Tuesday, January 31, 2012

Microsoft sets Office 15 public beta for summer 2012

Microsoft today announced it has kicked off a "technical preview" of the next version of its money-making Office suite and promised a public beta will ship this summer.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com



The move is a repeat of the route Microsoft took with Office 2010, which was distributed to a select group of testers as a technical preview in July 2009.

Microsoft said little about "Office 15," the code name for the product, and nothing about its Word, Excel, Outlook and PowerPoint applications in a blog post Monday that announced the preview.

"I'm not able to share too much about Office 15, but I can tell you Office 15 is the most ambitious undertaking yet for the Office Division," wrote P.J. Hough, the executive who leads the Office division. "With Office 15, for the first time ever, we will simultaneously update our cloud services, servers, and mobile and PC clients for Office, Office 365, Exchange, SharePoint, Lync, Project, and Visio."

Hough said the Office 15 technical preview was "already full," but added that "everyone will have the opportunity to try the Office 15 public beta later this summer."

He did not specify a date or set a month for the beta's availability.

Three years ago, Microsoft began the technical preview of Office 2010 in July 2009, followed that with a public beta in mid-November and launched the final product in April 2010. The suite hit retail shelves in June 2010.

If Microsoft follows a similar pace, it will release an Office 15 beta in late May or early June, wrap up the final code in October or November, and start selling the suite in December 2012 or January 2013.

Unless Microsoft changes Office's naming convention for Office, it will be called "Office 2013," as the two previous editions of the suite -- Office 2007 and Office 2010 -- actually shipped in the year prior to the one used in their titles.

It's possible, of course, that Microsoft has a faster release cadence in mind, and will ship the next Office alongside Windows 8 -- which most experts expect to see in October -- to duplicate the simultaneous launch of Windows Vista and Office 2007 in November 2007.

Microsoft may have required the invitation-only testers to sign a nondisclosure agreement that bars them from sharing secrets about the new suite, but that may not stop the unfinished code from leaking to others: Copies of the Office 2010 preview appeared on file-sharing sites even before Microsoft officially opened the program.

The company has not pegged the system requirements for Office 15, but it's possible that the new suite will not run on the decade-old Windows XP because that operating system is slated for retirement in April 2014.

Office 15 refers to the numbering system Microsoft uses to identify each edition: Office 2010 on Windows and Office 2011 on the Mac, for instance, are both labeled as "Office 14." Microsoft skipped "Office 13," jumping from 12 (Office 2007) to 14 (Office 2010) to avoid the unlucky number.

Office is one of Microsoft's biggest sources of both revenue and profit: In the fourth quarter of 2011, the Business division, which is responsible for Office, accounted for 30% of all revenues and 52% of all operating income.

Friday, January 27, 2012

Apple iPod Touch Awesome Highlights Which Can Amaze You

Should you take a glance all around, you will observe folks having their netbooks, mobile phones, and iPods. As a result, what is making use of these units which render it fundamental within the every day lifestyles of folks? Fundamentally, these devices generate items a lot easier. And, it's fun to experience and definitely will definitely entertain you wherever you go.

MCTS Certification, MCITP Certification

Best Microsoft MCTS Certification, Microsoft MCITP Training at examkingdom.com



Currently, the iPod Touch is often a fresh electronic device from Apple. This particular device produces a large amount of individuals need to have one of their own as this is dubbed to become the true computer system. Essentially, the Apple iPod Touch is a multimedia player. This kind of device will enable you to store and perform your favorite music and video lessons while you are out and about.

However, the iPod touch can do in addition to that, which can be fundamentally why persons need to have one. Therefore, what's so specific in regards to the iPod Touch that anybody seems to want one?

For starters, itouch new generation iPod is included using the multi touch display expertise. Instead of the click wheel that many men and women are accustomed to using the previous versions of iPod, this type of iPod employs touch screen technology to help you to communicate with the unit. Right now, you will need to admit that your function alone is very desirable and is sufficient to enable you to want one of your personal.


Nonetheless, this is precisely the beginning of more features to come using the iPod Touch. In contrast to some other iPods, the iPod Touch will enable you to connect to the web while using the built-in WiFi mobile program. As long as you are in a very WiFi hotspot, which you can easily find nowadays, you'll be able gain access to the web on your iPod Touch. With this particular tool, it is possible to evaluate your own emails, browse the internet, examine your MySpace account, and you will even make your favorite videos on YouTube.

Consequently you no longer have to lose out on important emails as the iPod itouch allow for you go on the internet everywhere as long as you are inside WiFi hotspot.

With a 3.5 inch multi-touch screen LCD, you will see that looking at movies listed here is a lot more fun than earlier types of iPods that can be able to play videos. The improved electric battery system is furthermore another key come with of the iPod Touch. Able to long lasting up to 22 several hours for trying to play music and 5 hrs for playing video clips, you will notice that you will have lot of fun for a period of time before you need to recharge the batteries of your iPod Touch again.


Itouch new generation ipod is likewise designed with a large information storage space capacity. With variants amounting up to 32 gigabytes of safe-keeping, you can be certain that you will never run out of space when it comes to saving your favorite music and videos. Of course, on this kind of safe-keeping capacity, you may also store and play with a lot of iPod Touch games.

Weighing only roughly 120 grams and measuring at only 4.3 by 2.4 by 0.31 inch, transportability is unquestionably one of the key features of this device.

Therefore, if you prefer a real laptop or computer that can enable you to admittance online, play songs and films, play your preferred games, and one that will easily fit in your pocket, the iPod Touch certainly is the gadget for you personally.

Microsoft seeking open-source expert to help put Linux on Azure

Microsoft is moving steadily ahead with its plan to enable Linux to run on its Windows Azure cloud platform.

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com


As I blogged earlier this month, Microsoft is preparing to enable Linux to run on its Windows Azure cloud platform. A test build of the coming Linux virtual-machine capability is slated for March, according to my contacts.

For those still doubting this is on the Microsoft roadmap, I’ve got a new piece of evidence. A contact of mine provided me with a link to a Microsoft job posting for a software development engineer at Microsoft that calls for some serious Linux credentials.

The job posting states quite plainly that the person the Server and Tools team is seeking will be charged with “Defin(ing) and scop(ing) open source projects designed to enable Linux on Microsoft’s virtualization and cloud platforms.” (Emphasis mine.)

Here is the pertinent part of the post:

SR Software Development Engineer (SDE) Job
Date: Jan 22, 2012
Location: Redmond, WA, US
Job Category: Software Engineering: Development
Location: Redmond, WA, US
Job ID: 764856-52821
Division: Server & Tools Business

Senior Software Development Engineer/Linux Virtualization

This position requires a proven track record in the open source community.

The Windows Interoperability Team at Microsoft has an immediate opening for a senior software development engineer. The purpose of this position is to become a key member of a highly specialized development team whose mission is to identify, define, scope, implement and drive to completion software projects that promote full, transparent interoperability between Windows and Linux in Microsoft virtual and cloud environments.

The primary responsibilities for this position are the following:

Define and scope open source projects designed to enable Linux on Microsoft’s virtualization and cloud platforms

Work directly with the Linux kernel community to develop Linux device drivers and kernel technology to support Linux on Microsoft platforms

Work with Microsoft product groups to help ensure the design and implementation of Microsoft virtualization and cloud technology will support Linux architectures and runtime paradigms.

The qualifications for this Microsoft job, according to the posting, include the ability to:

Create and implement plans that provide for the testing and quality assurance of software products
Write high-quality Linux kernel code in the C programming language and the associated unit tests.
Demonstrate an understanding of Linux virtualization methods, approaches and deployment. (Including but not limited to Hyper-V, Xen and KVM)
Demonstrate an understanding Linux device driver development and implementation
Demonstrate an understanding of the Linux kernel architecture, including kernel debugging and runtime libraries
Demonstrate an understanding of Linux networking and TCP/IP stack

I’ve also heard from another of my contacts Microsoft is holding an infrastructure-as-a-service workshop for partners in the next few weeks that will allow certain independent software vendors to test out a pre-release of the coming persistent virtual machine capability.

Tuesday, January 24, 2012

Microsoft to replace Mix with a new developer conference

Microsoft is doing away with its annual Mix designer/developer event. This year, instead, the company is planning a developer conference likely to focus on Windows 8.

MCTS Certification, MCITP Certification

Best Microsoft MCTS Certification, Microsoft MCITP Training at examkingdom.com



The rumors were true: Microsoft is doing away with its annual Mix conference for designers and developers after a six-year run. Microsoft officials finally confirmed that there will be no Mix ‘12 — and no future Mix events — via a blog post on January 24.

There is, however, going to be some kind of Microsoft developer event in calendar 2012, though Microsoft officials said they haven’t yet decided on its name, date or location. I’d bet whatever it is will be anchored to the releases of Windows 8 and Visual Studio 2012. (It sounds like this mystery event isn’t happening any time soon, so don’t expect it to be timed with the delivery of the beta/”Consumer Preview” of Windows 8, which is expected by late February, 2012.)

Microsoft also will continue to hold smaller, local and Web-casted developer events throughout the year, as well, today’s blog post noted.

When Microsoft replaced its Professional Developers Conference with BUILD in September 2011, there were some rumblings that BUILD also might end up replacing Microsoft’s annual Mix conference.

“As we look ahead to 2012 and beyond, the goal is to ensure that global Microsoft developer events are of the caliber that many of you experienced at BUILD last September,” blogged Tim O’Brien, General Manager of Developer & Platform Evangelism (DPE).

Microsoft execs aren’t linking the death of Mix to anything to do with Silverlight, despite the fact that Mix got its start largely as a promotional vehicle for Windows Presentation Foundation and WPF/e (a k a Silverlight). Microsoft officials didn’t share today any new information about what’s next for Silverlight. (Yes, I asked again.)

Instead, the Softies are attributing the end of Mix to the fact that the company has largely addressed the shortcomings that Mix originally was created to fix. Internet Explorer is no longer a Web standards laggard. Microsoft’s Web platform and open-source tools/platforms outreach is on far more solid footing than it was back in 2006. And, as O’Brien acknowledges, Microsoft is trimming back on the number of major conferences it is sponsoring — and, I’d add, in some cases, attending, like the Consumer Electronics Show.

I think developers who’ve been starting to work on Windows 8 apps — and those who are raring to do so – will agree that more information, documentation and time meeting with Microsoft engineers will be welcome.

Let’s see if Microsoft times the coming dev event (DEVELOP? WRITE? BUILD 2.0?) with the Windows 8 Release Candidate, its RTM or its launch… And if we potential attendees get to vote on location/timing, I vote Seattle in September. Anyone else have guesses/suggestions for the timing/content/location of the coming devcon?

Sunday, January 22, 2012

How IT storage systems have doubled the number of bone marrow transplants

IT storage systems have been used to help double the number of marrow transplants by reducing the time needed to find the right donor.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com




I recently saw an ad, which I thought was pretty cool. I clicked on a link that said, “For be the match, data is life.” I’d heard of the Be the Match registry before. They’re the nonprofit National Marrow Donor Program (NMDP).

The NMDP facilitates the collection of bone marrow. Well, that’s kind of the old-school name. What are really being collected are hematopoietic, or blood-forming cells. The confusion arises because many people aren’t aware that blood is actually born in the bones, in the marrow.

Hematopoietic cells are adult stem cells that originate from bone marrow, umbilical cord blood, and in the peripheral blood. Stems cells are important because they can multiply and differentiate, which means they can build new red blood cells, white blood cells, and platelets.

These cells are used to save lives by being transplanted to patients with life-threatening disorders. The recipients may suffer from diseases like leukemia, lymphoma, aplastic anemia, and other immune system and metabolic disorders.

Finding the right donor is really essential, and not so easy. A person who needs a hematopoietic cell transplant, and doesn’t have a family member who happens to be a suitable match, can search the Be The Match registry for a matched unrelated donor or umbilical cord blood unit.

Before I send you to the video, I just want to be clear that this is just something I found interesting. As far as I know, NetApp isn’t a sponsor or anything, I just find it heartwarming to see case study examples of how IT is helping important health efforts. If you want to geek out on it, go ahead and download the white paper.

If you’d like to check out the ad I saw, visit the Be the Match Story. You can watch a video about how IT storage systems have been used to help double the number of transplants that can be facilitated by reducing the time needed to find the right donor (when time is truly of the essence), and lean about the encouraging numbers the nonprofit projects for the future.

Tuesday, January 17, 2012

Mozilla slows pace of Firefox 9 upgrades

Mozilla dramatically slowed the update pace of Firefox 9, the browser it shipped late last month.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com




The company also said it may repeat the slow-down in the future.

Firefox 9, which Mozilla released Dec. 20, has yet to be completely "unthrottled," or offered as an update to all users, according to notes from a company meeting last week.

Like other software vendors, including Microsoft and Apple, Mozilla can offer upgrades to a fraction of its users rather than to everyone at once. The practice is designed to ensure that download servers aren't overwhelmed, and to prevent bugs -- if there are any in the update -- from reaching all users.

Firefox 8, the edition that launched Nov. 8, 2011, accounted for 40% of all versions of Mozilla's browser five days after its release, and broke the 50% mark 18 days after it shipped, according to usage statistics from Irish metrics firm StatCounter. Meanwhile, Firefox 9 accounted for just 7% of all editions of Firefox five days after its debut and required 24 days to reach 50%.

The slow-down was related to several bugs in Firefox 9 that Mozilla developers have investigated, including one mentioned last week in a status meeting that blocks some users running Mac OS X 10.6, aka Snow Leopard, from playing Netflix content.

While Mozilla issued Firefox 9.0.1 a day after shipping Firefox 9 -- the former removed code that caused some Mac, Linux and Windows browsers to crash -- it has not released a version 9.0.2 to patch any of the bugs that prompted it to throttle the upgrade process.

Firefox 9's slow upgrade appears to conflict with Mozilla's rapid-release schedule that ships a new version every six weeks. Mozilla, which debuted the speedier pace last summer, has touted it as a way to get new features into users' hands faster, and security updates to them on a regular timetable.

Mozilla said it may use a slower-upgrade process for future editions.

In notes for a meeting held Jan. 3, the company said, "Probably going to do something similar for releases in the future as well."

Mozilla did not answer questions about how the throttling seemed at odds with its rapid-release tempo -- and with plans to offer a silent updating mechanism later this year -- but a spokeswoman pointed out a line the company added to the release notes for Firefox 9. "We manage and monitor the rate of automatic updates to ensure a smooth release. Users can always manually check for updates from the About Firefox window to see whether they are up to date," the release notes stated.

Firefox 10 is slated to ship two weeks from today, on Jan. 31

Saturday, January 14, 2012

Android is coming to everything ... everywhere

Will Android will lead the way in a ’smart’ revolution?

We spend a lot of time talking about operating system market share and usage share, but could Android explode to the point where it make such data irrelevant?

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com


When we talk about Android market/usage share, we’re usually thinking about devices like smartphones and tablets. It seems that knowing how many people use a particular thing is important to some people (I’m not sure why, maybe it helps people think they’ve made the right choice or something). But Android isn’t confined to just smartphones and tablets. Chances are that if you have a gadget like a personal media player or an ebook reader or an in-car GPS receiver, it’s powered by Android. It might not say Android anywhere, and people might not know that it’s Android, but it’s there nontheless.

Android is already all around us, and pretty soon the OS is going to be in a whole lot more places. The next device that Android is set to invade is the TV set. Given the operating system’s heritage in media it seems like a good fit. It’s going to take a long time for people to replace their dumb TVs with Android-powered ‘Smart TV’ sets, but it will happen (people on the whole seem to keep their TV sets for a lot longer than they do cellphones, tablets and PCs).

The TV is just the start of things in my opinion, and it’s the beginning of an in-home Android revolution. As the price falls on low-power computers it becomes feasible to fit make things ’smart’ … smart oven, smart microwave, smart refrigerator, smart washing machine. smart thermostat. Heck, why not go the whole hog and have smart lights and smart doors too?

Smart devices are the next step in evolution for devices that have traditionally been dumb devices. And one of the keys to making dumb devices smart is the a flexible operating system.

Android offers just that.

Note: One company is going to absolutely love it if Android is everywhere … Microsoft. The Redmond giant already pulling in millions every year from patent deals struck with smartphones and tablets makers.

I can see Android in other places too … watches (now there’s something that needs revolutionizing), cars, binoculars, telescopes, home automation devices, remote controls and much more. Android’s power is its versatility, and it is that versatility that allows the platform to be customized and tweaked for a whole variety of applications. It’s because of this that I see an explosion in Android usage over the next few years.

Friday, January 13, 2012

IBM Research Determines Atomic Limits of Magnetic Memory

Punctuating 30 years of nanotechnology research, scientists from IBM Research (NYSE: IBM) have successfully demonstrated the ability to store information in as few as 12 magnetic atoms. This is significantly less than today’s disk drives, which use about one million atoms to store a single bit of information. The ability to manipulate matter by its most basic components – atom by atom – could lead to the vital understanding necessary to build smaller, faster and more energy-efficient devices.

Cisco CCNA Training, Cisco CCNA Certification

Best IBM Certification Training and IBM Exams Training and more Cisco exams log in to Certkingdom.com



While silicon transistor technology has become cheaper, denser and more efficient, fundamental physical limitations suggest this path of conventional scaling is unsustainable. Alternative approaches are needed to continue the rapid pace of computing innovation.

By taking a novel approach and beginning at the smallest unit of data storage, the atom, scientists demonstrated magnetic storage that is at least 100 times denser than today’s hard disk drives and solid state memory chips. Future applications of nanostructures built one atom at a time, and that apply an unconventional form of magnetism called antiferromagnetism, could allow people and businesses to store 100 times more information in the same space.

“The chip industry will continue its pursuit of incremental scaling in semiconductor technology but, as components continue to shrink, the march continues to the inevitable end point: the atom. We’re taking the opposite approach and starting with the smallest unit -- single atoms -- to build computing devices one atom at a time.” said Andreas Heinrich, the lead investigator into atomic storage at IBM Research

How it Works

The most basic piece of information that a computer understands is a bit. Much like a light that can be switched on or off, a bit can have only one of two values: "1" or "0". Until now, it was unknown how many atoms it would take to build a reliable magnetic memory bit.

With properties similar to those of magnets on a refrigerator, ferromagnets use a magnetic interaction between its constituent atoms that align all their spins – the origin of the atoms’ magnetism – in a single direction. Ferromagnets have worked well for magnetic data storage but a major obstacle for miniaturizing this down to atomic dimensions is the interaction of neighboring bits with each other. The magnetization of one magnetic bit can strongly affect that of its neighbor as a result of its magnetic field. Harnessing magnetic bits at the atomic scale to hold information or perform useful computing operations requires precise control of the interactions between the bits.

The scientists at IBM Research used a scanning tunneling microscope (STM) to atomically engineer a grouping of twelve antiferromagnetically coupled atoms that stored a bit of data for hours at low temperatures. Taking advantage of their inherent alternating magnetic spin directions, they demonstrated the ability to pack adjacent magnetic bits much closer together than was previously possible. This greatly increased the magnetic storage density without disrupting the state of neighboring bits.



Writing and reading a magnetic byte: this image shows a magnetic byte imaged 5 times in different magnetic states to store the ASCII code for each letter of the word THINK, a corporate mantra used by IBM since 1914. The team achieved this using 96 iron atoms − one bit was stored by 12 atoms and there are eight bits in each byte.

IBM and Nanotechnology Leadership

In the company's 100 year history, IBM has invested in scientific research to shape the future of computing. Today's announcement is a demonstration of the results garnered by IBM's world-leading scientists and the company's continual investment in and focus on exploratory research.

IBM Research has long been a leader in studying the properties of materials important to the information technology industry. For more than fifty years, scientists at IBM Research have laid the foundation of scientific knowledge that will be important for the future of IT and sought out discoveries that can advance existing technologies.

Wednesday, January 11, 2012

Critics accuse Google of unfairly promoting Google+ in search results

The long-standing and persistent accusation that Google unfairly uses its search engine to promote its other online services is once again in the spotlight, triggered by new social search functionality the company is rolling out this week that more tightly links its search engine with its Google+ social networking site.

MCTS Certification, MCITP Certification

Best HP Certification Training and HP Exams Training and more Cisco exams log in to examkingdom.com



The complaints have come from different quarters, including competitors and industry experts, and have focused on various arguments, but at bottom all charge Google with using its dominant search engine to deliberately boost Google+'s popularity, by giving Google+ pages and profiles an artificially prominent position in result pages.

One of the strongest arguments made so far comes from search engine expert Danny Sullivan, who described on Wednesday in his technology news site Search Engine Land how Google is now suggesting Google+ business pages that companies and public figures have set up on the site in a way that makes the Google+ pages much more prominent than similar pages these public figures and organizations have set up on competing social media sites.

Sullivan shows a variety of examples in which Google, via new query auto-complete suggestions for Google+ profiles and via the new Google+ People and Pages sidebar suggestions column, favors Google+ business pages over alternative ones that have more "fans" on Facebook and Twitter.

Sullivan ran his queries without being logged into his Google Account, and even using the Chrome browser's "incognito" mode, to make sure that the Google search engine treated his queries as coming from a fairly generic user, and not tailored to him specifically.

"Is there anyone out there who still wants to say that being on Google+ doesn't matter? Anyone? Because when being on Google+ means that you potentially can have your Google+ page leap to the top in those sidebar results, Google+ matters. It matters more than ever before," he wrote, adding that Google is clearly "taking its weight in search and leveraging it to boost Google+ in a big way."

Google, after many missteps in the social networking market, launched Google+ in mid-2011, and has made it clear, from CEO Larry Page on down, that Google+ will be a key, unifying product for the company, providing social sharing features and an identity layer across most Google online services.

However, there has been skepticism regarding the adoption and engagement level for Google+, especially when compared with social networking leader Facebook, which has more than 850 million active members who spend a lot of time on the site.

Google+ is also a rival to Twitter because Google+ can be used in similar ways as the microblogging phenomenon.

In fact, among the first to cry foul this week was Twitter. Its General Counsel Alex Macgillivray, who previously worked at Google, posted on his Twitter account that Tuesday was "a bad day for the Internet" after Google announced the new search functionality.

"Having been there, I can imagine the dissension @Google to search being warped this way," he wrote. Twitter later followed Macgillivray's post with a more formal statement, in which it reiterated and expanded on his complaint.

Meanwhile, Google answered back with a post on its main Google+ page, saying it was "a bit surprised by Twitter's comments" because Twitter "chose not to renew their agreement with us last summer," a reference to the now lapsed two-year deal which gave Google special access to Twitter's "firehose" of real-time tweets.

However, as Sullivan and others have pointed out, Google has continued indexing Twitter posts and has a massive collection of them in its index, including links to the official accounts of public figures, celebrities and organizations.

Throughout the two-day flap, Facebook officials have remained mum. Facebook has its own special search arrangement with its partner Microsoft, which gives the Bing search engine access to certain data that is out of Google's reach. While Facebook keeps most personal profile content off limits to search engines, its business profiles are public, as well as some other content, and thus available to Google. In fact, for a while Facebook has let individuals tag status updates as "public" and made those available to search engines -- a good example of this is the site Your OpenBook, devoted exclusively to this type of personal, public status update.

In its announcement on Tuesday of the new social search features, described by the company as "Search, Plus Your World," Google focused on new things its search users will be able to do when signed into their Google accounts: find Google+ posts and Picasa Web photos they and their contacts on those social media sites have shared not only publicly on the Web but also privately with each other.

This new functionality builds on the existing Google social search features, which let users logged into their Google Accounts see links in search results that their specific social media contacts tagged with the Google +1 button or shared publicly using a social media service.

Google didn't respond to a request for comment about the controversy surrounding the new social search functionality.

Saturday, January 7, 2012

70-432 Q & A / Study Guide

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

QUESTION 4
You work as a database administrator at Certkingdom.com. Certkingdom.com is using a SQL Server 2008
instance. The SQL Server 2008 instance hosts quite a few applications. ABC also has a server
named ABC-SR43 that is used to store log files.
You have to set up a new job that stores log files on ABC-SR43. You create a new account
ABC\Log_Account. You set it up to be run by the SQL Server Agent Services.
However, your job fails to store any log files on ABC-SR43. After some investigation you notice
that the job does not have permissions to store files on ABC-SR43.
How should you remedy the situation? Select the best option.

A. You should set up ABC\Log_Accoun as a Remote Service account.
B. You should set up ABC\Log_Accoun as a Domain service account.
C. You should set up ABC\Log_Accoun as a Local Service account.
D. You should set up ABC\Log_Accoun as a Local System account.
E. You should set up ABC\Log_Accoun as a Network Service account.
F. You should set up ABC\Log_Account as a Domain account.

Answer: F

Explanation:
The service startup account defines the Microsoft Windows account in which SQL Server Agent
runs and its network permissions. SQL Server Agent runs as a specified user account. For
compatibility with earlier versions of SQL Server, SQL Server Agent can also run as the Local
System account.
In this scenario you should select a Domain account, which allows sufficient permissions and
improved security.


QUESTION 5
You work as a database administrator at Certkingdom.com. Certkingdom.com is using a SQL Server 2008
instance that has a table named ABC_Training. ABC_ Training contains a column named
ABC_Distance. A new Certkingdom.com training policy states that the training (ie. The ABC_Distance
column in the ABC_Training table) cannot be increased or decreased by more than 3%.
How should you implement the ABC Training Policy?

A. You should consider developing a view which rolls back non-compliant Certkingdom.com policy
changes to ABC_Distance.
B. You should consider developing a stored procedure which rolls back non-compliant Certkingdom.com
policy compliant changes to the ABC_Distance column.
C. You should consider developing a primary key constraint to the ABC_training table which only
contains valid values on ABC_Distance.
D. You should consider developing a create trigger which rolls back non-compliant Certkingdom.com
policy changes to the ABC_Distance column.
E. You should consider developing an update trigger which rolls back non-compliant Certkingdom.com
policy changes to the ABC_Distance column.
F. You should consider developing a delete trigger which rolls back non-compliant Certkingdom.com policy
changes to the ABC_Distance column.

Answer: E

Explanation:


QUESTION 6
You work as a database administrator at Certkingdom.com. Certkingdom.com is using a SQL Server 2008
instance that contains a database named ABC_DB. Certkingdom.com contains a lot of customer data
which is processed by the Web application. You need to keep the customer information safe since
it is confidential. This information includes files of data, backups, and log files.
How can this be achieved and still keep the performance and functionality of the web application?
Select one or two.

A. You should consider adding a transaction Log on ABC_DB, and set the information to be
encrypted for a fixed time.
B. Use BitLocker Drive Encryption on the hard drives on the SQL Server.
C. Use EFS (Encrypting File System) on the hard drives on the SQL Server.
D. You should consider enabling the Transparent Database Encryption on ABC_DB and back up
the transaction log.
E. You should consider enabling the Transparent Database Encryption on ABC_DB and enabling
the Transparent Database Encryption on master database.
F. Use cell-level encryption for the specific data that needs to be kept safe.

Answer: D

Explanation:
With the introduction of transparent data encryption (TDE) in SQL Server 2008, users now have
the choice between cell-level encryption as in SQL Server 2005, full database-level encryption by
using TDE, or the file-level encryption options provided by Windows. TDE is the optimal choice for
bulk encryption to meet regulatory compliance or corporate data security standards. TDE works at
the file level, which is similar to two Windows® features: the Encrypting File System (EFS) and
BitLocker™ Drive Encryption, the new volume-level encryption introduced in Windows Vista®,
both of which also encrypt data on the hard drive. TDE does not replace cell-level encryption,
EFS, or BitLocker.


QUESTION 7
You work as a database administrator at Certkingdom.com. Certkingdom.com is using two SQL Server 2008
sample named ABCSmp1 and ABCSmp2. Furthermore, ABCSmp1 contains a database named
ABC_DB. A Certkingdom.com user named Mia Hamm uses her logon MiaHamm to log on to the database
on ABCSmp1. During the week you have transferred ABC_DB to ABCSmp2. You manually
recreate the Mia Hamm login on ABCSmp2. However, when she tries to login on ABC_DB at
ABCSmp2, she received an error message stating that she is not allowed access. Mia Hamm
needs to access ABC_DB and you need to make it happen.
What T-SQL code should you use? (Each correct option is part of the answer. Choose TWO)

A. Use Certkingdom.com;
B. Use ABC_DB; *
C. Use ABCSmp1;
D. Use ABCSmp2;
E. ALTER LOGIN MiaHamm WITH DEFAULT_DATABASE = ABC_DB;
F. CHANGE LOGIN MiaHamm WITH DEFAULT_DATABASE = ABC_DB;
G. ALTER LOGIN MiaHamm WITH PASSWORD = 'pwd1234' UNLOCK;
H. CHANGE LOGIN MiaHamm WITH PASSWORD = 'pwd1234' UNLOCK;
I. CHANGE USER MiaHamm WITH LOGIN = MiaHamm;
J. ALTER USER MiaHamm WITH LOGIN = MiaHamm; *
K. ALTER LOGIN MiaHamm ENABLE;
L. CHANGE LOGIN MiaHamm ENABLE;

Answer: B,J

Explanation:


QUESTION 8
You work as a database administrator at Certkingdom.com. Certkingdom.com is using a SQL Server 2008 instance.
Your junior assistant is curious about on how to move a table, such as ABC_table, from its current
scheme (scheme1) to another scheme (scheme2)
How can you accomplish this in T-SQL?

A. You should consider using the following:
ALTER TABLE Schema1.ABC_Table SWITCH TO Schema2.ABC_table;

B. You should consider using the following:
ALTER AUTHORIZATION ON Schema1.ABC_Table TO Schema2;

C. You should consider using the following:
ALTER SCHEMA schema2 TRANSFER schema1.ABC_table;

D. You should consider using the following:
ALTER SCHEMA schema1 TRANSFER schema2.ABC_table;

E. You should consider using the following:
ALTER USER Schema1 WITH DEFAULT_SCHEMA = Schema2;

F. You should consider using the following:
MOVE ABC_Table FROM SCHEMA schema1 TO schema2

G. You should consider using the following:
MOVE ABC_Table FROM schema1 TO schema2

Answer: C

Explanation:
ALTER SCHEMA can only be used to move securables between schemas in the same database.
To change or drop a securable within a schema, use the ALTER or DROP statement specific to
that securable.


QUESTION 9
You work as a database administrator at Certkingdom.com. Certkingdom.com is using a SQL Server 2008
instance. You have received instructions from management to allow the users at Certkingdom.com on the
SQL Server sample to use the OPENROWSET() function to search remote information sources.
You study incomplete code in the exhibit carefully. (Line numbers are used for reference purposes only)
Exhibit:
01. sp_configure 'show advanced options', 1
02. RECONFIGURE
03.
04. RECONFIGURE
05. GO
06.
07. SELECT a.*
08. FROM OPENROWSET('SQLNCLI', 'Server=Madrid;Trusted_Connection=yes;',
09. 'SELECT GroupName, Name, DepartmentID
10. FROM AdventureWorks.HumanResources.Department
11. ORDER BY GroupName, Name') AS a;
12. GO
Which T-SQL statement should you insert at line 03 to make the batch meet the requirement in
this scenario?

A. sp_configure 'Router control', 1
B. sp_configure 'Router control', 0
C. sp_configure 'Transaction Logs', 1
D. sp_configure 'Transaction Logs', 0
E. sp_configure 'Ad Lib Distributed Queries ', 1
F. sp_configure 'Ad Lib Distributed Queries ', 0
G. sp_configure 'Ad Hoc Distributed Queries', 1
H. sp_configure 'Ad Hoc Distributed Queries', 0

Answer: G

Explanation:
By default, SQL Server does not allow ad hoc distributed queries using OPENROWSET and
OPENDATASOURCE. When this option is set to 1, SQL Server allows ad hoc access. When this
option is not set or is set to 0, SQL Server does not allow ad hoc access.
Ad hoc distributed queries use the OPENROWSET and OPENDATASOURCE functions to
connect to remote data sources that use OLE DB. OPENROWSET and OPENDATASOURCE
should be used only to reference OLE DB data sources that are accessed infrequently. For any
data sources that will be accessed more than several times, define a linked server.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Thursday, January 5, 2012

70-431 Q & A / Study Guide

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
You work as the database administrator at CertKingdom.com. The CertKingdom.com network consists of
a single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run Windows 2000 Server. The CertKingdom.com network contains a SQL Server 2000 database
server named CERTKINGDOM-DB01 that runs on Windows 2000 Server. CERTKINGDOM-DB01
contains a database named CKD_Sales.
CertKingdom.com intends migrating CERTKINGDOM-DB01 to SQL Server 2005 in the near future. To
prepare for the migration, you decide to install SQL Server 2005 Express on a server named
CERTKINGDOM-SR31. You verify that CERTKINGDOM-SR31 exceeds the minimum recommended
hardware requirements for SQL Server 2005.
What should you do next?

A. Upgrade CERTKINGDOM-SR31 to Windows Sever 2003 and install Service Pack 1.
B. Install and run the SQL Server Upgrade Advisor on CERTKINGDOM-SR31.
C. Install SQL Server 2000 on CERTKINGDOM-SR31.
D. Download and install the .NET Framework 2.0.

Answer: D

Explanation:
SQL Server 2005 requires the.NET Framework 2.0. This is automatically installed when SQL
Server 2005 is installed but is not automatically installed when SQL Server 2005 Express is installed.

Incorrect Answers:
A: You do not need to upgrade CERTKINGDOM-SR31 to Windows Sever 2003 Service Pack 1 as
SQL Server 2005 Express can be installed on Windows 2000 Server. You will need to install
Service Pack 4 for Windows 2000 Server though.
B: You should run the SQL Server Upgrade Advisor when you want to upgrade an instance of a
SQL Server 2000 database to SQL Server 2005.
C: You do not need to install SQL Server 2000 before installing SQL Server 2005 Express.

Reference: Microsoft SQL Server 2005 Books Online (2006), Index: installing SQL Server
Express, before installing


QUESTION 2
You work as a database administrator at CertKingdom.com. The CertKingdom.com network consists of a
single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run Windows Server 2003 with the latest Service Packs and Hotfixes, while the client computers
run Windows XP Professional, Windows 98 Second Edition, and Novell NetWare 6.5.
You install SQL Server 2005 on a member server named CERTKINGDOM-SR21. CERTKINGDOMSR21
will host a database named CKD_Sales. All CertKingdom.com users must be able to connect to
CERTKINGDOM-SR21 by computer name. A CertKingdom.com network administrator named Rory Allen
must ensure that the client computers will be able to connect to CERTKINGDOM-SR21.
Which protocols can CertKingdom.com users use to CERTKINGDOM-SR21?

A. TCP/IP and Named Pipes
B. TCP/IP and IPX/SPX
C. Virtual Interface Adapter (VIA)
D. Shared Memory

Answer: A

Explanation:
By default, clients have TCP and Named Pipes as available protocols. You can manipulate the
protocol ordering by using the SQL Server Client utility. The client application uses the protocols
in the order specified on the client computer. If you are using SQL Server 2005, the protocol order
is stored in the ProtocolOrder registry entry under the following registry subkey:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSSQLServer\Client\SNI9.0
Incorrect Answers:
B: SQL Server 2005 does not support IPX/SPX. The newer versions of NetWare, such as
NetWare 6.5, support TCP/IP which makes it the common protocol for all clients.
C: The Virtual Interface Adapter (VIA) can be used only by VIA hardware.
D: Shared Memory can only be used on the local computer and cannot be used as a network protocol.

Reference:Microsoft SQL Server 2005 Books Online (2006), Index: client connections
[SQL Server], about client network connections, choosing a network protocol


QUESTION 3
You work as the database administrator at CertKingdom.com. The CertKingdom.com network consists of
a single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run Windows 2000 Server. The CertKingdom.com network contains a SQL Server 2000 database
server named CERTKINGDOM-DB01 that runs on Windows 2000 Server. CERTKINGDOM-DB01
contains a database named CKD_Sales.
CertKingdom.com intends migrating CERTKINGDOM-DB01 to SQL Server 2005 in the near future. To
prepare for the migration, you decide to install SQL Server 2005 Express on a server named
CERTKINGDOM-SR23. CERTKINGDOM-SR31 was used for previously used by application developer
and contains Microsoft Visual Studio 2003, .NET Framework 1.2 and Internet Explorer 5.5. You
verify that CERTKINGDOM-SR23 exceeds the minimum recommended hardware requirements for
SQL Server 2005.
What should you do next? (Each correct answer provides part of the solution. Choose THREE.)

A. Upgrade CERTKINGDOM-SR23 to Windows Sever 2003 and install Service Pack 1 for Windows Sever 2003.
B. Install Service Pack 4 for Windows 2000 Sever on CERTKINGDOM-SR23.
C. Upgrade the .NET Framework 1.2 to .NET Framework 2.0 on CERTKINGDOM-SR23.
D. Uninstall the .NET Framework 1.2 and install the .NET Framework 2.0 on CERTKINGDOM-SR23.
E. Upgrade Internet Explorer 5.5 to Internet Explorer 6.0 and install Service Pack 1 for Internet
Explorer 6.0 on CERTKINGDOM-SR23.
F. Upgrade Microsoft Visual Studio 2003 to Microsoft Visual Studio 2005 and install Service Pack
1 for Microsoft Visual Studio 2005 on CERTKINGDOM-SR23.

Answer: B,D,E

Explanation:
SQL Server 2005 requires Service Pack 4 for Windows 2000 Sever, Internet Explorer 6.0 with
Service Pack 1 and the .NET Framework 2.0. The .NET Framework 2.0 is automatically installed
with other versions of SQL Server 2005 but is not automatically installed with SQL Server 2005
Express. You can upgrade .NET Framework 1.0 and upgrade .NET Framework 1.1 to .NET
Framework 2.0 but .NET Framework 1.2 must be uninstalled first.
Incorrect Answers:
A: You do not need to upgrade CERTKINGDOM-SR31 to Windows Sever 2003 Service Pack 1 as
SQL Server 2005 Express can be installed on a Windows 2000 Server once you install Service
Pack 4 for Windows 2000 Server.
C: You can upgrade .NET Framework 1.0 and upgrade .NET Framework 1.1 to .NET Framework
2.0 but .NET Framework 1.2 must be uninstalled first.
F: SQL Server 2005 Express does not require any version of Microsoft Visual Studio.
Reference:Microsoft SQL Server 2005 Books Online (2006), Index: installing SQL Server
Express, before installing


QUESTION 4
You work as a database administrator at CertKingdom.com. The CertKingdom.com network consists of a
single Active Directory domain named CertKingdom.com.
You have received instruction from the CIO to prepare a new installation of SQL Server 2005. The
new SQL Server 2005 database server is named CERTKINGDOM-DB01. A CertKingdom.com user
named Mia Hamm is a member of the Marketing department. You instruct her to identify the
protocols that the client computers might use to connect to the server. Mia Hamm needs to identify
the protocols that are needed to accomplish this goal.
What should she identify? (Choose all that apply)

A. She should use the Multiprotocol.
B. Mia Hamm should use the Named Pipes.
C. She should use the Shared Memory.
D. She should use the TCP/IP
E. Mia Hamm should use the Virtual Interface Adapter (VIA).

Answer: B,D

Explanation:
The clients have by default TCP and Named Pipes as available protocols. You can make use of
the SQL Server Client utility to manipulate the protocol ordering. The client application uses the
protocols in the order specified on the client computer. When you make use of the SQL Server
2005, the protocol order is stored in the ProtocolOrder registry entry under the following registry
subkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSSQLServer\Client\SNI9.0
Incorrect Answers:
C: Shared Memory can only be used on the local computer and cannot be used as a network
protocol.
E: The Virtual Interface Adapter (VIA) can be used only by VIA hardware.Reference:Microsoft SQL
Server 2005 Books Online (2006), Index: client connections [SQL Server], about client network
connections, choosing a network protocol


QUESTION 5
You work as the database administrator at CertKingdom.com. The CertKingdom.com network consists of
a single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run Windows 2000 Server. The CertKingdom.com network contains a SQL Server 2000 database
server named CERTKINGDOM-DB01 that runs on Windows 2000 Server Service Pack 4.
CERTKINGDOM-DB01 contains a database named CKD_Trading.
CertKingdom.com wants to migrate CERTKINGDOM-DB01 to SQL Server 2005 but wants to retain the
CKD_Trading database with the same instance name. You decide to perform an in-place upgrade to
SQL Server 2005. You verify that CERTKINGDOM-DB01 exceeds the minimum recommended
hardware requirements for SQL Server 2005.
What should you do next?

A. Upgrade CERTKINGDOM-DB01 to Windows Sever 2003 Service Pack 1.
B. Run the SQL Server Upgrade Advisor on CERTKINGDOM-DB01.
C. Detach the CKD_Trading database on CERTKINGDOM-DB01.
D. Run the SQL Server 2005 Setup utility.

Answer: B

Explanation:
Before you perform an in-place upgrade of an existing database, you should run the SQL Server
Upgrade Advisor. The SQL Server Upgrade Advisor produces a list of items that must be
addressed before and after performing the upgrade. This list of items is specific to the existing
installation.
Incorrect Answers:
A: You do not need to upgrade CERTKINGDOM-DB01 to Windows Sever 2003 Service Pack 1 as
SQL Server 2005 can be installed on Windows 2000 Server with Service Pack 4.
C: You need to detach a database when you need to move the database to another database
instance or another database server. You do not need to detach the database before performing
an in-place upgrade.
D: You should run the SQL Server Upgrade Advisor before you run the SQL Server 2005 Setup
utility. The SQL Server Upgrade Advisor produces a list of items that must be addressed before
and after performing the upgrade. This list of items is specific to the existing
installation.Reference:Microsoft SQL Server 2005 Books Online (2006), Index: updating
databases, detaching and attaching databases


QUESTION 6
You work as the database administrator at CertKingdom.com. The CertKingdom.com network consists of
a single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run Windows 2000 Server. The CertKingdom.com network contains a SQL Server 7.0 database server
named CERTKINGDOM-DB01 that runs on Windows 2000 Server. Service Pack 4 for Windows 2000
Server id installed on CERTKINGDOM-DB01.
CertKingdom.com wants to migrate CERTKINGDOM-DB01 to SQL Server 2005. You decide to perform
an in-place upgrade to SQL Server 2005. You verify that CERTKINGDOM-DB01 exceeds the
recommended hardware requirements for SQL Server 2005.
What should you do next?

A. Upgrade CERTKINGDOM-DB01 to Windows Sever 2003.
B. Install Service Pack 4 for SQL Server 7.0 on CERTKINGDOM-DB01.
C. Upgrade SQL Server 7.0 on CERTKINGDOM-DB01 to SQL Server 2000.
D. Run the SQL Server 2005 Setup utility on CERTKINGDOM-DB01 and upgrade directly to SQL
Server 2005.

Answer: B

Explanation:
You can upgrade from SQL Server 7.0 with Service Pack 4 directly to SQL Server 2005. Thus you
need only install Service Pack 4 for SQL Server 7.0.
Incorrect Answers:
A: You do not need to upgrade CERTKINGDOM-DB01 to Windows Sever 2003 as SQL Server 2005
can be installed on Windows 2000 Server with Service Pack 4.
C: You do not need to upgrade CERTKINGDOM-DB01 to SQL Server 200 as SQL Server 7.0 with
Service Pack 4 can be upgraded directly to SQL Server 2005. Besides, you will need to install
Service Pack 3 for SQL Server 2000 before you can upgrade it to SQL Server 2005.
D: You need to install Service Pack 4 for SQL Server 7.0 before you can upgrade it directly to SQL
Server 2005.Reference:Microsoft SQL Server 2005 Books Online (2006), Index: upgrading SQL
Server, upgrading to SQL Server 2005


QUESTION 7
You work as the database administrator at CertKingdom.com. The CertKingdom.com network consists of
a single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run Windows Server 2003 and all client computers run Windows XP Professional. The
CertKingdom.com network contains two SQL Server 2000 database servers named CERTKINGDOMDB01
and CERTKINGDOM-DB02 that are configured for log shipping. CERTKINGDOM-DB01 is the
primary server and hosts a database named CKD_Trading. Both CERTKINGDOM-DB01 and
CERTKINGDOM-DB02 have Service Pack 3 for SQL Server 2000 installed.
CertKingdom.com wants to upgrade CERTKINGDOM-DB01 and CERTKINGDOM-DB02 to SQL Server
2005 Enterprise Edition but the CKD_Trading database must remain available during the upgrade
process. You verify that both CERTKINGDOM-DB01 and CERTKINGDOM-DB02 exceed the
recommended hardware requirements for SQL Server 2005 Enterprise Edition. You then install
Service Pack 1 for Windows Server 2003 on CERTKINGDOM-DB01 and CERTKINGDOM-DB02.
What should you do next?

A. Install Service Pack 4 for SQL Server 2000 on both database servers.
B. Enable failover in the SQL Server 2000 log shipping configuration and upgrade CERTKINGDOMDB02
to SQL Server 2005.
C. Run the Database Maintenance Plan Wizard on CERTKINGDOM-DB01 to upgrade it to SQL
Server 2005.
D. Upgrade CERTKINGDOM-DB02 to SQL Server 2005 and then upgrade CERTKINGDOM-DB01 to
SQL Server 2005.

Answer: B

Explanation:
SQL Server 2005 does not support the Database Maintenance Plan Wizard which was integral to
log shipping in SQL Server 2000. Hence, log shipping stops functioning when you upgrade a SQL
Server 2000 log shipping configuration directly to SQL Server 2005. To upgrade log shipping to
SQL Server 2005, you must migrate the database servers to SQL Server 2005. If you want the
database to remain available during the migration process, you must migrate with failover. To
migrate with failover you must enable failover and upgrade CERTKINGDOM-DB02. Then you need
to failover to CERTKINGDOM-DB02 and upgrade CERTKINGDOM-DB01. Then configure log shipping
with the CERTKINGDOM-DB02 becoming the primary server and CERTKINGDOM-DB01 becoming the
secondary server.
Incorrect Answers:
A: You do not need to install Service Pack 4 for SQL Server 2000 on the database servers as SQL
Server 2000 with Service Pack 3 can be upgraded to SQL Server 2005. However, SQL Server
2005 does not support the Database Maintenance Plan Wizard which was integral to log shipping
in SQL Server 2000. Hence, log shipping stops functioning when you upgrade a SQL Server 2000
log shipping configuration directly to SQL Server 2005.
C: SQL Server 2005 does not support the Database Maintenance Plan Wizard which was integral
to log shipping in SQL Server 2000. Hence, log shipping stops functioning when you upgrade a
SQL Server 2000 log shipping configuration directly to SQL Server 2005.
D: Removing log shipping from CERTKINGDOM-DB02 and upgrading CERTKINGDOM-DB01 to SQL
Server 2005 will not ensure that the CKD_Trading database remains available. Reference:Microsoft
SQL Server 2005 Books Online (2006), Index: log shipping [SQL Server], upgrading


QUESTION 8
You work as the database administrator at CertKingdom.com. The CertKingdom.com network consists of
a single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run Windows Server 2003. The CertKingdom.com network contains a Domain Controller named
CERTKINGDOM-DC01 and a member server named CERTKINGDOM-SR21.
CertKingdom.com wants to implement a SQL Server 2005 database that will store sales data. All
CertKingdom.com users will require access to the Sales_DB database. You have been instructed to
install SQL Server 2005 on CERTKINGDOM-SR21 and to create a database named Sales_DB. You
need to ensure that CertKingdom.com users and applications can connect to the database instance by
using only the computer name.
What should you do during the installation of SQL Server 2005 on CERTKINGDOM-SR21?

A. Select the Named Instance and use MSSQLSERVER as the instance name.
B. Select the Named Instance and use CERTKINGDOM-DC01 as the instance name.
C. Select the Default Instance and accept the default instance name.
D. Select the Named Instance and use CERTKINGDOM-SR21 as the instance name.

Answer: C

Explanation:
To ensure that users and applications can connect to the instance using the computer name, you
should select the Default Instance and accept the default instance name, MSSQLSERVER.
Incorrect Answers:
A: You cannot use a Named Instance as users and applications will need to specify the server
name and the instance name when connection to the database.
B: You cannot use a Named Instance as users and applications will need to specify the server
name and the instance name when connection to the database.
D: You cannot use a Named Instance as users and applications will need to specify the server
name and the instance name when connection to the database.


QUESTION 9
You work as the database administrator at CertKingdom.com. The CertKingdom.com network consists of
a single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run on Windows Server2003 while the client computers run Windows XP Professional, Windows
98 Second Edition, and Novell NetWare 6.5. All computers are members of the CertKingdom.com
Active Directory domain. The CertKingdom.com network contains a SQL Server 2005 database server
named CERTKINGDOM-DB01 that hosts a database instance named MSSQLSERVR.
CertKingdom.com wants to implement another SQL Server 2005 instance for a database named
Sales_DB. Sales_DB will store sales data for the company. All CertKingdom.com users will require
access to the Sales_DB database. You have been instructed to create the SQL Server 2005
instance for the Sales_DB database. You need to ensure that all users will be able to connect to
the Sales_DB database. You cannot make configuration changes to the client computers. Your
solution must optimize network traffic.
What should you do?

A. Install the instance as a Named Instance and configure it to support Mixed Mode
Authentication. The enable TCP/IP for the instance.
B. Install the instance as a Default Instance and configure it to support Windows Authentication.
The enable TCP/IP for the instance.
C. Install the instance as a Named Instance and configure it to support SQL Authentication. The
enable IPX/SPX for the instance.
D. Install the instance as a Default Instance and configure it to support Windows Authentication.
The enable IPX/SPX for the instance.

Answer: A

Explanation:
The default instance is named MSSQLSERVER. This instance name is already in use; therefore
you should use a Named Instance. You should use Mixed Mode Authentication to support
NetWare users.
Incorrect Answers:
B: You cannot use the Default Instance as the default instance is named MSSQLSERVER and is
already in use. Furthermore, you need to use Mixed Mode Authentication as Windows
Authentication does not support NetWare users.
C: You can use SQL Authentication, but this will require that you create SQL Logins for all users
and groups. It would be easier to use Windows Authentication for clients that user Windows XP
Professional and Windows 98 SE, and create SQL Logins for the NetWare 6.5 users. Also, SQL
Server 2005 does not support IPX/SPX. The newer versions of NetWare, such as NetWare 6.5,
support TCP/IP which makes it the common protocol for all clients.
D: You cannot use the Default Instance as the default instance is named MSSQLSERVER and is
already in use. Furthermore, you need to use Mixed Mode Authentication as Windows
Authentication does not support NetWare users. Also, SQL Server 2005 does not support
IPX/SPX. The newer versions of NetWare, such as NetWare 6.5, support TCP/IP which makes it
the common protocol for all clients.


QUESTION 10
You work as the database administrator at CertKingdom.com. The CertKingdom.com network consists of
a single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run on Windows Server2003 and all client computers run Windows XP Professional. The
CertKingdom.com network contains two SQL Server 2005 database servers that are configured in a
cluster with two nodes named NodeA and NodeB. NodeA hosts a default database instance
named MSSQLSERVR.
CertKingdom.com wants to implement another SQL Server 2005 instance for a database named
Sales_DB. Sales_DB will store sales data for the company. All CertKingdom.com users will require
access to the Sales_DB database. You have been instructed to create the SQL Server 2005
instance for the Sales_DB database on Node
A. You need to ensure that all users will be able to
connect to the Sales_DB database.
What should you do?

A. Run the SQL Server 2005 Setup utility on NodeA and select a Named Instance for the
Sales_DB database.
B. Run the SQL Server 2005 Setup utility on NodeA and select the Default Instance for the
Sales_DB database.
C. Move the existing instance from NodeA to NodeB. Run the SQL Server 2005 Setup utility on
Node
A. Select the Default Instance and accept the default instance name
D. Run the SQL Server 2005 Setup utility on NodeB and select a Named Instance for the
Sales_DB database.

Answer: A

Explanation:
The default instance is named MSSQLSERVER. This instance name is already in use on NodeA;
therefore you should use a Named Instance.
Incorrect Answers:
B: You cannot use the Default Instance as the default instance is named MSSQLSERVER and is
already in use.
C: You do not need to move the existing instance as you can install up to 50 instances on a SQL
Server 2005 database server.
D: You need to install the instance on NodeA not NodeB. You can install a new instance on
NodeA if you use a Named Instance.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

70-431 Q & A / Study Guide

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
You work as the database administrator at CertKingdom.com. The CertKingdom.com network consists of
a single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run Windows 2000 Server. The CertKingdom.com network contains a SQL Server 2000 database
server named CERTKINGDOM-DB01 that runs on Windows 2000 Server. CERTKINGDOM-DB01
contains a database named CKD_Sales.
CertKingdom.com intends migrating CERTKINGDOM-DB01 to SQL Server 2005 in the near future. To
prepare for the migration, you decide to install SQL Server 2005 Express on a server named
CERTKINGDOM-SR31. You verify that CERTKINGDOM-SR31 exceeds the minimum recommended
hardware requirements for SQL Server 2005.
What should you do next?

A. Upgrade CERTKINGDOM-SR31 to Windows Sever 2003 and install Service Pack 1.
B. Install and run the SQL Server Upgrade Advisor on CERTKINGDOM-SR31.
C. Install SQL Server 2000 on CERTKINGDOM-SR31.
D. Download and install the .NET Framework 2.0.

Answer: D

Explanation:
SQL Server 2005 requires the.NET Framework 2.0. This is automatically installed when SQL
Server 2005 is installed but is not automatically installed when SQL Server 2005 Express is installed.

Incorrect Answers:
A: You do not need to upgrade CERTKINGDOM-SR31 to Windows Sever 2003 Service Pack 1 as
SQL Server 2005 Express can be installed on Windows 2000 Server. You will need to install
Service Pack 4 for Windows 2000 Server though.
B: You should run the SQL Server Upgrade Advisor when you want to upgrade an instance of a
SQL Server 2000 database to SQL Server 2005.
C: You do not need to install SQL Server 2000 before installing SQL Server 2005 Express.

Reference: Microsoft SQL Server 2005 Books Online (2006), Index: installing SQL Server
Express, before installing


QUESTION 2
You work as a database administrator at CertKingdom.com. The CertKingdom.com network consists of a
single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run Windows Server 2003 with the latest Service Packs and Hotfixes, while the client computers
run Windows XP Professional, Windows 98 Second Edition, and Novell NetWare 6.5.
You install SQL Server 2005 on a member server named CERTKINGDOM-SR21. CERTKINGDOMSR21
will host a database named CKD_Sales. All CertKingdom.com users must be able to connect to
CERTKINGDOM-SR21 by computer name. A CertKingdom.com network administrator named Rory Allen
must ensure that the client computers will be able to connect to CERTKINGDOM-SR21.
Which protocols can CertKingdom.com users use to CERTKINGDOM-SR21?

A. TCP/IP and Named Pipes
B. TCP/IP and IPX/SPX
C. Virtual Interface Adapter (VIA)
D. Shared Memory

Answer: A

Explanation:
By default, clients have TCP and Named Pipes as available protocols. You can manipulate the
protocol ordering by using the SQL Server Client utility. The client application uses the protocols
in the order specified on the client computer. If you are using SQL Server 2005, the protocol order
is stored in the ProtocolOrder registry entry under the following registry subkey:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSSQLServer\Client\SNI9.0
Incorrect Answers:
B: SQL Server 2005 does not support IPX/SPX. The newer versions of NetWare, such as
NetWare 6.5, support TCP/IP which makes it the common protocol for all clients.
C: The Virtual Interface Adapter (VIA) can be used only by VIA hardware.
D: Shared Memory can only be used on the local computer and cannot be used as a network protocol.

Reference:Microsoft SQL Server 2005 Books Online (2006), Index: client connections
[SQL Server], about client network connections, choosing a network protocol


QUESTION 3
You work as the database administrator at CertKingdom.com. The CertKingdom.com network consists of
a single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run Windows 2000 Server. The CertKingdom.com network contains a SQL Server 2000 database
server named CERTKINGDOM-DB01 that runs on Windows 2000 Server. CERTKINGDOM-DB01
contains a database named CKD_Sales.
CertKingdom.com intends migrating CERTKINGDOM-DB01 to SQL Server 2005 in the near future. To
prepare for the migration, you decide to install SQL Server 2005 Express on a server named
CERTKINGDOM-SR23. CERTKINGDOM-SR31 was used for previously used by application developer
and contains Microsoft Visual Studio 2003, .NET Framework 1.2 and Internet Explorer 5.5. You
verify that CERTKINGDOM-SR23 exceeds the minimum recommended hardware requirements for
SQL Server 2005.
What should you do next? (Each correct answer provides part of the solution. Choose THREE.)

A. Upgrade CERTKINGDOM-SR23 to Windows Sever 2003 and install Service Pack 1 for Windows Sever 2003.
B. Install Service Pack 4 for Windows 2000 Sever on CERTKINGDOM-SR23.
C. Upgrade the .NET Framework 1.2 to .NET Framework 2.0 on CERTKINGDOM-SR23.
D. Uninstall the .NET Framework 1.2 and install the .NET Framework 2.0 on CERTKINGDOM-SR23.
E. Upgrade Internet Explorer 5.5 to Internet Explorer 6.0 and install Service Pack 1 for Internet
Explorer 6.0 on CERTKINGDOM-SR23.
F. Upgrade Microsoft Visual Studio 2003 to Microsoft Visual Studio 2005 and install Service Pack
1 for Microsoft Visual Studio 2005 on CERTKINGDOM-SR23.

Answer: B,D,E

Explanation:
SQL Server 2005 requires Service Pack 4 for Windows 2000 Sever, Internet Explorer 6.0 with
Service Pack 1 and the .NET Framework 2.0. The .NET Framework 2.0 is automatically installed
with other versions of SQL Server 2005 but is not automatically installed with SQL Server 2005
Express. You can upgrade .NET Framework 1.0 and upgrade .NET Framework 1.1 to .NET
Framework 2.0 but .NET Framework 1.2 must be uninstalled first.
Incorrect Answers:
A: You do not need to upgrade CERTKINGDOM-SR31 to Windows Sever 2003 Service Pack 1 as
SQL Server 2005 Express can be installed on a Windows 2000 Server once you install Service
Pack 4 for Windows 2000 Server.
C: You can upgrade .NET Framework 1.0 and upgrade .NET Framework 1.1 to .NET Framework
2.0 but .NET Framework 1.2 must be uninstalled first.
F: SQL Server 2005 Express does not require any version of Microsoft Visual Studio.
Reference:Microsoft SQL Server 2005 Books Online (2006), Index: installing SQL Server
Express, before installing


QUESTION 4
You work as a database administrator at CertKingdom.com. The CertKingdom.com network consists of a
single Active Directory domain named CertKingdom.com.
You have received instruction from the CIO to prepare a new installation of SQL Server 2005. The
new SQL Server 2005 database server is named CERTKINGDOM-DB01. A CertKingdom.com user
named Mia Hamm is a member of the Marketing department. You instruct her to identify the
protocols that the client computers might use to connect to the server. Mia Hamm needs to identify
the protocols that are needed to accomplish this goal.
What should she identify? (Choose all that apply)

A. She should use the Multiprotocol.
B. Mia Hamm should use the Named Pipes.
C. She should use the Shared Memory.
D. She should use the TCP/IP
E. Mia Hamm should use the Virtual Interface Adapter (VIA).

Answer: B,D

Explanation:
The clients have by default TCP and Named Pipes as available protocols. You can make use of
the SQL Server Client utility to manipulate the protocol ordering. The client application uses the
protocols in the order specified on the client computer. When you make use of the SQL Server
2005, the protocol order is stored in the ProtocolOrder registry entry under the following registry
subkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSSQLServer\Client\SNI9.0
Incorrect Answers:
C: Shared Memory can only be used on the local computer and cannot be used as a network
protocol.
E: The Virtual Interface Adapter (VIA) can be used only by VIA hardware.Reference:Microsoft SQL
Server 2005 Books Online (2006), Index: client connections [SQL Server], about client network
connections, choosing a network protocol


QUESTION 5
You work as the database administrator at CertKingdom.com. The CertKingdom.com network consists of
a single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run Windows 2000 Server. The CertKingdom.com network contains a SQL Server 2000 database
server named CERTKINGDOM-DB01 that runs on Windows 2000 Server Service Pack 4.
CERTKINGDOM-DB01 contains a database named CKD_Trading.
CertKingdom.com wants to migrate CERTKINGDOM-DB01 to SQL Server 2005 but wants to retain the
CKD_Trading database with the same instance name. You decide to perform an in-place upgrade to
SQL Server 2005. You verify that CERTKINGDOM-DB01 exceeds the minimum recommended
hardware requirements for SQL Server 2005.
What should you do next?

A. Upgrade CERTKINGDOM-DB01 to Windows Sever 2003 Service Pack 1.
B. Run the SQL Server Upgrade Advisor on CERTKINGDOM-DB01.
C. Detach the CKD_Trading database on CERTKINGDOM-DB01.
D. Run the SQL Server 2005 Setup utility.

Answer: B

Explanation:
Before you perform an in-place upgrade of an existing database, you should run the SQL Server
Upgrade Advisor. The SQL Server Upgrade Advisor produces a list of items that must be
addressed before and after performing the upgrade. This list of items is specific to the existing
installation.
Incorrect Answers:
A: You do not need to upgrade CERTKINGDOM-DB01 to Windows Sever 2003 Service Pack 1 as
SQL Server 2005 can be installed on Windows 2000 Server with Service Pack 4.
C: You need to detach a database when you need to move the database to another database
instance or another database server. You do not need to detach the database before performing
an in-place upgrade.
D: You should run the SQL Server Upgrade Advisor before you run the SQL Server 2005 Setup
utility. The SQL Server Upgrade Advisor produces a list of items that must be addressed before
and after performing the upgrade. This list of items is specific to the existing
installation.Reference:Microsoft SQL Server 2005 Books Online (2006), Index: updating
databases, detaching and attaching databases


QUESTION 6
You work as the database administrator at CertKingdom.com. The CertKingdom.com network consists of
a single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run Windows 2000 Server. The CertKingdom.com network contains a SQL Server 7.0 database server
named CERTKINGDOM-DB01 that runs on Windows 2000 Server. Service Pack 4 for Windows 2000
Server id installed on CERTKINGDOM-DB01.
CertKingdom.com wants to migrate CERTKINGDOM-DB01 to SQL Server 2005. You decide to perform
an in-place upgrade to SQL Server 2005. You verify that CERTKINGDOM-DB01 exceeds the
recommended hardware requirements for SQL Server 2005.
What should you do next?

A. Upgrade CERTKINGDOM-DB01 to Windows Sever 2003.
B. Install Service Pack 4 for SQL Server 7.0 on CERTKINGDOM-DB01.
C. Upgrade SQL Server 7.0 on CERTKINGDOM-DB01 to SQL Server 2000.
D. Run the SQL Server 2005 Setup utility on CERTKINGDOM-DB01 and upgrade directly to SQL
Server 2005.

Answer: B

Explanation:
You can upgrade from SQL Server 7.0 with Service Pack 4 directly to SQL Server 2005. Thus you
need only install Service Pack 4 for SQL Server 7.0.
Incorrect Answers:
A: You do not need to upgrade CERTKINGDOM-DB01 to Windows Sever 2003 as SQL Server 2005
can be installed on Windows 2000 Server with Service Pack 4.
C: You do not need to upgrade CERTKINGDOM-DB01 to SQL Server 200 as SQL Server 7.0 with
Service Pack 4 can be upgraded directly to SQL Server 2005. Besides, you will need to install
Service Pack 3 for SQL Server 2000 before you can upgrade it to SQL Server 2005.
D: You need to install Service Pack 4 for SQL Server 7.0 before you can upgrade it directly to SQL
Server 2005.Reference:Microsoft SQL Server 2005 Books Online (2006), Index: upgrading SQL
Server, upgrading to SQL Server 2005


QUESTION 7
You work as the database administrator at CertKingdom.com. The CertKingdom.com network consists of
a single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run Windows Server 2003 and all client computers run Windows XP Professional. The
CertKingdom.com network contains two SQL Server 2000 database servers named CERTKINGDOMDB01
and CERTKINGDOM-DB02 that are configured for log shipping. CERTKINGDOM-DB01 is the
primary server and hosts a database named CKD_Trading. Both CERTKINGDOM-DB01 and
CERTKINGDOM-DB02 have Service Pack 3 for SQL Server 2000 installed.
CertKingdom.com wants to upgrade CERTKINGDOM-DB01 and CERTKINGDOM-DB02 to SQL Server
2005 Enterprise Edition but the CKD_Trading database must remain available during the upgrade
process. You verify that both CERTKINGDOM-DB01 and CERTKINGDOM-DB02 exceed the
recommended hardware requirements for SQL Server 2005 Enterprise Edition. You then install
Service Pack 1 for Windows Server 2003 on CERTKINGDOM-DB01 and CERTKINGDOM-DB02.
What should you do next?

A. Install Service Pack 4 for SQL Server 2000 on both database servers.
B. Enable failover in the SQL Server 2000 log shipping configuration and upgrade CERTKINGDOMDB02
to SQL Server 2005.
C. Run the Database Maintenance Plan Wizard on CERTKINGDOM-DB01 to upgrade it to SQL
Server 2005.
D. Upgrade CERTKINGDOM-DB02 to SQL Server 2005 and then upgrade CERTKINGDOM-DB01 to
SQL Server 2005.

Answer: B

Explanation:
SQL Server 2005 does not support the Database Maintenance Plan Wizard which was integral to
log shipping in SQL Server 2000. Hence, log shipping stops functioning when you upgrade a SQL
Server 2000 log shipping configuration directly to SQL Server 2005. To upgrade log shipping to
SQL Server 2005, you must migrate the database servers to SQL Server 2005. If you want the
database to remain available during the migration process, you must migrate with failover. To
migrate with failover you must enable failover and upgrade CERTKINGDOM-DB02. Then you need
to failover to CERTKINGDOM-DB02 and upgrade CERTKINGDOM-DB01. Then configure log shipping
with the CERTKINGDOM-DB02 becoming the primary server and CERTKINGDOM-DB01 becoming the
secondary server.
Incorrect Answers:
A: You do not need to install Service Pack 4 for SQL Server 2000 on the database servers as SQL
Server 2000 with Service Pack 3 can be upgraded to SQL Server 2005. However, SQL Server
2005 does not support the Database Maintenance Plan Wizard which was integral to log shipping
in SQL Server 2000. Hence, log shipping stops functioning when you upgrade a SQL Server 2000
log shipping configuration directly to SQL Server 2005.
C: SQL Server 2005 does not support the Database Maintenance Plan Wizard which was integral
to log shipping in SQL Server 2000. Hence, log shipping stops functioning when you upgrade a
SQL Server 2000 log shipping configuration directly to SQL Server 2005.
D: Removing log shipping from CERTKINGDOM-DB02 and upgrading CERTKINGDOM-DB01 to SQL
Server 2005 will not ensure that the CKD_Trading database remains available. Reference:Microsoft
SQL Server 2005 Books Online (2006), Index: log shipping [SQL Server], upgrading


QUESTION 8
You work as the database administrator at CertKingdom.com. The CertKingdom.com network consists of
a single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run Windows Server 2003. The CertKingdom.com network contains a Domain Controller named
CERTKINGDOM-DC01 and a member server named CERTKINGDOM-SR21.
CertKingdom.com wants to implement a SQL Server 2005 database that will store sales data. All
CertKingdom.com users will require access to the Sales_DB database. You have been instructed to
install SQL Server 2005 on CERTKINGDOM-SR21 and to create a database named Sales_DB. You
need to ensure that CertKingdom.com users and applications can connect to the database instance by
using only the computer name.
What should you do during the installation of SQL Server 2005 on CERTKINGDOM-SR21?

A. Select the Named Instance and use MSSQLSERVER as the instance name.
B. Select the Named Instance and use CERTKINGDOM-DC01 as the instance name.
C. Select the Default Instance and accept the default instance name.
D. Select the Named Instance and use CERTKINGDOM-SR21 as the instance name.

Answer: C

Explanation:
To ensure that users and applications can connect to the instance using the computer name, you
should select the Default Instance and accept the default instance name, MSSQLSERVER.
Incorrect Answers:
A: You cannot use a Named Instance as users and applications will need to specify the server
name and the instance name when connection to the database.
B: You cannot use a Named Instance as users and applications will need to specify the server
name and the instance name when connection to the database.
D: You cannot use a Named Instance as users and applications will need to specify the server
name and the instance name when connection to the database.


QUESTION 9
You work as the database administrator at CertKingdom.com. The CertKingdom.com network consists of
a single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run on Windows Server2003 while the client computers run Windows XP Professional, Windows
98 Second Edition, and Novell NetWare 6.5. All computers are members of the CertKingdom.com
Active Directory domain. The CertKingdom.com network contains a SQL Server 2005 database server
named CERTKINGDOM-DB01 that hosts a database instance named MSSQLSERVR.
CertKingdom.com wants to implement another SQL Server 2005 instance for a database named
Sales_DB. Sales_DB will store sales data for the company. All CertKingdom.com users will require
access to the Sales_DB database. You have been instructed to create the SQL Server 2005
instance for the Sales_DB database. You need to ensure that all users will be able to connect to
the Sales_DB database. You cannot make configuration changes to the client computers. Your
solution must optimize network traffic.
What should you do?

A. Install the instance as a Named Instance and configure it to support Mixed Mode
Authentication. The enable TCP/IP for the instance.
B. Install the instance as a Default Instance and configure it to support Windows Authentication.
The enable TCP/IP for the instance.
C. Install the instance as a Named Instance and configure it to support SQL Authentication. The
enable IPX/SPX for the instance.
D. Install the instance as a Default Instance and configure it to support Windows Authentication.
The enable IPX/SPX for the instance.

Answer: A

Explanation:
The default instance is named MSSQLSERVER. This instance name is already in use; therefore
you should use a Named Instance. You should use Mixed Mode Authentication to support
NetWare users.
Incorrect Answers:
B: You cannot use the Default Instance as the default instance is named MSSQLSERVER and is
already in use. Furthermore, you need to use Mixed Mode Authentication as Windows
Authentication does not support NetWare users.
C: You can use SQL Authentication, but this will require that you create SQL Logins for all users
and groups. It would be easier to use Windows Authentication for clients that user Windows XP
Professional and Windows 98 SE, and create SQL Logins for the NetWare 6.5 users. Also, SQL
Server 2005 does not support IPX/SPX. The newer versions of NetWare, such as NetWare 6.5,
support TCP/IP which makes it the common protocol for all clients.
D: You cannot use the Default Instance as the default instance is named MSSQLSERVER and is
already in use. Furthermore, you need to use Mixed Mode Authentication as Windows
Authentication does not support NetWare users. Also, SQL Server 2005 does not support
IPX/SPX. The newer versions of NetWare, such as NetWare 6.5, support TCP/IP which makes it
the common protocol for all clients.


QUESTION 10
You work as the database administrator at CertKingdom.com. The CertKingdom.com network consists of
a single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run on Windows Server2003 and all client computers run Windows XP Professional. The
CertKingdom.com network contains two SQL Server 2005 database servers that are configured in a
cluster with two nodes named NodeA and NodeB. NodeA hosts a default database instance
named MSSQLSERVR.
CertKingdom.com wants to implement another SQL Server 2005 instance for a database named
Sales_DB. Sales_DB will store sales data for the company. All CertKingdom.com users will require
access to the Sales_DB database. You have been instructed to create the SQL Server 2005
instance for the Sales_DB database on Node
A. You need to ensure that all users will be able to
connect to the Sales_DB database.
What should you do?

A. Run the SQL Server 2005 Setup utility on NodeA and select a Named Instance for the
Sales_DB database.
B. Run the SQL Server 2005 Setup utility on NodeA and select the Default Instance for the
Sales_DB database.
C. Move the existing instance from NodeA to NodeB. Run the SQL Server 2005 Setup utility on
Node
A. Select the Default Instance and accept the default instance name
D. Run the SQL Server 2005 Setup utility on NodeB and select a Named Instance for the
Sales_DB database.

Answer: A

Explanation:
The default instance is named MSSQLSERVER. This instance name is already in use on NodeA;
therefore you should use a Named Instance.
Incorrect Answers:
B: You cannot use the Default Instance as the default instance is named MSSQLSERVER and is
already in use.
C: You do not need to move the existing instance as you can install up to 50 instances on a SQL
Server 2005 database server.
D: You need to install the instance on NodeA not NodeB. You can install a new instance on
NodeA if you use a Named Instance.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Wednesday, January 4, 2012

Easy Methods to Abolish Computer Viruses

May possibly not be considered a fun activity scanning and removing a virus from your PC. Malicious programs can infect a PC through various mediums, the most prominent which are emails, removable media and wireless networks. Once you know how to get rid of viruses, measures can be taken to make sure that such viruses are identified and removed the moment they infiltrate.

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com


Getting Rid Of Viruses - Better Safe Than Sorry

One thing to know is what viruses are and what you can perform. Having knowledge about common infections allows the consumer to identify the virus by its symptoms on the PC. It is very important to know how Trojans, worms, spyware and adware infiltrate and infect the operating system. This step will help you prepare to get rid of virus infections quickly considering that the user will then be acquainted with the best way viruses work.

Be armed and ready while using latest available anti-virus. There are hundreds otherwise a large number of anti-virus software that now come in bundles and supply multiple services to your user. A good antivirus program comes full of firewalls, network monitors, file system scanner, anti-spyware, anti-adware, email scanners and internet stealth protection add-ons. Having the latest antivirus program trims the prospect of malicious activity occurring on any PC.


Having excellent anti-virus software will only be lucrative when you are updating it regularly. Automatic updates are readily available with whatever software you are using. Update the virus database weekly and if threat of infection is high, updating daily is suggested. Constant updates will ensure you will get rid of latest virus threats when they infiltrate the system.

Caution need to be taken when surfing websites, with there being some sites that demand installing certain add-ons and plug-ins. Other websites offer free software and screen savers when they're visited. Ensure you don’t download and run software that is certainly either not trusted or even the internet monitor cautions you to download. This usually gets rid of virus threats before they infect the operating system.

Email protection becomes necessary with the frequency of email viruses being greater than any other kind of virus type. Some emails tend to be pretty obvious, being a friendly invitation from a girl or a gift offer from Microsoft. Such emails mustn't be opened or nothing must bedownloaded from them. Viruses might also infiltrate a PC through emails from personal contacts, as a result it is criticalon an email monitor together with youranti-virus software.


Our recommendation is that all email activity should be carried outin rich text format and not inside the HTML format that email services are presently deploying. Viruses can attach themselves easily to HTML emails instead of text emails that are purely text and contain no items whichallow a virus to add itself to the email.

Yet another way viruses descend onto a PC is P2P software. It is highly recommended that software like Limewire, Gnutella, Bearshare and Torrents usually are not used. But if you must, at the very least have your firewall ready and burning to its most. P2P engines are only able to download information in chunks (this means you don’t know very well what is on its way in), hence enhancing the chance of an infiltration. So keep the firewall up rather than disable it, and always scan you’re completed downloads before opening them.

Freeware vs. Commercial

This all talk about having updated anti-virus programs and firewalls sounds a bit geeky, but it’s safer to be safe than allowing a virus epidemic on your PC. It is better to possess a commercial (i.e. paid) anti-virus when compared to a free one. Freeware anti-virus will usually identify viruses, but will lack the ability to clean the virus and can quarantine the files and not delete them, allowing the threat to escalate. Commercial software will always have complete features along with a well-organized virus database to combat the prevailing threats to escalate.