Certification Questions

Q:

Which object types can you merge when using Multi Queries in a Web Intelligence document (WID)?

A. Dimension - Measure

B. Dimension - Detail

C. Measure - Measure

D. Dimension - Dimension

Answer

Answer : D

Report Error

View answer Workspace Report Error Discuss

Subject: SAP BW

0 2316
Q:

You develop an enterprise application, called XYZApplication that includes a Windows Form presentation layer, middle-tier components for business logic and data access, and a Microsoft SQL Server database.


You are in the process of creating a middle-tier component that will execute the data access routines in your application. When data is passed to this component, the component will call several SQL Server stored procedures to perform database updates. All of these procedure calls run under the control of a single transaction.


The code for the middle-tier component will implement the following objects:
SqlConnection cn = new SqlConnection();
SqlTransaction tr;


If two users try to update the same data concurrently, inconsistencies such as phantom reads will occur. You must now add code to your component to specify the highest possible level of protection against such inconsistencies.
Which code segment should you use?

A) tr = cn.BeginTransaction(?ReadCommitted?); B) tr = cn.BeginTransaction(IsolationLevel.ReadCommitted);
C) tr = cn.BeginTransaction(IsolationLevel.Serializable); D) tr = cn.BeginTransaction(?Serializable?);
 
Answer & Explanation Answer: C) tr = cn.BeginTransaction(IsolationLevel.Serializable);

Explanation:

Serializable is the highest isolation transaction level. It provide the highest possible level of protection against concurrent data errors. The correct syntax to begin a transaction with this transaction isolation level is: cn.BeginTransaction(IsolationLevel.Serializable)

Report Error

View Answer Report Error Discuss

1 2312
Q:

How can you redirect print jobs to a different print device?

A) Copy the print jobs from one printer to another printer B) Assign the printer to a port that is connected to a different type of print device.
C) Cancel all of the print jobs, then delete the printer. Create a new printer with the same name, and assign it to a different port. D) Assign the printer to a port that is connected to another identical print device.
 
Answer & Explanation Answer: D) Assign the printer to a port that is connected to another identical print device.

Explanation:

You need to assign the printer to a different port that is connected to the same type of print device.

Report Error

View Answer Report Error Discuss

0 2310
Q:

Describe the functions of DNS and DHCP in the network?

Answer

Dynamic Host Configuration protocol (DHCP) provides network configuration information (including IP address) to hosts, eliminating the need to perform the configurations manually.


Domain Name Service  (DNS)resolves hostnames - both internet names such as www.routersim.com and device names such as workstation 2 to IP addresses, eliminating the need to know the IP address of a device for connection purposes.

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

0 2308
Q:

You want to assign a mandatory user profile to a user. What must you do?

A) Rename the user's NTUSER.DAT file B) Rename the user's ntuser.ini file
C) Copy the Default User profile folder to the user's profile folder D) Copy the user's profile folder to the Default User profile folder
 
Answer & Explanation Answer: A) Rename the user's NTUSER.DAT file

Explanation:

To make a user's profile mandatory, you must rename the user's NTUSER.DAT file as NTUSER.MAN

Report Error

View Answer Report Error Discuss

0 2300
Q:

You plan to deploy your ASP.NET application over XYZ’s intranet. The application uses data retrieved from a Microsoft SQL Server database. You want to use SQL Server connection pooling to optimize performance. You also need to protect confidential data stored on the server while minimizing administrative costs.

 

You need to configure security for your application. What should you do?

A) Use Microsoft Windows authentication in the application. Enable impersonation for users to access the SQL Server database from your application. B) Use Microsoft Windows authentication in the application. Use a single Windows account for users to access the SQL Server database from your application.
C) Use form-based authentication in the application. Use the system administrator (sa) SQL Server login for users to access the SQL Server database from your application. D) Use form-based authentication in the application. Assign each user a separate SQL Server login to use to access the SQL Server database from your application.
 
Answer & Explanation Answer: B) Use Microsoft Windows authentication in the application. Use a single Windows account for users to access the SQL Server database from your application.

Explanation:

We should only use one account to access the SQL Server database. This ensures that connection pooling is optimized.

 

Incorrect Answers:

A: We should only use a single account to access the SQL Server database.

C: Form-based authentication is less secure. Furthermore, running as the System Administrator with the sa login would compromise security.

D: Form-based authentication is less secure. Furthermore, creating a separate SQL Server login for each user is a daunting administrative task.

Report Error

View Answer Report Error Discuss

0 2297
Q:

What function are available during packing?

A. Proposing allowed handling units.

B. Performing multi-level packing.

C. Automatically dividing the delivery items among handling units.

D. Packing or unpacking handling units.

Answer

Answer : A , B , C, ,D

Report Error

View answer Workspace Report Error Discuss

Subject: SAP SD

0 2297
Q:

Project Risk Management - Processes

Describe the Inputs, Tools and Techniques , Outputs included in the Quantitative Risk Analysis?

Answer

I. Inputs



  • Organizational process assets

  • Project scope statement

  • Risk management plan

  • Risk register

  • Project management plan


                 - Project schedule management plan


                 - Project cost management plan


II. Tools and Techniques



  • Data gathering and representation techniques

  • Quantitative risk analysis and modeling techniques


III. Outputs



  • Risk register (updates)

Report Error

View answer Workspace Report Error Discuss

0 2284