ImageVerifierCode 换一换
格式:DOC , 页数:21 ,大小:246.50KB ,
资源ID:504559      下载积分:2000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-504559.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文([计算机类试卷]微软认证70-228模拟试卷1及答案与解析.doc)为本站会员(sofeeling205)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

[计算机类试卷]微软认证70-228模拟试卷1及答案与解析.doc

1、微软认证 70-228模拟试卷 1及答案与解析 1 You are the administrator of a SQL Server 2000 computer. The server contains a database named Inventory. The Inventory database has a table named StorageLocations that stores the location of parts contained in your companys warehouses. The StorageLocations table is configur

2、ed as shown in the exhibit. The LocationDescription field is usually described with a name 10 to 25 characters in length. The locations never store more than 100,000 units of any given part.You want to modify the tables schema to save space. You cannot lose any existing data. You want to do this by

3、using the minimum amount of administrative time and server resources.Which Transact-SQL statement should you execute? ( A) ALTER TABLE dbo.StorageLocations ALTER COLUMN UnitsStored int NOT NULL ( B) ALTER TABLE dbo.StorageLocations LocationDescription char (25) COLLATE SQL_Latin1_General_CP1_CI_AS N

4、OT NULL ( C) ALTER TABLE dbo.StorageLocations ALTER COLUMN UnitsStored smallint NOT NULL ( D) ALTER TABLE dbo.StorageLocations LocationDescription nvarchar (25) COLLATE SQL_Latin1_General_CP1_CI_AS NOT NULL 2 You are the administrator of a SQL Server 2000 computer. The server contains a database nam

5、ed sales. You need to change the way customer Ids appear in the Customers table. The database schema is shown in the exhibit. You need to automate the process of updating the primary key tools. You also want to minimize records locks and administration within the database during the update process.W

6、hat should you do? ( A) Add an ON UPDATE CASCADE constraint to the CustomerID field in the Customers table. Modify the values in the CustomerID field in the Customers table. ( B) Create a duplicate record that has a new CustomerID value. Update the foreign key fields in the invoices, contacts, and q

7、uotes tables with the new value. ( C) Disable the FOREIGN KEY constraints. Within a transaction, modify the values in the CustomerID field in the Customers table and all related foreign key values in the invoices, contacts, and quotes tables. Re-enable the FOREIGN KEY constraints after the keys are

8、changed. ( D) Create a Data Transformation Services package. Use the package to transform the CustomerID value and the values of the related foreign keys in the invoices, contacts, and quotes tables. 3 You are the database administrator for a financial services company. Employees enter data 24 hours

9、 a day into a SQL Server 2000 database. These employees report slower response times when new account information is gathered from branch offices and added to the database. You currently use the following BULK INSERT statement to add the account information: BULK INSERT finance.dbo.customers FROM di

10、bulkaccts143_10141000.txt WITH DATAFILETYPE = char, FIELD/TERMINATOR = t, ROWTERMINATOR = n, TABLOCK You want to ensure that response times do not slow when new account information is added to the database. What should you do? ( A) Drop the indexes for the customers table before the data load, and t

11、hen re-create the indexes after the data load is complete. ( B) Remove the TABLOCK option from the BULK INSERT statement. ( C) Add the BATCHSIZE option to the BULK INSERT statement and then set the option equal to 10 percent of the number of rows to be loaded. ( D) Add the ROWS_PER_BATCH option to t

12、he BULK INSERT statement and then set the option equal to 10 percent of the number of rows to be loaded. 4 You are the database administrator for a retail company. The company owns 270 stores. Every month, each store submits approximately 2,000 sales records, which are loaded into a SQL Server 2000

13、database at the corporate headquarters. A Data Transformation Services (DTS) package transforms the sales records, as they are loaded. The package writes the transformed sales records to the Sales table, which has a column for integer primary key values. The IDENTITY property automatically assigns a

14、 key value to each transformed sales record. After loading this months sales data, you discover that a portion of the data contains errors. You stop loading data, identify the problem records, and delete those records from the database. You want to reuse the key values that were assigned to the reco

15、rds that you deleted. You want to assign the deleted key values to the next sales records you load. You also want to disrupt users work as little as possible. What should you do? ( A) Export all records from the Sales table to a temporary table. Truncate the Sales table, and then reload the records

16、from the temporary table. ( B) Export all records from the Sales table to a text file. Drop the Sales table, and then reload the records from the text file. ( C) Use the DBCC CHECKIDENT statement to reseed the Sales tables IDENTITY property. ( D) Set the Sales tables IDENTITY_INSERT property to ON.

17、Add new sales records that have the desired key values. 5 You are the administrator of a SQL Server 2000 computer. The server contains a database named Customers, which is used by a custom client/server application.The database contains more than 1 million rows. Users report that the database respon

18、ds slowly when they search for customers by using the application. Users search for customers by scrolling through an alphabetical list of customer names.You use SQL profiles to capture information about how the application uses the database.You receive results as shown in the following screen shot.

19、 You need to improve the applications performance. What should you do? ( A) Create additional nonclustered indexes on the CustomerInformation table. ( B) Rewrite the application so that it uses a user-defined function to return the customer list. ( C) Rewrite the application so that it uses a query

20、with a WHERE clause to search for customer names. ( D) Rewrite the application so that is uses a stored procedure to return the customer list. 6 You are the administrator of a SQL Server 2000 computer. The server contains a database named Contracts. The server is configured as shown in the server co

21、nfiguration exhibit. The database files are configured as shown in the database properties exhibit. The database developers have been creating new tables and indexes without specifying a filegroup.The primary filegroup is reaching its maximum capacity.You want the developers to continue adding new o

22、bjects, but you do not want then to change the way they create objects. You do not want to run out of disk space. You also want to minimize the time it takes to administer the database.What should you do? ( A) Back up the existing objects on the PRIMARY filegroup. Drop them from the database. Re-cre

23、ate them on the SECONDARY filegroup. ( B) Set the file growth on the PRIMARY filegroup to UNLIMITED. ( C) Set the PRIMARY filegroup so that it is read-only. ( D) Set the SECONDARY filegroup as the default filegroup. 7 You are the administrator of a SQL Server 2000 computer. The server contains a Dat

24、a Transformation Services (DTS) package that queries multiple databases and writes the results to a text file. You run this package by using a Microsoft Windows batch file. The batch file uses the dtsrun utility to execute the DTS package. You want to ensure that connection properties, such as login

25、 names and passwords, cannot be read or modified by users. Which two actions should you take? (Each correct answer represents part of the solution. Choose two.) ( A) Save the DTS package so that it has an owner password. ( B) Save the DTS package so that it has a user password. ( C) Encrypt the DTS

26、package details in the command line of the dtsrun utility. ( D) Store the DTS package in the Meta Data Services repository. ( E) Store the DTS package as a Microsoft Visual Basic file. 8 You are the administrator of several SQL Server 2000 computers. A data Transformation Services (DTS) package uses

27、 native OLE DB providers to transfer data between the servers. Connection details for the servers are specified in .udl files. The .udl files are frequently updated as connection details change. You want to distribute the DTS package as a file to developers in your company. You want to make sure con

28、nection details are available to developers who receive the DTS package. Which two tasks should you perform? (Each correct answer presents part of the solution. Choose two) ( A) Enable the Always read properties from UDL file option in the Connection Properties dialog box. ( B) Disable the Always re

29、ad properties from UDL file option in the Connection Properties dialog box. ( C) Delete the .udl files and store connection details in the registry by using system data source names. ( D) Delete the .udl files, and store connection details in the registry by using user data source names. ( E) Make t

30、he .udl files available on a network share. 9 You are the administrator of SQL Server computers. One server is named SQL7, and other is named SQL2000. SQL7 is running SQL Server 7.O and SQL2000 is running SQL Server 2000. The net-libraries on SQL2000 are configured as shown in the exhibit. SQL7 is c

31、onfigured so that it has the named pipes, TCP/IP, NWlink, IPX/SPX and multiprotocol Net Libraries. SQL2000 and SQL7 exchange confidential company information. You need to ensure that unauthorized users cannot access this information. Which two actions should you take? (Each correct answer presents p

32、art of the solution. Choose two) ( A) On SQL2000, enable the multiprotocol net library. ( B) On SQL2000, select the force protocol encryption check box. ( C) On SQL7, select the force protocol encryption check box. ( D) On SQL2000, install a secure sockets layer (SSL) encryption certificate. ( E) On

33、 SQL2000 and SQL7, enable multiprotocol encryption. 10 You are the administrator of SQL Server 2000 computer. The server contains a database named Medical Records. This database contains clinical records and administrative records. The database consumes about 30GB of disk space. The data files are c

34、onfigured as shown in the exhibit. You run full database backups each night after business hours. You notice that the backup is not complete by the time the morning shift begins to use the database.You need to minimize the time needed to restore data in the event of a system, failure. You also want

35、to reconfigure the database to allow the backups to complete during the evening hours.Which two actions should you take? (Each correct answer represents part of the solution. Choose two)A. Reorganize the data files into two groups. Place the system tables in the PRIMARY filegroup and the user-define

36、d tables in the other filegroup.B. Reorganize the data files into three groups. Place the system tables and shared objects in the PRIMARY filegroup, the clinical records in a filegroup, and the administrative records in a filegroup.C. Reorganize the data files into three groups. Place the system tab

37、les in the PRIMARY filegroup, the indexes in a filegroup, and the tables in the other filegroup.D. Back up the transaction log each night. Run a filegroup backup on a different filegroup each night.E. Back up the transaction log each night. Run a filegroup backup on the database each weekend.F. Back

38、 up the transaction log each night. Run a differential backup each Sunday, and run a full backup the first day of each month. 微软认证 70-228模拟试卷 1答案与解析 1 【正确答案】 A 【试题解析】 Explanation: In this scenario there are two considerations that must go into the table schema modfication. The space allocated to the

39、 LocationDescription and the use of data types. The scenario states that the LocationDescription field is usually described with a name, 10 to 25 characters in length. The locations never store more than 100,000 units of any given part. In the table the parts is represented by the PartID column; the

40、 amount of units by UnitsStored Storage column; the locations by the LocationID column and the LocationDescription field by the LocationDescription column. Because the LocationDescription field is usually described with a name, 10 to 25 characters in length, does not mean that the character length o

41、f this field is never longer than 25 characters. We thus cannot reduce the character length of this column. We must thus turn our attention to the UnitsStored column. SQL Server 2000 has four integer data types. These are bigint, which has a storage size of 8 bytes and is whole numbers that range fr

42、om -9223372036854775808 through 9223372036854775807; int, which has a storage size of 4 bytes and ranges from -2,147,483,648 through 2,147,483,647; smallint, which has a storage size of 2 bytes and ranges from -32,768 through 32,767; and tinyint, which has a storage size of 1 byte and ranges from 0

43、through 255. As no more than 100,000 units of any given part will be held in storage and int ranges from -2,147,483,648 through 2,147,483,647, this data field can be represented by the int data type. ALTER COLUMN is used in conjunction with ALTER TABLE. The latter modifies a table definition by alte

44、ring, adding, or dropping columns. Through ALTER COLUMN a specified columns data type length can be altered. Incorrect Answers: B: The scenario states that the LocationDescription field is usually described with a name, 10 to 25 characters in length. This does not mean that the character length of t

45、his field is never longer than 25 characters. If we ALTER COLUMN to a char data type field with a field length of only 25, truncation of the LocationDescription will occur if the description exceeds 25 characters. We thus cannot reduce the character length of this column. C: As no more than 100,000

46、units of any given part will be held in storage and int ranges from -2,147,483,648 through 2,147,483,647, this data field can be represented by the int data type. smallint, however, does not provide a sufficient range as it only ranges up to 32,767 while we require a range of up to at least 100,000.

47、 Note: SQL Server 2000 uses four integer data types, namely, bigint, which has a storage size of 8 bytes and is whole numbers that range from -9223372036854775808 through 9223372036854775807; int, which has a storage size of 4 bytes and ranges from -2,147,483,648 through 2,147,483,647; smallint, whi

48、ch has a storage size of 2 bytes and ranges from -32,768 through 32,767; and tinyint, which has a storage size of 1 byte and ranges from 0 through 255 D: While the char data type is a fixed-length character data with a specified length has a storage size in bytes that is equal to the specified data

49、length, varchar is a variable-length character data with a specified length but has a storage size in bytes that is equal to the actual length of the entered data and not the specified length of the data. The varchar data type should be used when it is expected that the data values in a column will vary considerably in size. The use of this data type can reduce database size but this solution restricts the data length to 25 characters. The scenario states that the LocationDescription field is usually described with a name, 10 to 25 characters

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1