Searching for "go"

Q:

What will be output when you will execute following c code?

#include <stdio.h>
void main()

{
     switch(2)

      {
            case 1L:printf("No");
            case 2L:printf("%s","I");
              goto Love;
            case 3L:printf("Please");
            case 4L:Love:printf("Hi");
     }
}

A) I B) IPleaseHi
C) IHi D) Compilation error
 
Answer & Explanation Answer: C) IHi

Explanation:

It is possible to write label of goto statement in the case of switch case statement.

Report Error

View Answer Report Error Discuss

Filed Under: Programming

Q:

The output of the code below is

       #include <stdio.h>
        void main()
        {
            int i = 0, k;
            if ( i == 0 )
                goto label;
                for ( k = 0;k < 3; k++ )
                {
                    printf( "hin" );
                    label: k = printf( "%03d", i );
                }
         }

A) 0 B) hi hi hi 0 0 0
C) 0 hi hi hi 0 0 0 D) 0 0 0
 
Answer & Explanation Answer: A) 0

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: Programming

Q:

Which of the following are goals of OLE DB?

A) Create object interfaces for DBMS functionality pieces only. B) Increase flexibility only.
C) Object interface over any type of data only. D) All of the above as goals of OLE DB.
 
Answer & Explanation Answer: D) All of the above as goals of OLE DB.

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: Database

Q:

 A goal of data mining includes which of the following?

A) To explain some observed event or condition B) To analyze data for expected relationships
C) To confirm that data exists D) To create a new data warehouse
 
Answer & Explanation Answer: A) To explain some observed event or condition

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: Database

Q:

A manager in your office received a new Windows 2000 Professional laptop computer. You have been asked to configure offline files for the manager to work on documents at home. You enable offline files, and have the manager log off of the network. During the logoff process, the expected synchronization of offline files does not occur. You have the manager log back on to the network. What can you do to correct the problem?

A) Enable file and print sharing. When the manager logs off, the files will synchronize. B) Manually synchronize all offline files.
C) On the server, make all files available offline. When the manager logs off, the files will synchronize. D) Do nothing. Windows 2000 Professional does not tell you when Synchronization happens.
 
Answer & Explanation Answer: C) On the server, make all files available offline. When the manager logs off, the files will synchronize.

Explanation:
Report Error

View Answer Report Error Discuss

Q:

Your network consists of a single Active Directory domain that contains two domain controllers. Both domain controllers run Windows Server 2003 Service Pack 2 (SP2). Auditing of successful account logon events is enabled on all computers in the domain. You need to identify the last time a specific user logged on to the domain. What should you do?

A) Examine the System Event Log on the user's computer. B) Examine the System Event Log on both domain controllers.
C) Examine the Security Event Log on both domain controllers. D) Examine the Application Event Log on the user's computer.
 
Answer & Explanation Answer: C) Examine the Security Event Log on both domain controllers.

Explanation:
Report Error

View Answer Report Error Discuss

Q:

Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). You enable auditing for failed logon attempts on all domain controllers. You need to ensure that a record of failed logon attempts is retained for 90 days on all domain controllers. What should you do?

A) From the Security Templates snap in, open the hisecdc template. Modify the Retain System Log setting. B) From the Security Templates snap in, open the securedc template. Modify the Retain Security Log setting.
C) Open the Default Domain Policy. Modify the Retain System Log setting. D) Open the Default Domain Controller Policy. Modify the Retain Security Log setting.
 
Answer & Explanation Answer: D) Open the Default Domain Controller Policy. Modify the Retain Security Log setting.

Explanation:
Report Error

View Answer Report Error Discuss

Q:

You are the administrator of a Microsoft Windows NT Server 4.0 computer. The server is the PDC in your domain and also runs SQL Server 2000. The server has four processors and 1 GB of RAM.Your network consists of 500 client computers that are running Microsoft Windows Millennium Edition. Users report that when they log on in the morning their computers respond slowly and occasionally return error messages.You use System Monitor to monitor processor performance and RAM utilization. You discover that the % Total Time and % User Time counters average 90 percent and the % Privileged Time counter averages 20 percent. The Available Mbytes counter averages 800 MB. You need to improve server performance for user logons. What should you do?

A) Increase the physical RAM on the computer to 2 GB. B) Increase the virtual RAM on the computer to 4 GB.
C) Configure SQL Server to use only processors 0, 1, and 2. D) Configure SQL Server to use only processors 1, 2, and 3.
 
Answer & Explanation Answer: D) Configure SQL Server to use only processors 1, 2, and 3.

Explanation:

The system monitor clearly indicates that the processors are overloaded. We need to decide which processors we should use for SQL Server. Processor 0 is the default CPU for the I/O subsystem. Network Interface Cards (NIC) are assigned to the remaining CPUs, starting from the highest-numbered CPU. The NIC would get processor 3.
SQL Server would be using all four processors by default.

The Windows NT/2000/XP operating system use processor 0. In order to avoid the logon
problems we should not let SQL Server to use this processor. Instead SQL Server should be configured to use processor 1, 2, and 3.

Note 1: The Affinity mask is used to exclude a processor on a multiprocessor computer from processing SQL Server 2000 threads. Default is equal distribution of SQL Server 2000 processes across all processors.

Note 2: Monitoring the Processor and System object counters provides information about the CPU utilization and helps in determining whether or not a bottleneck exists. The %Total Processor Time is used on multiple CPU Severs to gauge the average activity of the processors and shows the percentage of elapsed time that a processor is busy executing a nonidle thread. Values around 100 percent on a Server computer that processes many client requests indicate that processes are queuing up, waiting for processor time, and causing a bottleneck. Such a sustained high level of processor usage is unacceptable for a server.

Report Error

View Answer Report Error Discuss