Certification Questions

Q:

What network service is the most likely problem if you can ping a computer by IP address but not by name?

A) DNS B) DHCP
C) ARP D) ICMP
 
Answer & Explanation Answer: A) DNS

Explanation:

 The most likely problem if you can ping a computer by IP address but not by name is a failure of DNS.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 3993
Q:

A company that you previously worked for is seeking new employees and you are trying to exolain the culture to a potential candidate. The company has strict policies, supervisory control, and rules. Team members are not encouraged to be individualistic nor offer feedback to upper management. Many times, the team feels its input is not valuable or implemented. This explanation describes a company that utilizes what employee management theory?

A) Meridith and Mann's Autocratic Management Theory B) Deming's Zero Defects Theory
C) Kerzner's Earned value Theory D) DMcGregor's X Theory
 
Answer & Explanation Answer: D) DMcGregor's X Theory

Explanation:

Answer A is incorrect because Meridith and Mann did not develop an autocratic management theory.Answer B is incorrect because Deming's theories did not involve any of the X and Y theories that were developed by McGregor. Answer C is incorrect because Earned value is not related to X or Y management theories.

Report Error

View Answer Report Error Discuss

Filed Under: PMP Certification

0 3989
Q:

You are an administrator of a SQL Server 2000 computer. The server contains a database that stores inventory data. Another database administrator has created a number of scheduled jobs to maintain the inventory database. Each weeknight the following jobs occur.


- A BULK INSERT job imports data at 10:00 P.M
- Indexes are rebuilt at 10:15 P.M
- Data integrity checks are performed at 10:30 P.M
- A differential backup is performed at 10:45 P.M
- A DBCC SHRINKDATABASE job runs at 11:00 P.M.


You notice that the final job often fails and returns the following error message: "Server: Msg 3140, Level 16, State 3. Could not adjust the space allocation for file  'inventory_data'."You need to ensure that the final job runs without errors.

What should you do?

A) Modify the DBCC SHRINKDATABASE job so that it uses DBCC SHRINKFILE statement to shrink each file individually. B) Create a new DBCC SHRINKFILE job to shrink the inventory_data file. Schedule the new job to run at the same time as the DBCC SHRINKDATABASE job.
C) Increase the time between the differential backup and the DBCC SHRINKDATABASE job. D) Increase the time between the data integrity checks and the differential backup.
 
Answer & Explanation Answer: C) Increase the time between the differential backup and the DBCC SHRINKDATABASE job.

Explanation:

The DBCC SHRINKDATABSE cannot be executed until the previous job step, the differential backup, has been completed. We should increase the time between these two job steps, or even better configure the last job step to run only after the differential backup has been completed.

 

Note: The DBCC SHRINKDATABASE statement shrinks data files on a per-file basis but shrinks log files as if all the log files existed in one contiguous log pool. The target size for the data and log files cannot be smaller than the minimum size of a file that was specified when the file was originally created, or the last explicit size set with a file size changing operation such as the ALTER DATABASE statement with the MODIFY FILE option or the DBCC SHRINKFILE statement.

Report Error

View Answer Report Error Discuss

0 3970
Q:

Which among the following keys are used to identify each row of the table uniquely?

A) Primary key B) Unique key
C) Partial key D) None of the above
 
Answer & Explanation Answer: A) Primary key

Explanation:

Primary key helps us to identify a row uniquely in a relation

Report Error

View Answer Report Error Discuss

2 3966
Q:

Communication requirements are defined by

A) the adaptation of the theory of sender-receiver models to the dominant listening and learning style of each stakeholder. B) the logistics of how many individuals will be involved with the project and at which locations.
C) the technologies or methods available to transfer information back and forth among project stakeholders. D) combining the type and format of information required with an analysis of the value of that information.
 
Answer & Explanation Answer: D) combining the type and format of information required with an analysis of the value of that information.

Explanation:

“ Communication requirements are defined by combining the type and format of information needed with an analysis of the value of that information.”

Report Error

View Answer Report Error Discuss

Filed Under: PMP Certification

0 3959
Q:

You use Microsoft Visual Studio 2010 and Microsoft .NET Framework 4 to create an
application. You use the ADO.NET Entity Framework to model entities. You write the following code segment. (Line numbers are included for reference only.)


01AdventureWorksEntities context = New AdventureWorksEntities
02
03var q = from c in context.Customers
04where c.City == "London"
05orderby c.CompanyName
06select c;


You need to ensure that the application meets the following requirements: "Compares the current values of unmodified properties with values returned from the data source". Marks the property as modified when the properties are not the same. Which code segment should you insert at line 02?

A) context.MergeOption = MergeOption.AppendOnly; B) context.MergeOption = MergeOption.PreserveChanges;
C) context.MergeOption = MergeOption.OverwriteChanges; D) context.MergeOption = MergeOption.NoTracking;
 
Answer & Explanation Answer: B) context.MergeOption = MergeOption.PreserveChanges;

Explanation:
Report Error

View Answer Report Error Discuss

17 3952
Q:

Given the following network range 192.168.0.0/24. We want minimum 50 hosts on each of the available subnets. What will be the subnet mask?

A) /24 B) /25
C) /26 D) /27
 
Answer & Explanation Answer: C) /26

Explanation:

Explanation: 50 hosts require 6 bits of the last octet giving us 64 -2 = 62 possible hosts this satisfies our requirement and leaves us 2 bits over for the subnets. The default mask is /24 or 255.255.255.0 adding the 2 bits for the subnets it becomes 255.255.255.192 or /26

Report Error

View Answer Report Error Discuss

Filed Under: CCENT

1 3942
Q:

How can you store long-term prices for services in the form of service conditions?

A. At the service and plant level

B. At the service and vendor level

C. At the service level

D. At the service, vendor and plant level

Answer

Answer: B , C , D


 


Explanation: Long term prices can be maintained at Service level, Service and Vendor level or Service, Vendor and Plant level.

Report Error

View answer Workspace Report Error Discuss

Subject: SAP MM

11 3939