-
You need to reduce the level of access that a malicious Web site might have to your computer. What should you do? ()
A . Start a Windows Defender scan.
B . Enable Microsoft Windows Internet Explorer Phishing Filter.
C . Enable Microsoft Windows Internet Explorer Pop-up Blocker.
D . Confirm that Microsoft Windows Internet Explorer Protected Mode is enabled on the Internet security zone.
-
You have a file server that runs Windows Server 2008. A user restores a large file by using thePrevious Versions tab. You need to view the progress of the file restoration. What should you do? ()
A . From the command prompt, run shadow.exe
B . From the command prompt, run vssadmin.exe query reverts
C . From Computer Management, click on the Shared Folders node and then click on Sessions.
D . From Computer Management, click on the Shared Folders node and then click on Open File
-
You need to create a view EMP_VU. The view should allow the users to manipulate the records of only the employees that are working for departments 10 or 20. Which SQL statement would you use to create the view EMP_VU? ()
A . CREATE VIEW emp_vu AS SELECT * FROM employees WHERE department _ id IN (10,20);
B . CREATE VIEW emp_vu AS SELECT * FROM employees WHERE department_id IN (10,20) WITH READ ONLY;
C . CREATE VIEW emp_vu AS SELECT * FROM employees WHERE department_id IN (10,20) WITH CHECK OPTION;
D . CREATE FORCE VIEW emp_vu AS SELECT * FROM employees WITH department_id IN (10,20);
E . CREATE FORCE VIEW emp_vu AS SELECT * FROM employees WHERE department_id IN (10,20) NO UPDATE
-
You manage 40 computers that run Microsoft Windows Vista. You use Microsoft Windows Calendar to publish a calendar to a shared network location. You need to allow users to automatically view the most recent calendar updates. What should you do? ()
A . Instruct all users to configure a calendar subscription that has an update interval of 15 minutes.
B . Instruct all users to perform calendar synchronization for all shared calendar subscriptions.
C . Instruct all users to map a network drive to the folder that holds the shared calendar. Import the .ics file for the shared calendar.
D . Use e-mail messages to deploy the .ics file for the shared calendar to each user. Instruct each user to import the .ics file that is attached to the e-mail message.
-
What view might you use to try to determine how long a particular backup will take?()
A . V$SESSION_EVENT
B . V$SESSION
C . V$W0041ITS
D . V$WAITSTAT
E . V$SESSION_LONGOPS&e
-
What is one reason you might recommend a solution using only autonomous access points to a customer? ()
A . The customer requires Layer 3 roaming.
B . The customer requires immediate wire line integration with a catalyst 6500 switch.
C . The customer needs an outdoor-ready access point.
D . The customer wants the option to migrate to LWAPP.
-
You have a file server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). You use Windows Backup to back up Server1. You need to view all the backup jobs that are scheduled to run on Server1. What should you do? ()
A . From Administrative Tools, run Services.
B . From Administrative Tools, run File Server Manager.
C . From Windows System Tools, run Scheduled Tasks.
D . From Windows System Tools, run System Information.
-
You are preparing for a new installation of SQL Server 2005. You need to select the protocols that client computers might use to connect to the server. Which two protocols can you use to achieve this goal?()
A . Named Pipes
B . TCP/IP
C . Shared Memory
D . Virtual Interface Adapter (VIA)
E . Multiprotocol&e
-
You need to provide an administrator the ability to view and interact with your current logon session. What should you do?()
A . At the command prompt, run Psr.exe.
B . At the command prompt, run Winrm.exe quickconfig.
C . From the Start menu, open Remote Desktop Connection.
D . From the Start menu, open Windows Remote Assistance.
-
You need to create a view EMP_VU. The view should allow the users to manipulate the records of only the employees that are working for departments 10 or 20. Which SQL statement would you use to create the view EMP_VU?()
A . CREATE VIEW emp_vu AS SELECT * FROM employees WHERE department_id IN (10,20);
B . CREATE VIEW emp_vu AS SELECT * FROM employees WHERE department_id IN (10,20) WITH READ ONLY;
C . CREATE VIEW emp_vu AS SELECT * FROM employees WHERE department_id IN (10,20) WITH CHECK OPTION;
D . CREATE FORCE VIEW emp_vu AS SELECT * FROM employees WHERE department_id IN (10,20);
E . CREATE FORCE VIEW emp_vu AS SELECT * FROM employees WHERE department_id IN (10,20) NO UPDATE
-
You want to use WLST to view metrics for a running domain. Which command should you issue to navigate through the Mbean hierarchy containing the metrics?()
A . runtime ()
B . runtimeMbeanServer ()
C . connectRuntime ()
D . beginRuntime ()
E . serverRuntime ()
-
During recovery, you need to know if log sequence 11 is in the online redo logs, and if so, you need to know the names of the online redo logs so you can apply them during recovery. Which view or views would you use to determine this information?()
A . V$LOGFILE
B . V$RECOVER_LOG
C . V$RECOVER_DATABASE
D . V$LOG_RECOVER
E . V$LOG
-
Which SQL statement would you use to remove a view called EMP_DEPT_VU from your schema?()
A . DROP emp_dept_uv;
B . DELETE emp_dept_uv;
C . REMOVE emp_dept_uv;
D . DROP VIEW emp_dept_uv;
E . DELETE VIEW emp_dept_uv;
F . REMOVE VIEW emp_dept_uv
-
You have an Exchange Server 2010 organization.You need to view the replication status of a mailbox database copy.What should you do?()
A . From the Exchange Management Shell, run the Test-ServiceHealth cmdlet.
B . From the Exchange Management Shell, run the Get-DatabaseAvailabilityGroup cmdlet.
C . From the Exchange Management Console (EMC), view the properties of the database copy.
D . From the Exchange Management Console (EMC), view the properties of the Mailbox server.
-
Which view will you use to view information regarding the jobs that are currently running in a database?()
A . DBA_SCHEDULER_RUNNING_JOBS
B . DBA_SCHEDULER_JOB_RUN_DETAILS
C . DBA_SCHEDULER_JOBS
D . DBA_SCHEDULER_JOB_LOG
-
You have a file server that runs Windows Server 2008. A user restores a large file by using the Previous Versions tab. You need to view the progress of the file restoration what should you do()?
A . From the command prompt, rum shadow.exe /v
B . From the command prompt, run vssadmin.exe query reverts
C . From Computer management, click on the shared folders node and then click on sessions
D . From computer management, click on the shared folders node and then click on open files.
-
You are granted the CREATE VIEW privilege. What does this allow you to do? ()
A . Create a table view.
B . Create a view in any schema.
C . Create a view in your schema.
D . Create a sequence view in any schema.
E . Create a view that is accessible by everyone.
F . Create a view only of it is based on tables that you created.
-
You have a computer that runs Windows 7. You need to view the processes that currently generate networkactivity. What should you do?()
A . Open Resource Monitor and click the Network tab.
B . Open Windows Task Manager and click the Networking tab.
C . Open Event Viewer and examine the NetworkProfile Operational log.
D . Open Performance Monitor and add all the counters for network interface.
-
What are two Cisco IOS commands that can be used to view neighbor adjacencies?()
A . show ip ospf interfaces
B . show ip ospf protocols
C . show ip ospf neighbors
D . show ip ospf database
-
You have a computer that runs Windows 7. The computer is configured to use an intranet Microsoft updateservice location. You need to view the name of the intranet service location. What should you do?()
A . At a command prompt, run Wusa.exe.
B . Open Event Viewer and examine the Application log.
C . Open Windows Update and click View update history.
D . R.eview the contents of the C:\windows\windowsupdate.log file.
-
You are preparing for a new installation of SQL Server 2005. You need to select the protocols that client computers might use to connect to the server. Which two protocols can you use to achieve this goal?()
A . Named Pipes
B . TCP/IP
C . Shared Memory
D . Virtual Interface Adapter (VIA)
E . Multiprotocol
-
Why might you choose to organize your paper using the compare then contrast format?
-
Every time you try to answer a question that asks why, you engage in the process of causal analysis--you attempt to determine a cause or series of causes for a particular effect. When you try to answer a question that what if, you attempt to determine what effect will result from a particular cause. You will have frequent opportunity to use cause- and-effect analysis in the writing that you will do in college. For example, in history you might be asked to determine the causes of the Seven Day War between Egypt and Israel. In political science you might be asked to determine the reasons why Ronald Reagan won the 1984 Presidential election. And in sociology you might be asked to predict the effect that changes in Social Security legislation would have on senior citizens.
22. Determining causes and effects is usually thought-provoking and quite complex. One reason for this is that there are two types of causes: immediate causes, which are readily apparent because they are closest to the effect, and ultimate cause, which, being somewhat removed, are not so apparent and perhaps even hidden. Furthermore, ultimate causes may bring about effects which themselves become immediate causes, this creating a causal chain. For example, consider the following causal chain. Sally, a computer salesperson, prepared extensively for a meeting with an important client (ultimate cause), impressed the client (immediate cause), and made a very large sale (effect). The chain did not stop there: The large sale cause her to be promoted by her employer (effect).
A second reason why causal analysis can be so complex is that an effect may have any number of possible or actual causes, and a cause may have any number of possible or actual effects. 23. An upset stomach may be caused by eating spoiled food, but it may also be caused by overeating, flu, allergy, nervousness, pregnancy, or any combination of factors. Similarly, the high cost of electricity may have multiple effects: higher profits for utility companies, fewer sales of electrical appliances, higher prices for other products, and the development of alternative sources of energy. Sound reasoning and logic are central to any causal analysis. Writers of believable causal analysis examine their material objectively and develop their essays carefully. They are convinced by their own examination of the material, but are not afraid to admit other possible causes and effects.
Because people are accustomed to thinking of causes with their effects, they sometimes commit an error in logic known as the "after this, therefore because of this" fallacy. 24. This fallacy leads people to believe that because one event occurred after another event, the first event somehow caused the second. That is, they sometimes make causal connection that are not proved. For example, if students began to perform. better after a free breakfast program was instituted at their school, one could not assume that the improvement was caused by the breakfast program. There could of course be any number of other causes for this effect, and a responsible writer on the subject would analyze and consider them all before suggesting the cause.
(21)
-
What might you do the first when you have to introduce yourself to a new colleague()
A.Give a sweet smile
B.Extend your hand and hello
C.Ask someone else to introduce you
D.Extend your best wishes