Searching for "name"

Q:

Word 2010 has a particular template that it uses when you first open the program. This template contains default styles, no text and you also use it when you create new, blank documents. As you customize styles, marcos and other elements these settings are automatically stored in this template.

 

What is the name of this template file?

A) Standard.dotx B) Normal.dotx
C) Empty.dotx D) Template.dotx
 
Answer & Explanation Answer: B) Normal.dotx

Explanation:
Report Error

View Answer Report Error Discuss

Q:

You have a reference computer that runs Windows 7.

You plan to deploy an image of the computer.

You create an answer file named answer.xml.

You need to ensure that the installation applies the answer file after you deploy the image. Which command should you run before you capture the image?

A) Imagex.exe /append answer.xml /check B) Imagex.exe /mount answer.xml /verify
C) Sysprep.exe /reboot /audit /unattend:answer.xml D) Sysprep.exe /generalize /oobe /unattend:answer.xml
 
Answer & Explanation Answer: D) Sysprep.exe /generalize /oobe /unattend:answer.xml

Explanation:
Report Error

View Answer Report Error Discuss

Q:

You have a computer named Computer1 that runs Windows 7. You need to ensure that Computer1 can connect to File Transfer Protocol (FTP) servers only while it is connected to a private network. What should you do?

A) From Windows Firewall with Advanced Security, create a new rule. B) From the local Group Policy, modify the application control policies.
C) From Windows Firewall, modify the Allowed Programs and Features list. D) From Network and Sharing Center, modify the Advanced Sharing settings.
 
Answer & Explanation Answer: A) From Windows Firewall with Advanced Security, create a new rule.

Explanation:
Report Error

View Answer Report Error Discuss

Q:

Your network consists of one Active Directory domain. You have two computers named Computer1 and Computer2 that run Windows 7. Both computers are members of the domain.


From Computer1, you can recover all Encrypting File System (EFS) encrypted files for users in the domain.


You need to ensure that you can recover all EFS encrypted files from Computer2. What should you do?

A) On Computer1, back up %systemroot%\DigitalLocker. On Computer2, restore %systemroot%\DigitalLocker. B) On Computer1, export the data recovery agent certificate. On Computer2, import the data recovery agent certificate.
C) On Computer1, run Secedit.exe and specify the /export parameter. On Computer2, run Secedit.exe and specify the /import parameter. D) On Computer1, run Cipher.exe and specify the /removeuser parameter. On Computer2, run Cipher.exe and specify the /adduser parameter.
 
Answer & Explanation Answer: B) On Computer1, export the data recovery agent certificate. On Computer2, import the data recovery agent certificate.

Explanation:
Report Error

View Answer Report Error Discuss

Q:

You have a computer named Computer1 that runs Windows Vista and a computer named Computer2 that runs Windows 7. You plan to migrate all profiles and user files from Computer1 to Computer2.


You need to identify how much space is required to complete the migration.
What should you do?

A) On Computer1 run Loadstate c:\store /nocompress B) On Computer1 run Scanstate c:\store /nocompress /p
C) On Computer2 run Loadstate \\computer1\store /nocompress D) On Computer2 run Scanstate \\computer1\store /nocompress /p
 
Answer & Explanation Answer: B) On Computer1 run Scanstate c:\store /nocompress /p

Explanation:
Report Error

View Answer Report Error Discuss

Q:

You have a portable computer named Computer1 that runs Windows 7.
You have a file server named Server1 that runs Windows Server 2008. Server1 contains a shared folder named Share1.


You need to configure Computer1 to meet the following requirements:
Ensure that cached files from Share1 are encrypted.
Ensure that files located in Share1 are available when Server1 is disconnected from the network.


What should you do?

A) On Server1, encrypt the files in Share1. On Computer1, make Share1 available offline. B) On Server1, configure BitLocker Drive Encryption. On Computer1, make Share1 available offline.
C) On Computer1, make Share1 available offline and enable encryption of offline files. D) On Computer1, copy the files from Share1 to the Documents library and configure BitLocker Drive Encryption.
 
Answer & Explanation Answer: C) On Computer1, make Share1 available offline and enable encryption of offline files.

Explanation:
Report Error

View Answer Report Error Discuss

Q:

You are the administrator of a SQL Server 2000 computer named CorpSQL. The server is a member of a Microsoft Windows NT domain named CORPORATE. Franz maintains a local user account on CorpSQL and is a member of the local Power Users group. He requests access to the SQL Server databases that are stored on CorpSQL.You need to allow Franz to access CorpSQL. Which Transact-SQL statement should you execute?

A) EXEC sp_grantlogin CorpSQL\Franz B) EXEC sp_grantlogin Franz
C) EXEC sp_grantlogin [Power Users\Franz] D) EXEC sp_grantlogin CORPORATE\Franz
 
Answer & Explanation Answer: A) EXEC sp_grantlogin CorpSQL\Franz

Explanation:
Report Error

View Answer Report Error Discuss

Q:

You are the administrator of a SQL Server 2000 computer. The server contains a database named Inventory. The database has a Parts table that has a field named InStock.When parts are shipped, a table named PartsShipped is updated. When parts are received, a table named PartsReceived is updated. The relationship of these tables is shown in the exhibit. (Click the Exhibit button.)

You want the database to update the InStock field automatically. What should you do?

A) Add triggers to the PartsShipped and the PartsReceived tables that update the InStock field in the Parts table. B) Use a view that creates anInStock field as part of an aggregate query.
C) Create stored procedures for modifying the PartsReceived and the PartsShipped tables that also modify the InStock field in the Parts table. Use these procedures exclusively when modifying data in the PartsReceived and the PartsShipped tables. D) Create a user-defined function that calculates current inventory by running aggregate queries on the PartsShipped and PartsReceived tables.
 
Answer & Explanation Answer: A) Add triggers to the PartsShipped and the PartsReceived tables that update the InStock field in the Parts table.

Explanation:

Triggers are a special class of stored procedure defined to fire automatically when an UPDATE, INSERT, or DELETE statement is issued against a table or view. They are powerful tools that can be used to enforce business rules automatically when data is modified. Triggers can extend the integrity checking logic of SQL Server constraints, defaults, and rules, although constraints and defaults should be used instead whenever they provide all the needed functionality. In this scenario an AFTER UPDATE trigger can be used to update the tables to update the PartsShipped and the PartsReceived tables that update the InStock column in the parts table.

Report Error

View Answer Report Error Discuss