Lumia 900 release window confirmed

One of the hottest devices to be announced at CES 2012 was Nokia’s Lumia 900. Nokia and Microsoft already gave us the lowdown on the big brother of the Lumia 800, but one detail that they left out was a release date. All we had to go on was “the next few months.” Now it appears that we can narrow down that timeframe: the Lumia 900 will be launching on AT&T in March.

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at https:://www.actualkey.com

The info was spilled via the Nokia Developer portal. In an otherwise typical press release announcing the Lumia 900, it is revealed that the Lumia 900 “will become available exclusively through AT&T in March.”

The Lumia 900 is, by most people’s measures, a gorgeous phone. Its polycarbonate build is complemented by a 4.3-inch display that uses ClearBlack technology for darker darks. Its software is the real deal too, sporting the latest edition of Windows Phone, version 7.5 Mango. The Lumia 900 will run on AT&T’s burgeoning LTE network.

Microsoft and Nokia wanted to wait until after the 2011 holiday season to launch the first fruits of its collaboration. This was allegedly because it wanted to have its own moment in the spotlight. This may prove to be a smart strategy: apart from maybe Intel’s Medfield announcement, the Lumia 900′s unveiling may have been the biggest smartphone news to come out of CES 2012. March shouldn’t be a crowded field for big smartphone releases, though the expected release of the iPad 3 will surely dominate tech headlines in that month.

There still isn’t any pricing info for the Lumia 900, but it would be wise for Nokia and AT&T to keep it at $200. Verizon’s annoying habit of pricing its new LTE phones at $300 may work for the Android fans who always want the latest-and-greatest. But it wouldn’t be a wise pricing strategy for a platform that’s still unfamiliar to most Americans. $200 would match it up evenly with the iPhone, which is a comparison that Microsoft and Nokia will gladly accept.

70-448 Q & A / Study Guide

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
You work as a database administrator at Certkingdom.com. The Certkingdom.com network contains a SQL Server
2008 database server named ABC-DB01, which hosts the SQL Server 2008 Reporting Services
(SSRS) instance.
During routine monitoring, you discover that this instance does not render any extensions for
Microsoft Office Word.
How would you modify the instance to render these extensions?

A. The Report Server database should be modified on ABC-DB01.
B. The RSReportServer.config file should be modified on ABC-DB01.
C. The XML configuration file should be modified onABC-DB01.
D. The Web.config file should be modified on ABC-DB01.

Answer: B

Explanation:


QUESTION 2
You work as a database administrator for Certkingdom.com. The Certkingdom.com network contains a SQL
Server 2008 database server named ABC-DB03.
You are in the process of designing a SQL Server 2008 Integration Services (SSIS) package for
the Certkingdom.com network. Certkingdom.com has informed you that ABC-DB03 will be hosting the package.
You receive an instruction from the CIO to devise a plan of action in the event that ABC-DB03
becomes inactive.
How can this be achieved?

A. The master database should be backed up.
B. You should back up ABC-DB03.
C. You should execute an incremental backup on a weekly basis.
D. The SSIS package should be backed up.

Answer: A

Explanation:


QUESTION 3
You work as a database administrator at Certkingdom.com. You are responsible for managing a SQL
Server 2008 database server named ABC-DB01.
You receive instruction that the SQL Server 2008 Reporting Services model needs to be deployed
on ABC-DB01 to support a data source that contains 800 tables for the Marketing division. You
have been tasked with developing a report model.
Which of the following options will make sure that the Marketing division is only able to access 10
tables? (Choose two)

A. A data source view should be developed.
B. The marketing division should be denied access to the other tables.
C. The tables and views the marketing division will not be using should be highlighted.
D. The tables and views the marketing division will use should be indicated.
E. The Dynamic Management View should be properly modified.

Answer: A,D

Explanation:


QUESTION 4
You work as a database administrator at Certkingdom.com. The Certkingdom.com network contains a SQL Server
2008 database server named ABC-DB01. ABC-DB01 is configured to host the SQL Server
Analysis Services (SSAS) role.
There is a dimension named Housing in ABC-DB01 that contains three properties named Slabs,
Cement and Bricks. The relationship between the properties is nonflexible. Currently a data source
is used that indicates the changes between the affiliations of the properties. You receive an
instruction from the CIO to ensure that any modifications will be reflected.
Identify the command that will help you to accomplish your task?

A. The ProcessDefault command
B. The ProcessAdd command.
C. The ProcessFull command.
D. The ProcessClear command.
E. The ProcessNone command.

Answer: A,D

Explanation:


QUESTION 5
You work as a database administrator at Certkingdom.com. Your duties include administering a SQL
Server 2008 Analysis Services (SSAS) sample named ABC-DB01.
You receive an instruction from the CIO to log all queries. You then decide to make the necessary
changes to the QueryLogconnection String feature.
What should your next step be?

A. You should modify the connection string to the default value.
B. A valid connection string should be set on ABC-DB01.
C. The source attribute should be set to 20.
D. You should set the default value using Discover_Query.

Answer: B

Explanation:


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

IBM Research Determines Atomic Limits of Magnetic Memory

Punctuating 30 years of nanotechnology research, scientists from IBM Research (NYSE: IBM) have successfully demonstrated the ability to store information in as few as 12 magnetic atoms. This is significantly less than today’s disk drives, which use about one million atoms to store a single bit of information. The ability to manipulate matter by its most basic components – atom by atom – could lead to the vital understanding necessary to build smaller, faster and more energy-efficient devices.

Cisco CCNA Training, Cisco CCNA Certification

Best IBM Certification Training and IBM Exams Training  and more Cisco exams log in to Certkingdom.com

While silicon transistor technology has become cheaper, denser and more efficient, fundamental physical limitations suggest this path of conventional scaling is unsustainable. Alternative approaches are needed to continue the rapid pace of computing innovation.

By taking a novel approach and beginning at the smallest unit of data storage, the atom, scientists demonstrated magnetic storage that is at least 100 times denser than today’s hard disk drives and solid state memory chips. Future applications of nanostructures built one atom at a time, and that apply an unconventional form of magnetism called antiferromagnetism, could allow people and businesses to store 100 times more information in the same space.

“The chip industry will continue its pursuit of incremental scaling in semiconductor technology but, as components continue to shrink, the march continues to the inevitable end point: the atom. We’re taking the opposite approach and starting with the smallest unit — single atoms — to build computing devices one atom at a time.” said Andreas Heinrich, the lead investigator into atomic storage at IBM Research

How it Works

The most basic piece of information that a computer understands is a bit. Much like a light that can be switched on or off, a bit can have only one of two values: “1” or “0”. Until now, it was unknown how many atoms it would take to build a reliable magnetic memory bit.

With properties similar to those of magnets on a refrigerator, ferromagnets use a magnetic interaction between its constituent atoms that align all their spins – the origin of the atoms’ magnetism – in a single direction. Ferromagnets have worked well for magnetic data storage but a major obstacle for miniaturizing this down to atomic dimensions is the interaction of neighboring bits with each other. The magnetization of one magnetic bit can strongly affect that of its neighbor as a result of its magnetic field. Harnessing magnetic bits at the atomic scale to hold information or perform useful computing operations requires precise control of the interactions between the bits.

The scientists at IBM Research used a scanning tunneling microscope (STM) to atomically engineer a grouping of twelve antiferromagnetically coupled atoms that stored a bit of data for hours at low temperatures. Taking advantage of their inherent alternating magnetic spin directions, they demonstrated the ability to pack adjacent magnetic bits much closer together than was previously possible. This greatly increased the magnetic storage density without disrupting the state of neighboring bits.

Writing and reading a magnetic byte: this image shows a magnetic byte imaged 5 times in different magnetic states to store the ASCII code for each letter of the word THINK, a corporate mantra used by IBM since 1914. The team achieved this using 96 iron atoms − one bit was stored by 12 atoms and there are eight bits in each byte.

IBM and Nanotechnology Leadership

In the company’s 100 year history, IBM has invested in scientific research to shape the future of computing. Today’s announcement is a demonstration of the results garnered by IBM’s world-leading scientists and the company’s continual investment in and focus on exploratory research.

IBM Research has long been a leader in studying the properties of materials important to the information technology industry. For more than fifty years, scientists at IBM Research have laid the foundation of scientific knowledge that will be important for the future of IT and sought out discoveries that can advance existing technologies.

Critics accuse Google of unfairly promoting Google+ in search results

The long-standing and persistent accusation that Google unfairly uses its search engine to promote its other online services is once again in the spotlight, triggered by new social search functionality the company is rolling out this week that more tightly links its search engine with its Google+ social networking site.

MCTS Certification, MCITP Certification

Best HP Certification Training and HP Exams Training  and more Cisco exams log in to examkingdom.com

The complaints have come from different quarters, including competitors and industry experts, and have focused on various arguments, but at bottom all charge Google with using its dominant search engine to deliberately boost Google+’s popularity, by giving Google+ pages and profiles an artificially prominent position in result pages.

One of the strongest arguments made so far comes from search engine expert Danny Sullivan, who described on Wednesday in his technology news site Search Engine Land how Google is now suggesting Google+ business pages that companies and public figures have set up on the site in a way that makes the Google+ pages much more prominent than similar pages these public figures and organizations have set up on competing social media sites.

Sullivan shows a variety of examples in which Google, via new query auto-complete suggestions for Google+ profiles and via the new Google+ People and Pages sidebar suggestions column, favors Google+ business pages over alternative ones that have more “fans” on Facebook and Twitter.

Sullivan ran his queries without being logged into his Google Account, and even using the Chrome browser’s “incognito” mode, to make sure that the Google search engine treated his queries as coming from a fairly generic user, and not tailored to him specifically.

“Is there anyone out there who still wants to say that being on Google+ doesn’t matter? Anyone? Because when being on Google+ means that you potentially can have your Google+ page leap to the top in those sidebar results, Google+ matters. It matters more than ever before,” he wrote, adding that Google is clearly “taking its weight in search and leveraging it to boost Google+ in a big way.”

Google, after many missteps in the social networking market, launched Google+ in mid-2011, and has made it clear, from CEO Larry Page on down, that Google+ will be a key, unifying product for the company, providing social sharing features and an identity layer across most Google online services.

However, there has been skepticism regarding the adoption and engagement level for Google+, especially when compared with social networking leader Facebook, which has more than 850 million active members who spend a lot of time on the site.

Google+ is also a rival to Twitter because Google+ can be used in similar ways as the microblogging phenomenon.

In fact, among the first to cry foul this week was Twitter. Its General Counsel Alex Macgillivray, who previously worked at Google, posted on his Twitter account that Tuesday was “a bad day for the Internet” after Google announced the new search functionality.

“Having been there, I can imagine the dissension @Google to search being warped this way,” he wrote. Twitter later followed Macgillivray’s post with a more formal statement, in which it reiterated and expanded on his complaint.

Meanwhile, Google answered back with a post on its main Google+ page, saying it was “a bit surprised by Twitter’s comments” because Twitter “chose not to renew their agreement with us last summer,” a reference to the now lapsed two-year deal which gave Google special access to Twitter’s “firehose” of real-time tweets.

However, as Sullivan and others have pointed out, Google has continued indexing Twitter posts and has a massive collection of them in its index, including links to the official accounts of public figures, celebrities and organizations.

Throughout the two-day flap, Facebook officials have remained mum. Facebook has its own special search arrangement with its partner Microsoft, which gives the Bing search engine access to certain data that is out of Google’s reach. While Facebook keeps most personal profile content off limits to search engines, its business profiles are public, as well as some other content, and thus available to Google. In fact, for a while Facebook has let individuals tag status updates as “public” and made those available to search engines — a good example of this is the site Your OpenBook, devoted exclusively to this type of personal, public status update.

In its announcement on Tuesday of the new social search features, described by the company as “Search, Plus Your World,” Google focused on new things its search users will be able to do when signed into their Google accounts: find Google+ posts and Picasa Web photos they and their contacts on those social media sites have shared not only publicly on the Web but also privately with each other.

This new functionality builds on the existing Google social search features, which let users logged into their Google Accounts see links in search results that their specific social media contacts tagged with the Google +1 button or shared publicly using a social media service.

Google didn’t respond to a request for comment about the controversy surrounding the new social search functionality.

CES 2012: Following the new startups

Whenever I go to a large show such as CES, I always try to make time to look around on the fringes of the show, where the small and (hopefully) up-and-coming companies are. This year, the CEA pointed directly at some very early startups with its Eureka area, which featured companies and products which (at least most of them) aren’t quite ready for prime time, but which show potential for the future.

MCTS Certification, MCITP Certification

Microsoft HP Exam Training , HP Certification and over 2000+
Exams with Life Time Access Membership at https:://www.actualkey.com

Many of the companies seemed to be approaching tech from a for-fun point of view. For example, a company called Modular Robotics was showing electronic building blocks it calls Cubelets, which it is marketing as a toy for children but which I think not a few adults wouldn’t mind spending some time with — you attach power blocks, sensor blocks and action blocks together to make small robots that move, light up or perform other actions.

Another company was creating small robotic vehicles that used smartphones as the driving intelligence. Romotive lets you either preprogram your smartphone — Android or iOS — to drive a small wheeled device in a preprogrammed pattern, or you can use your tablet to direct its movements. According to one of its representative, Phu Nguyen, kits are now being sold to developers, and they hope to come out with a consumer-ready product in another year or so.

Another not-quite-ready startup showing at the Eureka area was nVolutions, which was developing cases that would power up your mobile phones using a small wheel attached to the back of the case that powers it via a spinning motion. It’s an interesting idea, certainly; one of several companies trying to figure out how people can keep their smartphone batteries going without having to constantly search for a power source.

Whether nVolutions, or any of the other startups showing this year, will make it will be interesting to follow. I’m glad that, despite the overwhelming presence of large companies at CES, there are still tiny, ambitious developers out there ready to enter the fray.

Microsoft MB2-185 Q & A / Study Guide

Exam Name: Microsoft CRM Customization v1.2
Exam Type: Microsoft
Exam Code: MB2-185


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


 

QUESTION 1
The object model, query processor, and metadata framework are main components of which
layer of Microsoft CRM architecture?

A. Database
B. Platform
C. Presentation
D. Application

Answer: B


QUESTION 2
Which layer in the Microsoft CRM architecture includes the Browser Client and Sales for Outlook
Client components?

A. Platform
B. Application
C. Database
D. Presentation

Answer: D


QUESTION 3
Communication between the application layer and the platform layer is accomplished using which
technology?

A. Remote Procedure Calls
B. https: Post Method
C. SOAP
D. Stored Procedure Calls

Answer: C


QUESTION 4
Which technology does the Microsoft CRM browser client use to present the user interface to
Internet Explorer?

A. XML
B. Generated Platform API
C. ASP.NET
D. Fetch Builder

Answer: C


QUESTION 5
Which layer or Microsoft CRM performs all security checks independent of the caller?

A. Application
B. Platform
C. Database
D. Presentation

Answer: B


QUESTION 6
Once you have created a workflow rule, what must you do to it before you can test it in Microsoft
CRM?

A. Using Server Manager, run the server task titled “WF 100_Publish_Rule” in order to
instantiate the workflow rule you created
B. Activate the rule
C. Publish the rule
D. Assign the rule to a business unit

Answer: B


QUESTION 7
Your business is interested in using Microsoft CRM Workflow to automate its business processes
and policies. Which types of processes can a company automate with Microsoft CRM Workflow?

A. A process triggered by an event in an unlinked third-party application
B. A process that specifies the steps a sales rep should go through to close a sale
C. A process that schedules an activity for a non-Microsoft CRM user and places it on his
Outlook calendar
D. A process that assigns a sales rep to an account

Answer: B, D


QUESTION 8
Which of the following can instantiate a workflow rule against a particular record?

A. A unit
B. An event
C. A code change
D. A manual ‘Apply Rule’ action

Answer: B, D


QUESTION 9
The Microsoft CRM Professional Edition includes which of the following Workflow tools?

A. Workflow Manager
B. Workflow Process Mapper
C. Workflow Monitor
D. Workflow Event Scheduler

Answer: A, C


QUESTION 10
Workflow Rules can be created for which of the following objects?

A. Accounts
B. Activities
C. Case
D. Lead

Answer: A, C, D


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


 

Microsoft – MB2-184 – Q & A/ Study Guide

Microsoft CRM Installation and Configuration V.1.2
Microsoft – MB2-184

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at https:://www.actualkey.com


QUESTION 1
What business framework was Microsoft CRM developed upon that allows it to be integrated with
virtually any system in the world?

A. Windows NT4.0
B. Microsoft NET
C. Web Net
D. SQL Server 2000

Answer: B


QUESTION 2
The integration between Microsoft CRM and Microsoft Outlook uses which technology that allows
users of the Sales for Outlook Client to see their contacts, leads, activities, opportunities, tasks,
appointments, and e-mail?

A. MDAC 2.7a
B. Microsoft Message Queuing
C. XML Web Services
D. UDDI

Answer: C


QUESTION 3
Microsoft CRM Version 1.2 can be installed in both Windows Server 2000 and Windows Server
2003 environments. In either of these environments, how many Primary Domain Controllers are
installed in a single domain?

A. One Primary Domain Controller is always required
B. At least one Primary Domain Controller and as many Backup Domain Controllers as needed
C. None. All Domain Controllers are considered peers in both Windows Server 2000 and
Windows Server 2003 environments
D. None. Domain Controllers are not required in a Windows Server 2000 or Windows Server
2003 environment running Microsoft CRM

Answer: C


QUESTION 4
Which advantage does the Active Directory domain architecture provide for companies that have
deployed Microsoft CRM Version 1 .2 in a Windows Server 2003 domain?

A. It provides a single point of management for user accounts, computers, and applications in
the Windows Server 2003 domain
B. It meets the messaging and collaboration needs of small organizations, large distributed
enterprises and everything in between.
C. It enables structured data exchange and data transport
D. It enables an unprecedented level of software integration through the use of XML Web
Services.

Answer: A


QUESTION 5
Which technology allows Microsoft CRM to share data and invoke capabilities from other
applications without regard to how those applications were built, what operating system or
platform they run on, and what devices are used to access them?

A. Application Programming Interfaces
B. XML Web Services
C. UDDI
D. Microsoft Exchange

Answer: B


QUESTION 6
XML Web Services are invoked over the Internet by means of industry-standard protocols
including which of the following?

A. SOAP
B. ASP.NET
C. Microsoft NET
D. UDDI

Answer: A


QUESTION 7
Microsoft CRM is tightly integrated with which of the following technologies for the purpose of
validating access level security upon each user request?

A. SQL Server 2000
B. Active Directory
C. Internet Information Server (lIS)
D. Exchange Server 2000

Answer: B


QUESTION 8
Which software component must be installed on the same machine as your Exchange 2000
server(s) in order to enable the e-mail functionality of Microsoft CRM?

A. E-Mail Router
B. Deployment Manager
C. Outlook Rich Client
D. Workflow Monitor

Answer: A


QUESTION 9
Which technology render the web pages used by Microsoft CRM and allows organizations to host
and manage web pages on the Internet or on their internal intranet?

A. DHTML
B. XML Web Services
C. UDDI
D. IIIS

Answer: D


QUESTION 10
Microsoft CRM uses which of the following technologies to display its web forms via the browser
application?

A. XML Web Services
B. SOAP
C. ASP.NET
D. Open Database Connectivity (ODBC)

Answer: C


MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at https:://www.actualkey.com

Windows ultrabooks: What’s Apple response?

With a glut of “ultrabook” announcements slated at this week’s Consumer Electronics Show (CES), Apple watchers have one question: How will the Cupertino, Calif. company respond?

 

Cisco CCNA Training, Cisco CCNA Certification

Best HP Certification Training and HP Exams Training  and more Cisco exams log in to Certkingdom.com

Backed by Intel, the big PC manufacturers are expected to launch or show ultrabooks, the chipmaker’s term for thin, lightweight notebooks that rely on solid-state storage (SSD) in lieu of a traditional platter-based hard disk drive and forgo an optical drive, at CES this week.

According to Intel, more than 75 different ultrabooks will appear during 2012.

But as two analysts who cover Apple noted today, the category isn’t new. In fact, Apple was the company that kicked it off.

“They started the ultrabook trend four years ago with the MacBook Air,” noted Brian Marshall, an analyst with International Strategy & Investment Group (ISI ), in an interview Monday.

“Apple set the form factor and the bar,” agreed Ezra Gottheil of Technology Business Research.

Both experts were referring to the MacBook Air, which Apple introduced in 2008. Sales of the Air, however, took off only after October 2010, when Apple dropped the price and revamped the line to include not only a 13-in. model, but also a lower-priced 11-in. laptop. Four months ago, Apple refreshed the MacBook Air line, equipping the notebooks with faster processors and Mac OS X 10.7, aka Lion.

But Apple’s lead in the thin-light laptop class — last year, it owned an estimated 89% of that market, said Marshall — is threatened by an expected wave of ultrabooks from big-name PC makers, including Acer, which trotted out its Aspire S5 Monday.

Late last year, Marshall forecast a significant drop during 2012 for Apple’s share because of the new competition from Windows-based ultrabooks.

“There will definitely be a lot more attention paid to ultrabooks this week,” said Marshall. “And that points out that Apple could be vulnerable here.”

So what’s Cupertino to do?

Tweak the MacBook Air, said Marshall and Gottheil.

“They can add a little bit more functionality and some more features,” said Marshall, ticking off such natural evolutions as higher resolution screens, faster processors and more ports, the latter of which the Air lacks in large numbers.

“Apple can proliferate the Air concept into larger [screen] sizes,” said Gottheil, echoing his take last November when rumors of an impending 15-in. MacBook Air began circulating.

“Frankly, it’s tough to see how Apple can make the Air all that much better,” said Marshall, who called that laptop his favorite Apple product of all time.

Another possible move by Apple, agreed both analysts, would be to reframe the iPad, or at least a version of it, as an ultrabook rival by designing a keyboard and case integrated with the tablet and its iOS operating system.

Third-party vendors, notably Zagg — which also designed the $99 Bluetooth-based keyboard and case sold by Logitech — have had limited success with such an accessory.

But Apple should be able to do those designs one better, thought Gottheil.

“Apple hasn’t filled the gap that others may exploit with a tablet that also offers a keyboard,” said Gottheil, referring to expectations that later this year PC makers will launch devices that function as either a tablet or as a lightweight notebook. “Their little [wireless] keyboard doesn’t have a nice carrying case, but I think they will find a way to fill [that gap].”

Gottheil sees Apple tackling the tablet-plus-keyboard issue not as a discrete package but as an add-on, along the lines of the approach it took last year when it launched the Smart Cover accessory for the iPad 2.

But although Apple will face increased competition from ultrabooks this year or next, analysts highlighted the enviable position the company finds itself in.

“It’s kind of ironic that it’s taken PC OEMs four years to come up with a viable alternative to the MacBook Air,” said Marshall.

“If ultrabooks are only thin, light MacBook Air knockoffs, they won’t be very successful,” chimed in Jack Gold or J. Gold Associates, in an email last week. “They need to be more.”

70-433 Q & A / Study Guide

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
You work as a network database administrator at Certkingdom.com. Certkingdom.com has a database server
named ABC-DB01 that hosts the Inventory database.
Certkingdom.com has a user named Rory Allen has the SQL login rallen. Rory Allen was granted the
DELETE permissions to Stock table in the Inventory database.
How would you configure ABC-DB01 to revoke Rory Allen’s SELECT permissions to the Stock
table without disrupting other permissions he has to the Inventory database?

A. By running the ADD USER rallen Transact-SQL statement.
B. By running the TRUNCATE Inventory.Stock FROM rallen Transact-SQL statement.
C. By running the DENY DELETE ON Inventory.Stock TO rallen Transact-SQL statement.
D. By running DELETE SELECT ON Inventory.Stock TO rallen Transact-SQL statement.

Answer: C

Explanation:


QUESTION 2
You work as a network database administrator at Certkingdom.com. Your boss, CertKingdom wants to know
on which columns unique constraints can be created.
What must you tell your boss?

A. On nvarchar(50) NULL or nvarchar(50) NOT NULL columns.
B. On nvarchar(50) SPARSE NULL and nchar(max) SPARSE NULL columns.
C. On nvarchar(max) NOT NULL and nvarchar(max) NULL columns.
D. On all of the above.

Answer: A

Explanation:


QUESTION 3
You work as a network database administrator at Certkingdom.com. Certkingdom.com has a database server
named ABC-DB01 which hosts the Inventory database.
Certkingdom.com recently created a table named ItemsSold which lists the customers with their discount ratings.
How can you configure ABC-DB01 to have customers who have made purchases before granted 15% discount?

A. By using the WITH CHECK (Purchases = 0 AND Discount = 0.15) constraint.
B. By using the WITH CHECK (Purchases > 0 AND Discount 0.15) constraint.
C. By using the WITH CHECK ((Purchases = 0 AND Discount = 0) AND (Purchase < 0 AND Discount = 0.15)) constraint.
D. By using the WITH CHECK ((Purchases = 0 AND Discount = 0) OR (Purchase > 0 AND Discount = 0.15)) constraint.

Answer: D

Explanation:


QUESTION 4
You work as a network database administrator at Certkingdom.com. Certkingdom.com has a database server
named ABC-DB01 that hosts the Inventory database.
Certkingdom.com has a Sales division which makes changes to the ItemSold and Stock tables of the Inventory database.
How can the Inventory database be configured ensuring changes listed in the ItemSold table
corresponds to records in the Stock table?

A. By making use of the MERGE statement.
B. By making use of CLR triggers.
C. By making use of a Clustered Index and INNER JOIN constraints.
D. By making use of a Foreign key constraint.
E. By making use of a Unique constraint.

Answer: D

Explanation:


QUESTION 5
You work as a network database administrator at Certkingdom.com. Certkingdom.com has a database server
named ABC-DB01 that hosts the Retail database.
The Retail database has a table named Customers that has a column named Address. You need
to alter the Address column to enable users to query the column based on geographic location.
How would you alter the column?

A. By specifying the datetimeoffset data type.
B. By specifying the text data type.
C. By specifying the geography data type.
D. By specifying the user-defined type data type.

Answer: C

Explanation:


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

 

70-432 Q & A / Study Guide

 

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

 

QUESTION 4
You work as a database administrator at Certkingdom.com. Certkingdom.com is using a SQL Server 2008
instance. The SQL Server 2008 instance hosts quite a few applications. ABC also has a server
named ABC-SR43 that is used to store log files.
You have to set up a new job that stores log files on ABC-SR43. You create a new account
ABC\Log_Account. You set it up to be run by the SQL Server Agent Services.
However, your job fails to store any log files on ABC-SR43. After some investigation you notice
that the job does not have permissions to store files on ABC-SR43.
How should you remedy the situation? Select the best option.

A. You should set up ABC\Log_Accoun as a Remote Service account.
B. You should set up ABC\Log_Accoun as a Domain service account.
C. You should set up ABC\Log_Accoun as a Local Service account.
D. You should set up ABC\Log_Accoun as a Local System account.
E. You should set up ABC\Log_Accoun as a Network Service account.
F. You should set up ABC\Log_Account as a Domain account.

Answer: F

Explanation:
The service startup account defines the Microsoft Windows account in which SQL Server Agent
runs and its network permissions. SQL Server Agent runs as a specified user account. For
compatibility with earlier versions of SQL Server, SQL Server Agent can also run as the Local
System account.
In this scenario you should select a Domain account, which allows sufficient permissions and
improved security.


QUESTION 5
You work as a database administrator at Certkingdom.com. Certkingdom.com is using a SQL Server 2008
instance that has a table named ABC_Training. ABC_ Training contains a column named
ABC_Distance. A new Certkingdom.com training policy states that the training (ie. The ABC_Distance
column in the ABC_Training table) cannot be increased or decreased by more than 3%.
How should you implement the ABC Training Policy?

A. You should consider developing a view which rolls back non-compliant Certkingdom.com policy
changes to ABC_Distance.
B. You should consider developing a stored procedure which rolls back non-compliant Certkingdom.com
policy compliant changes to the ABC_Distance column.
C. You should consider developing a primary key constraint to the ABC_training table which only
contains valid values on ABC_Distance.
D. You should consider developing a create trigger which rolls back non-compliant Certkingdom.com
policy changes to the ABC_Distance column.
E. You should consider developing an update trigger which rolls back non-compliant Certkingdom.com
policy changes to the ABC_Distance column.
F. You should consider developing a delete trigger which rolls back non-compliant Certkingdom.com policy
changes to the ABC_Distance column.

Answer: E

Explanation:


QUESTION 6
You work as a database administrator at Certkingdom.com. Certkingdom.com is using a SQL Server 2008
instance that contains a database named ABC_DB. Certkingdom.com contains a lot of customer data
which is processed by the Web application. You need to keep the customer information safe since
it is confidential. This information includes files of data, backups, and log files.
How can this be achieved and still keep the performance and functionality of the web application?
Select one or two.

A. You should consider adding a transaction Log on ABC_DB, and set the information to be
encrypted for a fixed time.
B. Use BitLocker Drive Encryption on the hard drives on the SQL Server.
C. Use EFS (Encrypting File System) on the hard drives on the SQL Server.
D. You should consider enabling the Transparent Database Encryption on ABC_DB and back up
the transaction log.
E. You should consider enabling the Transparent Database Encryption on ABC_DB and enabling
the Transparent Database Encryption on master database.
F. Use cell-level encryption for the specific data that needs to be kept safe.

Answer: D

Explanation:
With the introduction of transparent data encryption (TDE) in SQL Server 2008, users now have
the choice between cell-level encryption as in SQL Server 2005, full database-level encryption by
using TDE, or the file-level encryption options provided by Windows. TDE is the optimal choice for
bulk encryption to meet regulatory compliance or corporate data security standards. TDE works at
the file level, which is similar to two Windows® features: the Encrypting File System (EFS) and
BitLocker™ Drive Encryption, the new volume-level encryption introduced in Windows Vista®,
both of which also encrypt data on the hard drive. TDE does not replace cell-level encryption,
EFS, or BitLocker.


QUESTION 7
You work as a database administrator at Certkingdom.com. Certkingdom.com is using two SQL Server 2008
sample named ABCSmp1 and ABCSmp2. Furthermore, ABCSmp1 contains a database named
ABC_DB. A Certkingdom.com user named Mia Hamm uses her logon MiaHamm to log on to the database
on ABCSmp1. During the week you have transferred ABC_DB to ABCSmp2. You manually
recreate the Mia Hamm login on ABCSmp2. However, when she tries to login on ABC_DB at
ABCSmp2, she received an error message stating that she is not allowed access. Mia Hamm
needs to access ABC_DB and you need to make it happen.
What T-SQL code should you use? (Each correct option is part of the answer. Choose TWO)

A. Use Certkingdom.com;
B. Use ABC_DB; *
C. Use ABCSmp1;
D. Use ABCSmp2;
E. ALTER LOGIN MiaHamm WITH DEFAULT_DATABASE = ABC_DB;
F. CHANGE LOGIN MiaHamm WITH DEFAULT_DATABASE = ABC_DB;
G. ALTER LOGIN MiaHamm WITH PASSWORD = ‘pwd1234’ UNLOCK;
H. CHANGE LOGIN MiaHamm WITH PASSWORD = ‘pwd1234’ UNLOCK;
I. CHANGE USER MiaHamm WITH LOGIN = MiaHamm;
J. ALTER USER MiaHamm WITH LOGIN = MiaHamm; *
K. ALTER LOGIN MiaHamm ENABLE;
L. CHANGE LOGIN MiaHamm ENABLE;

Answer: B,J

Explanation:


QUESTION 8
You work as a database administrator at Certkingdom.com. Certkingdom.com is using a SQL Server 2008 instance.
Your junior assistant is curious about on how to move a table, such as ABC_table, from its current
scheme (scheme1) to another scheme (scheme2)
How can you accomplish this in T-SQL?

A. You should consider using the following:
ALTER TABLE Schema1.ABC_Table SWITCH TO Schema2.ABC_table;

B. You should consider using the following:
ALTER AUTHORIZATION ON Schema1.ABC_Table TO Schema2;

C. You should consider using the following:
ALTER SCHEMA schema2 TRANSFER schema1.ABC_table;

D. You should consider using the following:
ALTER SCHEMA schema1 TRANSFER schema2.ABC_table;

E. You should consider using the following:
ALTER USER Schema1 WITH DEFAULT_SCHEMA = Schema2;

F. You should consider using the following:
MOVE ABC_Table FROM SCHEMA schema1 TO schema2

G. You should consider using the following:
MOVE ABC_Table FROM schema1 TO schema2

Answer: C

Explanation:
ALTER SCHEMA can only be used to move securables between schemas in the same database.
To change or drop a securable within a schema, use the ALTER or DROP statement specific to
that securable.


QUESTION 9
You work as a database administrator at Certkingdom.com. Certkingdom.com is using a SQL Server 2008
instance. You have received instructions from management to allow the users at Certkingdom.com on the
SQL Server sample to use the OPENROWSET() function to search remote information sources.
You study incomplete code in the exhibit carefully. (Line numbers are used for reference purposes only)
Exhibit:
01. sp_configure ‘show advanced options’, 1
02. RECONFIGURE
03.
04. RECONFIGURE
05. GO
06.
07. SELECT a.*
08. FROM OPENROWSET(‘SQLNCLI’, ‘Server=Madrid;Trusted_Connection=yes;’,
09. ‘SELECT GroupName, Name, DepartmentID
10. FROM AdventureWorks.HumanResources.Department
11. ORDER BY GroupName, Name’) AS a;
12. GO
Which T-SQL statement should you insert at line 03 to make the batch meet the requirement in
this scenario?

A. sp_configure ‘Router control’, 1
B. sp_configure ‘Router control’, 0
C. sp_configure ‘Transaction Logs’, 1
D. sp_configure ‘Transaction Logs’, 0
E. sp_configure ‘Ad Lib Distributed Queries ‘, 1
F. sp_configure ‘Ad Lib Distributed Queries ‘, 0
G. sp_configure ‘Ad Hoc Distributed Queries’, 1
H. sp_configure ‘Ad Hoc Distributed Queries’, 0

Answer: G

Explanation:
By default, SQL Server does not allow ad hoc distributed queries using OPENROWSET and
OPENDATASOURCE. When this option is set to 1, SQL Server allows ad hoc access. When this
option is not set or is set to 0, SQL Server does not allow ad hoc access.
Ad hoc distributed queries use the OPENROWSET and OPENDATASOURCE functions to
connect to remote data sources that use OLE DB. OPENROWSET and OPENDATASOURCE
should be used only to reference OLE DB data sources that are accessed infrequently. For any
data sources that will be accessed more than several times, define a linked server.

 

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com