicate to each DNS server in the forest.D. Modify each DNS zone to replicate as part of a custom Active Directory replication partition. Answer: A11. Your network contains an Active Directory forest named .You plan to deploy a new child domain named . The child domain will contain two domain controllers. Both domain controllers will have the DNS Server server role installed. All users and computers in the branch office will be members of the domain.You need to plan the DNS infrastructure for the child domain to meet the following requirements:Ensure resources in the root domain are accessible by fully qualified domain names.Ensure resources in the child domain are accessible by fully qualified domain names.Provide name resolution services in the event that a single server fails for a prolonged period of time. Automatically recognize when new DNS servers are added to or removed from the domain. What should you include in your plan?A. On both domain controllers, add a conditional forwarder for and create a standard primary zone for .B. On both domain controllers, modify the root hints to include the domain controllers for . On one domain controller, create an Active Directory-integrated zone for .C. On one domain controller create an Active Directory-integrated zone for and create an Active Directory-integrated stub zone for .D. On one domain controller, create a standard primary zone for . On the other domain controller, create a standard secondary zone for .Answer: C12. Your network is configured as shown in the following diagram.You deploy an enterprise certification authority (CA) on the internal network. You also deploy a Microsoft Online Responder on the internal network.You need to recommend a secure method for Internet users to verify the validity of individual certificates. The solution must minimize network bandwidth.What should you recommend?A. Deploy a subordinate CA on the perimeter network.B. Install a stand-alone CA and the Network Device Enrollment Service (NDES) on a server on the perimeter network.C. Install a Network Policy Server (NPS) on a server on the perimeter network. Redirect authentication requests to a server on the internal network.D. Install Microsoft Internet Information Services (IIS) on a server on the perimeter network. Configure IIS to redirect requests to the Online Responder on the internal network.Answer: D13. Your network contains servers that run either Windows Server 2003 or Windows Server 2008. All client computers run Windows Vista.Your company has a public key infrastructure (PKI) that includes an offline root certification authority (CA) and two enterprise subordinate CAs. All CAs run Windows Server 2003.You publish the certificates to the user accounts and the computer accounts in Active Directory.Your company creates an engineering department.You need to plan a PKI solution for the Windows Vista client computers and the Windows Server 2008 servers that are in the engineering department. Your solution must meet the following requirements:The certificates must support Suite B hashing and encryption algorithms.The private keys must be stored in Active Directory.The administrative effort to manage certificates for your network must be minimized.What should you include in your plan?A. Install a new Windows Server 2008 enterprise subordinate CA.B. Install a new Windows Server 2008 stand-alone subordinate CA.C. Deploy a new PKI that uses Windows Server 2008 CAs. Configure cross-certification between the CA hierarchies.D. Create a new Active Directory forest. Deploy a new PKI that uses Windows Server 2008 CAs. Configure one-way forest trusts between the two forests.Answer: A14. Your company has 100 physical servers that have 64-bit hardware and that run Windows Server 2003. You need to consolidate the 100 physical servers into 30 physical servers that run Windows Server 2008. You must achieve this goal while meeting the following requirements:Maximize resource utilizationUse existing hardware and softwareSupport 64-bit virtual machinesMaintain separate services among the serversWhat should you do?A. Consolidate services across the physical machines and create the necessary host (A) records.B. Install Microsoft Virtual PC and convert the physical machines into virtual machines.C. Install Microsoft Virtual Server 2005 R2 and convert the physical machines into virtual machines.D. Install the Hyper-V feature and convert the physical machines into virtual machines.Answer: D15. Your network contains two DHCP servers. The DHCP servers are named DHCP1 and DHCP2. The internal network contains 1,000 DHCP client computers that are located on a single subnet. A router separates the internal network from the Internet. The router has a single IP address on the internal interface.DHCP1 has the following scope information.Starting IP address: 172.16.0.1Ending IP address: 172.16.7.255Subnet mask: 255.255.240.0You need to provide a fault-tolerant DHCP infrastructure that supports the client computers on the internal network. In the event that a DHCP server fails, all client computers must be able to obtain a valid IP address.How should you configure DHCP2?A. Create a scope for the subnet 172.16.0.0/20. Configure the scope to use a starting IP address of 172.16.8.1 and an ending IP address of 172.16.15.254.B. Create a scope for the subnet 172.16.0.0/21. Configure the scope to use a starting IP address of 172.16.0.1 and an ending IP address of 172.16.15.254.C. Create a scope for the subnet 172.16.8.0/21. Configure the scope to use a starting IP address of 172.16.8.1 and an ending IP address of 172.16.10.254.D. Create a scope for the subnet 172.17.0.0/16. Configure the scope to use a starting IP address of 172.17.0.1 and an ending IP address of 172.17.255.254.Answer: A16. Your company has a main office and three branch offices. The network consists of a single Active Directory domain. Each office contains an Active Directory domain controller.You need to create a DNS infrastructure for the network that meets the following requirements:The DNS infrastructure must allow the client computers in each office to register DNS names within their respective offices.The client computers must be able to resolve names for hosts in all offices.What should you do?A. Create an Active Directory-integrated zone at the main office site.B. Create a standard primary zone at the main office site and at each branch office site.C. Create a standard primary zone at the main office site. Create a secondary zone at each branch office site.D. Create a standard primary zone at the main office site. Create an Active Directory-integrated stub zone at each branch office site.Answer: A17. Your network consists of a single Active Directory domain. The network contains two Windows Server 2008 computers named Server1 and Server2. The company has two identical print devices.You plan to deploy print services.You need to plan a print services infrastructure to meet the following requirements:Manage the print queue from a central location.Make the print services available, even if one of the print devices fails.What should you include in your plan?A. Install and share a printer on Server1. Enable printer pooling.B. Install the Terminal Services server role on both servers. Configure Terminal Services Session Broker (TS Session Broker).C. Install and share a printer on Server1. Install and share a printer on Server2. Use Print Management to install the printers on the client computers.D. Add Server1 and Server2 to a Network Load Balancing cluster. Install a printer on each node of the cluster.Answer: A18. Your network contains two servers that run the Server Core installation of Windows Server 2008. Thetwo servers are part of a Network Load Balancing cluster. The cluster hosts a Web site. Administrators use client computers that run Windows Vista.You need to recommend a strategy that allows the administrators to remotely manage the Network Load Balancing cluster. Your strategy must support automation.What should you recommend?A. On the servers, enable Windows Remote Management (WinRM).B. On the servers, add the administrators to the Remote Desktop Users group.C. On the Windows Vista client computers, enable Windows Remote Management (WinRM).D. On the Windows Vista client computers, add the administrators to the Remote Desktop Users group. Answer: A19. Your company has a main office and a branch office.You plan to deploy a Read-only Domain Controller (RODC) in the branch office.You need to plan a strategy to manage the RODC. Your plan must meet the following requirements: Allow branch office support technicians to maintain drivers and disks on the RODCPrevent branch office support technicians from managing domain user accountsWhat should you include in your plan?A. Configure the RODC for Administrator Role Separation.B. Configure the RODC to replicate the password for the branch office support technicians.C. Set NTFS permissions on the Active Directory database to Read & Execute for the branch office support technicians.D. Set NTFS permissions on the Active Directory database to Deny Full Control for the branch office support technicians.Answer: A20. Your company has a main office and a branch office. All domain administrators are located in the main office. Two support technicians are located in the branch office.You plan to deploy a new Windows Server 2008 server in the branch office.You need to plan for the management of the new Windows Server 2008 server. Your plan must meet the following requirements:Allow the support technicians to install server rolesAllow the support technicians to stop and start servicesMinimize the security privileges granted to the support techniciansWhat should you include in your plan?A. Add the support technicians to the Domain Admins group.B. Assign the support technicians to the Administrators group on the new Windows Server 2008 server.C. Configure the restricted enrollment agent on the new Windows Server 2008 server. Create a permissions list for the support technicians.D. Place the new Windows Server 2008 server in a new organizational unit (OU). Assign the support technicians permission to modify objects in the new OU.Answer: B21. You plan to move 50 Windows Server 2008 servers from an existing network segment to a new network segment.You need to recommend a method for changing the TCP/IP addresses on the 50 servers. You want to achieve this goal by using the minimum amount of administrative effort.What should you recommend?A. Visit each server to make the changes.B. Run the Netsh tool from an administrators client computer.C. Run the ServerManagerCMD tool from an administrators client computer.D. Connect to each server by using Remote Desktop to make the changes.Answer: B22. Your network consists of a single Active Directory domain. The network contains five Windows Server 2008 servers that host Web applications.You need to plan a remote management strategy to manage the Web servers. Your plan must meet the following requirements:Allow Web developers to configure features on the Web sitesPrevent Web developers from having full administrative rights on the Web serversWhat should you include in your plan?A. Configure request filtering on each Web server.B. Configure authorization rules for Web developers on each Web server.C. Configure the security settings in Internet Explorer for all Web developers by using a Group Policy.D. Add the Web developers to the Account Operators group in the domain.Answer: B23. Your network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2008. The domain contains 200 Windows Server 2008 servers.You need to plan a monitoring solution that meets the following requirements.Sends a notification by e-mail to the administrator if an application error occurs on any of the servers Uses the minimum amount of administrative effortWhat should you include in your plan?A. On one server, create event subscriptions for each server. On the server, attach tasks to the application error events.B. On one server, create an Event Trace Sessions Data Collector Set. On all servers, create a System Performance Data Collector Set.C. On all servers, create event subscriptions for one server. On all servers, attach a task for the application error events.D. On all servers, create a System Performance Data Collector Set. On one server, configure the report settings for the new Data Collector set.Answer: A24. Your network contains 50 DNS servers that run Windows Server 2003. One of the DNS servers is named Server1. Server1 has Adminpak.msi installed.Administrators use client computers that run Windows Vista. The administrators manage the DNS servers by using a Remote Desktop Connection (RDC) to connect to Server1.You replace the 50 DNS servers with new servers that run the Server Core installation of Windows Server 2008. The Windows Server Core servers have the DNS Server server role installed.You need to plan for the administration of the new DNS servers. The administrators must manage the DNS server by using a Microsoft Management Console (MMC).What should you include in your plan?A. Deploy Windows PowerShell to all administrators by using a Group Policy.B. Deploy the Windows Server 2003 Adminpak.msi file to all administrators by using a Group Policy.C. Provide remote access to the Windows Server 2008 Server Core servers.D. Provide remote access to a Windows Server 2008 server that has the Remote Server Administration Tools (RSAT) installed.Answer: D25. You plan to deploy 10 servers that will run the Server Core installation of Windows Server 2008. The servers will only be accessible by using TCP ports 80 and 443.You need to plan for the administration of the Server Core servers to meet the following requirements: Enable administrators to install and administer server roles remotely.Enable administrators to fully manage the servers remotely.What should you include in your plan?A. On each server, use Oclist.exe.B. On each server, use Ocsetup.exe.C. On each server, enable Remote Desktop.D. On each server, enable Windows Remote Management (WinRM).Answer: D26. Your network consists of a single Active Directory domain. The network includes a branch office named Branch1. Branch1 contains 50 member servers that run Windows Server 2008.An organizational unit (OU) named Branch1-Servers contains the computer objects for the servers in Branch1. A global group named Branch1-admins contains the user accounts for the administrators. Administrators maintain all member servers in Branch1.You need to recommend a solution that allows the members of Branch1?admins group to perform the following tasks on the Branch1 member servers.Stop and start servicesChange registry settingsWhat should you recommend?A. Add the Branch1-admins group to the Power Users local group on each server in Branch1.B. Add the Branch1-admins group to the Administrators local group on each server in Branch1.C. Assign the Branch1-admins group change permissions to the Branch1-Servers OU and to all child objects.D. Assign the Branch1-admins group Full Control permissions on the Branch1-Servers OU and to all child objects.Answer: B27. Your network consists of a single Active Directory domain. The network includes a branch office named Branch1. Branch1 contains a member server named Server1. Server1 runs Windows Server 2008 and has the File Services server role installed.An organizational unit (OU) named Branch1-Servers contains the computer objects for the servers in Branch1. A global group named Branch1?admins contains the user accounts for the administrators. Administrators manage the shared folders on the servers in Branch1.You need to ensure that the members of Branch1-admins can create shared folders on Server1.What should you do?A. Add the Branch1-admins group to the Power Users local group on Server1.B. Add the Branch1-admins group to the Administrators local group on Server1.C. Assign Full Control permissions on the Branch1-Servers OU to the Branch1-admins group.D. Assign Create Shared Folders permissions on the Branch1-Servers OU to the Branch1-admins group. Answer: B28. Your network consists of a single Active Directory domain. The network includes a branch office named Branch1. Branch1 contains a Read-only Domain Controller (RODC) named Server1. A global group named Branch1?admins contains the user accounts for administrators. Administrators manage the client computers and servers in Branch1.You need to recommend a solution for delegating control of Server1. Your solution must meet the following requirements:Allow the members of the Branch1-admins group to administer Server1; including, change device drivers and install operating system updates by using Windows Update.。

Testpassport最新微软 70-515题库免费下载

Testpassport最新微软 70-515题库免费下载

2 / 12
The safer , easier way to help you pass any IT exams.
A.Add the following markup to the default.skin file. <asp:Button ID="Help"></asp:Button> <asp:Button ID="Default"></asp:Button> Use the following markup for the buttons in the page. <asp:Button SkinID="Help">Help</asp:Button> <asp:Button SkinID="Default">Detail</asp:Button> B.Add the following markup to the default.skin file. <asp:Button SkinID="Help"></asp:Button> <asp:Button ID="Default"></asp:Button> Use the following markup for the buttons in the page. <asp:Button SkinID="Help">Help</asp:Button> <asp:Button SkinID="Default">Detail</asp:Button> C.Add the following code segment to default.skin. <asp:Button SkinID="Help"></asp:Button> <asp:Button></asp:Button> Use the following markup for the buttons in the page. <asp:Button SkinID="Help"></asp:Button> <asp:Button SkinID="Default">Detail</asp:Button> D.Add the following markup to default.skin. <asp:Button SkinID="Help"></asp:Button> Answer: D 5.You are creating an Web site. The site has a master page named Custom.master. The code-behind file for Custom.master contains the following code segment. public partial class CustomMaster : MasterPage { public string Region { get; set; } protected void Page_Load(object sender, EventArgs e) { } } You create a new page and specify Custom.master as its master page. You add a Label control named lblRegion to the new page. You need to display the value of the master page's Region property in lblRegion. What should you do? A.Add the following code segment to the Page_Load method of the page code-behind file. CustomMaster custom = this.Parent as CustomMaster; lblRegion.Text = custom.Region; B.Add the following code segment to the Page_Load method of the page code-behind file. CustomMaster custom = this.Master as CustomMaster; lblRegion.Text = custom.Region; C.Add the following code segment to the Page_Load method of the Custom.Master.cs code-behind file.

身份验证错误要求的函数不受支持Windows远程桌面连接 远程桌面 发生身份验证word版

身份验证错误要求的函数不受支持Windows远程桌面连接 远程桌面 发生身份验证word版

身份验证错误要求的函数不受支持Windows远程桌面连接之前好好的能远程桌面连接到服务器,但是今天来就不能连接上了,并提示身份验证错误。

要求的函数不受支持。

猜想可能是Windows又更新了什么鬼,后面查询资料知道是由于CredSSP加密Oracle修正的原因,这里我整理了下解决方案,希望能帮到你。

微软给出解决方案2018 年5 月8 日罪魁祸首是由于Windows将默认设置,从“易受攻击”更改为“缓解”的更新引起的。

通用解决方案方案一安装补丁(强烈推荐)本地电脑和服务器端都同时安装更新补丁,更新以后重启服务器。

补丁单独下载地址win 7、win2008 R2KB4103718win 8、win2012KB4103730win10、win2016 KB4103721注意下载对应版本补丁进行安装,该方案博主没有亲测,请谨慎操作,如有探索的同学,可以试试,欢迎和博主一起交流学习。

方案二修改组策略设置(适用于windows专业版以上)打开运行gpedit.msc打开组策略编辑器应用确定完之后就可以进行远程连接方案三删除卸载更新(适用于windows10家庭版)Windows10家庭版,卸载KB4103727和KB4131372两个补丁包即可。

选择查看已安装的更新选择你要卸载的卸载即可补丁包需要逐个卸载,等第一个卸载完再卸载第二个,两个都卸载完毕后,重启电脑。

你又可以进行远程桌面连接了。

方案四windows10家庭版找回组策略(适用于windows10家庭版)以为windows 10 家庭版也可以通过组策略配置就可以了,就把组策略搞了出来,进入组策略发现没有那一项,,最后还是卸载了最后的那个更新补丁新建一个TXT文档,在里面写入@echo offpushd "%~dp0"dir /bC:\Windows\servicing\Packages\Microsoft-Windows-GroupPolicy-ClientE xtensions-Package~3*.mum >List.txtdir /bC:\Windows\servicing\Packages\Microsoft-Windows-GroupPolicy-ClientT ools-Package~3*.mum >>List.txtfor /f %%i in ('findstr /i . List.txt 2^>nul') do dism /online /norestart/add-package:"C:\Windows\servicing\Packages\%%i"pause最后将后缀改为.cmd结尾即可双机运行,等待他执行完,任意键退出即可重启PC,运行中再输入gpedit.msc即可调出组策略编辑器,再进行方案二的操作。

微软错误代码大全

微软错误代码大全
7 存储控制块被损坏。
8 存储空间不足,无法处理此命令。
9 存储控制块地址无效。
10 环境错误。
11 试图加载格式错误的程序。
12 访问码无效。
13 数据无效。
14 存储器不足,无法完成此操作。
15 系统找不到指定的驱动器。
125 磁盘没有卷标。
126 找不到指定的模块。
127 找不到指定的程序。
128 没有等候的子进程。
130 试图使用操作(而非原始磁盘 I/O)的已打开磁盘分区的文件句柄。
2006-5-31 11:53 回复
吉格斯的悲哀
151 为 DosMuxSemWait 指定的信号灯事件个数错误。
152 DosMuxSemWait 不可运行。已设置过多的信号灯。
153 DosMuxSemWait 清单错误。
154 输入的卷标超过目标文件系统的 长度限制
155 无法创建另一个线程。
135 试图在已被合并的驱动器上使用 JOIN 或 SUBST 命令。
136 系统试图解除未合并驱动器的 JOIN。
137 系统试图解除未替代驱动器的 SUBST。
138 系统试图将驱动器合并到合并驱动器上的目录。
139 系统试图将驱动器替代为替代驱动器上的目录。
212 段已锁定且无法重新分配。
214 连到该程序或动态链接模块的动态链接模块太多。
215 无法嵌套调用 LoadModule。
230 管道状态无效。
231 所有的管道实例都在使用中。
232 管道正在关闭中。
233 管道的另一端上无任何进程。
31 连到系统上的设备没有发挥作用。

信息系统运行管理员(基础知识、应用技术)合卷软件资格考试(初级)试题与参考答案(2024年)

信息系统运行管理员(基础知识、应用技术)合卷软件资格考试(初级)试题与参考答案(2024年)

2024年软件资格考试信息系统运行管理员(基础知识、应用技术)合卷(初级)模拟试题(答案在后面)一、基础知识(客观选择题,75题,每题1分,共75分)1、下列关于计算机系统组成结构的说法,错误的是()A. 计算机系统由硬件和软件两部分组成B. 硬件系统包括中央处理器(CPU)、存储器、输入输出设备等C. 软件系统包括系统软件和应用软件D. 计算机系统组成结构由冯·诺依曼结构发展而来,目前主流为冯·诺依曼结构2、下列关于操作系统功能的描述,不属于操作系统基本功能的是()A. 进程管理B. 内存管理C. 文件管理D. 编译3、以下哪个操作系统属于类Unix系统?A. Windows Server 2008B. LinuxC. macOSD. iOS4、以下关于TCP/IP协议的描述,哪项是错误的?A. TCP/IP协议是一种网络协议集合,用于数据在不同网络间的传输B. TCP/IP协议分为四层,分别为网络接口层、网络层、传输层和应用层C. IP协议主要负责数据包的路由和寻址D. TCP协议提供面向连接的服务,确保数据传输的可靠性5、问题:在信息系统运行管理中,以下哪项不属于系统性能监控的主要内容?A. 系统资源利用率B. 系统响应时间C. 网络带宽利用率D. 用户满意度调查6、问题:在信息系统运行管理中,以下哪项不属于系统安全策略的内容?A. 访问控制B. 数据备份与恢复C. 系统日志管理D. 硬件设备采购7、以下关于操作系统基本概念的说法中,不正确的是()A. 操作系统是计算机系统的核心软件B. 操作系统负责管理计算机的硬件资源C. 操作系统不负责管理计算机的应用软件D. 操作系统为用户提供一个良好的工作环境8、在Windows操作系统中,以下关于文件和文件夹的说法中,错误的是()A. 文件名可以包含中文字符B. 同一个文件夹中不允许有重名的文件C. 文件夹的名称可以包含空格D. 文件夹的名称可以包含特殊字符9、题目:在信息系统中,以下哪个不是系统运行管理员需要关注的数据备份策略?A. 定期全量备份B. 定期增量备份C. 定时备份D. 需求备份 10、题目:在信息系统运行管理过程中,以下哪个说法是错误的?A. 系统监控是确保系统稳定运行的关键B. 故障排除需要遵循一定的步骤和方法C. 系统优化可以提高系统性能D. 系统运行管理不需要关注网络安全问题11、以下哪项不属于软件资格考试信息系统运行管理员(基础知识、应用技术)合卷(初级)考试的范围?A. 系统运行管理的基本概念和原则B. 操作系统的基础知识C. 网络基础知识D. 软件工程的基本概念12、在信息系统运行管理中,以下哪种技术不属于数据备份的方法?A. 增量备份B. 全量备份C. 同步备份D. 异步备份13、以下关于信息系统运行管理员职责描述错误的是:()A. 负责信息系统的日常运行和维护B. 监控信息系统运行状态,确保系统稳定运行C. 制定和实施信息系统的安全策略D. 负责信息系统的用户管理和权限控制14、在信息系统中,以下哪项不是影响系统性能的主要因素?()A. 硬件性能B. 软件质量C. 数据存储方式D. 用户操作习惯15、题目:以下关于信息系统运行管理员职责的描述,不正确的是()A. 负责信息系统的日常运行维护B. 确保信息系统的安全可靠运行C. 负责信息系统的硬件设备管理D. 参与信息系统的新增功能开发和优化16、题目:在信息系统中,以下哪项不属于信息系统运行管理员的工作内容?()A. 监控系统运行状态B. 处理系统故障C. 编写系统需求分析报告D. 定期备份数据17、题目:在计算机网络中,以下哪个协议主要用于网络设备间的通信?A. HTTPB. FTPC. TCP/IPD. SMTP18、题目:关于数据库的规范化理论,以下哪项说法是正确的?A. 第一范式(1NF)要求每个字段都是不可分割的原子值B. 第二范式(2NF)要求所有非主键字段必须完全依赖于主键C. 第三范式(3NF)要求所有非主键字段必须只依赖于主键D. 以上都是19、信息系统运行管理员在处理用户投诉时,应遵循的原则是:A. 首先责怪用户,然后解决问题B. 忽略投诉,认为不重要C. 认真倾听,耐心解答,确保用户满意D. 忽视用户反馈,只关注技术问题 20、在信息系统运行维护中,以下哪个选项不是导致系统故障的常见原因?A. 硬件故障B. 软件缺陷C. 网络连接中断D. 用户操作失误21、以下关于操作系统内核的描述中,哪个是错误的?A. 内核是操作系统的核心部分,负责管理计算机资源B. 内核通常包含进程管理、内存管理、文件系统和设备驱动程序等模块C. 内核在用户态和内核态之间进行切换时,需要保护用户程序不被内核程序直接访问D. 内核可以随时被用户程序直接调用,而不需要通过系统调用接口22、以下关于数据库管理系统的描述中,哪个是正确的?A. 数据库管理系统(DBMS)是用于存储和检索数据的软件系统B. 数据库管理系统负责管理数据库的数据完整性、安全性和并发控制C. 数据库管理系统只支持关系型数据库D. 数据库管理系统在处理大量数据时,其性能会降低23、以下哪项不是信息系统运行管理员需要掌握的信息安全基础知识?A. 加密技术B. 访问控制C. 网络安全D. 数据备份与恢复24、在信息系统运行管理中,以下哪种情况不属于系统故障?A. 硬件故障导致服务器无法启动B. 系统软件异常导致服务中断C. 网络连接不稳定导致数据传输失败D. 信息系统管理员忘记用户密码25、在信息系统中,数据备份的目的是什么?A、提高数据存储容量B、防止数据丢失和损坏C、增加系统性能D、优化数据存储结构26、以下哪项不属于信息系统运行管理员的工作职责?A、监控信息系统运行状态B、制定信息系统运行维护计划C、进行信息系统硬件设备的安装和调试D、编写信息系统需求规格说明书27、以下关于数据库事务的描述中,哪个说法是错误的?A. 事务具有原子性(Atomicity)B. 事务具有一致性(Consistency)C. 事务具有隔离性(Isolation)D. 事务具有可持久性(Durability)28、在Linux系统中,以下哪个命令用于查看当前系统的CPU使用情况?A. freeB. topC. psD. lscpu29、在信息系统运行管理中,以下哪项不属于常见的系统故障类型?A. 软件故障B. 硬件故障C. 网络故障D. 数据库故障E. 用户操作失误 30、以下关于信息系统运行管理中日志管理的说法,错误的是:A. 日志管理是确保信息系统安全的重要手段B. 日志记录应包括系统操作记录、错误记录和系统运行状态记录C. 日志记录应当定期清理,防止占用过多存储空间D. 日志记录应当永久保存,以便于事后分析31、在信息系统安全领域,下列哪一项不是实现信息安全的基本要素?•A) 物理安全•B) 访问控制•C) 数据加密•D) 系统冗余32、关于云计算中的SaaS(Software as a Service)模式,下列描述错误的是?•A) 用户无需关心软件的安装与维护•B) 可根据需求灵活调整服务规模•C) 用户可以直接在自己的服务器上部署应用•D) 服务通常基于订阅模式提供33、【题目】在信息系统中,下列哪项不属于系统维护的内容?A. 数据备份与恢复B. 系统性能监控C. 硬件设备更新D. 系统安全审计34、【题目】以下哪项技术不属于数据加密技术?A. 对称加密B. 非对称加密C. 混合加密D. 数据脱敏35、在计算机网络中,用于实现不同网络间的通信设备被称为?A. 中继器B. 路由器C. 集线器D. 网桥36、在操作系统中,负责管理和调度进程的模块称为?A. 文件管理B. 存储管理C. 设备管理D. 进程管理37、在信息系统中,以下哪个概念通常用来表示系统中存储的数据?A. 程序B. 文件C. 数据库D. 硬件38、在信息系统设计中,以下哪种设计模式通常用于实现对象之间的松耦合?A. 单例模式B. 工厂模式C. 观察者模式D. 命令模式39、下列关于计算机网络拓扑结构的说法正确的是:A. 星型结构中,各节点直接相连,任意两个节点间可直接通信。

微软考证70-640

微软考证70-640

1.公司有一个总部和一个分部。

你将运行Microsoft Windows Server 2008 的只读域控制器(RODC) 部署在分部。

你需要确保分部的用户能够使用RODC 登录到域。

你该怎么做?A在分部再部署一个RODCB在总部部署一台桥头服务器C在RODC 上配置密码复制策略D使用“Active Directory 站点和服务”控制台减少所有连接对象的复制时间间隔答案:C2.公司有一个总部和一个分部。

公司有一个单域的Active Directory 林。

总部有两个运行Windows Server 2008 的域控制器,并且分别名为DC1 和DC2。

分部有一台Windows Server 2008 只读域控制器(RODC),名为DC3。

所有域控制器都承担着DNS 服务器角色,并都配置为Active Directory 集成区域。

DNS 区域只允许安全更新。

你需要在DC3 上启用动态DNS 更新。

你该怎么做?A在DC3 上运行Ntdsutil.exe > DS Behavior 命令。

B在DC3 上运行Dnscmd.exe /ZoneResetType 命令。

C在DC3 上将Active Directory 域服务重新安装为可写域控制器。

D在DC1 上安装自定义应用程序目录分区。

配置该分区以存储Active Directory 集成区域。

答案:C3.公司有一个Active Directory 林,其中只包含Windows Server 2003 域控制器。

你需要准备Active Directory 域,以安装Windows Server 2008 域控制器。

你应该执行哪两项任务?(每个正确答案表示解决方法的一部分。

请选择两个正确答案。

)A运行adprep !forestprep 命令。

B运行adprep /domainprep 命令。

C将林功能级别提升为Windows Server 2008。

2024年4月自考管理系统中计算机应用考前试题和复习资料

2024年4月自考管理系统中计算机应用考前试题和复习资料

2024年4月自考《管理系统中计算机应用》考前试题和答案00051一、选择题(本大题共30小题,每小题1分,共30分)在每小题列出的四个备选项中只有一个是符合题目要求的,请将其代码填写在题后的括号内。

错选、多选或未选均无分。

第1题在软件系统维护中,工作量最大的是()A. 完善性维护B. 适应性维护C. 纠错性维护D. 预防性维护【正确答案】 A【你的答案】本题分数1分第2题假如用户A对关系SP.QTY有读权,说明A用户可以()A. 查询SP中QTY字段B. 查询SP关系C. 修改SP中QTY字段D. 修改SP关系结构【正确答案】 A【你的答案】本题分数1分第3题组成中心处理器的是运算器、限制器和()A. CPUB. 总线C. CacheD. 寄存器【正确答案】 D【你的答案】本题分数1分第4题快捷菜单的挂接对象是()A. 下拉菜单B. 吩咐按钮C. 表D. 视图【正确答案】 B【你的答案】本题分数1分第5题在企业管理中建立信息系统, 对负责系统开发的企业领导培训, 其内容主要有:管理信息系统的基本概念,系统开发的()A. 方法和原则B. 方法和步骤C. 步骤和规范D. 必要性和可行性【正确答案】 A【你的答案】本题分数1分第6题企业信息化主要体现在:企业运作过程的自动化、智能化,企业管理决策的网络化、智能化和企业()A. 办公自动化B. 商务活动电子化C. 计算机集成制造D. 经理信息系统【正确答案】 B【你的答案】本题分数1分第7题要阅读当前视图的结构()A. 用LIST STRUCTURE吩咐B. 用表设计器C. 用视图设计器D. 不支持【正确答案】 A【你的答案】本题分数1分第8题计算机协助生成的数据字典具有的功能为:查询、维护、统计和()A. 分析B. 重构C. 修改D. 重组织【正确答案】 A【你的答案】本题分数1分第9题智能决策支持系统及决策支持系统在结构上的区分是增加了()A. 推理机B. 推理机和数据库C. 学问库D. 推理机和学问库【正确答案】 D【你的答案】本题分数1分第10题应用软件重新开发,是指需重新开发一个新系统来取代()A. 已停止运用的软件B. 正在开发将投入运行的软件C. 正在运行的软件D. 尚未投入运行的软件【正确答案】 C【你的答案】本题分数1分第11题系统开发采纳托付开发的方式, 其主要缺点是()A. 质量差B. 系统维护困难C. 开发周期长D. 难适应本企业要求【正确答案】 B【你的答案】本题分数1分第12题应用最早,运用较广泛的MIS结构形式为()A. 层次结构B. 职能结构C. 功能结构D. 管理阶段结构【正确答案】 B【你的答案】本题分数1分第13题影响系统平安的主要因素有:自然灾难、偶然事务;软件的非法删改、复制和窃取;数据的非法篡改、盗用或破坏及()A. 硬件故障B. 软件故障C. 系统故障D. 计算机病毒【正确答案】 A【你的答案】本题分数1分第14题以下哪种陈述是错误的:数据流程图是()A. 对原系统分析和抽象的工具B. 描述新系统逻辑模型的主要工具C. 对原系统业务描述的主要工具D. 对新系统的需求进行综合分析的工具【正确答案】 C【你的答案】本题分数1分第15题系统开发的参与者有:系统分析员、程序设计员和()A. 企业领导B. 系统开发领导小组成员C. 各职能部门负责人D. 企业管理人员【正确答案】 D【你的答案】本题分数1分第16题发展CASE的目的是提高()A. 系统的重用性B. 系统可维护性C. 系统可扩充性D. 系统开发效率和质量【正确答案】 D【你的答案】本题分数1分第17题在下列企业经营活动中,信息更新间隔期最长的是()A. 制定战略规划B. 日常业务管理C. 生产安排编制D. 作业安排编制【正确答案】 A【你的答案】本题分数1分第18题信息系统执行性规划包括:系统运行环境描述,系统硬、软件配置,系统目标及范围描述和()A. 系统功能描述B. 系统开发安排C. 系统开发方法D. 系统开发方式【正确答案】 B【你的答案】本题分数1分第19题数据库重构造是指()A. 有限的变更数据库逻辑结构B. 变更数据的存储位置C. 对数据库逻辑结构重新设计D. 重新选择数据库管理系统【正确答案】 A【你的答案】本题分数1分第20题在下列企业经营活动中,对信息精度要求最高的是()A. 制定战略规划B. 日常业务管理C. 管理限制D. 资源配置【正确答案】 B【你的答案】本题分数1分第21题数据流程图中的数据存储是指()A. 文件B. 数据库C. 逻辑上存储的数据D. 磁盘文件【正确答案】 C【你的答案】本题分数1分第22题须要从当前菜单项打开其下一级菜单设计窗口,应当选择该菜单项的“结果”列为()A. 吩咐B. 过程C. 填充名称D. 子菜单【正确答案】 D【你的答案】本题分数1分第23题数据库管理系统常见的3种数据模型是()A. 网状、关系和语义B. 层次、关系和网状C. 环状、层次和关系D. 网状、键状和层次【正确答案】 B【你的答案】本题分数1分第24题应用软件系统开发的发展趋势,是采纳()A. 自行开发B. 托付开发C. 合作开发D. 购买软件包【正确答案】 D【你的答案】本题分数1分第25题系统运行后,保证系统牢靠性的技术措施主要有:设备冗余技术、负荷分布技术和()A. 双机方式B. 系统重新组合技术C. 数据拷贝D. 分级的客户-服务器技术【正确答案】 B【你的答案】本题分数1分第26题在程序调试器窗口中的调试功能按钮一共有()A. 3个B. 4个C. 5个D. 6个【正确答案】 D【你的答案】本题分数1分第27题顶层数据流程图的组成一般包括:系统处理功能、数据来源、信息去向和()A. 数据字典B. 系统数据存储C. 系统共享数据存储D. 主要数据存储【正确答案】 C【你的答案】本题分数1分第28题 U/C矩阵的正确性,由以下三方面检验:完备性、无冗余性和()A. 共享性B. 一样性C. 唯一性D. 相关性【正确答案】 B【你的答案】本题分数1分第29题数据库的维护主要指:数据库平安限制;数据库的正确性爱护、转储和复原;数据库的()A. 数据更新B. 结构修改C. 重组织及重构造D. 文件结构修改【正确答案】 C【你的答案】本题分数1分第30题在面对对象的程序设计中,对于数据和操作应当()A. 独立设计B. 统一设计C. 捆绑设计D. 重复设计【正确答案】 C二、名词说明题(本大题共5小题,每小题3分,共15分)第1题表单【正确答案】表单(Form)在系统中是用户的主要界面,它是一个容器类对象。

微软认证70432课程教材

微软认证70432课程教材

Pass4sideExam:Microsoft70-432Title:TS:MS SQL Server@2008,Implementation andMaintenanceVersion:DemoImportant Note, Please Read CarefullyOther Pass4Side productsAll Pass4Side IT Exam ProductsPass4Side Popular Certifications:Cisco CertificationsCCNA | CCDA | CCNP | CCIE | CCIP | CCVP | CCDP | CCSP | IP CommunicationIBM CertificationsAdvanced Deployment Professional | Certified Administrator | Certified Enterprise Developer | DB2 | Certified Specialist | eserver Certified Specialist | Cognos 8 BI | Application Developer | Lotus CertificationOracle Certifications9i DBA | 9i Internet Application Developer | OCA | 10g DBA | Oracle 11i | Oracle 11gLatest VersionWe are constantly reviewing our products. New material is added and old material is revised. Free updates are available for 90 days after the purchase. Y ou should check your member zone at Pass4Side and update 3­4 days before the scheduled exam date.FeedbackIf you spot a possible improvement then please let us know. We always interested in improving product quality.Feedback should be send to pass4side(at). Y ou should include the following: Exam number, version, page number, question number, and your login Account.Our experts will answer your mail promptly.ExplanationsThis product does not include explanations at the moment. If you are interested in providing explanations for this exam, please contact pass4side(at).1.You work in a company which is named Wiikigo Corp.The company uses SQL Server2008.You are the administrator of the company database.Now you are in charge of a SQL Server2008instance.There is a computer which hosts several applications in your company.The instance runs on the computer.A job named DiliveryList is created by you.This job requires a file to be written to a file server.But because the job cannot access the file server,it fails to run.You intend to configure the SQL Server Agent service so that only the SQL Server Agent service has read and write access to the file server.Which account type should you use?A.You should use local Service accountB.You should use network Service accountC.You should use domain accountD.You should use local System accountAnswer:C2.You work in a company which is named Wiikigo Corp.The company uses SQL Server2008.You are the administrator of the company database.Now you are in charge of a SQL Server2008instance.There is a database named DB1in the instance.On DB1,quite few logged operations are performed.Now according to the requirement of the company CIO,you must validate that the database can be restored to a specific point in time.So what action should you perform to achieve this goal?A.You should verify that the simple recovery model is used by the databaseB.You should verify that the full recovery model is used by the database.C.You should verify that the checksum page verify option is used by the databaseD.You should verify that the bulk-logged recovery model is used by the databaseAnswer:B3.You work in a company which is named Wiikigo Corp.The company uses SQL Server2008.You are the administrator of the company database.Now you are in charge of a SQL Server2008instance.There is a SQL Server7.0database.You upgrade the database to the SQL Server instance.According to the company requirement,you must make sure that suspect pages can be detected in the database.So what action should you perform to achieve this goal?A.For the database,you should turn on the TRUSTWORTHY database optionB.For the database,the PAGE_VERIFY database option should be set to CHECKSUMC.For the database,the database compatibility level option should be set to10.D.For the model database,the PAGE_VERIFY database option should be set to TORN_PAGE_DETECTION.Answer:B4.You work in a company which is named Wiikigo Corp.The company uses SQL Server2008.You are the administrator of the company database.Now you are in charge of a SQL Server2008instance.You configure the SQL Server instance to use the-T1222and-T1204trace flags during startup.You must make sure that your failure recovery plan performs backup of the use of the trace flags.So what action should you perform to achieve this goal?A.You should backup the master databaseB.You should backup the default.trc fileC.You should backup the SQL Server registry hive.D.You should backup the resource databaseAnswer:C5.You work in a company which is named Wiikigo Corp.The company uses SQL Server2008.You are the administrator of the company database.Now you are in charge of a SQL Server2008instance.According to the company requirement,the names of all user-defined stored procedures must contain the prefix usp_ on all instances.Besides this,you must make sure that stored procedures that do not contain this prefix cannot be created by you.What should you do?A.A policy should be created.The policy targets the name of the stored procedure that is evaluated on demand.B.A policy should be created.The policy targets the name of the stored procedure that is evaluated on change.C.A condition should be created.The condition targets the name of the stored procedure that is evaluated on changeD.A condition should be created.The condition targets the name of stored procedure that is evaluated on demand.Answer:B6.You work in a company which is named Wiikigo Corp.The company uses SQL Server2008.You are the administrator of the company database.Now you are in charge of a SQL Server2008instance.There is an Internet Information Services application.This application will use anonymous access to access the SSAS instance.You must make sure that the application can access the SSAS instance.What should you do?A.The Security\RequireClientAuthentication server configuration should be set to FalseB.The Security\RequireClientAuthentication server configuration should be set to True.C.The NTLM Security Support Provider Interface(SSPI)provider should be added to the Security\SecurityPackageList server configuration.D.The Kerberos Security Support Provider Interface(SSPI)provider should be added to the Security\SecurityPackageList server configurationAnswer:A7.You work in a company which is named Wiikigo Corp.The company uses SQL Server2008.You are the administrator of the company database.Now for a new application,a SQL Server2008instance has to be installed on an existing server.The server contains a default SQL Server2005instance.Your company CIO wants their corresponding certified third-party applications can access to both database instances.The company assigns this task to you.You must achieve this by using as little database administrative effort as possible,and never change the existing application environments.What should you do?A.You should install SQL Server2008as the default instance,and configure the new application to use the default instanceB.You should upgrade the SQL Server2005application to use SQL Server2008C.You should upgrade the SQL Server2005instance to a SQL Server2008instanceD.You should install SQL Server2008as a named instance,and make the new application use the new instance.Answer:D8.You work in a company which is named Wiikigo Corp.The company uses SQL Server2008.You are the administrator of the company database.Now you are in charge of a SQL Server2008instance.Now yourcompany CIO assigns a task to you.The company CIO wants you to configure FILESTREAM data and the two requirements below must be met:you must enable FILESTREAM for file I/O streaming access;remote client computers must be able to have streaming access to FILESTREAM data.You must make sure that FILESTREAM data is enabled.Which service should you configure?A.You should configure SQL Server VSS WriterB.You should configure Distributed File SystemC.You should configure SQL ServerD.You should configure SQL Server Full TextAnswer:C9.You work in a company which is named Wiikigo Corp.The company uses SQL Server2008.You are the administrator of the company database.Now you are in charge of two instances both of which run on the same computer.One is a SQL Server2008instance;another is a SQL Server2005instance.There is a database named DB1in the SQL Server2008instance.DB1uses the Fulltext indexes.Several records that include the word"root"are added to DB1.An empty resultset is returned when the Fulltext index is queried for the word"root."You must make sure the query can return records that contain the word"root". What should you do?A.You should terminate and restart the MSFTESQL serviceB.You should rebuild the full-text indexC.The word"root"should be added to the stop listD.The word"root"should be added to the thesaurus fileAnswer:B10.You work in a company which is named Wiikigo Corp.The company uses SQL Server2008.You are the administrator of the company database.Now you are in charge of a SQL Server2008instance.You must make sure that all SQL Server instances are consistently configured for naming conventions,security settings,force index creation and avoidance of data fragmentation.So what action should you perform to achieve this goal?A.You should use the Database Engine Tuning Advisor.B.In Microsoft SQL Server Management Studio,you should create a maintenance planC.You should use the SQL Server Configuration ManagerD.In Microsoft SQL Server Management Studio,you should create a policyAnswer:D11.You work in a company which is named Wiikigo Corp.The company uses SQL Server2008.You are the administrator of the company database.Now you are in charge of a SQL Server2008instance.There is a database named Dworks in the instance.The Dworks database has a table named Orderthings.The Orderthings table is partitioned on the OrderId column.The first partition contains integer values greater than100,000,while the second partition contains integer values between1and100,000.You have to add a new partition.The new partition should contain integer values greater than200,000.What should you do?A.A new partition function should be createdB.You should change the existing partition schemeC.You should use a Merge clause to change the existing partition functionD.You should use a Split clause to change the existing partition functionAnswer:D12.You work in a company which is named Wiikigo Corp.The company uses SQL Server2008.You are the administrator of the company database.Now you are in charge of a SQL Server2008instance.There is a database named Dworks in the instance.Now you get a report from users saying that DB1meets deadlock problems.As the technical support,you have to capture the deadlock information to the SQL Server error log.What should you do?A.For the AdventureWorks database,enable Server AuditingB.First you should set the appropriate trace flags as a startup parameter,and then restart the SQL Server instanceC.You should configure the data collector and make it capture the deadlock graphsD.You should configure a SQL Profiler trace,and make it capture the deadlock graphsAnswer:B13.You work in a company which is named Wiikigo Corp.The company uses SQL Server2008.You are the administrator of the company database.Now you are in charge of a SQL Server2008instance.There is adatabase named Dworks in the instance.The Dworks database has a table named Orderthings.According to the company requirement,you have to export all data from the Orderthings table to a file.During the export,you must make sure that the data export process is saved for reuse and a Microsoft Office Open XML document format is used.What should you do?A.You should run the bulk copy program utility along with an output file and no format fileB.You should run the SQLCmd utility and save the output to a fileC.You should run the SQL Import and Export Data Wizard and save the output to a file.D.You should run the bulk copy program utility along with a format file and an output file.Answer:C14.You work in a company which is named Wiikigo Corp.The company uses SQL Server2008.You are the administrator of the company database.Now you are in charge of a SQL Server2008instance.There is a database which is named Sellings in the instance.The Sellings database contains a table named Productions.The table is used to stores information about all types of products.The Productions table is often queried by users on the basis of the RadioSize column.The RadioSize column contains the NULL value for all products other than Radios.Currently no index exists on the RadionSize column.According to the requirement of the company CIO,you have to optimize the query performance and reduce the effect on the disk space to the least.So what action should you perform to achieve this goal?A.On the Products table,you should create a view.B.On the RadioSize column,you should create a clustered indexC.On the RadioSize column,you should create a filtered indexD.On the RadioSize column,you should create a unique clustered indexAnswer:C15.You work in a Organization which is named Wiikigo Corp.The Organization uses SQL Server2008.You are the administrator of the Organization database.Now you are in charge of a SQL Server2008instance. Look at the following query:SELECT s.*,i.*FROM SensitiveTbl AS s INNER JOIN InsensitiveTbl AS iON i. OrganizationName=anizationName You use the above query to join two tables on a column named OrganizationName.The following error is returned when you execute the query."Msg468,Level16,State 9,Line17Cannot resolve the collation conflict between'SQL_Latin1_General_CP1_CS_AS'and'SQL_Latin1_General_CP1_CI_AS'in the equal to operation."The ON clause of the query has to be modified so that it can perform a case-sensitive joinsuccessfully.What should you do?A.ON LOWER(anizationName)=LOWER(anizationName)B.ON UPPER(anizationName)=UPPER(anizationName)C.ON anizationName=anizationName COLLATE SQL_Latin1_General_CP1_CS_ASD.ON anizationName=anizationName COLLATE SQL_Latin1_General_CP1_CI_AS Answer:CPass 4 side was founded in 2003. The safer,easier way to help you pass any IT Certification exams . We provide high quality IT Certification exams practicequestions and answers(Q&A). Especially Adobe, Apple, Citrix, Comptia, EMC, HP, HuaWei, LPI, Nortel, Oracle, SUN, Vmware and so on. And help you pass any IT Certification exams at the first try.English Chinese (Traditional) http:// Chinese (Simplified) http:// 。

2024年9月GESP编程能力认证C++等级考试试卷四级真题(含答案)

2024年9月GESP编程能力认证C++等级考试试卷四级真题(含答案)

2024年9月GESP编程能力认证C++等级考试试卷四级真题(含答案) 一、单选题(每题2分,共30分)。

1. 在C++ 中,正确定义了一个返回整数值并接受两个整数参数的函数是()。

A. int add(int a, int b){ return a + b;}B. void add(int a, int b){ return a + b;}C. int add(a, b){ return a + b;}D. void add(int a, int b){ return a - b;}2. 在C++中,形参与实参的关系描述正确的是()。

A. 形参在函数调用时指定,实参在函数定义时传递。

B. 形参在函数定义时指定,实参在函数调用时传递。

C. 形参和实参可以互换D. 形参和实参必须是完全相同的类型,不能有任何差异。

3. 运行以下代码,屏幕上将输出()。

#include <iostream>using namespace std;int var =100;void function(){int var =200;cout << var << " ";cout << ::var << " ";}int main(){cout << var << " ";function();var +=100;cout << var << " ";return 0;}A. 100 200 100 200B. 100 200 100 300C. 100 200 200 200D. 100 200 200 3004. 运行下面代码,屏幕上输出是()。

int arr[3]={24, 9, 7};int* p =arr;p++;cout << *p << endl;A. 24B. 9C. 7D. 不确定5. 运行下面代码片段的结果是()。

2024年软件资格考试信息系统运行管理员(初级)(基础知识、应用技术)合卷试卷及解答参考

2024年软件资格考试信息系统运行管理员(初级)(基础知识、应用技术)合卷试卷及解答参考

2024年软件资格考试信息系统运行管理员(基础知识、应用技术)合卷(初级)复习试卷(答案在后面)一、基础知识(客观选择题,75题,每题1分,共75分)1、以下关于操作系统的作用描述错误的是:A、管理计算机硬件资源B、提供用户界面C、执行应用程序D、负责用户数据的存储2、在计算机系统中,以下哪种存储设备属于非易失性存储器?A、硬盘驱动器(HDD)B、光盘(CD)C、随机存取存储器(RAM)D、只读存储器(ROM)3、以下哪个选项不属于软件资格考试信息系统运行管理员(基础知识、应用技术)初级考试的范围?A. 操作系统基础知识B. 数据库管理技术C. 网络基础知识D. 软件工程基本概念4、在Linux操作系统中,以下哪个命令用于查看当前登录系统的所有用户?A. whoB. wC. usersD. passwd5、在计算机系统中,内存(RAM)的主要功能是什么?A、存储永久数据B、提供快速的数据存储空间以供CPU临时使用C、存储计算机的操作系统D、存储计算机的硬件驱动程序6、以下哪个不属于软件工程的五个核心过程?A、需求分析B、设计C、编码D、测试E、部署7、信息系统运行管理员在进行系统监控时,以下哪项指标通常不被直接监控,但对其性能有重要影响?A. 系统负载B. 磁盘空间使用率C. 网络带宽利用率D. 用户活跃度8、在信息系统运行维护中,以下哪种备份策略通常用于确保数据在灾难发生时的恢复?A. 完全备份B. 差异备份C. 增量备份D. 镜像备份9、在操作系统中,以下哪个组件负责管理计算机的内存资源?A. CPUB. 硬盘驱动器C. 内存管理器D. 网络适配器 10、以下哪项技术不属于数据库管理系统(DBMS)的核心功能?A. 数据定义B. 数据查询C. 数据备份D. 数据加密11、以下哪项不是信息系统运行管理员的工作职责?A. 监控信息系统运行状态B. 确保信息系统的安全性C. 负责信息系统的硬件维护D. 制定信息系统的运行策略12、在信息系统的运行过程中,以下哪种情况会导致系统性能下降?A. 系统硬件配置合理B. 系统软件版本过高C. 系统数据存储合理D. 系统网络带宽足够13、在计算机系统中,以下哪种存储设备的数据存取速度最快?A. 硬盘驱动器(HDD)B. 固态硬盘(SSD)C. 光盘驱动器D. 磁带驱动器14、以下哪个协议是用于在网络中传输文件的标准协议?A. HTTP(超文本传输协议)B. SMTP(简单邮件传输协议)C. FTP(文件传输协议)D. DNS(域名系统)15、在信息技术中,什么是“云计算”?A. 通过互联网提供的在线数据存储服务B. 通过互联网提供的在线计算资源服务C. 通过互联网提供的在线数据库服务D. 通过互联网提供的在线视频服务16、以下哪个不是数据库管理系统(DBMS)的主要功能?A. 数据定义B. 数据查询C. 数据备份与恢复D. 数据传输17、在信息系统中,以下哪个概念指的是一个组织或个人在特定时间点拥有的信息资源总和?A. 信息资产B. 信息系统C. 信息处理D. 信息交流18、在数据库设计中,以下哪种范式可以保证数据表中不存在部分依赖,从而提高数据的一致性和完整性?A. 第一范式(1NF)B. 第二范式(2NF)C. 第三范式(3NF)D. 第四范式(4NF)19、以下关于数据库事务的描述中,哪项是错误的?A. 事务是数据库操作的基本单位B. 事务必须是原子的,即事务中的所有操作要么全部完成,要么全部不做C. 事务具有隔离性,即事务的执行不会被其他事务干扰D. 事务是可重入的,即事务可以多次进入 20、以下关于操作系统进程管理的描述中,哪项是正确的?A. 进程是操作系统进行资源分配和调度的基本单位B. 线程是操作系统进行资源分配和调度的基本单位C. 进程和线程是同一概念的不同称谓D. 进程和线程没有区别,只是执行方式不同21、题目:在信息系统中,以下哪项不属于系统分析阶段的工作内容?A. 需求分析B. 系统设计C. 程序编码D. 系统测试22、题目:以下哪个不属于软件工程的基本原则?A. 单一职责原则B. 开放封闭原则C. 依赖倒置原则D. 贪婪复制原则23、在信息系统中,数据备份的主要目的是什么?A. 防止数据丢失B. 提高系统性能C. 加快系统响应速度D. 优化系统结构24、以下哪个不属于信息系统安全的基本要素?A. 机密性B. 完整性C. 可用性D. 可控性25、在信息系统中,数据库管理系统(DBMS)的主要作用是什么?26、在关系型数据库中,什么是“范式”(Normalization)?27、在信息系统中,以下哪项不属于数据备份的常见类型?A. 完全备份B. 差分备份C. 增量备份D. 文件级备份28、在信息系统中,以下哪项不是数据库管理系统(DBMS)的典型功能?A. 数据定义B. 数据查询C. 数据恢复D. 数据物理存储29、题目:在信息系统中,以下哪种数据库模型最适合处理复杂的查询和数据关联?A. 关系型数据库模型B. 面向对象数据库模型C. 层次型数据库模型D. 网状型数据库模型 30、题目:以下哪项不是软件生命周期中的一个阶段?A. 需求分析B. 设计C. 编码D. 维护31、以下关于操作系统内存管理的说法中,正确的是()A. 页式存储管理中,页表项的数量等于内存中页的数量B. 段式存储管理中,段表项的数量等于内存中段的数量C. 分区存储管理中,内存被划分为大小相等的区域D. 虚拟存储管理中,内存不足时操作系统会自动释放内存32、在关系数据库中,如果将一个关系的属性分为若干组,并且每组中的属性具有相同的特征,这样的结构称为()A. 关系模式B. 视图C. 属性组D. 元组33、以下哪个不是信息系统运行管理员应具备的基本素质?A. 团队合作精神B. 良好的沟通能力C. 良好的心理素质D. 简单的计算机操作技能34、以下哪种情况属于信息系统运行管理员在故障处理过程中可能遇到的紧急情况?A. 系统出现间歇性故障,但对业务影响不大B. 网络连接不稳定,导致部分用户无法访问C. 系统出现重大故障,业务完全中断D. 系统更新过程中出现意外,需要立即恢复35、以下关于操作系统进程管理的说法正确的是:A. 进程是操作系统进行资源分配和调度的基本单位B. 进程状态转换只能由用户发起C. 进程在执行过程中始终处于运行状态D. 进程在创建时就具备了所有资源36、在数据库管理系统中,以下哪种索引最适合于查询中经常需要根据其键值范围查找记录的情况?A. 索引散列(Hash Index)B. 哈希索引(B-Tree Index)C. 位图索引(Bitmap Index)D. 全文索引(Full-Text Index)37、以下关于信息系统运行管理员职责的描述,不正确的是()。

利用Windows CMD命令实现系统文件完整性检查的技巧

利用Windows CMD命令实现系统文件完整性检查的技巧

利用Windows CMD命令实现系统文件完整性检查的技巧在日常使用计算机的过程中,我们经常会遇到系统文件损坏或丢失的情况。

这些问题可能导致系统运行不稳定甚至无法正常启动。

为了解决这些问题,我们可以利用Windows CMD命令来进行系统文件的完整性检查,以便及时发现并修复问题。

1. 使用sfc命令检查系统文件sfc(System File Checker)命令是Windows自带的系统文件检查工具。

它可以扫描并修复系统文件中的错误。

要使用sfc命令,首先需要以管理员身份打开命令提示符。

在开始菜单中找到“命令提示符”,右键点击并选择“以管理员身份运行”。

在命令提示符中,输入sfc /scannow命令并按下回车键。

系统将开始扫描并检查系统文件的完整性。

这个过程可能需要一些时间,取决于系统文件的大小和数量。

完成后,系统将给出扫描结果,并根据需要修复文件。

2. 使用dism命令修复系统映像除了sfc命令,Windows还提供了dism(Deployment Image Servicing and Management)命令来修复系统映像。

系统映像是操作系统的核心组件,包括系统文件、驱动程序和安装程序等。

如果系统映像损坏,可能会导致系统无法正常运行。

要使用dism命令,同样需要以管理员身份打开命令提示符。

在命令提示符中,输入dism /online /cleanup-image /restorehealth命令并按下回车键。

系统将开始扫描并修复系统映像中的错误。

这个过程可能需要一些时间,取决于系统映像的大小和数量。

3. 使用chkdsk命令检查磁盘错误除了检查和修复系统文件,我们还可以使用chkdsk(Check Disk)命令来检查磁盘错误。

磁盘错误可能导致文件丢失或损坏,从而影响系统的正常运行。

同样,我们需要以管理员身份打开命令提示符。

在命令提示符中,输入chkdsk C: /f命令并按下回车键。

70-540考试心得分享.doc

70-540考试心得分享.doc

70-540 ExamTS:Microsoft Windows Mobile Application Development微软Windows Mobile 5.应用程序开发科目编号:70-540科目名称:TS:Microsoft Windows Mobile Application Development70-540 考试是Microsoft 公司的TS:Microsoft Windows Mobile Application Development 认证考试官方代号,TS:Microsoft Windows Mobile Application Development 认证作为全球IT 领域专家Microsoft热门认证Z_,是许多大中IT企业选择人才标准的必备条件。

微软认证技术工程师(MCTS)认证可让专业人员钻研特定的技术,并且透过在其专精技术上展现深度的知识和专业,表现出色。

微软认证技术丁•稈师(MCTS)屮的Windows Mobile 5.0 Applications 对于开发Windows 的行动装置与企业系统整合的应用稈序,拥有深入且广泛的了解。

成功的应试者将亲身体验使用.NET Framework A .NET Compact Frameworks Visual Basic .NET 或Visual C 扒SQL Server 2005 Mobile Edition 和SQL Server 2000/2005 的工作经验。

考试信息:考试代码一70・540问题数量一55考试时M-150分钟通过分数一700测验领域:.NET Compact Framework 2.0应用稈•序开发基础Windows Mobile 使用者接口在Windows Mobile应用程序屮柴合数据,包含档案系统,与XML使用SQL Server Mobile Edition 管理数据开发Windows Mobile应用稈序的通讯与联机能力开发Windows Mobile应用稈•序中,对特定平台的功能与平台互通性最佳化,封装与部署Windows Mobile应用程序准备工具:在线课程一Microsoft E-Learning Collection 5150Microsoft Mobile Development Handbook (原文书)Programming Microsoft Visual C# 2005, The Base Class Library (原文书)Programming Microsoft Visual C# 2005, The Language (原文书)SQLServer Mobile Edition 在线书籍(MSDN).NET Compact Framework程序开发手册与参考数据(MSDN)Windows Mobile 5.0 SDK考试结果:874/1000.NET Compact Framework 2.()丿垃丿I]程序开发基础:80%Windows Mobile 使用者接口:75%在Windows Mobile应用程序屮瘵合数据:100%使用SQLServer Mobile Edition 管理数据:85%开发Windows Mobile应用程序的通讯与联机能力:100%开发Windows Mobile应用程序中,对特定平台的功能与平台互通性:85%最佳化,封装与部署Windows Mobile应用程序:70%70-540 Exam微软Windows Mob订e 5•应用程序开发科Fl编号:70-540科目名称:TS:Microsoft Windows Mobile Application Development相关认证:MCTS70-540 考试是Microsoft 公司的TS:Microsoft Windows Mobi 1 e Application Development 认证考试官方代号,TS:Microsoft Windows Mobile Application Development认证作为全球IT领域专家Microsoft热门认证之一,是许多大中TT 企业选择人才标准的必备条件。

微软认证考试:提示内存不足原因及解决方法.docx

微软认证考试:提示内存不足原因及解决方法.docx

微软认证考试:提示内存不足原因及解决方法一、剪贴板占用了太多的内存实际上剪贴板是内存中的一块临时区域,当你在稈序中使用了“复制”或“剪切” 命令后,Windows将把复制或剪切的内容及其格式等信息暂吋存储在剪贴板上,以供“粘贴” 使用。

如果当前剪贴板中存放的是一幅图画,则剪贴板就占用了不少的内存。

这吋,请按下述步骤清除剪贴板中的内容,释放其占用的内存资源:1.单击“开始”,指向“程序”或“所有程序”,指向“附件”,指向“系统工具”,然后单击“剪贴板查看程序”,打开“剪贴板查看程序”窗口。

2.在“编辑”菜单上,单击“删除”命令。

3.关闭“剪贴板查看程序”窗口。

为了与Microsoft Office程序提供的多垂剪贴板相区分,上述所说的剪贴板,常被我们称为系统剪贴板。

如果你正在使JIJ Microsoft Office程序,而H使川了其多重剪贴板功能,那么你应清空“Office剪贴板”上的项目,方法是:在“Office剪贴板”任务窗格(OfficeXP)或工具栏(0ffice2000)上,单击“全部清空”或“清空'剪贴板'”。

当清空“Office剪贴板”时,系统剪贴板也将同时被清空二、打开的程序太多如果同时打开的文档过多或者运行的程序过多,就没有足够的内存运行H他程序。

这时,对丁哆文档界面(MD1)程序,如Wd、Excel等,请关闭当前文档外的所有文档,并退出当前未使川的程序,然后或许你就能够继续执行因“内存不足”而被屮断的任务。

三、重新启动计算机如果只退出程序,并不重新启动计算机,程序可能无法将内存资源归还给系统。

请重新启动计算机以释放系统资源,然后再次运行程序或执行被中断的任务。

四、口动运行的程序太多如果在启动Windows时自动运行的程序太多,那么,即使重新启动计算机,也没足够的内存用来运行其它程序。

(一)确定设置为口动运行的程序是否太多1.单击“开始”,然后单击“运行”。

2.在“打开”框中,键入“Msconfig” ,单击“确定”按钮,打开“系统配置实用程序”窗口。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Test4pass E xpert In IT Certification E xamsExam : Microsoft 70-513Title : Windows CommunicationFound Dev w/MS .NETFrmwk 4Version : DemoTest4pass E xpert In IT Certification E xamsTop 3 Customers in Test4passs - Best IT certifications TeamHOT Certifications On Test4passCisco CertificationsCCNA CCDA CCNP CCDP CCVP CCSP CCIP CCIE CCDE Data Center Sales ExpertMicrosoft CertificationsMCP MCSE MCITP MCTS MCSE2003MCPD MCDST TS Exchange Server2007 MCSE2003 Security MCSE2003 Messaging Microsoft Business SolutionsIBM CertificationsCertified Administrator Certified Systems Expert Solutions Expert System AdministatorDB2Certified Advanced Technical Expert Certified Advanced System AdministratorLotus Certification WebSphere Cognos 8 BI Certified Associate Developer Tivoli SoftwareCompTIA CertificationsA+CDIA+CTT+e-Biz+CompTIA HTI+i-NET+ Linux+Network+Project+RFID+Security+ Server+PDI+Convergence+members. You need the application to throw a Serialization Exception if any of the data members are not present when a serialized instance of the data contract is deserialized. What should you do?A. Add the Known Type attribute to the data contract.Set a default value in each of the data member declarations.B. Add the Known Type attribute to the data contract.Set the Order property of each data member to unique integer value.C. Set the Emit Default Value property of each data member to false.D. Set the Is Required property of each data member to true.Answer: D2. You are creating a Windows Communication Foundation (WCF) service that implements operations in a RESTful manner.You need to add a delete operation.You implement the delete method as follows.string void DeleteItems(string id);You need to configure WCF to call this method when the client calls the service with the HTTP DELETE operation. What should you do?A. Add the WebInvoke(UriTemplate = "/Items/{id}",Method="DELETE") attribute to the operation.B. Add the HttpDelete attribute to the operation.C. Replace the string parameter with a RemovedActivityAction parameter.D. Replace the return type with RemovedActivityAction.Answer: A3. A Windows Communication Foundation (WCF) service has a callback contract.You are developing a client application that will call this service.You must ensure that the client application can interact with the WCF service.What should you do?A. On the OperationContractAttribute, set the AsyncPattern property value to True.B. On the OperationContractAttribute, set the ReplyAction property value to the endpoint address of theFor interactive and self-paced preparation of exam 70-513, try our practice exams.Practice exams also include self assessment and reporting features!C. On the client, create a proxy derived from DuplexClientBase(Of TChannel).D. On the client, use GetCallbackChannel(Of T).Answer: C4. A Windows Communication Foundation (WCF) solution exposes the following contract over an HTTP connection.<ServiceContract()>Public Interface IDataService <OperationContract()>Function GetData() As String End Interface Existing clients are making blocking calls to GetData.Calls to GetData take five seconds to complete.You need to allow new clients to issue non-blocking calls to get the data, without breaking any existing clients. What should you do?A. Replace the service interface with the following interface and implement the new methods.<ServiceContract()>Public Interface IDoSomething <OperationContract()>Function DoLongOperation() As String <OperationContract(AsyncPattern:=True)>Function BeginDoLongOperation() As IAsyncResult <OperationContract(AsyncPattern:=True)> Function EndDoLongOperation(ByVal result As IAsyncResult) As String End InterfaceB. Replace the service interface with the following interface and implement the new methods.<ServiceContract()>Public Interface IDoSomething <OperationContract(AsyncPattern:=True)>Function BeginDoLongOperation() As IAsyncResult <OperationContract(AsyncPattern:=True)> Function EndDoLongOperation(ByVal result As IAsyncResult) As String End InterfaceC. Generate a proxy class with asynchronous methods and use it for the new clients.D. Add a new endpoint to the service that uses a full-duplex binding and use it for the new clients. Answer: CThe data contract for the order is defined as follows.[DataContract]public class Order {[DataMember] public string CardHolderName { get; set; [DataMember]public string CreditCardNumber { get; set; }}You have the following requirements:"Enable the transmission of the contents of Order from the clients to the service."Ensure that the contents of CreditCardNumber are not sent across the network in clear text. "Ensure that the contents of CreditCardNumber are accessible by the service to process the order. You need to implement the service to meet these requirements.What should you do?For interactive and self-paced preparation of exam 70-513, try our practice exams.Practice exams also include self assessment and reporting features!A. Add a DataProtectionPermission attribute to the CreditCardNumber property and set the ProtectData property to true.B. Convert the DataContract to a MessageContract and set the ProtectionLevel property to SignAndEncrypt.C. Change the data type of CreditCardNumber from string to SecureString.D. Implement the CreditCardNumber property getter and setter.In the setter, run the value of the CreditCardNumber through the MD5CryptoServiceProvider class TransformBlock method.Answer: B6. You are creating a Windows Communication Foundation (WCF) service that accepts messages from clients when they are started.The message is defined as follows.[MessageContract] public class Agent {public string CodeName { get; set; }}You have the following requirements:"The CodeName property must be sent in clear text.The service must be able to verify that the property value was not changed after being sent by the client. "The SecretHandshake property must not be sent in clear text and must be readable by the service.What should you do?A. Add a MessageBodyMember attribute to the CodeName property and set the ProtectionLevel to Sign. Add a MessageBodyMember attribute to the SecretHandshake property and set the ProtectionLevel to EncryptAndSign.B. Add a DataProtectionPermission attribute to the each property and set the ProtectData property to true.C. Add an XmlText attribute to the CodeName property and set the DataType property to Signed.Add a PasswordPropertyText attribute to the SecretHandshake property and set its value to true.D. Add an ImmutableObject attribute to the CodeName property and set its value property to true.Add a Browsable attribute to the SecretHandshake property and set its value to false.Answer: A7. You are creating a Windows Communication Foundation (WCF) service that implements the following service contract.<ServiceContract()>Public Interface IOrderProcessing <OperationContract()>Sub ApproveOrder(ByVal id As Integer)For interactive and self-paced preparation of exam 70-513, try our practice exams.Practice exams also include self assessment and reporting features!End Interface You need to ensure that only users with the Manager role can call the ApproveOrder method. What should you do?A. In the method body, check the Rights.PosessesProperty property to see if it contains Manager.B. Add a PrincipalPermission attribute to the method and set the Roles property to Manager.C. Add a SecurityPermission attribute to the method and set the SecurityAction to Demand.D. In the method body, create a new instance of WindowsClaimSet.Answer: B8. A Windows Communication Foundation (WCF) service exposes two operations: OpA and OpB. OpA needs to execute under the client's identity, and OpB needs to execute under the service'sidentity. You need to configure the service to run the operations under the correct identity.What should you do?A. Set the ImpersonateCallerForAllOperations property of the service's ServiceAuthorizationBehavior to true.Apply an OperationBehavior attribute to OpA and set the Impersonation property to ImpersonationOption.Required.Apply an OperationBehavior attribute to OpB and set the Impersonation property to ImpersonationOption.Allowed.B. Set the ImpersonateCallerForAllOperations property of the service's ServiceAuthorizationBehavior to true.Apply an OperationBehavior attribute to OpA and set the Impersonation property to ImpersonationOption.Allowed.Apply an OperationBehavior attribute to OpB and set the Impersonation property to ImpersonationOption.NotAllowed.C. Set the ImpersonateCallerForAllOperations property of the service's ServiceAuthorizationBehavior to false.Apply an OperationBehavior attribute to OpA and set the Impersonation property to ImpersonationOption.Allowed.Apply an OperationBehavior attribute to OpB and set the Impersonation property to ImpersonationOption.NotAllowed.D. Set the ImpersonateCallerForAllOperations property of the service's ServiceAuthorizationBehavior to false.Apply an OperationBehavior attribute to OpA and set the Impersonation property to ImpersonationOption.Required.Apply an OperationBehavior attribute to OpB and set the Impersonation property toTest4pass E xpert In IT Certification E xamsImpersonationOption.Allowed.Answer: D10. A WCF service code is implemented as follows. (Line numbers are included for reference only.)For interactive and self-paced preparation of exam 70-513, try our practice exams.Practice exams also include self assessment and reporting features!01 <ServiceContract()>02 <ServiceBehavior(03InstanceContextMode:=InstanceContextMode.Single)>04Public Class CalculatorService0506 <OperationContract()>07Public Function Calculate(ByVal op1 As Double,08ByVal op As String, ByVal op2 As Double) As Double…24End Function2526End ClassYou need to increase the rate by which clients get the required response from the service.What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)A. Change the service behavior to the following.<ServiceBehavior(InstanceContextMode:=InstanceContextMode.Single,ConcurrencyMode:=ConcurrencyMode.Multiple)>B. Change the service behavior to the following.<ServiceBehavior(InstanceContextMode:=InstanceContextMode.PerCall)>C. Require the clients use threads, the Parallel Task Library, or other mechanism to issue service calls in parallel.D. Require the clients to use async operations when calling the service.Test4pass E xpert In IT Certification E xamsAnswer: ABC o n t a c t T e s t4p a s sWe are proud of our high-quality customer service, which serves you around the clock 24/7. To get your problem resolved instantly, live supportRead Our Frequently Asked Questions (FAQs)We have gathered the most frequently asked questions for you. Please read our list of FAQs. Contact us by Live MessengerSales:Test4pass(at)You can reach us at any of the email addresses listed below Please allow up to 24 hours for us to respond•MSN: Test4pass@。

相关文档
最新文档