February 28, 2012

83-640 Q & A / Study Guide / Testing Engine

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
You work as the network administrator at CERTKINGDOM.com. The CERTKINGDOM.com network has a
domain named CERTKINGDOM.com. All servers on the CERTKINGDOM.com network run Windows Server 2008.
Only one Active-Directory integrated zone has been configured in the CERTKINGDOM.com domain.
CERTKINGDOM.com has requested that you configure DNS zone to automatically remove DNS records
that are outdated.
What action should you consider?

A. You should consider running the netsh /Reset DNS command from the Command prompt.
B. You should consider enabling Scavenging in the DNS zone properties page.
C. You should consider reducing the TTL of the SOA record in the DNS zone properties page.
D. You should consider disabling updates in the DNS zone properties page.

Answer: B

Explanation: In the scenario you should enable scavenging through the zone properties because
scavenging removes the outdated DNS records from the DNS zone automatically. You should
additionally note that patience would be required when enabling scavenging as there are some
safety valves built into scavenging which takes long to pop.
Reference: http://www.gilham.org/Blog/Lists/Posts/Post.aspx?List=aab85845-88d2-4091-8088-
a6bbce0a4304&ID=211


QUESTION 2
You work as the network administrator at CERTKINGDOM.com. The CERTKINGDOM.com network has a
domain named CERTKINGDOM.com. All servers on the CERTKINGDOM.com network run Windows Server
2008.
The CERTKINGDOM.com network has a server named CERTKINGDOM-SR15. You install the Active
Directory Lightweight Directory Services (AD LDS) on CERTKINGDOM-SR15.
Which of the following options can be used for the creation of new Organizational Units (OU’s) in
the application directory partition of the AD LDS?

A. You should run the net start command on CERTKINGDOM-SR15.
B. You should open the ADSI Edit Microsoft Management Console on CERTKINGDOM-SR15.
C. You should run the repadmin /dsaguid command on CERTKINGDOM-SR15.
D. You should open the Active Directory Users and Computers Console on CERTKINGDOM-SR15.

Answer: B

Explanation: You need to use the ADSI Edit snap-in to create new OUs in the AD LDS
application directory partition. You also need to add the snap-in in the Microsoft Management
Console (MMC).


QUESTION 3
You work as the network administrator at CERTKINGDOM.com. The CERTKINGDOM.com network has a
domain named CERTKINGDOM.com. All servers on the CERTKINGDOM.com network run Windows Server
2008.
The CERTKINGDOM.com network has two domain controllers CERTKINGDOM-DC01 and CERTKINGDOMDC02.
CERTKINGDOM-DC01 suffers a catastrophic failure but it is causing problems because it was
configured to have Schema Master Operations role. You log on to the CERTKINGDOM.com domain as
a domain administrator but your attempts to transfer the Schema Master Operations role to
CERTKINGDOM-DC02 are unsuccessful.
What action should you take to transfer the Schema Master Operations role to CERTKINGDOMDC02?

A. Your best option would be to have the dcpromo /adv command executed on CERTKINGDOMDC02.
B. Your best option would be to have the Schema Master role seized to CERTKINGDOM-DC02.
C. Your best option would be to have Schmmgmt.dll registered on CERTKINGDOM-DC02.
D. Your best option would be to add your user account to the Schema Administrators group.

Answer: B

Explanation: To ensure that CERTKINGDOM-DC02 holds the Schema Master role you need to seize
the Schema Master role on CERTKINGDOM-DC02. Seizing the schema master role is a drastic step
that should be considered only if the current operations master will never be available again. So to
transfer the schema master operations role, you have to seize it on CERTKINGDOM-DC02.
Reference: http://technet2.microsoft.com/windowsserver/en/library/d4301a14-dd18-4b3c-a3ccec9a773f7ffb1033.
mspx?mfr=true


QUESTION 4
You work as the network administrator at CERTKINGDOM.com. The CERTKINGDOM.com network has a
single forest. The forest functional level is set at Windows Server 2008.
The CERTKINGDOM.com network has a Microsoft SQL Server 2005 database server named
CERTKINGDOM-DB04 that hosts the Active Directory Rights Management Service (AD RMS).
You try to access the Active Directory Rights Management Services administration website but
received an error message stating:
"SQL Server does not exist or access is denied."
How can you access the AD RMS administration website?

A. You need to restart the Internet Information Server (IIS) service and the MSSQLSVC service on
CERTKINGDOM-DB04.
B. You need to install the Active Directory Lightweight Directory Services (AD LDS) on
CERTKINGDOM-DB04.
C. You need to reinstall the AD RMS instance on CERTKINGDOM-DB04.
D. You need to reinstall the SQL Server 2005 instance on CERTKINGDOM-DB04.
E. You need to run the DCPRO command on CERTKINGDOM-SR04

Answer: A

Explanation: You need to restart the internet information server (IIS) to correct the problem. The
starting of the MSSQULSVC service will allow you to access the database from AD RMS
administration website.


QUESTION 5
You work as an enterprise administrator at CERTKINGDOM.com. The CERTKINGDOM.com network has a
domain named CERTKINGDOM.com. The CERTKINGDOM.com network has a Windows Server 2008
computer named CERTKINGDOM-SR03 that functions as an Enterprise Root certificate authority (CA).
A new CERTKINGDOM.com security policy requires that revoked certificate information should be
available for examination at all times.
What action should you take adhere to the new policy?

A. This can be accomplished by having a list of trusted certificate authorities published to the
CERTKINGDOM.com domain.
B. This can be accomplished by having the Online Certificate Status Protocol (OCSP) responder implemented.
C. This can be accomplished by having the OCSP Response Signing certificate imported.
D. This can be accomplished by having the Startup Type of the Certificate Propagation service set to Automatic.
E. This can be accomplished by having the computer account of CERTKINGDOM-SR03 added to the
PGCertificates group.

Answer: B

Explanation: You should use the network load balancing and publish an OCSP responder. This
will ensure that the revoked certificate information will be available at all times. You do not need to
download the entire CRL to check for revocation of a certificate; the OCSP is an online responder
that can receive a request to check for revocation of a certificate. This will also speed up certificate
revocation checking as well as reducing network bandwidth tremendously.


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

February 27, 2012

70-562 Q & A / Study Guide / Testing Engine

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
You work as a Web Developer at CERTKINGDOM.com. You make use of Microsoft .NET Framework 3.5 to
develop ASP.NET Web applications.
CERTKINGDOM.com has a server, named CERTKINGDOM-SR13, which runs an instance of Microsoft SQL Server 2005
locally and is configured to make use of Windows Authentication. You have developed a Web
application named CERTKINGDOMApp1 that will be hosted on CERTKINGDOM-SR13.
You are preparing to configure the role management and membership providers on CERTKINGDOM-SR13.
Which of the following actions should you take?

A. You should consider making use of the Aspnet_compiler.exe command.
B. You should consider making use of the aspnet_regiis.exe command.
C. You should consider making use of the Aspnet_merge.exe command
D. You should consider making use of the ASP.NET SQL Server registration tool.

Answer: A,B

Explanation:


QUESTION 2
You work as a Web Developer at CERTKINGDOM.com. You make use of Microsoft .NET Framework 3.5 to
develop ASP.NET Web applications.
You have recently developed a Web application named CERTKINGDOMWebApp1, and configured it to make
use of Windows Authentication. After specific group is granted NTFS permissions to access a
specific file named CERTKINGDOM.doc, you are informed that you have to make sure that users not
belonging to the group are prevented from accessing the file.
Which of the following actions should you take?

A. You should configure the machine.config file to include the element.
B. You should configure the machine.config file to include the element.
C. You should configure the app.config file to include the element.
D. You should configure the Web.config file to include the element.
E. You should configure the Web.config file to include the element.
F. You should configure the app.config file to include the element.

Answer: D

Explanation:


QUESTION 3
You work as a Web Developer at CERTKINGDOM.com. You make use of Microsoft .NET Framework 3.5 to
develop ASP.NET Web applications.
You have developed a web application named CERTKINGDOMWebApp. You are now preparing to configure
authentication for CERTKINGDOMWebApp so that clients are not allowed to access it anonymously. You also
need to make sure that access for users from untrusted domains are allowed.
You have written the code segment shown below:








Which of the following actions should you take NEXT?

A. You should consider adding the code segment to the web.config file.
B. You should consider adding the code segment to the project’s property pages.
C. You should consider adding the code segment to the app.config file.
D. You should consider adding the code segment to the workstation’s machine.config file.

Answer: A


QUESTION 4
You work as a Web Developer at CERTKINGDOM.com. An MS ASP.NET Web application, named CERTKINGDOMApp1,
has been developed using the 3.5 version of MS Net Framework.
Subsequent to retrieving the most recent project version from the source control repository, you try
to compile it on your workstation and find that the reference to the assembly is absent.
You want to add a reference path that connects to the absent assembly.
Which of the following options should you access to achieve this?

A. The project’s property pages.
B. CERTKINGDOMApp1’s web.config file.
C. CERTKINGDOMApp1’s app.config file.
D. Your workstation’s machine.config file.

Answer: A

Explanation:


QUESTION 5
You work as a Web Developer at CERTKINGDOM.com. You make use of Microsoft .NET Framework 3.5 to
develop Microsoft ASP.NET Web applications.
An existing Web application was developed using Microsoft .NET Framework 1.0. the Web
application makes use of Microsoft Internet Information Services (IIS) 6.0, but does not make use
of any features of Microsoft .NET Framework 3.5.
You want to configure the Web application for .NET Framework 3.5 with as little administrative
effort as possible.
Which of the following actions should you take?

A. You should consider accessing Microsoft Internet Information Services (IIS) 6.0 to modify the
handler runtime version.
B. You should consider accessing the machine.config file to modify the handler runtime version.
C. You should consider accessing the app.config file to modify the handler runtime version.
D. You should consider accessing the web.config file to modify the handler runtime version.

Answer: A

Explanation:


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

February 26, 2012

Avaya Is Said to Plan $1 Billion IPO for as Soon as April

Avaya Holdings Corp., the communications-gear maker owned by private-equity firms Silver Lake and TPG Capital, plans to hold its initial public offering as soon as April, two people with knowledge of the matter said.

Cisco CCNA Training, Cisco CCNA Certification

Best Avaya Certification Training and Avaya Exams Training and more Cisco exams log in to Certkingdom.com



The company, based in Basking Ridge, New Jersey, filed in June to raise $1 billion in an IPO. It put off the sale amid stock-market swings that left some investors reluctant to buy shares in newly minted companies, said the people, who asked not to be identified. The timing could slip, the people said.

Cisco Systems Inc., the top manufacturer of networking equipment and a competitor to Avaya, slumped 11 percent last year, while rival Juniper Networks Inc. dropped 45 percent. The weakness reflected concerns that customers would delay upgrades amid economic turmoil. The outlook brightened in recent weeks after quarterly results from Cisco exceeded profit and sales estimates and analysts predicted that AT&T Inc., the largest U.S. telephone company, would step up capital spending.

Avaya Inc., which is owned by Avaya Holdings, reported on Feb. 13 that its fourth quarter net loss narrowed to $26 million from $180 million a year earlier while sales rose 1.5 percent to $1.39 billion. The company cut costs in fiscal 2011 by eliminating jobs and consolidating facilities.

Market Share

Synergy Research Group said in August that Avaya gained share in the global market for voice equipment for corporate customers. It ranks No. 2 in the market behind Cisco.

Telecommunications capital spending began increasing last year for the first time since 2009, according to Yankee Group. The research firm said last May that global expenditures will rise to $302.2 billion in 2014 from $275.7 billion in 2011.

Stacey Torman, a representative of Avaya, declined to comment.

AT&T, based in Dallas, is planning to make “reasonably healthy” orders from networking companies this year, Jefferies Group Inc. said in report yesterday.

Avaya was spun off from Lucent Technologies Inc. in 2000 and taken private in 2007 for $8.2 billion. Later, it acquired an equipment business from Nortel Networks Corp. for $943 million.

Morgan Stanley, Goldman Sachs Group Inc. and JPMorgan Chase & Co. are leading the IPO, Avaya said in its June 9 filing with the U.S. Securities and Exchange Commission. The company didn’t disclose how many shares it will sell or give a price range in the filing.

February 24, 2012

70-561 Q & A / Study Guide

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
You work as an application developer at CertKingdom.com. You are making use of .NET Framework
3.5, as well as Microsoft ADO.NET for application development.
You have recently developed an application that references a database named, CKDDatabase1,
which is hosted by a server, named CERTKINGDOM-SR13. You then created a storage schema
definition file, a conceptual schema definition file, and a mapping schema definition file. The files
are named CertKingdom.ssdl, CertKingdom.csdl, and CertKingdom.msl respectively.
After modifying the contents of the conceptual schema definition file and the mapping schema
definition file, you are required to create the .NET Framework entities from the modified schema
definitions.
You have decided to make use of the Edmgen.exe tool.
Which of the following actions should you take?

A. You should consider making use of the EntityClassGeneration mode.
B. You should consider making use of the FromSsdlGeneration mode.
C. You should consider making use of the ValidateArtifacts mode.
D. You should consider making use of the FullGeneration mode.

Answer: A


QUESTION 2
You work as an application developer at CertKingdom.com. You are making use of .NET Framework
3.5, as well as Microsoft ADO.NET for application development.
You have recently developed an application that has two entities named CKDClient and CKDOrders.
The CKDClient entity has a navigable property, named CKDOrders, which returns a collection of
CKDOrders entity instances.
You have been instructed to create code that returns the corresponding CKDOrders entity instances
when a CKDClient entity instance is queried.
Which of the following actions should you take?

A. You should construct the following code:
CKDEntities context = new CKDEntities();
ObjectQuery query;
query = context.Client.Include("CKDOrders");
B. You should construct the following code:
CKDEntities context = new CKDEntities();
ObjectQuery query;
query = context.Client.Insert("CKDOrders");
C. You should construct the following code:
CKDEntities context = new CKDEntities();
ObjectQuery query;
query = context.Client.Release("CKDOrders");
D. You should construct the following code:
CKDEntities context = new CKDEntities();
ObjectQuery query;
query = context.Client.Remove("CKDOrders");

Answer: A


QUESTION 3
You work as an application developer at CertKingdom.com. You are making use of .NET Framework
3.5, as well as Microsoft ADO.NET for application development.
CertKingdom.com has a server, named CERTKINGDOM-SR35, which hosts a Microsoft SQL Server
2005 database named CKDDatabase1. You are in the process of developing a new application that
is linked to CKDDatabase1, which hosts has two tables. Each table is displayed in its own GridView
control using its own SqlConnection object.
You have received instructions to reconfigure the way that the tables are displayed, so that it
makes use of one SqlConnection object to display the tables at the same time.
Which of the following actions should you take?

A. You should consider making use of a SqlCommand object to simultaneously implement two
SqlDataReader objects.
B. In the connection string of the application, have the Multiple Active Result Sets (MARS)
enabled.
C. You should consider making use of the xsd.exe tool.
D. In the connection string of the application, have the Default Result Set enabled.

Answer: B


QUESTION 4
You work as an application developer at CertKingdom.com. You are making use of .NET Framework
3.5, as well as Microsoft ADO.NET for application development.
You are in the process of configuring an application that you recently developed. You have to
configure the application so that it is able to connect to all kinds of databases.
You start by specifying the database driver name in the application's connection string.
Which of the following actions should you take NEXT?

A. You should make use of ODBC Connection Pooling for creating the connection object.
B. You should make use of the OLE DB Connection Manager for creating the connection object
C. You should consider making use of the subsequent code to construct the connection object:
DSProviderFactory factory = DSProviderFactories.GetFactory("System.Data");DbConnection =
CreateConnection();
D. You should consider making use of the subsequent code to construct the connection object:
DbProviderFactory factory =
DbProviderFactories.GetFactory(databaseProviderName);DbConnection connection =
factory.CreateConnection();

Answer: D


QUESTION 5
You work as an application developer at CertKingdom.com. You are making use of .NET Framework
3.5, as well as Microsoft ADO.NET for application development.
You have recently created a new application that has Microsoft OLE DB Provider configured as its
data provider.
You received instruction to reconfigure the application so that the data provider is Microsoft
SqlClient. Subsequent to the reconfiguration, you find that errors are thrown when the application
performs parameterized queries.
You are required to make sure that this does not occur.
Which of the following actions should you take?

A. You should make use of the OracleClient Provider instead of the OLE DB Provider.
B. You should insert an XSD file to the schema collections of the XmlReader object.
C. Use the Unicode attribute in the connection string to false.
D. You should consider reconfiguring the the application code by replacing the positional
parameters with named parameters.

Answer: D


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

February 22, 2012

Maintenance fee nerves jangling at Oracle?

Oracle bending to customer demand or playing a crafty hand?

Cisco CCNA Training, Cisco CCNA Certification

Best Oracle Certification Training and Oracle Exams Training and more Cisco exams log in to Certkingdom.com



Chris Kanarakus reports that Oracle has waivered extended support fees. Given what we know about Oracle’s masterful account control in its customer base you might be forgiven for wondering why this is the case. Citing Forrester analyst Paul Hamerman, Kanaracus offers several possible explanations including:

Keep customers happy while not force marching to Fusion
Waiting for Fusion to reach feature/function parity with eBusiness Suite
Keep customers from straying into the arms of third party maintenance providers like Rimini Street

I sense the decision is much more pragmatic. As Kanaracus observes, maintenance fees are extraordinarily lucrative, generating gross margin north of 90%. Until recently, maintenance fees have been a small fraction of total IT spend. When weighed against for example the cost of upgrade, they often look like little more than a rounding error. So what has changed? I sense there are several factors in play:

Direct IT department spend has stagnated or is falling yet demands for IT to deliver value are rising.
Newer technologies and especially those that are sold on a consumption basis are coming in directly via line of business departments rather than IT.
While most commenters recognise that cloud based applications will remain a minor part of the overall landscape for the immediate future, the long term threat is real for incumbents like Oracle.
Oracle, like every other incumbent on-premise player is desperate to maintain margins while figuring out a way of getting on the cloud bus.

My guess is that Oracle is viewing this combination of factors as creating an environment where treading lightly keeps the cash register ticking over while giving the company breathing space. The question in my mind is just how long that breathing space will last.

In The New Technology Elite, Vinnie Mirchandani makes the bold statement:

For too long IT has been an expensive and low-payback back-office investment. Now technology in the companies’ products is allowing them to generate revenue and growth.

As I look back over time and think about the numerous ERP failures, the lack of genuine innovation, the stress that some companies have felt and yet balance that against the fat margins companies like Oracle, SAP, Infor, Microsoft and others make I wonder whether the maintenance chickens are finally coming home to roost.

In Oracle’s case, the problems are compounded by a less than stellar performance in its hardware story. As Larry Dignan observed:

The problem, however, is that Oracle saw new software license revenue gain only 2 percent in the second quarter from a year ago to $2 billion. Updates and support revenue was up 8 percent to $4 billion. Hardware systems revenue fell 14 percent from a year ago to $953 million in the second quarter. In addition, Oracle couldn’t blame currency fluctuations either—the growth rates in constant currencies mirrored the actual results.

As Oracle closes out its Q3, analysts will be watching all line items to better understand where the real weaknesses are in Oracle’s business model.

February 20, 2012

Intel ponders solar-powered CPU tech in graphics, memory

Intel's experimental solar-powered processor may have started off as a fun project, but the chip maker is now looking to extend the technology to hardware such as graphics processors, memory and floating point units.

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com


Intel last year showed the low-power processor -- charged only by the light from a reading lamp -- running Windows and Linux PCs. Intel is expected to share further details about the processor, which is code-named Claremont, at the International Solid-State Circuits Conference in San Francisco next week.

The CPU, which is the size of a postage stamp, is also known as the near-threshold voltage (NTV) CPU for its ability to keep operating at extremely low voltage levels. The CPU's power consumption could go down to as little as 280 millivolts when running at 3MHz, and up to 1.2 volts when running at around 1Ghz when more performance is needed.

The NTV CPU is designed to bring extreme energy efficiency to computing devices, said Justin Rattner, Intel's chief technology officer, in a briefing ahead of the show.

"It's allowing us to make Intel's product more [power efficient] across the compute continuum" while reaching appropriate performance levels, Rattner said.

The CPU can remain at near-threshold voltage levels when not operational, which could keep laptops operational without killing battery life. That is much better than putting a PC into sleep or hibernation mode to save battery.

In an on-stage demonstration at last year's Intel Developer Forum, an engineer demonstrated a PC running a small animation when powered by the CPU. After the light source was blocked from the chip, the computer froze. The CPU worked with concept DDR3 memory developed by Micron called Hybrid Memory Cube, which is seven times more power-efficient than current DDR3 memory.

"It was not our intention to build a solar-powered microprocessor," Rattner joked, reminiscing about the experiment.

But the demonstration was an interesting way to show what the company was trying to achieve with NTV technology. The energy gains are about five to 10 times with NTV, Rattner said.

"The design has generated an extraordinary amount of interest," Rattner said.

The next goal is to extend the technology to other key components inside a computer.

"We are continuing to expand the use of these low-voltage techniques ... to graphics and memory," Rattner said. The technology can also be deeply embedded inside circuitry to bring more power efficiency to supercomputing.

The solar-powered CPU is based on a Pentium chip design, and the researchers converted the logic circuit to operate at near-threshold voltage. The CPU was made using the 32-nanometer processor, which is the same used to make Intel's latest smartphone chip code-named Medfield. That chip will be appear in smartphones and tablets later this year.

Intel is sharing details about the chip layout and design methodology at ISSCC, which is being held from Feb. 19 to Feb. 23. The chip maker is also presenting separate papers that cover memory, graphics processors and floating-point units based on near-threshold voltage technology.

The research around the solar-powered CPU is being carried out in Intel's research labs. The chip maker has said it does not expect the solar-powered CPU to go commercial, but that elements from the research would be implemented in future Intel products.

70-542 Q & A / Study Guide

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
There is a web site CertKingdomWS.
CertKingdomWS uses MS Office SharePoint Server 2007 Search Center.
CertKingdomWS runs a fixed keyword query.
If the result of this query is a fail to return any data.
How can this be achieved?



Answer:




QUESTION 2
There is a MS Office SharePoint Server 2007 application CertKingdomApp.
CertKingdomApp uses two tables Employees and EmployeesDetails.
They are related through a one-to many relation.
Two entities Employees and EmployeesDetails are defined in a BDC definition.
The metadata of this definition need to be defined.
Which code is appropriate?



Answer:




QUESTION 3
There is a MS Office SharePoint Server 2007 web site CertKingdomWS.
There is a MS Office SharePoint Server 2007 application CertKingdomApp.
There is a security group named DOMAIN\Employees.
In CertKingdomWS there is content that this group should have access to.
How can this be ensured? Select two.

A. Add a custom Web Part…
B. Add an audience…
C. Add a site group…
D. Use a filter…
E. ..based on the DOMAIN\Employees group.
F. ..that has the DOMAIN\Employees group as a member.
G. ...that shows only the members of the DOMAIN\Employees group.

Answer: B,E

Explanation:


QUESTION 4
There is a MS Office SharePoint Server 2007 web site CertKingdomWS.
There is a MS Office SharePoint Server 2007 application CertKingdomApp.
There is a MS Excel 2007 workbook which contain employee data such as name, city, salary.
End users must be able to filter the workbook on city.
How can this be achieved through MS Office SharePoint Server 2007 Excel services? Select two.

A. Add an Excel VBA application…
B. Add an ActiveX control...
C. Use the Data-Filter option…
D. ...in the workbook.
E. ..in CertKingdomApp.
F. ..in CertKingdomWS.

Answer: C,D

Explanation:


QUESTION 5
There is a MS SQL Server 2005 database CertKingdomDB.
There is a BDC definition which is used to search for employee data in CertKingdomDB.
Incremental crawls must be performed for indexing in CertKingdomDB.
How can this be ensured? Select two or three.

A. Add method
B. Add function..
C. Add stored procedure…
D. ..Finder
E. ..GenericInvoker
F. .. IDEnumerator
G. .. ViewAccessors
H. ..to have a return field representing the last update time of CertKingdomDB.
I. .. to return a different set of columns from the CertKingdomDB.

Answer: A,F,H

Explanation:


QUESTION 6
Exhibit:
public class CertKingdomClass
{
public double CertKingdom1 (double d)
{
return d * 9; }
public DateTime CertKingdom2 {
return ( DateTime.Today );
}
}
There are two UDFs CertKingdom1 and CertKingdom2.
These are defined as Excel Services in MS Office SharePoint Server 2007.
The code is displayed in the exhibit.
What action should you take?




Answer:



QUESTION 7
There is a ASP.NET web site CertKingdomWS.
There is a MS Office SharePoint Server 2007 application CertKingdomApp.
There is a Microsoft Office InfoPath form CertKingdomForm.
There is a custom control CertKingdomC that is derived from the XMLFormView class.
CertKingdomC will show CertKingdomForm inside an ASP.NET page on CertKingdomWS.
How can this be ensured?



Answer:



QUESTION 8
There is a web site CertKingdomWS.
There is a portal site template CertKingdomTempl.
CertKingdomTempl is used within CertKingdom Ltd. To recreate site hierarchies,
Extra sites must be added to the hierarchy.
What steps should be taken?
Your company uses a portal site template to recreate site hierarchies. You need to add additional
sites to the hierarchy that is defined in the portal site template. What should you do?

A. Modify file Webtemp*.xml…
B. Modify file webconfig…
C. Modify file global.aspx…
D. Modify the XML definition file..
E. Modify CertKingdomTempl…
F. Modify CertKingdomWS…
G. ..by adding a Template element that contains the site definitions for the new sites.
H. ..by adding extra Web elements to the XML definition file of the portal site template.
I. .. to include the new hierarchy and create a new site template on the Site Settings page.

Answer: D,H

Explanation:


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

February 19, 2012

Intel sneaks out quad-core Core i7-3820 Sandy Bridge-E processor for under $300

If Intel’s six-core Sandy Bridge-E CPUs were too rich for your blood (and wallet), the chip giant is now giving you a more affordable option. The Core i7-3820 sports only four cores, but it also carries a much lighter price of $294. The new chip has a higher clock speed than its siblings at 3.6GHz, but [...]

MCTS Certification, MCITP Certification

Best Microsoft MCTS Certification, Microsoft MCITP Training at examkingdom.com



If Intel’s six-core Sandy Bridge-E CPUs were too rich for your blood (and wallet), the chip giant is now giving you a more affordable option. The Core i7-3820 sports only four cores, but it also carries a much lighter price of $294.

The new chip has a higher clock speed than its siblings at 3.6GHz, but its Turbo Boost maxes out at 3.9GHz like the Core i7-3960X. It also has only 10MB of cache, while the 3960X comes with 15MB and the i7-3930K includes 12MB.

The 3820 is priced lower than the Core i7-2600K, despite having some key advantages (support for quad-channel memory and PCIe 3.0), though it requires a new, pricey X79-based motherboard. Would you rather get the new CPU and motherboard, or go with the older processor and cheaper LGA 1155 motherboard? Let us know in the Talkback section.

February 16, 2012

Software Development Services - IT consulting

There are many services that are available to many people. Among the most valuable services is IT consulting. Information technology consulting is a type of consulting in which a company helps another company or individual find ways to improve the operation, implementation and quality of their computer systems.

MCTS Certification, MCITP Certification

Microsoft CCNA Certification, CCNA Training and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com


Information technology consultants do many things and are therefore among the most useful services in the economy. These types of companies provide many services including software consulting, software development and software development programming services.
One of the first services that an IT consulting firm provides is software consulting. This is a type of service that includes advice and consultation on various software packages. The firm will be able to discuss certain software and how it can help a company meet its objectives. With this service organizations can also receive feedback on what types of software should be developed and used for various purposes.

Another key service that IT consultants provide is software development. With software development the firm will help a company devise, design and create a specific type of software. They will help with things such as designing the software features, benefits and also helping companies make the software easy to install for an everyday user.


The last and most vital service that these types of firms provide is software development programming services. This service will help companies actually put together the software packages they plan to use or sell. The consulting firm will provide them advice on how to program the software, what features to put in, and how to design the software as well. Software programming services are yet another very useful service that IT consulting firms provide to their clients.
IT consulting firms also do many other things and fulfill certain needs. These companies provide attention to quality which will help clients achieve the outcomes that they expect. The IT consulting firms will therefore help their clients achieve the IT related goals they have for their organization. Other things such as identifying strategy initiatives, planning action, performing numerous IT related assessments, performing audits and also helping organizations find solutions to achieve their objectives.

As with any other service IT consulting is one that can be very helpful to many businesses. Since information technology has become a very vital industry in the economy, many businesses will need to have their computer systems and programs up to date and of high quality. As a result they will at times need the help of information technology consultants. By using the services of an information technology consultant, companies will have a very valuable resource to use when looking to improve the quality of their information technology systems. The expertise, feedback, advice and consultation of an information technology consultant will help businesses better adapt to current technological trends.

To get the most out of your information technology consulting services you should look at the various companies that provide it. Meeting with various information technology consultants and discussing your needs is a good start. Once you find an information technology consultant then you will need to go over things such as how to improve software, improve hardware and also improve the overall operation of your computer systems. With these consultants your company will be able to be more competitive and successful in the modern economy.

70-523 Q & A / Study Guide

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

QUESTION 3
There is a service WCF (Windows Communication Foundation) Data Services CertKingdomService.
CertKingdomService has been developed with MS .NET Framework 4 and MS Visual Studio 2010.
An application CertKingdomApp uses CertKingdomService.
There is a problem. Whenever CertKingdomApp sends DELETE and PUT requests to
CertKingdomService there is an error.
What should be done in this scenario? Select three.

A. When accessing CertKingdomService CertKingdomApp should use header..
B. When accessing CertKingdomService CertKingdomApp should use footer..
C. ..HTTP-Method..
D. .. X-HTTP-Method..
E. .. HTTP ContentType..
F. .. XML ContentType..
G. .. XLS-Method..
H. ..as part of a DELETE request.
I. ..as part of a GET request.
J. ..as part of a POST request.
K. ..as part of a PUT request.

Answer: A,D,J

Explanation:


QUESTION 4
There is an application CertKingdomApp.
CertKingdomApp has been developed with MS .NET Framework 4 and MS Visual Studio 2010.
There is a server CertKingdomSrv.
There is a Microsoft SQL Server 2008 database CertKingdomDb on CertKingdomSrv.
CertKingdomApp connects to CertKingdomDb.
CertKingdomDb includes a table CertKingdomProducts.
CertKingdomProducts includes product information.
CertKingdomProducts has a column ProductType.
ProductType is used to identify if the product is digital or physical.
There is Product entity base type.
There is an Association entity Digital inheriting from the Product entity base type.
All digital products must be bound to Digital class.
What should be done? Select three.

A. The Entity Data Model Designer should be used to..
B. Change the file..
C. ..code-behind to include..
D. ..global.aspx to include..
E. .. .edmx file to include..
F. ..to set up a referential constraint..
G. .. to set up an association between..
H. .. the primary key of the Digital class and ProductType.
I. .. between the Digital class and ProductType.
J.
K.

Answer: B,E,J

Explanation:


QUESTION 5
There is an application CertKingdomApp.
CertKingdomApp has been developed with MS .NET Framework 4 and MS Visual Studio 2010.
To model entities CertKingdomApp ADO.NET Entity Framework is used.
CertKingdomApp make sure that users can update entities even if they are not connected to the
central store. In such a case, when the user reconnects: changes the local data must be persisted,
latest updates from the central data store are loaded to the local store (when no local changes
have been made).
What should be done in this scenario? Select three.

A. Use method…
B. Use library..
C. Use attribute..
D. ..Execute..
E. ..Refresh of ObjectContext class..
F. ..Refresh of ViewContext class..
G. ..through usage of MergeOptions.OverwriteChanges
H. ..through usage of RefreshMode.StoreWins.AppendOnly
I. ..through usage of RefreshMode.ClientWins
J. ..through usage of MergeOptions.AppendOnly

Answer: A,E,I

Explanation:


QUESTION 6
There is an application CertKingdomApp.
CertKingdomApp has been developed with MS .NET Framework 4 and MS Visual Studio 2010.
You are implementing the CertKingdomApp data layer.
In particular when the GetDataReader method returns a SqlDataReader, the SqlDataReader can
retrieve rows from the database.
Also when the SqlDataReader is closed the active SQL connections, opened with the
GetDataReader method, must be closed.
What code should be used in this scenario?



Answer:



QUESTION 7
Sales Exhibit:
Sales Properties:
SalesID
CustomerID
OrderDate
ShipAddress
Sales_details Exhibit:
Properties:
SalesID
ProductID
UnitPrice
Quantity
There is an application CertKingdomApp.
CertKingdomApp has been developed with MS .NET Framework 4 and MS Visual Studio 2010.
There is a server CertKingdomSrv.
There is a Microsoft SQL Server 2008 database CertKingdomDb on CertKingdomSrv.
CertKingdomApp connects to CertKingdomDb.
LINQ is used to created the Sales and Sales_details in the exhibit.
There is a one- to-many relation from the SalesID of Sales to the SalesID of Sales_details.
The primary key of Sales is SalesID column.
The primary key of Sales_details is the SalesID and ProductID columns.
You are required to provide SQL code that produces the sum of the price of each Sales record.
Which code should be used?



Answer:


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

February 11, 2012

Apple launches the iPad into the classroom

A home is where treasures are kept. Treasures in many California homes are in the form of furniture collections with a coffee table from a favorite antique store or a wing-back chair you inherited from a grandmother , or may be your electronics collection with flat screen high-definition television and surround sound equipment. Even your garage is full of things boxes of treasures of which you may only have of vague recollection.

MCTS Certification, MCITP Certification

Best Microsoft MCTS Certification, Microsoft MCITP Training at examkingdom.com



Your most important treasures are, of course, your wife and children. Naturally, you want all these to remain safe and a part of your life. Unfortunately, there are others who share your world who would like to relieve you of these treasures for their own gain. There may come a time when you feel the need to protect yourself and those you love with security. California security is available in many forms: by a guard with training in Los Angeles, by electronic alarm systems, or by camera surveillance.

Investing in an alarm system for your home can help you sleep better at night in your own bedroom, as well as help you play better when away from home on vacation or business trips. Representatives from alarm system companies may visit your home in person to help you design the perfect alarm system to protect your possessions and your family. Sophisticated electronic systems are disguised in a simple control panel that mounts on a convenient wall in your house, which can then be programmed to alert you and local law enforcement when a door or window of your home is opened, or when an intruder is seen on camera surveillance.


For example, one man was concerned about nightly robberies which were occurring in his small rural mining town. He traveled out of state often with his work. He decided to be proactive in protecting his possessions, and bought an electronic alarm system with a proven track record. One feature of this system included the capability to alert him by mobile phone text if his home alarm system were activated. One week after he bought and installed the system, he received a text that his alarm system had sounded. He immediately called the local police near his residence. Law enforcement was already en route; they caught the thief, who was still at the residence in the act of removing expensive electronic equipment.

There are ways to be sure your personal guard has training in Los Angeles and is completely trustworthy. One such service, called the Bureau of Security and Investigative Services, accepts applications from would-be guards. The Bureau, and other companies like it, then checks criminal history and posts applicants who are ready for employment as guards on their web site. It is important to note, however, that some states may allow those applicants with a past history of felony or misdemeanor offenses to qualify for employment as a registered guard after careful review of circumstances and possible rehabilitation. Some applicants with a criminal history may become guards, but may be restricted from carrying a weapon.


Not everyone needs this type of personal security. However, a widow in a large city felt particularly vulnerable after her husband’s death. She even suspected she was being followed when she left her house to go shopping or to walk her dog. Her children, who lived out of state, contacted an agency that provided personal security guard protection at specified times of the day to help her feel more confident every time she went out of her home. The widow saw no more evidences that she was being followed by strangers, and she was comforted to know someone was nearby that she could trust to help her if needed. Her children were also comforted to know the one they treasured was protected.

February 10, 2012

70-516 Q & A / Study Guide

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
Exhibit:
ee.SELECT EmployeeID, Name, Region, Country FROM dbo.Employees .
There is a MS Visual Studio 2010 and MS .NET Framework 4 application CertKingdomApp.
CertKingdomApp connects to a MS SQL Server 2008 database CertKingdomDB.
A SQL statement is used to retrieve dataset instance (see exhibit).
You need to use this dataset to access rows where the Name field is not null.
Which code should you use?



Answer:



QUESTION 2
There is MS Visual Studio 2010 and MS .NET Framework 4 application CertKingdomApp.
CertKingdomApp connects to a MS SQL Server 2008 database CertKingdomDB.
To access data from CertKingdomDB Entity SQL is used.
How can you check if a collection is empty or not? Select two.

A. Use entity set attribute…
B. Use entity set operator…
C. Use entity set function…
D. ISNULL
E. IN
F. EXISTS
G. ANYELEMENT
H. EXCEPT
I. EMPTYCOLLECTION

Answer: B,F

Explanation:


QUESTION 3
There is MS Visual Studio 2010 and MS .NET Framework 4 application CertKingdomApp.
CertKingdomApp uses this service to connect to a MS SQL Server 2008 database
CertKingdomDB.
To access data from CertKingdomDB Entity SQL is used.
How should you enable query plan caching? Select two.

A. Use a stored procedure…
B. Use object…
C. Use function…
D. Use operator…
E. EntityConnection
F. queryPlanCaching
G. EntityCommand
H. EntityCaching
I. EntityDataReader
J. sp_caching
K. EnableCaching
L. caching
M. EntityTransaction

Answer: B,G

Explanation:


QUESTION 4
There is MS Visual Studio 2010 and MS .NET Framework 4 application CertKingdomApp.
CertKingdomApp connects to a MS SQL Server 2008 database CertKingdomDB.
CertKingdomApp is calling a stored procedure that has a table-valued parameter.
What steps do you need to take to make this work?



Answer:



QUESTION 5
There is MS Visual Studio 2010 and MS .NET Framework 4 application CertKingdomApp.
CertKingdomApp connects to a MS SQL Server 2008 database CertKingdomDB.
CertKingdomApp is calling a stored procedure that is using a spatial value parameter.
What steps do you need to take to make this work?



Answer:


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

February 8, 2012

Oracle seeks new trial in IP theft suit against SAP

Oracle's plan to drag its legal fight against rival SAP's defunct TomorrowNow subsidiary through a second trial is not surprising, analysts said Tuesday.

Cisco CCNA Training, Cisco CCNA Certification

Best Oracle Certification Training and Oracle Exams Training and more Cisco exams log in to Certkingdom.com



The company clearly wants to distract SAP by forcing it to go through another bruising battle in court, they said.

"SAP wanted to get this whole messy affair behind it as quickly as possible," said Frank Scavo, president of Computer Economics, an IT research firm. "Right now, SAP has a lot of momentum, but if Oracle can keep the dispute alive it keeps SAP on the defensive."

Oracle on Monday rejected a federal judge's September ruling that had awarded it $272 million in damages in its IP infringement lawsuit against SAP.

Judge Phyllis Hamilton's decision cut about $1 billion from the $1.3 billion in damages awarded by a jury hearing the suit in late 2010.

Hamilton said Oracle could either accept the damages she awarded or seek a new trial.

Oracle has claimed--and SAP has subsequently admitted -- that the now-closed TomorrowNow subsidiary infringed on Oracle's intellectual property and IPs when it delivered third-party support and maintenance services to Oracle customers.

Oracle in September had vowed to seek the $1.3 billion awarded by the jury. In the motion filed Monday U.S. District Court for the Northern District of California, Oracle formally rejected the $272 million award and said it had "no choice but to elect a new trial."

Accepting Hamilton's ruling would "force Oracle to risk waiving its right to appeal the Court's decision on the motions for judgment as a matter of law and for a new trial," the company said.

Scavo said Oracle's motion for a new trail isn't surprising. "Oracle's continued pursuit of SAP is just one battle in the war against third-party support," he noted.

Oracle has filed a similar lawsuit against Rimini Street, a provider of low-cost support services for users of enterprise software products from vendors such as Oracle, Siebel, PeopleSoft and SAP.

Rimini Street has claimed its services cost just half of what enterprises would otherwise need to pay Oracle, SAP and others for maintenance and support,

Oracle, which derives substantial revenues from such services, has claimed that Rimini and TomorrowNow are able to deliver the services only by illegally using Oracle software.

Scavo said the Rimini Street battle is more critical for Oracle than the TomorrowNow fight. "If that decision goes against Oracle, it essentially validates the legal basis for third-party support," he said.

Paul Hamerman, an analyst at Forrester Research, said Oracle's request for a new trial should have been expected given the significant difference between the jury's damage award and the judge's decision.

Also, he said "Oracle can afford to drag this out. The rivalry motivates Oracle to keep SAP on the defensive, and prolongs the agony for SAP, which just wants to put this case behind it," he said.

IT executives should take note of Oracle's actions and be careful when entering into contracts with third-party software service providers, Scavo added.

"Organizations that are currently looking at third-party maintenance should have their legal counsel take a careful look at the proposed contracts to ensure that their interests are adequately protected," he said.

In a statement, SAP said it was "disappointed that Oracle has passed up yet another opportunity to resolve this case. We will continue to work to bring this case to a fair and reasonable end."

February 6, 2012

70-515 Q & A / Study Guide / Testing Engine

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
There is an ASP.NET application CertKingdomApp.
CertKingdomApp is deployed to a production server.
CertKingdomApp is deployed in Release configuration.
The web.config connection string value must be changed to the production server’s string
value in the deployment process.
How can this be achieved?

Answer:

Explanation:


QUESTION 2
There is a ASP.NET MVC 2 Web Application named CertKingdomApp.
There is a single project area for CertKingdomApp.
In the Areas folder there is a subfolder CertKingdom.
There are files CertKingdomC.cs and CertKingdomD.aspx in proper subfolders.
The Route of the area is registered, the route is named CertKingdomRoute, and the name of
the area is CertKingdomArea.
Outside the area there is a view CertKingdomView.aspx.
The CertKingdomView.aspx must be linked to CertKingdomD.aspx.
What to do?

Answer:


Explanation:


QUESTION 3
There is an ASP.NET Web site CertKingdomWS.
There is an ASP.NET Web application CertKingdomApp.
There is an ASP.NET AJAX page CertKingdomPage.
CertKingdomPage has two DIV elements.
Considering content refreshing, each div element must be refreshed individually (the page
should not be refreshed).
How can this be achieved?

Answer:


Explanation:



QUESTION 4
There is an ASP.NET Web site CertKingdomWS.
There is an ASP.NET Web application CertKingdomApp.
There is an ASP.NET page CertKingdomPage.
CertKingdomPage has the following div element

.
CertKingdomPage has a jQuery $.ajax function that calls the server.
An error handler must be implemented. The error handler should add error information
from all page $.ajax calls to the div named ErrorInfo.
How can this be achieved?

Answer:

Explanation:


QUESTION 5
There is an ASP.NET Web site CertKingdomWS.
There is an ASP.NET Web application CertKingdomApp.
There is a Web page CertKingdomPage.
CertKingdomPage has the following div element Hello World
text
.
The contents of spam should be replaced with HTML.
The global variable PGURL specifies the URL from which the HTML is downloaded.
Which code should be used?

Answer:

Explanation:

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Bookmark and Share