October 31, 2011

Memory comes to the fore in Firefox 7

Performance and improved memory use were the goals of Firefox 7, which arrived on schedule today from Mozilla. Firefox 7 is available to download for Windows, Mac, Linux, and Android.

The new Telemetry feature asks you to opt in before it will collect your data.
(Credit: Mozilla)

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com


The wide-release version of Firefox 7 brings changes to the majority of Firefox users that the beta and Aurora channels have been playing with for some time. These include claims of significant gains in reducing memory use, "often 20 percent to 30 percent less, and sometimes as much as 50 percent less," a company representative wrote in a blog post based on work by Firefox developer Nicholas Nethercote.

These performance gains are the first public results of an internal Mozilla project called MemShrink, which, as the name implies, is about reducing the browser's system impact. Mozilla cited several specific areas of improvement in Firefox 7, including when the browser is kept open for long periods of time, when multiple tabs are open at once, and when the browser is used concurrently with other programs that also use a lot of memory. The company also noted that MemShrink was successful in part because of the rapid-release cycle that a vocal minority of Firefox users have been criticizing.

The spotlight on performance is something that Mozilla clearly plans to keep lit. When you install Firefox 7, you'll be prompted to opt in to a new anonymous-reporting measure that the company is calling Telemetry. Not unlike security suites that use your data anonymously to improve threat detection rates, Mozilla plans to crowd-source its performance data to learn more about how the browser performs in real-world situations.

Unlike the security suites, Telemetry is an opt-in reporting system, so Mozilla won't be collecting data without permission. Lead privacy engineer Sid Stamm addresses security concerns in a blog post, but the short version is that Mozilla is far more open about the data it collects--and why it collects that data--than competitors such as Apple, Google, and Microsoft. Currently, Telemetry looks at four categories: memory usage, CPU core count, cycle collection times, and startup speed. Curious readers can install the about:telemetry add-on to see the personal statistics Firefox is gathering.

If you've enabled Telemetry and would like to disable it, you can go to Options, Advanced, and uncheck the Submit Performance Data box at the bottom of the General ta
Other changes in Firefox 7 for desktops include a new version of hardware-accelerated Canvas for faster HTML5 games and animations, and improvements for Web developers. These include support for the W3C navigation timing API, which allows developers to measure page load time and site navigation against factors like bandwidth, and a new set of Firefox tools for developers.

Firefox 7 for Android includes a laundry list of changes, including the ability to select text in a Web page for copying and pasting. Long-tap on a site, and the Android-style drag handles will appear. There's a new Quit feature under Preferences/More to force an exit from the browser, the WebSocket API now works on Firefox for mobile devices, and image rendering has been improved on Tegra-powered tablets and phones. The browser also now auto-detects your system default language if it's supported, and a new Preferences option enables you to change the language displayed in the browser on-demand.

Facebook: 'Open hardware' integral to green IT infrastructure

Open Compute Project strives to model itself after the Apache Software Foundation, with technical contributions vetted by community members.

Is the secret to building greener, more energy-efficient data centers using “open hardware” optimized for that purpose?

Best CCNA Training and CCNA Certification and more Cisco exams log in to Certkingdom.com



Facebook and its allies in the Open Compute Project certainly would have you believe that this is so. Right now, most server hardware vendors invest in “gratuitous differentiation” and not true innovation, according to Andy Bechtolsheim, the chief development officer for Arista Networks and co-founder of Sun Microsystems who is one of the Open Compute Project’s five newly named board members.

“What has been missing is standards at the systems level,” Bechtolsheim told attendees of the Open Compute summit held this week in New York.

If you step back and look at what Facebook was able to accomplish at its Prinville, Ore., data center, the evidence certainly suggests that Internet service providers or those building cloud infrastructure would do well to embrace some of this philosophy.

Facebook built its own servers for that facility, adopted a new power distribution design, and approached each rack holistically in order to create drive efficiencies. That facility can run work loads using up to 38 percent less energy than its counterparts at a 24 percent cost reduction, according to the Open Compute Web page. “This isn’t just important for the environment, it is green for the bottom line,” said Frank Frankovsky, director of technical operations for Facebook and chairman for the Open Compute Project.

Let’s be clear. Open Compute Project isn’t a standards organization. It is modeled after the open source software movement, which Frankovsky and other Open Compute Project members suggest has spurred innovation that has far outpaced true advances in the software world. Community members are being encouraged to contributed designs and architectural best practices. For example, ASUS has submitted motherboard specifications while Facebook is opening up its OpenRack specifications.

The other thing to keep in mind is that there is a lot more to a data center than just the information technology housed within.

In his presentation during the Open Compute Summit, James Hamilton, vice president and distinguished engineer with Amazon Web Services, pointed out that there has been more data center innovation in the past five years than in the past 15 years — inspired by the challenges of scale commputing.

The cost of infrastructure directly impacts service costs, so efficiency is paramount. During his talk, here are several issues that Hamilton discussed:

Virtualization: Intuitively, current best practices suggest that less is more in the data center. But Hamilton suggests that data center managers think twice about turning off a server just to save power. “Any workload that is worth more than the marginal cost of power is worth it,” he said.
Power distribution: Up to 11 percent of the power that heads into a data center is typically lost through conversions and other legacy design issues in the grid. Any conversions that can be eliminated along the way, SHOULD be eliminated. UPS technology, he suggests, is in for an overhaul. (Facebook, as an example, has redesigned the way it includes back-up power in its racks.)
Temperatures must rise: Even though most managers run their data centers at 77 degrees Fahrenheit today, most systems can tolerate much higher temperatures. If everyone raises the temperature AND talks about the results, temperatures will rise across the sector.
Use outside air 100 percent of the time for cooling, period.
Look to water cooling technologies, including evaporative cooling methods.
Think modular: Regardless of the specific servers they use, the most efficient data centers in the world all use modular architectures that use some sort of outside cooling mechanism. That includes Microsoft, Facebook and Amazon.

The cynic in me believes that the Open Compute movement has as long uphill battle to face in existing data center environments. Yet, as the industry moves to scale computing architectures that can support cloud-delivered infrastructure services and applications, it is clear that the hardware world may be holding things back. That, in itself, is a reason to keep a close eye on Open Compute Project development.

Why Microsoft's vision of the future will really happen

Two videos from Microsoft show the future of technology. Here's why I think they're dead-on

Computerworld - Microsoft released a video in 2008 and another one this week that together predict the sleek, wireless, connected gadgets we'll all enjoy by the year 2019.


Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com



In one scene, two businesspeople each place a smart object on a smart table -- a keychain fob and a flat phone or smartcard of some kind. From these devices, out spills their data, which can be manipulated on the table. The same thing happens at home, where a girl's homework spills out onto the kitchen table, and cookbook instructions spill out onto the kitchen counter.

Data and documents can apparently be transferred from anything to anything else. One business-related example involves a drag-and-drop gesture from a desktop to a mobile device. In another scene, that same mobile device becomes a virtual keyboard for a desktop computer the user happens to be sitting at.

Another example shows a man "capturing" with a kind of take-a-picture gesture using a clear-glass remote control then moving data from a wall-mounted device and dumping it out onto his e-newspaper.

Videoconferencing has been perfected. What looks like a glass window into another classroom is actually a live, big-screen video chat connecting schools in India and Australia. In one scene, two children interact with each other, each speaking a different language instantly translated with cartoon-like speech bubbles.

Intelligent agents pay attention to what's going on. The kids fingerpaint a dog onscreen, and the computer recognizes the image and animates it accordingly.

One very cool and versatile device shown in the video is a smartphone, a card-like gadget so thin that a woman uses it as a book marker. The card functions as a boarding pass, an airport map, a calendar, an augmented reality window, a 3D holographic display and more.

The phone splits into two halves about the size of playing cards, with one "card" displaying live video and the other held up to the ear for videoconferencing on the go. It even projects some kind of laser beam arrow on the ground, telling Mr. Future Businessman where to go.

Everything is connected to everything. Intelligent agents make decisions about when to inform the user about relevant data.
Why these are great predictions

Everything in this video is being worked on, refined and developed. If you follow current trends for compute power, display technology, networking speeds, device miniaturization, flexible displays, touchscreens, gesture technologies and others, you get this Microsoft future.

And Microsoft itself is working on much of this. The intelligent displays are really just advanced versions of what's possible now with a Microsoft Surface table. The in-air gestures are advanced versions of what Kinect for Xbox 360 users are already doing.

Industrywide, displays are getting bigger while devices are getting thinner and lighter. Companies have already developed versions of clear displays, augmented reality systems and all the rest.

The past four years have ushered in thin multitouch tablets supporting gestures and intelligent agent voice technology.

Although breathtaking to look at and consider, everything in Microsoft's videos are fairly conservative predictions based on existing products or technology actively being developed.
Why Microsoft won't build it

There tends to be little connection between companies that envision the future clearly and those who build it.

October 29, 2011

What does Windows XP's tenth birthday mean to you?

For all its wide usage and market share, I never liked Windows XP, and never ran it on any system I've owned. I stuck with Windows 2000 until the release of Windows Server 2003, bought a license for that—I was a software developer at the time, and I needed access to IIS 6—and used it as my desktop system until the release of Windows Vista, switching as soon as I could buy it. I couldn't stand Luna—it was so bulbous and blobby, so faux-organic, so garish—but I loved the Watercolor theme that Microsoft used during Windows XP's beta, and so duly patched Windows Server 2003 to let me use a Watercolor theme.


Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com



I was happy with my Windows XP-free existence. Then I got an office job, and I had to use it as part of the corporate install. I still didn't care for it. Sure, it more or less worked, but I never really liked it. My workplace stuck with Windows XP after Windows Vista was released, and with this my dislike turned to disgust. Windows Vista's searchable Start menu was a fantastic feature, and I resented every moment that I had to spend deprived of its convenience.

But for many, Windows XP became the pinnacle of operating systems. Time can be cruel to old software—it can make its shortcomings, its missing features and clunkiness, all the more apparent—but it can also be kind. With time, even the most sluggish and oversized of programs can become lightning quick. Windows XP was never bloated, and as hardware improved, it became downright lightweight. Its system resource usage was basically negligible. It did its job well enough, and it did so with a minimum of burden.

It's the enterprise, more than anything else, that has fallen in love with Windows XP. It took a while to warm to the new operating system, but once companies were on board with it, the lure of an operating system that they wouldn't have to change for years on end became intoxicating. In the eyes of many, Windows XP "just works"; no fuss, no messing around. Yes, stability is important, and yes, changing the operating system costs money—but with Windows Vista and Windows 7 you get something for that money. You get much better security track record, much better support for modern hardware and standards such as IPv6. You get more powerful deployment, imaging, and management capabilities. There are many good reasons to move on.

To me, the fact that Windows XP is still widely used a decade later is a cause for dismay. It means that people are missing out on better software and better experiences. Windows XP works, just, but it's time to move on. We have technologies today that just weren't a factor for Windows XP; ubiquitous powerful 3D accelerators, abundant multicore processors, USB3, Thunderbolt, and SSDs with TRIM support. Laptops now outsell desktops, making power efficiency, cloud connectivity, and data security more important than ever. The Internet is a much more hostile place, making robust operating system security essential. The world of 2011 isn't the same as the world of 2001, and software needs to reflect that.

So as we observe the tenth anniversary of XP's release, what feelings does it evoke in you? Will you (or your workplace) stick with it to the bitter end, continuing to use it into 2014 and beyond? Will the advance of technology slow down such that Windows 7 will enjoy a similar lifespan? Or is goodbye and good riddance to Windows XP? Weigh in with your comments below.

October 25, 2011

MacBook Air and Android device with Verizon 4G LTE: A winning combination

Need an Internet connection on your MacBook Air that actually works? Try tethering your Android device to share its 4G LTE (or equivalent) connection! Works like a charm.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com



Directly on the heels of my plea to Apple to please fix their WiFi issues, I thought I would share a solution that works great for me when using my MacBook Air in locations where there is no WiFi or the WiFi connection is wonky due to the problems many MacBooks seem to have currently.

First, you need a Verizon 4G LTE device. For me, that’s a Thunderbolt, which runs Android. Next, head on over to the Android App Market and download an application called EasyTether Pro. It costs $9.99, and though there’s a free version (EasyTether Lite), it doesn’t allow https access (take a moment and let that one marinate so you can understand how many sites you won’t be able to access with the free version). While $9.99 may seem steep, it has been totally worth it for me, personally. I’ve had this setup for almost a year and a half now between multiple laptops running OS X and Windows, and the experience is always incredibly facile, no matter what I use.

Next, you need your MacBook and you need to go download the appropriate drivers from EasyTether’s Web site. After you install them and restart, all that’s left is to connect your phone to your MacBook via USB with your charging cable, then run the app and follow the quick configuration wizard. If all went well, you should be tethered to your phone and using its blazing-fast 4G connection with absolutely no interruptions on behalf of Apple’s end!

Personally, I like to write and be connected to the Internet in places that typically have no sort of WiFi or Internet access whatsoever, so this solution has been well worth the $9.99 price tag to me. For those of you who would like to do unmonitored browsing at work, this is your ticket, for sure. Likewise, for those of you traveling, you’ve undoubtedly been in your fair share of hotels with a shoddy Internet connection. No more of that!

The only thing you may need to watch out for is your data usage, depending on your plan. Lucky for me, I was grandfathered in with my unlimited data package that I’ve had practically since Verizon first offered it way back when. But that doesn’t mean they won’t change things up on me, and, thus, you as well, if you’re in the same boat as me, so exercise caution with the whole data plan thing and you’ll be good to go.

If you’re currently paying for your phone to be a mobile hotspot that you only use one device with (like a MacBook), then this little trick could essentially replace that for you and save you that monthly fee (for now, until Verizon decides to make restrictions based on deep packet inspection or something similar).

Last of note, I used a MacBook Air and Verizon’s 4G LTE network as my examples in this post since they’re what I have. So long as you have Internet access on your phone and a way to tether it to your computer — be it a MacBook or a PC — you can create a similar setup. I just wanted to throw this quick tip out there for anyone who may find it useful!

October 24, 2011

Best Android Honeycomb Tablet News, Magazine Apps

Honeycomb has matured to a large number of Tablet optimized apps, and its about time that we start talking about them, one at a time.



Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com



Best & Top News, Magazine apps on Android Honeycomb for tablets

1. News 360

One of my favorite apps. Aggregates news from various sources and displays them beautifully.

2. CNN for Android Tablet
Clean, and very well designed app that brings world class news right to android tablet.

3. Pulse

Pulse aggregates news content from various top internet blogs and displays them in a very natural scrollable thumbnails. This is my fav app on Android phones, tablet. Syncs and downloads news for offline reading, automatically.

4. USA Today

Latest news, scores, weather, stocks and photos from USA TODAY. The latest news, scores, weather, stocks and photos you’ve come to expect from USA TODAY and now available in a beautiful new way, on the Android Tablet. Staying informed has never been this quick, easy or enjoyable.

5. Feedly

Integrates with Google Reader, Tumblr, Twitter, Facebook, Read it Later and Instapaper.

6. Newsr:

Sync and read Google Reader feeds.

7. CNBC Realtime

Get real-time stock quotes, watchlists, news, videos & more. The CNBC Real-Time App for Android gives you free access to real-time stock quotes – before, during and after market hours, directly from both the New York Stock Exchange and NASDAQ Marketplace. Additionally, you will get CNBC breaking news alerts, top news stories & analysis, and access to the latest CNBC business video clips, CEO interviews and market updates via CNBC video-on-demand.



8. HackerNews
Love HackerNews? You’ll love this easy to user Hacker news navigator.

9. Press Reader
PressReader for Honeycomb brings over 1,900 full-content newspapers from 95 countries in 51 languages to your favorite Google Honeycomb operated tablet.
Choose from a growing list of the world’s most popular publications, including: The Washington Post, USA Today, Los Angeles Times, Chicago Tribune.

10. F5 Reddit browser

Like Reddit? You would love this. Browse through various top links from around the web.

11. Financial times

Ge the latest in Finance via the official FT app.

12. Sports Illustrated

A Magazine that covers all your sports.

13. News Republic

Choose your favorite category of News and be bedazzled with them in a beautiful interface.

14. Time Magazine

The Famous Time magazine is now on Honeycomb. Various pay models for subscriptions.

15. SkyGrid

SkyGrid is the most powerful & only app for you to stay up to date on your interests. Follow your own topics and get updates on the exact interests you care about!



15. Appy Geek

APPY Geek, the best-rated Tech news app on Android is now available on tablets!
With hundreds of news articles every day (including TechRadar, New Media Age, Pocket-Lint, Technology Blogged, Tech Watch and more)

16. Honey Reader

A Simple RSS reader.

17. Fashion news app

A simple app that gives you different Fashion apps for android.

Windows 8 Tiles Metro-Style UI on Windows 7

Windows 8 would ditch the Windows 7 Aero interface in favor of Metro UI, which exists on Windows Phone today. If you love the MEtro style tiles and interface, you can get the Metro UI on windows 7 using Zetro UI.



Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com



Zetro UI is very simple to install and configure. Extract the zip after downloading the theme from the link below. When done, follow the below two simple steps:

Opening the Extras folder, running the Theme Patcher, and clicking on all three “patch” buttons contained within.
Opening the Theme folder and copying both of the files inside it to C:\Windows\Resources\Themes.

When finished, Open the Control Panel and “Change the Theme” under Appearance and Personalization. The Zetro theme should be available in “Installed themes”.

metro-ui-windows7
The look and feel of the theme makes you windows 7 look simple with white all over the place, which might look a bit odd for the first few minutes. You can tweak it using the extra tweaks available in the readme file that comes along with the zip.

Extending the tweak further, feel free to blend it with something like the Metro-inspired Omnimo 4 theme for Rainmeter.

Microsoft Office 2010 takes on all comers

Ask most people to name a productivity suite and chances are they'll say Microsoft Office, but they might also name one of the numerous competitors that have sprung up. None have completely displaced the Microsoft monolith, but they've made inroads.

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com


Most of the competition has positioned itself as being better by being cheaper. SoftMaker Office has demonstrated you don't always need to pay Microsoft's prices to get some of the same quality, while OpenOffice.org proved you might not need to pay anything at all. Meanwhile, services like Google Docs are available for anyone with an Internet connection.


Microsoft's response has been to issue the newest version of Office (2010) in three retail editions with slightly less ornery pricing than before, as well as a free, ad-supported version (Microsoft Office Starter Edition) that comes preloaded on new PCs. Despite the budget-friendly competition, Office continues to sell, with Microsoft claiming back in January that one copy of Office 2010 is sold somewhere in the world every second. (Full disclosure: The author of this review recently bought a copy for his own use.)

How well do the alternatives shape up? And how practical is it to switch to them when you have an existing array of documents created in Microsoft Office? Those are the questions I had in mind when I sat down with both the new version of Microsoft Office and several other programs (and one cloud service) that have been positioned as low- or no-cost replacements.

Microsoft Office 2010
Despite all efforts to dethrone it, Microsoft Office remains the de facto standard for word processing, spreadsheets, presentations, and to a high degree, corporate email. Other programs may have individual features that are better implemented, but Microsoft has made the whole package work together, both across the different programs in the suite and in Windows itself, with increasing care and attention in each revision.


If you avoided Office 2007 because of the radical changes to the interface -- namely, the ribbon that replaced the conventional icon toolbars -- three years' time might change your mind. First, the ribbon's no longer confined to Office only; it shows up in many other programs and isn't as alien as before. Second, Microsoft addressed one major complaint about the ribbon -- that it wasn't customizable -- and made it possible in Office 2010 for end-users to organize the ribbon as freely as they did their legacy toolbars. I'm irked Microsoft didn't make this possible with the ribbon from the start, but at least it's there now.

Finally, the ribbon is now implemented consistently in Office 2010. Whereas Outlook 2007 displayed the ribbon only when editing messages, Outlook 2010 uses the ribbon throughout. (The rest of Outlook has also been streamlined a great deal; the thicket of settings and submenus has been pruned down a bit and made easier to traverse.) One feature that would be hugely useful is a type-to-find function for the ribbon; there is an add-in that accomplishes this, but having it as a native feature would be great.

Aside from the interface changes, Office 2007's other biggest alteration was a new XML-based document format. Office 2010 keeps the new format but expands backward- and cross-compatibility, as well as native handling of OpenDocument Format (ODF) documents -- the .odt, .ods, and .odp formats used by OpenOffice.org. When you open a legacy Word .doc or .rtf file, for instance, the legend "[Compatibility Mode]" appears in the window title. This means any functions not native to that document format are disabled, so edits to the document can be reopened without problems in earlier versions of Office.

Note that ODF documents don't trigger compatibility mode, since Office 2010 claims to have a high degree of compatibility between the two. The problem is "high degree" doesn't always mean perfect compatibility. If you highlight a passage in an ODF document while in Word 2010, OpenOffice.org and LibreOffice recognize the highlighting. But if you highlight in OpenOffice.org or LibreOffice, Word 2010 interprets the highlighting as merely a background color assignment for the selected text.

Exporting to HTML is, sadly, still messy; Word has never been good at exporting simple HTML that preserves only basic markup. Also, exporting to PDF is available natively, but the range of options in Word's PDF export module is very narrow compared to that of OpenOffice.org.

Many other little changes throughout Office 2010 ease daily work. I particularly like the way the "find" function works in Word now, where all the results in a given document are shown in a navigation pane. This makes it far easier to find that one occurrence of a phrase you're looking for. Excel has some nifty new ways to represent and manipulate data: Sparklines, little in-cell charts that usefully display at-a-glance visualizations of data; and data slicers, multiple-choice selectors that help widen or narrow the scope of the data you're looking at. PowerPoint lets you broadcast a presentation across the Web (via Microsoft's PowerPoint Broadcast Service, the use of which comes free with a PowerPoint license) or save a presentation as a video.

One last feature is worth mentioning as a possible future direction for all products in this vein. Office users who also have a SharePoint server can now collaborate in real time on Word, PowerPoint, or Excel documents. Unfortunately, SharePoint is way out of the reach of most casual users. But given how many professional-level features in software generally have percolated down to the end-user level, I wouldn't be surprised if Microsoft eventually adds real-time collaboration, perhaps through Windows Live Mesh, as a standard feature.

Microsoft Office 2010 takes on all comers: OpenOffice.org 3.3.0
OpenOffice.org has long been a commonly suggested replacement for Microsoft Office. It offers several common office-suite features at a much lower price -- free -- than Microsoft Office itself, although many of those individual features don't have the level of polish or advancement found in commercial office-suite products. That said, for people who don't need the absolute latest and greatest functionality in every category, OpenOffice.org is a solid piece of software. (In the interest of full disclosure, again, I admit I have been frustrated by its limitations, but I can recognize that for many other people it will more than do the job.)

Don't be thrown off if you come to OpenOffice.org from the Microsoft Office side. The program's UI is very vintage 2003 -- dockable toolbars instead of the newer ribbon/tab metaphors that are now all the rage. That said, future versions of OpenOffice.org may sport a more modern look, although this is still very much under wraps -- nothing more than mock-up designs of such a UI have surfaced yet.

October 22, 2011

70-270 Exam Q & A


Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com



QUESTION 1
You work as an administrator at CertKingdom.com. The corporate network consists of a single Active
Directory domain named CertKingdom.com. All client computers on the corporate network are configured
to run Windows 2000 Professional.
You are preparing to uABCrade the client computers to Windows XP Professional with zero impact
on productivity. You use a server named ABC-SR01 that has a shared folder named Data to save
the Setup files required for the uABCrade. You need to determine the appropriate manner in which
to start the Setup.
What is the first step to make sure the Setup files are installed in an unattended process on the
client computers?

A. You should create a test environment and run an unattended installation of the Setup Files.
B. You should execute the Winnt32.exe command and follow up with the xcopy command onABCSR01.
C. You should execute the Winnt32.exe command with the /dushare:\\ABC-SR01\data
parameters.
D. You should use an OEM installation package on the first client computer.

Answer: C

Explanation: Your best option in this scenario would be to use the dushare switch and indicate
the updates folder.
Reference:
Rick Wallace, MCSE (Exam 70-270) Microsoft XP Professional Training Kit, Microsoft Press,
Redmond, 2002, Chapter 2, Lesson 3
Microsoft Knowledge Base Article – Q312110, How to Deploy the Windows XP Dynamic Update
Package


QUESTION 2
You are the desktop administrator for CertKingdom.com. The CertKingdom.com network consists of a single Active
Directory domain named CertKingdom.com. All client computers on the network are configured to run
Windows XP Professional.
The CertKingdom.com users who are assigned laptop computers often work from home. These laptop
computers are set up specifically to make a connection to the network and the Internet without any
problems. After a few weeks several laptop users complained that they cannot access the shared
folders on the laptop computers even when working at the office.
You check and discover that these users have permission to access the shared folders. You thus
decide to make the necessary modifications in the local GPO on all laptop computers.
Which actions should you take to make sure of continued Internet protection and provide access
to the shared folders? (Choose Two.)

A. You should configure the Windows Firewall on the laptop computers.
B. You should assign all laptop computers to a global security group.
C. You should change the local GPO by deselecting the Prohibit the use of ICF on your DNS
domain network option.
D. You should enable TCP/IP filtering.
E. You should enable the Allow users to connect remotely to this computer option.

Answer: A,C

Explanation: To ensure that users can access shared folders on the portable computers during
the day and to ensure that the portable computers are protected when they are connected to the
Internet in the evening, you need to enable Windows Firewall and then enable the Prohibit the use
of ICF on your DNS domain network setting in the local GPO.
The ICF should not be used on VPN connections as it interferes with file sharing and print
services. ICF can cause undesirable issues if clients in a network enable ICF on their LAN
interfaces. Instead, large network should use better alternatives such as dedicated firewalls.
Reference: Sharing (ICS) and Internet Connection Firewall (ICF)

http://www.techexams.net/technotes/xp/ics_icf.shtml


QUESTION 3
You are employed as an administrator at CertKingdom.com. The CertKingdom.com network consists of a single
Active Directory domain named CertKingdom.com. A server named ABC-SR27 is used as a file server that
hosts a shared folder. All network users store their files and documents on the shared folder.
The CertKingdom.com Finance department makes use of a custom application and save their files to the
shared folder on ABC-SR27.
You received a complaint from the Finance Department members that some of the custom
application files have become unusable resulting in productivity decrease when they have to
restore the application using the backup. You then find that the other network users configured the
shared folder to be available offline and all indications are that this is the cause of the problem.
You must make sure that the custom application files will remain unavailable when the users are
not logged on.
How can you achieve this without impacting on user access to other files in the folder? (Choose
TWO. Each answer forms part of the solution.)

A. You should change the network policy.
B. You should assign the Allow – Write permission to all users.
C. You should configure “My Documents” to be available offline in Windows Explorer on every
client computer.
D. You should include the custom application files in the Files not cached domain group policy.
E. You should select the Synchronize all offline files before logging off check box on the Offline
Files tab.

Answer: A,D

Explanation: The custom application files become corrupt due to the offline caching. In this
scenario we need to prevent this type of file being made available offline. We can do this by
configuring the ‘Files not cached’ setting in group policy.
Files not cached
Computer Configuration\Administrative Templates\Network\Offline Files
Reference:
Lisa Donald & James Chellis, MCSA/MCSE: Windows XP Professional Study Guide Second
Edition, Sybex Inc., Alameda, 2003, p. 344


QUESTION 4
You work as the network administrator at CertKingdom.com. All client computers on the CertKingdom.com network
are configured to run Windows XP Professional.
A CertKingdom.com user named Kara Lang is assigned a laptop computer named ABC-WS15. She
complains that she gets random error messages regarding missing .dll files on ABC-WS15 when it
is not connected to the docking station.
After some troubleshooting you discover that the device driver uses the .dll file mentioned in the
error messages as an external storage device. The storage device is in turn linked to the docking
station of Kara Lang. There are no random error messages when she works in docked mode. To
ensure productivity you need to make sure that this incident does not recur.
How can this be accomplished? (Choose THREE. Each answer forms part of the solution.)

A. By disabling the support for the docking station in the BIOS.
B. By creating a new hardware profile named KingUndocked by copying the default hardware
profile of ABC-WS15.
C. By disabling the server service in the Services Options.
D. by disabling the storage device in the undocked hardware profile.
E. By informing the user too restart ABC-WS15 using the undocked hardware profile.
F. by disabling the devices used by the docked hardware profile.

Answer: B,D,E

Explanation: Hardware profiles are used to load different sets of device drivers according to
which profile is selected. In this scenario, we have a docking station with an external storage
device attached. Therefore, we want to load the driver for the external storage device when the
computer is docked, but not when the computer is undocked. To do this, we can create another
hardware profile to be used when the computer is undocked. We can configure the undocked
profile to not load the driver by disabling the external storage device in Device Manager.
Reference:
Rick Wallace, MCSE (Exam 70-270) Microsoft XP Professional Training Kit, Microsoft Press,
Redmond, 2002, Chapter 10, Lesson 3 & Chapter 15, Lesson 6


QUESTION 5
CertKingdom.com has employed you as an administrator for their organization. All computers on the
network are configured to run Windows XP professional.
A CertKingdom.com user named Rory Allen is assigned a computer named ABC-SR12. ABC-SR12 is
configured to host a custom application to create huge databases.
A vast amount of disk space is occupied when databases are created with this application. At
present the ABC-SR12 configuration is as in Exhibit:

You receive a complaint from Rory Allen regarding an error message when he attempts to run the
application to create a database.
Which actions should you take to create a mount point on the ABC-SR12 C-Drive to make sure
that the application allows the creation of database without any error message?

A. You should point the mount point on the C-Drive to the D-Drive root directory.
B. You should convert both Disk A and Disk B to dynamic volumes.
C. You should convert both Disk A and Disk B to basic volumes.
D. You should configure an alternative file distribution system.

Answer: A

Explanation: Your best option in this scenario would be to create mount points. Volume mount
points permits a volume to be mounted on an existing folder rather than at the root of a new drive
letter. You are able to create a volume mount point for an empty NTFS directory in order to permit
an administrator to create new volumes without needing extra drive letters.
We create a mount point on the volume that needs more space, C-Drive, and points it to the
volume which has the required free disk space.
Reference:
Rick Wallace, MCSE (Exam 70-270) Microsoft XP Professional Training Kit, Microsoft Press,
Redmond, 2002, Chapter 10, Lesson 3


QUESTION 6
You work as a desktop administrator for CertKingdom.com. All computers on the CertKingdom.com network are
configured to run Windows XP Professional.
A CertKingdom.com employee named Rory Allen took over the duties of another employee named Kara
Lang. This move involved taking over files, documents and the workstation named ABC-WS02
that was used by Kara Lang. however, Rory Allen discovered that he cannot access the
documents and files on ABC-WS02. You then attempt to grant Rory Allen the required
permissions after logging on with a local administrator account, but only get an error message
stating “access denied”.
Which actions should you take to make the ABC-WS02 files accessible to Rory Allen? (Choose all
that apply.)

A. You should assign the files and documents stored on ABC-WS02 to you.
B. You should make Rory Allen a member of the Power Users group.
C. You should make Rory Allen a member of the Domain users group.
D. You should assign Rory Allen the Allow-Full Control permission.
E. You should assign Rory Allen the Allow – Read & Execute permissions.
F. You should assign Rory Allen the Allow- Modify permission.

Answer: A,D

Explanation:


QUESTION 7
You are employed as an administrator at CertKingdom.com. All client computers on the CertKingdom.com network
run Windows XP Professional.
You are preparing to install an OEM version of Windows XP Professional on a new client
computer named ABC-WS10. ABC-WS10 is equipped with the following components:
• A PCI network card and graphics card
• To accommodate the various drives including the hard drive, an industry standard architecture
(ISA) SCSI controller.
Just after initializing the Setup process on ABC-WS10 you get an error message that informs you
the “Setup is unable to find a hard disk’. However, even after checking for loose cables and
functionality of the SCSI hard disk, you get the same problem. To ensure productivity you need to
make sure that the installation process can run successfully on ABC-WS10.
How can this be accomplished? (Choose TWO. Each answer forms part of the solution.)

A. By restarting the Setup process.
B. By changing the Boot.ini file of ABC-WS10.
C. By running fdisk.exe /mbr and restart the installation.
D. By installing the driver for the SCSI adapter using F5 during the Setup process.
E. By restarting the installation from the Windows XP Professional installation CD.
F. By install the driver for the SCSI adapter using F6 during the Setup process.

Answer: A,F

Explanation: To ensure that the installation can run to completion you need to select options A
and F. During the early text-mode phase of the setup process, you are allowed to press F6 and
install the driver for the SCSI adapter.
Reference:
Rick Wallace, MCSE (Exam 70-270) Microsoft XP Professional Training Kit, Microsoft Press,
Redmond, 2002, Chapter 11, Lessons 1 & 2


QUESTION 8
You are employed as an administrator at CertKingdom.com. All client computers on the CertKingdom.com network
are configured to run Windows 2000 Professional.
You performed a successful migration to Windows XP Professional on all the client computers.
You receive a complaint from a user named Kara Lang stating that she is experiencing problems
while opening some of the Utilities that are available on the Control Panel.
You receive an instruction to restore functionality to Kara Lang’s computer. All indications are that
the error on her computer was caused by a dynamic linked library file (.dll file) that is located on a
corrupted area on her hard drive.
What actions should you take to accomplish this task?

A. You should execute the Sfc.exe command and command prompt.
B. You should execute the Sysprep.exe command at command prompt.
C. You should execute the Sysprep.exe command prior to installing the application.
D. You should execute the RIPrep.exe command prior to installing the application.
E. You should re-install Windows XP Professional.

Answer: A

Explanation: Your best option in this scenario would be to select Option
A. The Windows File
Protection (WFP) feature in Windows 2000 and Windows XP prevents overwriting or replacement
of certain system files, such as system .dll files. A command-line utility called System File Checker
(SFC.EXE) allows an Administrator to scan all protected files to verify their versions. SFC.exe
scans all protected system files and replaces incorrect versions with correct Microsoft versions.
In this scenario it seems likely that a system .dll is corrupted and should be replace or repaired-
Reference:
Windows 2000 Platform Development, Windows File Protection and Windows
Microsoft Knowledge Base Article (Q259283): How to Use the File Signature Verification Tool to
Find Third-Party Drivers


QUESTION 9
CertKingdom.com has employed you as an IT admin for their organization. The CertKingdom.com network consists
of a single Active Directory domain named CertKingdom.com.
You performed a successful migration of all Microsoft Windows 98 client computers to Windows
XP Professional. A CertKingdom.com employee named Mia Hamm informs you that she is unable to
access or restore her information from a tape device that was created before the uABCrade to
Windows XP Professional.
Identify the next steps for restoring the backup to a Windows 98 computer? (Choose TWO. Each
answer forms part of the solution.)

A. You should restore the information in a non-compressed mode.
B. You should establish a performance baseline and restore the information.
C. You should restore Windows 98 using Ntbackup utility and the most recent Automated System
Recovery (ASR) backup.
D. You should restore the information in a compressed mode.
E. You should restore the information on the computer of Mia Hamm.

Answer: A,E

Explanation: Your subsequent steps should be to restore the information in a non-compressed
mode. Thereafter the information should be restored on the computer of Mia Hamm. Windows XP
works only with the compression that is included with NTFS. For this to work you need to first
uncompress any drives that are compressed with DoubleSpace, DriveSpace, or any other drive
compression software. If you do not uncompress a drive, the data on the drive is not available in
Windows XP. The data on the drive is still intact, but it is not available in Windows XP. To be able
to use the data on the compressed drive, you must dual-boot with the operating system that
supports the compression method. When your C-Drive is compressed, you cannot install Windows
XP.


QUESTION 10
You work as an administrator at CertKingdom.com. All client computers on the network are configured to
run Windows XP Professional computers.
A CertKingdom.com user named Kara Lang informs you that she is unable to connect to the secure
intranet Web site at intranet.CertKingdom.com. She gets an error message that the digital certificate is not
from a trusted source as soon as she types http://intranet.CertKingdom.com into the Internet explorer
address bar.
You check and discover that the intranet Web server is using a digital certificate issued by your
company’s Enterprise Certificate Authority. The Enterprise Certificate Authority is located on a
server named certificates. CertKingdom.com.
Which action should you take to make sure that Kara Lang is able to access the secure intranet
Web site? (Choose TWO. Each answer forms part of the solution.)

A. You should install the certificate in the certificate store using the Certificate import Wizard.
B. You should open the Internet Explorer’s list of certificates on the Kara Lang computer.
C. You should enable Use TLS 1.0 option in order to configure internet Explorer for the Kara Lang
computer.
D. You should request a new certificate from the enterprise CA.
E. You should contact the support company to obtain a certificate and add it to the list of personal
certificates.
F. You should import a copy of the certificate into the Trusted Publishers certificates store of Kara
Lang.

Answer: B,E

Explanation: The Internet Explorer Certificate Manager permits you to install and remove trusted
certificates for clients and CAs. Many CAs have their root certificates already installed in Internet
Explorer. You can select any of these installed certificates as trusted CAs for client authentication,
secure e-mail, or other certificate purposes, such as code signing and time stamping. If a CA does
not have its root certificate in Internet Explorer, you can import it. Each CA’s Web site contains
instructions that describe how to obtain the root certificate. To install or remove clients and CAs
from the list of trusted certificates click Internet Options on the Tools menu, and then click the
Content tab. Click Certificates and then click the Trusted Publishers tab. To add other certificates
to the list, click Import. The Certificate Manager Import Wizard steps you through the process of
adding a certificate.
Reference:
Rick Wallace, MCSE (Exam 70-270) Microsoft XP Professional Training Kit, Microsoft Press,
Redmond, 2002, Chapter 13, Lesson 4


Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com

October 20, 2011

Microsoft: No Windows Server for ARM

While Microsoft is embracing the ARM processor architecture for its next Windows client operating system, Windows 8, the company has no immediate plans to develop an ARM-based version of its next Windows Server, the company executive in charge of Windows Server confirmed Wednesday.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com



This week at Microsoft's Build conference, being held in Anaheim, California, Bill Laing, Microsoft corporate vice president for the server and cloud division, demonstrated some of the new features of Windows Server 8. The next generation of the server operating system features new capabilities such as a revamped, command line-based PowerShell that will allow administrators to control multiple machines, and a new management console for blending in-house servers and cloud resources into a single view.

Unlike Windows 8, however, Windows Server 8 will not come in an ARM edition, Laing said. "The answer in the short term is no," Laing said, when asked if Microsoft is contemplating an ARM-based Windows Server.

The ARM processor has seen a revival in interest over the past few years, as more device manufacturers use the low-power processors to run mobile devices. And a few industry observers have speculated that the chip may also work well in data center environments as well, where it could save energy. ARM Holdings, which owns the architecture, is even investigating the possibility of ARM-based server chips.

But should such chips ever be produced, they may still need a Windows Server-based OS to run.

One immediate problem with porting Windows Server to ARM is that the OS was written for 64-bit processors, while the current ARM architecture is limited to 32-bit processing, Laing explained. Windows Server stopped offering 32-bit support with the Release 2 update to Windows Server 2008.

Beyond this show-stopper of a problem, one reason for not porting the software is that there would be little benefit in running Windows Server on ARM, Laing added. Server-based ARM might initially look like an easy way to cut server power usage, but it would have only a minimal impact on energy usage.

"On a server, the chip is only one part of the power consumption," he said. The motherboard, memory, network controllers and other components all consume power as well. "Even if you dramatically drop the power requirement [of the chip] there are definitely some other power requirements," he said.

Laing would not say that Microsoft would never consider developing an ARM-based version of Windows Server, but he said the company has no immediate plans for doing so now.

Microsoft had been developing Windows Server 8 for about three years, Laing said. It had a broad set of goals to reach with this release, such as cloud compatibility and automation of routine tasks across multiple machines. "No longer does a server run on a single machine," he said.

Laing assigned engineers not to develop specific technologies, but rather to solve common problems that may cover a range of technologies, such as moving virtual machines from server to server without any downtime. "We tied all the pieces together, so we would have a more consistent release," he said.


The new release also benefits from Microsoft's work building out its own Azure cloud service, he explained. Many technologies developed for the server were tested in the cloud, and many technologies developed for Azure were then imported back to the server.

"Historically, there has been a separation between people who developed applications and the people who operated in the data center," he said. "We tried to keep a tight feedback [loop] between the two, to share the technology."

October 18, 2011

Microsoft Office 365 goes live

Microsoft CEO Steve Ballmer launched the much-awaited Office 365 on Tuesday, after a beta program of about nine months, as the company responds -- some critics say belatedly -- to the rising popularity of cloud-based applications for collaboration and communication.

"Office 365 is where Office meets the cloud," Ballmer said at an event in New York.

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com


Office 365 is the next version of the BPOS (Business Productivity Online Suite) collaboration and communication suite. Among the main improvements in Office 365 is that its applications, including Exchange Online and SharePoint Online, are based on the 2010 version of their on-premise counterparts, while BPOS' are based on the 2007 version. Office 365 also comes with Lync Online, which is an upgrade to Office Communications Online.

Also significant is that Office 365 offers customers the option to have Office productivity applications like Word and Excel either through Office Web Apps -- the online version of Office -- or through the full-fledged, on-premise Office Professional Plus 2010 delivered via a subscription model.

Office 365 comes in a variety of configuration options, starting from an e-mail only version that costs US$2 per user, per month, to the most sophisticated option with Office Professional Plus and voice communications capabilities with Lync Server on premises, which costs $27 per user per month. Lync Server is the next version of Office Communications Server. A version tailored for small businesses with 25 or fewer end users costs $6 per user per month.

Ballmer stressed that Office 365 is designed for businesses of all sizes. More than 70 percent of the about 200,000 companies that beta-tested Office 365 were small and medium-size businesses, he said.

Officials demonstrated Office 365 capabilities, like the ability for multiple users to jointly collaborate and edit documents in real time, not only from PC browsers but also from mobile devices.

"Collaboration is critical for business growth," Ballmer said.

Microsoft also announced that Bell Canada, Intuit, NTT Communications, Telefonica, Telstra and Vodafone are some of the partners that will resell Office 365 with their own services.

With Office 365, Microsoft is responding to an explosion in recent years of cloud-based enterprise collaboration and communication suites from a variety of large and niche vendors alike, including big names like Google, Cisco, IBM, VMware and Novell and specialists like Jive Software, Socialtext, Box.net and Zoho.

The primary competitor is Google's Apps suite, which industry experts consider the biggest threat to Microsoft's communications and collaboration products, both on-premise and on the cloud.

Since the announcement of Office 365 in October of last year, expectations have been growing, and Google has been intensifying its competitive rhetoric.


"While Office 365 does put Microsoft in mortal combat with Google, it is not really an existential threat for Google since Microsoft is essentially validating the model that Google pioneered with Google Apps. I would expect that Office 365 actually heightens interest in Google Apps," Gartner analyst Matt Cain said via e-mail.

Ultimately, time will tell how successful the concept of cloud-based productivity and collaboration tools ends up being. "Time, and I mean 3-5 years, will prove or disprove the soundness of the model in terms of economics, security, stability and functionality. The first 20 percent of the business community that moves to the cloud will act as a proxy for the rest of the business world," Cain said.

In recent months, Microsoft has struggled with several major outages affecting BPOS, which have made some critics question whether Microsoft will be able to live up to its 99.9 percent uptime service level agreement for Office 365.

With Office 365, Microsoft is also trying to consolidate the branding and technology base for various cloud-based suites it has developed in recent years, such as BPOS, Office Web Apps and Live@edu.

Overall, Office 365 will offer hosted productivity applications -- word processing, spreadsheet and presentations -- e-mail, calendar, contacts, instant messaging, Web meetings, videoconferencing, intranet and website creator tools.

Office 365 has also been designed to interact natively with the on-premise versions of SharePoint, Exchange, Lync and Office.

Existing BPOS customers have a window of 12 months to migrate to Office 365, a process that Microsoft maintains will be straightforward, even for small businesses.

However, Office 365 doesn't work with some older Microsoft desktop and server software that BPOS still supports, so customers, especially those who want Office 365 to interact with on-premise Microsoft applications, will likely face the need to do software upgrades.

For example, Office 365 can't be used with desktop Office versions earlier than Office 2007 SP2, which means it doesn't work with Office 2003 and Outlook 2003.

October 17, 2011

Microsoft goes public with its 'Drawbridge' operating-system research project

Drawbridge, a Microsoft Research project, expands on the “library OS” concept to streamline virtualization for application sandboxing.

MCTS Certification, MCITP Certification
Best Comptia A+ Training | Comptia A+ Certification 2000+ Exams at Examkingdom.com



Microsoft has begun taking the wraps off its hush-hush “Drawbridge” application-virtualization project.

“Drawbridge” is a Microsoft Research project developed by some of the same folks who helped create the Singularity microkernel operating system and the “Menlo” mobile operating system prototype. (Menlo was dedicated to replacing the Windows Embedded kernel with a Windows NT kernel in mobile devices.)

Drawbridge is a new adaptation of the “library OS” concept, as I blogged back in March. Microsoft researchers describe Drawebridge as which Microsoft researchers explain as the library OS concept as:

“(T)he personality of the OS on which an application depends runs in the address space of the application. A small, fixed set of abstractions connects the library OS to the host OS kernel, offering the promise of better system security and more rapid independent evolution of OS components.”

In addition to including a Windows-centric library OS, Drawbridge also includes a “picoprocess,” which its researchers describe as “a process-based isolation container with a minimal kernel API (application programming interface) surface” inside of which the Windows library OS runs.

As I noted earlier this year, the Microsoft Research Drawbridge team has built a working prototype of a Windows 7 library OS that can run the latest releases of Excel, PowerPoint and Internet Explorer.

From the introduction to the Drawbridge paper:

“Each instance has significantly lower overhead than a full VM bundled with an application: a typical application adds just 16MB of working set and 64MB of disk footprint. We contribute a new ABI (application binary interface) below the library OS that enables application mobility. We also show that our library OS can address many of the current uses of hardware virtual machines at a fraction of the overheads.”

The researchers conclude: “Our experience shows that the long-promised benefits of the library OS approach—better protection of system integrity and rapid system evolution—are readily obtainable.”

Microsoft published on October 17 a new Channel 9 video with MSR Operating System research manager Galen Hunt and other members of the team explaining Drawbridge

As with all Microsoft Research projects, there is no set timetable as to when or even if Drawbridge will become commercial products or parts of commercial products. However, lately at Microsoft there seems to be more effort to convert MSR experiments into shipping deliverables. So maybe Drawbridge will show up inside a future Windows version — or maybe even as underlying technology enabling Microsoft to better run existing Windows apps (virtually) on mobile devices?

70-643 Exam


Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com




QUESTION 1
You work as the network administrator at Certkingdom.com The Certkingdom.com network has a domain named
Certkingdom.com All servers on the Certkingdom.com network run Windows Server 2008 and all client computers
run Windows Vista.
Certkingdom.com recently entered into partnership with Weyland Industries.
You create user accounts in the Certkingdom.com domain for some employees of Weyland Industries.
You place the user accounts into a global security group named WeySecure.
You want to provide members of the WeySecure group access to parts of the Certkingdom.com network
via a Terminal Services Gateway server named ABC-TS01.
What do you need to do to ensure that the WeySecure group is able to access ABC-TS01?

A. You need to configure a Remote Access Policy.
B. You need to create and configure a Connection Authorization Policy.
C. You need to configure Device redirection.
D. You need to configure a Network Access Protection Policy.

Answer: B

Explanation: To provide a security group access to ABC-TS02, you need to create and configure
a Connection Authorization Policy.
A connection authorization policy (CAP) allows you to control who can connect to the Terminal
Server through the Terminal Services Gateway. You can configure what groups can access the
Terminal Server through the TS Gateway.

Reference: Configuring the Windows Server 2008 Terminal Services Gateway (Part 2) / Create a
Terminal Services Gateway CAP

http://www.windowsecurity.com/articles/Configuring-Windows-Server-2008-Terminal-Services-

Gateway-Part2.html


QUESTION 2
You work as a network administrator for Certkingdom.com The Certkingdom.com network consists of a domain
named Certkingdom.com All servers on the Certkingdom.com network either run Windows Server 2008 or
Windows Server 2003.
The Certkingdom.com network contains a Windows Server 2003 server named ABC-SR05 and a Windows
Server 2008 server named ABC-SR06. ABC-SR05 has Microsoft SQL Server 2005 and Microsoft
Windows SharePoint Services (WSS) 2.0 installed.
You receive instruction to uABCrade Windows SharePoint Services (WSS) 2.0 to Windows
SharePoint Services (WSS) 3.0 and have it run on ABC-SR06. You need to have Windows
SharePoint Services (WSS) 3.0 retain the content and settings from Windows SharePoint Services
(WSS) 2.0.
Which of the following steps would be the best way to accomplish this task? (Choose multiple
answers).

A. You should back up the SharePoint configuration as well as the content from ABC-SR05.
B. You should back up the SQL Server 2005 configuration as well as the Microsoft Windows
SharePoint Services (WSS) databases from ABC-SR05.
C. You should uABCrade ABC-SR05 to Windows Server 2008.
D. You should install Microsoft Windows SharePoint Services (WSS) 3.0 on ABC-SR06.
E. You should install Microsoft Windows SharePoint Services (WSS) 2.0 on ABC-SR06.
F. You should restore the backup from ABC-SR05 to ABC-SR06.
G. You should uABCrade Windows SharePoint Services (WSS) 2.0 to Windows SharePoint
Services (WSS) 3.0 on ABC-SR06.

Answer: A,E,F,G

Explanation: In order to migrate to SharePoint Services (WSS) 3.0 from ABC-SR05 to ABC-SR06
with all the configuration and content, you need to install WSS 2.0 on ABC-SR06. You need to
back up the WSS 2.0 configuration and content from ABC-SR05. Then the backup can be restored
from ABC-SR05 to ABC-SR06. Lastly an in-place uABCrade of WSS 2.0 to WSS 3.0 can be
executed on ABC-SR06.
When you run an in-place uABCrade, all content and configuration data is uABCraded in-place, at
one time. When you start the in-place uABCrade process, the Web server and Web sites remain
offline until the uABCrade has been installed. In-place uABCrades are best for a stand-alone
server and small installations as in this case

Reference: Install and configure Office SharePoint Server for an in-place uABCrade

http://technet.microsoft.com/en-us/library/cc263212(TechNet.10).aspx

Determine uABCrade approach (Office SharePoint Server)

http://technet.microsoft.com/en-us/library/cc263447(TechNet.10).aspx


QUESTION 3
You work as the network administrator at Certkingdom.com The Certkingdom.com network consists of a domain
named Certkingdom.com Certkingdom.com has headquarters in London and branch office in Paris. All servers on
the Certkingdom.com network run Windows Server 2008 and all client computers run Windows Vista.
The Certkingdom.com network contains a member server named ABC-SR01. ABC-SR01 is configured as
the Key Management Service (KMS) server.
You are planning to roll out 20 new Windows Server 2008 computers on the network.
After installing Windows Server 2008 on three of the computers you discover that the servers are
unable to activate using ABC-SR01.
How can you ensure that the new computers are able to activate using ABC-SR01?

A. You should ensure that the new servers have a connection to the internet.
B. You should install the Key Management Service (KMS) on a dedicated Windows Server 2008
computer.
C. You should phone Microsoft Licensing House to Activate the servers by telephone.
D. You should install Windows Server 2008 on at least 7 of the remaining computers.

Answer: D

Explanation: To activate the new server through KMS server, you should complete the installation
of at least 10 servers. The Key Management Service is a Windows service. KMS is a trusted
mechanism that, once the KMS host is activated, allows volume client computers within the
enterprise to activate themselves without any interactions with Microsoft. KMS activation of
Windows Server 2008 follows a hierarchical structure. Each successive product group can activate
all the groups below it, and the KMS can be hosted on any edition that it can activate.


QUESTION 4
You are the network administrator at Certkingdom.com The Certkingdom.com network consists of a domain
named Certkingdom.com All servers on the Certkingdom.com network run Windows Server 2008 and all client
computers run Windows XP Professional. Certkingdom.com currently makes use of two computers named
ABC-TS01 and ABC-TS02 which runs the Terminal Server Session Broker role.
Certkingdom.com recently entered into partnership with Weyland Industries who make use of two
computers named WEYLAND-TS01 and WEYLAND-TS02. During the course of the day you
receive instruction from Certkingdom.com and Weyland Industries to configure their Terminal servers for
load balancing whilst ensuring ABC-TS02 is configured as the preferred server.
What program would you use to configure the load balancing?

A. You should use the Terminal Services Resource Authorization policy (RAP).
B. You should use the Terminal Services Configuration utility.
C. You should use the Terminal Services Connection Authorization policy (CAP).
D. You should use the Group Policy Manager utility.

Answer: B

Explanation: In order to configure load balancing for the four terminal servers you need to make
use of the Terminal Services Configuration utility. This will also make ABC-TS02 the preferred
server for TS sessions. Using NLB with Terminal Services provide increased availability,
scalability, and load-balancing performance, as well as the ability to distribute a large number of
Terminal Services clients over a group of terminal servers.


QUESTION 5
You work as an enterprise administrator at Certkingdom.com The Certkingdom.com network consists of a domain
named Certkingdom.com All servers on the Certkingdom.com network run Windows Server 2008.
The Certkingdom.com network contains a server named ABC-SR22 which hosts Windows SharePoint
Services (WSS). ABC-SR22 hosts a WSS site for each department in the company.
The Sales department WSS site contains a document library. The Sales manager asks you to
configure the WSS site so that Sales users can send email to the document library. To this end,
you configure ABC-SR22 to accept incoming email.
What else is required to enable users to send email to the document library?

A. You need to modify the incoming email settings for the WSS site in IIS Manager.
B. You need to modify the incoming email settings the Application pool in IIS Manager.
C. You need to modify the incoming email settings for the Sales WSS site
D. You need to modify the incoming email settings for the document library.

Answer: D

Explanation: You need to change the incoming mail settings for the document library. This will
allow the users to send email to the document library.

Reference: http://technet.microsoft.com/en-us/library/cc262947(TechNet.10).aspx


QUESTION 6
You work as the network administrator at Certkingdom.com The Certkingdom.com network consists of a domain
named Certkingdom.com All servers on the Certkingdom.com network run Windows Server 2008. Half the client
computers run Windows XP, and the rest run Windows Vista.
You are responsible for a Terminal Server named ABC-TS01. ABC-TS01 is used to allow remote
users to run the necessary applications required for their daily tasks from their workstations. You
receive instruction to install a Terminal Service application named KingSalesApp2 on ABC-TS01.
KingSalesApp2 does not make use a Microsoft Windows Installer package for the installation and
modifications are made to the current user registry during installation.
Which two of the following steps should you perform to install KingSalesApp2?

A. After installing the application, run the change logon /enable command on ABC-TS01.
B. Before installing the application, run the change logon /enable command on ABC-TS01
C. Before installing the application, run the change user /install command on ABC-TS01.
D. After installing the application, run the change user /install command on ABC-TS01.
E. Before installing the application, run the change user /execute command on ABC-TS01.
F. After installing the application, run the change user /execute command on ABC-TS01.
G. Before installing the application, run the change logon /disable command on ABC-TS01 before
running the application.
H. After installing the application, run the change logon /disable command on ABC-TS01 before
running the application

Answer: C,F

Explanation: In order to install the application to support numerous user sessions in the above
scenario, you need to first run the change user /install command on ABC-TS01because you need
to put a Terminal Services server in Install mode to be able to install or remove programs on the
server. You can put a Terminal Services server in Install mode using the Add/Remove Programs
tool in Control Panel in order to add or remove a program or by using the change user command
at a command prompt. Thereafter you can install the application.
After the installation of the program, you need to return the Terminal Services server to Execute
mode, to be able to execute the application. Therefore, to return to the Execute mode, you need to
run the change user /execute command on ABC-TS01.

Reference: HOW TO: Use the CHANGE USER Command to Switch to Install Mode in Windows
2000 Terminal Services

http://support.microsoft.com/kb/320185


QUESTION 7
You work as a network administrator for Certkingdom.com The domain contains four Windows Server
2008 domain controllers. All domain member servers run Windows Server 2008 and all client
computers run Windows Vista or Windows XP Service Pack 3.
You receive instruction to assign the Terminal Services and Terminal Services Gateway roles to a
server named ABC-TS02.
In order to protect the network you want to make sure that all client computers that connect to
ABC-TS02 have antivirus software and up to date security patches installed.
How can you enforce the security requirements?

A. You should implement a Network Access Protection (NAP) server in the domain and configure
the client computers to send a health option statement in the Terminal Services client access policy.
B. You should configure a Remote Access Policy with the required security settings.
C. You should install Microsoft Baseline Security Analyzer (MBSA) on ABC-TSO2 and configure it
to scan the client computers when they connect.
D. You should install Microsoft Security Assessment Tools (MSAT) on ABC-TSO2 and configure it
to scan the client computers when they connect.

Answer: A

Explanation: Explanation
To ensure that all client computers have firewall, antivirus software and anti-spyware software
installed, you need to set the Request clients to send a health option statement in the Terminal
Services client access policy. You also need to install and configure Network Access Protection
(NAP) on a server in the Certkingdom.com domain.


QUESTION 8
You work as an enterprise administrator at Certkingdom.com The Certkingdom.com network has a domain named
Certkingdom.com All servers on the Certkingdom.com network run Windows Server 2008. Half the client
computers run Windows XP Professional, and the rest run Windows Vista.
The Certkingdom.com network contains a server named ABC-SR22 which hosts Windows SharePoint
Services (WSS). ABC-SR22 hosts a WSS site for each department.
You receive instruction to ensure that CertK ing .com users are able to create distribution lists from
the SharePoint site.
How would you configure ABC-SR02 to accomplish this?

A. You need to install the Exchange System Manager software on ABC-SR02.
B. You need to enable IMAP4 on ABC-SR02.
C. You need to enable the SharePoint Directory Management Service on ABC-SR02.
D. You need to modify the incoming email settings on the SharePoint site on ABC-SR02.

Answer: B

Explanation: In order to configure the WSS server in such a way that it permits users to create
distribution lists from a SharePoint site, you need to enable the SharePoint Directory Management
Service on ABC-SR02. A distribution list contains the e-mail addresses of existing address lists as
well as the e-mail addresses of other site members. Distribution lists are available only if the
SharePoint Directory Management Service is enabled in Central Administration.
All new subsites that are created in an e-mail-enabled site collection are automatically e-mailenabled
also. If you choose to use an existing group during site creation, the distribution list for the
parent site (if available) will be associated with the new site

Reference: Introduction to incoming e-mail/ New site creation walkthrough

http://office.microsoft.com/en-us/help/HA100823061033.aspx


QUESTION 9
You work as an enterprise administrator at Certkingdom.com The Certkingdom.com network consists of a domain
named Certkingdom.com All servers on the Certkingdom.com network run Windows Server 2008.
The Certkingdom.com network contains a member server named ABC-SR11 that has the IIS server role
installed. ABC-SR10 hosts a Web site called ABCWeb.com. ABCWeb.com is configured to use
both HTTP and HTTPS connections. An SSL certificate is configured to enable the HTTPS
connections.
There are multiple virtual directories configured within the Web site. Some virtual directories allow
HTTP connections and some require encrypted connections using SSL.
You add another virtual directory named to the Web site. The virtual directory can be accessed at
ABCweb.com/accounts/.
The Certkingdom.com security policy requires that /accounts/ must be accessible to authenticated users
only and to allow authentication types to support all browsers. However, the CIO wants the
authentication traffic to be encrypted by using HTTPS.
How should you configure the /accounts virtual directory without affecting the other virtual
directories? Choose three

A. By enabling Basic Authentication for ABCWeb.com.
B. By enabling the Basic Authentication setting for the /accounts virtual directory.
C. By enabling disabling the Anonymous Authentication setting for ABCWeb.com.
D. By disabling the Anonymous Authentication setting for the /accounts virtual directory.
E. By configuring the Web site to the Require SSL setting.
F. By configuring the /accounts virtual directory to the Require SSL setting.
G. By enabling Digest Authentication setting the /accounts/ virtual directory.

Answer: B,D,F

Explanation: You need to enable the Basic Authentication setting, because it is supported by
mostly all the browsers.
You need to disable the Disable the Anonymous Authentication setting, so that only authenticated
users can access the virtual directory.
You also need to the /accounts/ virtual directory to the Require SSL setting. This will only allow
that the authentication traffic is encrypted and all other directories of the Website must be
accessible to anonymous users and be available without SSL.
You also need to configure the virtual directory for the Web site and not the website.

Reference: How to configure IIS Web site authentication

http://support.microsoft.com/kb/308160


QUESTION 10
You work as an enterprise administrator at Certkingdom.com The Certkingdom.com network consists of a domain
named Certkingdom.com All servers on the Certkingdom.com network run Windows Server 2008.
The Certkingdom.com network contains a member server named ABC-SR25 that runs the Web Server
(IIS) role and hosts multiple Websites.
You have received instruction to configure ABC-SR25 to run a new company Intranet Web site.
You want to configure ABC-SR25 to release memory to the new company Intranet Web site
automatically.
How should you configure ABC-SR25 without affecting the other Web sites?

A. The best option is to associate the Intranet website with the Default Application Pool.
B. The best option is to decrease the connection timeout for the Intranet website.
C. The best option is to modify the settings on the Default Web Site.
D. The best option is to configure the settings on the Performance tab of Default Application Pool.
E. The best option is to associate the website with a new application pool.

Answer: E

Explanation: The best option is to create a new application pool and associate the Web site to the
application pool. This will automatically release memory for a single website without affecting the
other Web sites. An application pool is a group of one or more URLs that are served by a worker
process or a set of worker processes. Application pools set boundaries for the applications they
contain, which means that any applications that are running outside a given application pool
cannot affect the applications in the application pool.

Reference: IIS 7.0: Managing Application Pools in IIS 7.0

http://technet2.microsoft.com/windowsserver2008/en/library/1dbaa793-0a05-4914-a065-

4d109db3b9101033.mspx?mfr=true

Reference: IIS 7.0: Configuring Recycling Settings for an Application Pool

http://technet2.microsoft.com/windowsserver2008/en/library/0d5770e3-2f6f-4e11-a47c-

9bab6a69ebc71033.mspx?mfr=true


Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com

October 16, 2011

Microsoft records banner sales year

Proving naysayers incorrect once again, Microsoft posted a banner fiscal 2011 year in revenue, as sales of Microsoft Office, server software and Xbox continued to drive growth, even as sales of Windows leveled off, according to the company.

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com


For the fiscal year ending June 30, Microsoft generated US$69.94 billion in revenue, an all-time high for the company and a 12 percent increase in revenue compared to fiscal 2010. Of this revenue, $23.15 billion was net income, a 23 percent increase from the prior year.

For the fourth quarter of fiscal 2011, Microsoft reported revenue of $17.37 billion, an 8 percent increase from the same period a year prior. Net income was $5.87 billion, a 30 percent increase.

Microsoft Business Division's revenue for the fourth quarter grew by 16 percent for the year and 7 percent for the quarter, thanks to the recent launch of Microsoft Office 2010, which has already sold 100 million licenses. The division reported $5.8 billion in revenue for the fourth quarter and $22 billion for the full year, eclipsing revenue of Microsoft's flagship Windows and Windows Live Division, which oversees the Windows operating system.

Windows and Windows Live Division actually declined by 2 percent for the year, and 1 percent for the quarter, as demand for personal computers stagnated during this period of time. This division posted $4.74 billion in revenue for the fourth quarter and $19.02 billion for the year.

Revenue from Microsoft's Server and Tools division grew by 11 percent for the full year and 12 percent for the fourth quarter, as increased demand for Windows Server, System Center, and SQL Server continued unabated. Server and Tools reported $4.6 billion for the fourth quarter and $17 billion for the year.

The Entertainment and Devices Division posted the largest revenue growth for the company, swelling sales by 45 percent for the full year and 30 percent for the fourth quarter, thanks to sales of the Xbox game console and associated games and services. This division generated $1.5 billion in revenue for the quarter and $8.9 billion for the year.

For the fiscal year 2010 overall, the company reported revenue of $62.48 billion, and net income of $18.76 billion. That year, Microsoft recorded fourth quarter revenue of $16.04 billion and net income was $4.52 billion.

With these earnings, Microsoft bested analyst estimates across the board. Analysts expected the company to generate $17.23 billion in revenue for the quarter and $61.72 billion for the fiscal year, according to a poll by Thomson One Analytics. Net income was expected to come in at $4.9 billion for the fourth quarter and $22 billion for the year.

October 14, 2011

70-519 Exam

Best CCNA Training and CCNA Certification and more Cisco exams log in to Certkingdom.com


QUESTION 1
There is ASP NET 3.5 Web application CertKingdomApp.
You are required to upgrade CertKingdomApp to ASP.NET 4.0.
You need to make sure that CertKingdomApp is optimized for search engines.
In particular this optimization must include HTML that is generated by CertKingdomApp and URLs
local within CertKingdomApp.
Within CertKingdomApp there is a Data List control CertKingdomC.
CertKingdomApp must be able to load data at runtime into CertKingdomC with the help of the current
URL.
What is appropriate in this scenario? Select four.

A. Use property Repeat Layout of..
B. Use property Data List Layout of..
C. Use property Render Outer table Layout of..
D. ..Web Forms routing and set the property to…
E. .. permanent redirect and set the property to..
F. .. temporary redirect and set the property to..
G. ..Null..
H. ..True..
I. ..False..
J. ..Table..
K. ..List..
L. .. on all list controls.
M. ..on all controls.
N. .. all Form View controls.

Answer: B,D,I,N

Explanation:


QUESTION 2
There a ASP.NET MVC 2 application CertKingdomApp.
Consider unhandled exceptions.
CertKingdomApp must manage and log these unhandled exceptions.
What would be best to achieve this if you want to put the logic into a single place?

A. Use a custom Handle Error attribute to…
B. Use the default Handle Error attribute to…
C. For every method..
D. For each controller..
E. .. override the Exception method.
F. .. override the OneException method.
G. .. and apply it to all controllers.
H. ..use try and catch.

Answer: A,G

Explanation:


QUESTION 3
There is an ASP.NET Web application CertKingdomApp.
CertKingdomApp has pages that are available for public users.
CertKingdomApp has pages that are available for only administrative purposes.
Consider error handling code for these pages.
The same code must be used for the public pages and the administrative pages.
Errors must be handled in one way for the public pages and in another way for the administrative
pages.
How can this be achieved? Select two.

A. Use file Global.asax.cs (or Global.asax.vb)
B. Use file code-behind.
C. Use the Page_Error method(s).
D. ..for every public page and for every administrative page.
E. ..of the subclasses of System.Web.UI.Page.
F. ..of the subclasses of System.Web.URL.Page.
G. ..use the Application_error method.
H. .. for each master page.

Answer: C,E

Explanation:


QUESTION 4
CertKingdom has multiple ASP.NET Web applications.
There is a class library CertKingdomLib that are used by all these application.
There is a variable CertKingdomVar in CertKingdomLib.
CertKingdomVar is within the helper class.
CertKingdomVar contains secret information.
CertKingdomVar must not be seen by developers debugging applications.
How can this be achieved?

Answer:


QUESTION 5
There is an ASP.NET Web application CertKingdomApp.
CertKingdomApp has a Menu Control CertKingdomMC.
For unauthorized users CertKingdomMC shows a menu of public pages.
For authorized users CertKingdomMC shows a menu of both public pages and some private pages.
For security you need to ensure that the private pages (both the menu options and the URLs) are
not shown to unauthorized user.
What is appropriate in this scenario? Select four.

A. The event handler..
B. The attribute..
C. The method..
D. The exception handler..
E. ..Page_Refresh should be used..
F. ..Page_Load should be used..
G. ..window.onload should be used..
H. ..window.update should be used..
I. ..window.onupdate should be used..
J. ..Page_Init should be used..
K. .. JavaScript document ready should be used..
L. ..VBS (or C# script) document ready should be used..
M. …to add pages to CertKingdomMC that are to be accessed by all users
N. ..to hide the private pages from the list of pages shown on CertKingdomMC.
O. ..to add pages to CertKingdomMC that are to be accessed by authorized users.
P. ..to add pages to CertKingdomMC that are to be accessed by unauthorized users.

Answer: C,F,O

Explanation:


QUESTION 6
There is an ASP.NET Web application CertKingdomApp.
A user of CertKingdomApp can send customized e-mails to several thousand receivers at a time
through a form CertKingdomForm.
CertKingdomApp has around 3000 users about half of which can be accessing CertKingdomApp at a
specific point of time.
How can you optimize the performance of CertKingdomApp? Select three.

A. Use the On Load method..
B. Use the On Click method..
C. ..of CertKingdomForm..
D. ..of CertKingdomApp..
E. ..as a separate process.
F. ..as multiple processes.
G. .. from the System.Net.Mail namespace classes.
H. .. from the System.Mail namespace classes.
I. .. from the Machine.Web.Mail namespace classes.
J. .. from the System.Web.Mail namespace classes.

Answer: B,C,E

Explanation:


QUESTION 7
There is an ASP.NET Web application CertKingdomApp.
CertKingdomApp is used to edit pictures online within your web browser.
Clients can upload pictures to CertKingdomApp.
Clients can edit the uploaded pictures through special features CertKingdomApp.
Some of these features are very computationally demanding.
These specific features should be run on a GPU (Graphics Processing Unit).
Other features of CertKingdomApp, the ones that are not so CPU intensive, should be run on the
server.
Bandwidth usage is also a critical part of the required solution. It should be minimized.
What action should you take?

Answer:


QUESTION 8
There is an ASP.NET Web application CertKingdomApp.
You are required to enforce that CertKingdomApp is using data caching at all times.
You are required to enforce that CertKingdomApp keeps the session state at all points of time.
CertKingdomApp must maintain session state and data caching.
What is appropriate in this scenario? Select two.

A. Mixed process session state should be used.
B. out-of-process session state should be used.
C. in-process session state should be used.
D. in&out process session state should be used.
E. out-of-process transaction state should be used.
F. in-process transaction state should be used.
G. in&out process transaction state should be used.
H. input caching should be used.
I. output caching should be used.
J. Static caching should be used.
K. Caching should be enabled.
L. distributed caching should be used.
M. multiple caching should be used.

Answer: B,L

Explanation:


QUESTION 9
There is an ASP.NET Web application CertKingdomApp.
CertKingdomApp is rewritten.
Now CertKingdomApp should be deployed.
What is appropriate in this scenario? Select two or three.

A. Use a web pool..
B. Use an application pool…
C. Use a rewritten pool..
D. Use the global assembly cache…
E. ..which includes only ASP.NET 2.0, ASP.NET 3.0, ASP NET 3.5, and ASP.NET.4 Web
applications…
F. ..which includes only ASP.NET. 3.5 Web applications…
G. ..which includes only ASP.NET.4 Web applications…
H. ..which includes only ASP.NET 2.0, ASP.NET 3.0, and ASP NET 3.5Web applications…
I. ..which includes only ASP.NET 1.0, ASP.NET 2.0, ASP.NET 3.0, and ASP NET 3.5Web
applications…
J. ..and add CertKingdomApp to it.
K. .. and compile and deploy CertKingdomApp to it.
L. ..and deploy CertKingdomApp to it.

Answer: B,G,J

Explanation:


QUESTION 10
There is an ASP.NET Web application CertKingdomApp.
There is a MS SQL Server database CertKingdomDB on server CertKingdomSrv.
CertKingdomDB is used to store user authorization data.
CertKingdomDB also store some other secret information used by CertKingdomApp.
CertKingdomApp must not access CertKingdomSrv directly.
CertKingdomApp should not include programming code for authorization.
Some Web pages, the ones that displays secret information, should only show information for
authenticated users.
Visitors should only be able to see pages that do not contain any secret data.
Which type of solution should be used in this scenario?

A. Third party authentication solution.
B. SQL Service
C. WCF service.
D. Separate library.
E. Standard library
F. SQL XML Services.
G. SQL HTML Services.
H. stored procedures.

Answer: C

Explanation:


Best CCNA Training and CCNA Certification and more Cisco exams log in to Certkingdom.com

Bookmark and Share