Your application must access data that is located on two SQL

题目
单选题
Your application must access data that is located on two SQL Server 2005 computers. One of these servers is named SQL1 and the other is SQL2. You have permissions to create a stored procedure on SQL1 to support your application. However,on SQL2 you only have permissions to select data. You write the stored procedure on SQL1. The stored procedure accesses SQL2 by using the OPENQUERY Transact-SQL statement. However,the query fails when executed.You need to troubleshoot the cause of the error. What should you do?()
A

Join the two servers by using the four-part syntax of server.database.schema.table.

B

Reference SQL2 by using an alias.

C

Add SQL2 as a remote server to SQL1.

D

Add SQL2 as a linked server to SQL1.

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Your database supports an online transaction processing (OLTP) application. The application is undergoing some major schema changes, such as addition of new indexes and materialized views. You want to check the impact of these changes on workload performance. What should you use to achieve this?()

  • A、Database replay
  • B、SQL Tuning Advisor
  • C、SQL Access Advisor
  • D、SQL Performance Analyzer
  • E、Automatic Workload Repository compare reports

正确答案:E

第2题:

You are a database administrator for your company. The company uses a vendor company’s application that is based on a proprietary database. You query data from the application database and import the data into a SQL Server 2005 database. The application vendor provides you with a new OLE DB driver to be used when querying the application database. Company policy prohibits connections between the SQL Server database and the application database, except when querying this data. You need to provide a way to query data from the application database. What should you?()

  • A、Configure a Linked Server connection to the application database.
  • B、Write a query that uses an OPENDATASOURCE command.
  • C、Write a query that uses an OPENQUERY command.
  • D、Configure a Remote Server connection to the application database.

正确答案:B

第3题:

Which two requirements would lead towards a high availability solution?()

A.When uptime is critical

B.When data must be refactored

C.When application concurrency is static

D.When data loss is unacceptable

E.When application is a single point of failure


参考答案:A, D

第4题:

Your company has a main office and a branch office. Your network contains a single Active Directory domain. The functional level of the domain is Windows Server 2008 R2. An Active Directory site exists for each office. All servers run Windows Server 2008 R2. You plan to deploy file servers in each office.   You need to design a file sharing strategy to meet the following requirements: èUsers in bothoffices must be able to access the same files.   èUsers in both offices must use the same Universal Naming Convention (UNC) path to access files.   èThe design must reduce the amount of bandwidth used to access files. èUsers must be able to access files even if a server fails. What should you include in your design?()

  • A、A stand-alone DFS namespace that uses replication.
  • B、A domain-based DFS namespace that uses replication.
  • C、A multi-site failover cluster that contains a server located in the main office and another server located in the branch office.
  • D、A Network Load Balancing cluster that contains a server located in the main office and another server  located in the branch office.

正确答案:B

第5题:

An application connects to a SQL Azure database.  The application occasionally loses the connection to the SQL Azure database.   You need to recommend an approach for reliably completing data access operations.  What should you recommend?()  

  • A、 Use Microsoft ADO.NET connection pooling.
  • B、 Pass exceptions to the user interface layer.
  • C、 Implement a retry policy in the data access layer.
  • D、 Begin a transaction before each data access operation.

正确答案:C

第6题:

Which two requirements would lead towards a high availability solution?()

  • A、When uptime is critical
  • B、When data must be refactored
  • C、When application concurrency is static
  • D、When data loss is unacceptable
  • E、When application is a single point of failure

正确答案:A,D

第7题:

You have a Web application that is configured for personalization. You need to access personalization data from one of the pages of the Web application by using the minimum amount of administrative effort. What should you do? ()

  • A、Access the personalization data from the Session property of the HttpContext object.
  • B、Access the personalization data from the Application property of the HttpContext object.
  • C、Access the personalization data from the Cache property of the HttpContext object.
  • D、Access the personalization data from the Profile property of the HttpContext object.

正确答案:D

第8题:

You want to create a valid directory structure for your Java EE web application, and your application usestag files and a JAR file. Which three must be located directly in your WEB-INF directory(NOT in asubdirectory of WEB-INF)?()

  • A、The JAR file
  • B、A directory called lib
  • C、A directory called tags
  • D、A directory called TLDs
  • E、A directory called classes
  • F、A directory called META-INF

正确答案:B,C,E

第9题:

You develop a Web application that writes data to a file on a server. You restrict access to the file to specific Windows users. The Web application runs as CONTOSO/ASPNET. You deny anonymous access to the application in IIS. You add the following XML segment in the Web.config file.You need to ensure that the application meets the following requirements:It must impersonate the user when it writes data to the file.It must run as CONTOSO/ASPNET when a user does not access the file. Which two actions should you perform? ()

  • A、Use the following XML segment in the Web.config file. <identity impersonate="false"/>
  • B、Use the following XML segment in the Web.config file. <identity impersonate="true"/>
  • C、Use the following code segment to access the file. Dim wp As WindowsPrincipal = _CType(HttpContext.Current.User, WindowsPrincipal) Dim wi As WindowsIdentity = WindowsIdentity.GetCurrent() Dim wic As WindowsImpersonationContext = wi.Impersonate()' Access the file herewic.Undo()
  • D、Use the following code segment to access the file. Dim wi As WindowsIdentity = WindowsIdentity.GetCurrent()Dim wic As WindowsImpersonationContext = _WindowsIdentity.Impersonate(wi.Token)' Access the file herewic.Undo()

正确答案:A,C

第10题:

 Application developers in your company create an assembly that contains a CLR function. This CLR function reads data from a spreadsheet, performs some calculations, and returns the data to a SQL Server 2005 computer. You need to register the assembly with SQL Server 2005 by using the CREATE ASSEMBLY statement and the least privileged security permission set.  Which permission set should you use? ()

  • A、 Default 
  • B、 SAFE 
  • C、 EXTERNAL_ACCESS 
  • D、 UNSAFE

正确答案:C

更多相关问题