1. Trang chủ
  2. » Công Nghệ Thông Tin

Question Bank COM+ and MSMQ

73 350 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Question Bank Com+ And Msmq
Trường học Unknown University
Chuyên ngành Computer Science
Thể loại Bài Tập
Năm xuất bản 2023
Thành phố Unknown
Định dạng
Số trang 73
Dung lượng 1,68 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

_________ applications were designed using a modular approach.

Trang 1

4. In the current scenario, applications are expected to have the following

b) High network operability d) Scalability

5. Which of the following options are true with respect to monolithic

applications?

[0.5]

a) They are time consuming c) It is an expensive

process.

b) Sharing of data is possible d) Change was very easy

6. In the Distributed Component approach, the single middle-tier application object has been perceived as several _ that can communicate with each other

[1.0]

Trang 2

b) Components d) Objects

7. The n-tier architecture talks about a logical architecture [0.5]

8. In Two-tier client server architecture, the business logic has to be

9. The middle tier can be hidden behind the firewall security of the

10 In Two-tier client server architecture, the _ controls the flow of

data between the database and the application [0.5]

11 In Distributed Component Approach, the interaction between

components and the environment is carried out through a Context Object

a) They behave like a black

box hiding the

implementation from the

outside world.

c) They can be used by locating it through its identity.

b) They encapsulate the data

and methods.

d) They are difficult to modify

Trang 3

13 The components in Distributed Component Approach require a

to run

[1.0]

a) Origin Server c) Content Server

b) Application Server d) Gateway Server

14 In n-tier architecture, the factor ‘n’ depends on the number of parts the

business logic is divided into

a) Server implements the rules

for data integrity.

c) Implementation of a powerful

hardware for the server does not enhance the reliability of the application

b) It prevents different data

integrity rules being

implemented by different

client applications.

d) Implementation of a powerful hardware for the server enhances the availability of the application.

17 To support the increase in load, an application needs to be highly

along with the additional hardware support

[1.0]

Trang 4

18 is a process of hiding the details about its operations from

c) Security

20 Which of the following is true for n-tier architecture? [1.5]

a) Due to division of

application logic into

multiple parts, scalability is

achieved.

c) More system resources are

not available to the application

b) The parts of the business

logic may reside on different

systems.

d) The middle tier objects are

able to communicate with each other

21 In three-tier architecture, the entire business logic of the application

physically resides on

[1.5]

b) Single machine d) Client, Server and Backend

22 In n-tier architecture, the number of parts obtained by dividing the

business logic are _ on/of each other

[1.5]

Trang 5

b) Large application may not

have the desired scalability

level.

d) The business logic, or the database type or schema can be changed without causing interruption to the clients.

24 The synonym for middle tier, in a three-tier client server architecture is

a) Statement 1 is true c) Both statements are true

b) Statement 2 is false d) Both statements are false.

26 Which of the following are true for a two-tier client server architecture? [2.0]

b) The presentation logic and

the business logic are

clubbed together as a client

application

d) The client holds the

database

Trang 6

27 Application architectures are part of of the OSI model [2.0]

28 Two-tiered systems can only access one database system at a time

Other database systems, mainframe applications, or other resources must be accessed through gateways

[2.0]

29 Which of the following are true in case of two-tiered architecture? [2.0]

a) Databases must not maintain

connections with each active

client

c) None of the options given

b) It is difficult to reuse

two-tiered application logic

broadly, because

applications are tightly

bound to specific database

systems and table formats.

d) Databases must maintain connections with each active client.

30 Busy web sites typically employ two or more _ in a

load-balancing scheme

[2.0]

31 VB (Visual Basic) from Microsoft is one of the tools that competes with

Trang 7

32 Which of the following is true for Data Access tier? [2.0]

a) It lies between Business tier

and Data tier c) It is used to provide interfaces to the database.

b) It lies between presentation

and Data tier

d) It is used to handle data input/output.

33 In a _ tiered architecture, contention can occur in the database

as many clients try to work on the same data concurrently

[2.0]

34 _ computing is where remote servers and clients cooperate

over the Internet to perform tasks

[2.0]

35 Which one of the following is true in case of a three-tier architecture? [2.0]

a) Thin client, Fat server c) Fat client

b) Fat client, Thin server d) Thin server

36 Statement1: Two-tiered security focuses on granting or denying users

access to data

Statement 2: Three-tiered security focuses on granting or denying access on a component-by-component basis

[2.0]

a) Statement 1 is true c) Both statements are true.

b) Statement 2 is false d) Both statements are false.

Trang 8

37 is a platform-independent, distributed, object-oriented system

for creating binary software components that can interact

[0.5]

38 COM is not a but a set of specifications [0.5]

a) Distributed Technology b) Programming Language

40 Different classes can implement the interfaces differently [0.5]

42 Components can implement Multiple interfaces [0.5]

43 _ is a variation of Remote Procedure Call (RPC) enabling

communication between two processes on the same machine [0.5]

Trang 9

44 RPC enables applications residing on different machines to

communicate with each other using a variety of network transport techniques

[0.5]

45 The function decides whether the component supports a

particular type of interface

50 Open Software Foundation defines as a 128-bit number to

identify the remote systems in a distributed computing environment’s remote procedure call

[1.0]

Trang 10

51 In Remote Process Server technique, the overheads in communicating

with the remote components are not high

[1.0]

52 In COM, the status of an operation is notified through the return value

of the function in a format known as HRESULT [1.0]

53 By providing binary standard for interoperability, COM enables

applications developed by multiple developers and vendors to communicate with each other

a) Language dependence for

developing the componentt

implementation of the component.

b) Reusable application

architecture

d) Language independence for developing the component

55 Which of the following are true in relation with IUnknown interface? [1.0]

specifications, it is mandatory

that every COM component

must support it

d) All the functions defined in

this interface are pure virtual functions

b) It is available by default for all

windows based systems

e) All of the above

c) It helps the client application to

Trang 11

scan for other interfaces

available in the component

56 Which are the three functions or methods supported by IUnknown

58 Which of the following types of COM components depend on the type

of container chosen and the location of the component?

[1.0]

b) Out-of-process server d) In-range server

59 The function decides whether the component supports a

particular type of interface

[1.0]

60 In-process server is a type of COM component, which is implemented

in the form of DLL files

[1.0]

a) Creation and use of reusable

component objects

d) A good foundation for

security at the object level

Trang 12

b) A single programming model

for developing components on

native and non-native

platforms

e) All of the above.

c) Optimum usage of the system

resources by encapsulating

the life-cycle management of

the object internally

62 Which are the standard interfaces to be implemented by COM that are

associated with the standard Ids and provide certain standard functionalities shared by most of the components developed by various component authors?

[1.5]

63 Which of the following are the advantages of the components created

a) Fully Language dependent c) Provides Location

Transparency

compatibility d) Fully independent Language

64 Which of the following are true in relation with an interface? [1.5]

a) Defines ways in which

components will talk to each

other.

c) Through few controls of interface, the user can use multiple functionalities.

b) Helps in hiding the business

logic used for developing

the object.

d) Does not enable the

interaction between different types of components of the system

Trang 13

65 Which of the following is true with regards to Interface pointer? [1.5]

a) It points to a group of pointers

wherein each pointer from the

group points to another group

of pointers

c) It points to a group of pointers.

b) It points to the interface

member functions d) Each pointer from the group of pointers points to

the interface member functions.

66 Which of the following are the advantages of using DLLs? [1.5]

a) The overheads involved in

memory allocation are

reduced.

languages.

b) Does not save disk space e) All of the above.

c) Upgradations are easy.

67 Which of the following is true for COM components in relation with

.EXE and DLL formats?

[1.5]

a) The executable codes for the

COM objects are placed in

the .EXE format or the .DLL

format

d) EXE and DLL are the file

extensions provided for the files under Windows operating system to identify them as executables and dynamic link libraries respectively

b) The DLLs or EXEs act as a

component server as they are

the means of component

distribution

e) All of the above

c) The EXE or DLL files act as

containers for the COM

component

Trang 14

68 Which of the following are true regarding a type of COM component

known as In-process server?

[1.5]

a) The overheads involved in

memory allocation increase c) Any change made to the DLL does not require the

client applications using it

69 The _ function returns a value of type HRESULT, which is

the COM error status code with a specific format, whereas the functions and _return ULONG i.e unsigned long values

70 Which of the following is the structure of GUID? [1.5]

a) typedef struct _GUID { // size

WORD Data2;

WORD Data3;

BYTE Data4[8];

WORD Data2;

WORD Data3;

BYTE Data4[4];

} GUID;

Trang 15

71 Statement 1: CLSID, a class ID is a GUID that names an interface.

Statement 2: IID, an interface ID is a GUID that names an interface

[2.0]

a) Statement 1 is false c) Statement 1 is true

b) Statement 2 is true d) Statement 2 is false

72 Statement 1: CLSID is a class ID or a GUID which is used to name a

coclass

Statement 2: IID, an interface ID is a GUID that names an interface

[2.0]

a) Statement 1 is false c) Statement 1 is true

b) Statement 2 is true d) Statement 2 is false

73 Statement 1: There is no selective inheritance in COM; if one interface

inherits from another, it includes all the methods that the other

interface defines

Statement 2: Inheritance in COM means only reusing code

[2.0]

a) Statement 1 is true c) Both statements are true

b) Statement 2 is false d) Both statements are false

74 Which of the following is true in relation with namespaces for

d) All of the above.

75 and are the two ways of packaging

components in COM

[2.0]

a) Hierarchical and Physical c) Global and Local

Trang 16

b) Hierarchical and Logical d) Logical and Physical.

76 Statement 1: In COM, all communication between clients and objects

occurs over methods defined on interfaces

Statement 2: Methods are implemented in classes, but defined on interfaces

[2.0]

a) Statement 1 is true c) Both statements are true

b) Statement 2 is false d) Both statements are false

77 Statement 1: HRESULT is a 32-bit signed integer with nonnegative

values indicating success

Statement 2: HRESULT is a 32-bit signed integer with nonnegative values indicating failure

[2.0]

a) Statement 1 is true c) Statement 1 is false

b) Statement 2 is true d) Statement 2 is false

78 Which are the two types of inheritance used by COM+? [2.5]

a) Interface inheritance c) Data inheritance

b) Implementation inheritance d) Class inheritance

79 Which of the following are true in relation with the IUnknown interface

a) Release() method tells the

COM object to increment its

reference count

d) AddRef() tells the COM

object to decrement its reference count

b) Release() method can be

called to tell the COM object

that it is no longer needed

e) All of the above.

c) Once Release() method is

called, we must not use the

interface pointer any more.

Trang 17

80 Which of the following are true with respect to COM? [2.5]

a) For COM, we can define a new

version of an old interface and

give it the same identifier

d) In COM, interface names usually starts with I.

b) The structure of COM

objects in memory just

happens to use the same

structure that is used by C++

virtual functions.

e) All of the above.

c) As COM is Win32-specific, it

could, in theory, be ported to

Unix or any other OS

81 HKEY_CLASSES_ROOT key is the basic requirement of COM

82 _ are application specific names and their corresponding

83 The component ID is not stored in the CLSID key [0.5]

84 In a windows registry, _ are the keys created within a key [0.5]

Trang 18

85 can be a decimal number, hexadecimal number or a string [0.5]

86 The files generated by the MIDL (Microsoft IDL) compiler can have an

89 The _ file contains the proxy/stub source that is used in local

process and remote components

[0.5]

90 HKEY_CLASSES_ROOT key holds the information about all the

registered components and file associations [0.5]

91 The _ file contains the GUID definitions of interfaces,

92 In DCOM, AppID is a sub key used for mapping a GUID to a

Trang 19

a) True b) False

93 The Windows registry, being a unified database, can store information

about the details of the users, and hardware of a system but cannot

store information about the applications installed in it

[1.0]

94 Which of the following are true with regards to Default Values? [1.0]

a) They are provided with a

specific name

c) They are unnamed values.

b) Each key can have only one

default key d) Each key can have more than one default key

95 _ key holds information about globally accessible data like

general configurations of the system and applications [1.0]

96 _ are application specific names and their corresponding

values

[1.0]

97 Which of the following keys belong to Windows registry? [1.0]

a) It is used to view the

contents of the registry.

c) It displays the registry contents in Registry

Trang 20

b) It is not a part of Windows

Operating System

d) It is a part of Windows Operating System.

99 Statement 1: The name.H file contains the definitions of the interfaces

in C++ language

Statement 2: The name_I.C file contains the GUID definitions of interfaces, components and type libraries

[1.0]

a) Statement 1 is true c) Both statements are true

b) Statement 2 is false d) Both statements are false

100 Which file is used as the language neutral library by the non-C++

client applications to communicate with the component server? [1.0]

101 Which are the .ini files in Windows 3.x systems that store the

information related to the system?

103 Statement 1: The DLLDATA.C file contains the proxy/stub source that

is used in local process and remote components

Statement 2: The name_P.C file contains the code to implement the proxy/stub DLL

[1.0]

a) Statement 1 is true c) Statement 1 is false

Trang 21

b) Statement 2 is true d) Statement 2 is false

104 Statement 1: Microsoft has provided non-C++ clients with Type

Libraries, which are language independent files to help them in using

the component technology

Statement 2: Using the type library, the non-C++ client applications can get the type information about the interfaces and functions supported by the component

[1.0]

a) Statement 1 is false c) Statement 1 is true

b) Statement 2 is true d) Statement 2 is false

105 Statement 1: The problem with ini files was that they could be lost or

corrupted at any point of time

Statement 2: To prevent problems with ini files that stored information

in a scattered way, Microsoft implemented the concept of registry

[1.5]

a) Statement 1 is false c) Statement 1 is true

b) Both the statements are false d) Statement 2 is true

106 Which of the following is true regarding the Windows registry? [1.5]

a) Information is organized in a

hierarchical structure

c) A key is the item that is

referenced by the application

b) Each item in the hierarchy of

information is called a key d) All of the above.

107 Which of the following is true regarding HKEY_CURRENT_USER

a) Holds information about the

user who has currently logged

Trang 22

or human readable identifier

for the class ids.

c) It is not easy to understand.

b) It is the programmer friendly

109 Consider a registry organization for Microsoft Word 2000 that has an

internal version as 9 Which of the following are true?

[1.5]

a) If the client application

needs to use the common

features of Microsoft Word,

it can use the version

independent ProgID.

c) If the client application needs to use the common features of Microsoft Word,

it can use the version dependent ProgID

b) If the client needs to use

the specific features of

d) All of the above

110 Which of the following is true with regards to the Interface Definition

Language (IDL)?

[1.5]

a) a) It is used to create the

interfaces in a language independent way

d) Microsoft adopted the

technology of the IDL for their Distributed Computing architecture and added few COM specific extensions to

Trang 23

support object-oriented features of COM

b) The files created by compiling

IDL files contain the C++

equivalent interface

definitions, GUID definitions

and other details

e) All of the above.

c) Open Software Foundation

(OSF) originally designed the

IDL for their Distributed

helpstring(“xyzinf

Interface”),

pointer_default(unique)

HRESULT Add ([in] int

x, [in] int y, [out] int* res);

};

c) import “abc.idl”

//Interface xyzinf Header

[

object, helpstring(“xyzinf Interface”)

pointer_default(unique) ]

//Interface xyzinf Definition

interface xyzinf : IUnknown

{

HRESULT Add ([in]

int x, [in] int y, [out] int* res) };

uuid(C6ED4D50-0000E2102452),

d) import “abc.idl”

//Interface xyzinf Header

[

object, uuid(C6ED4D50- 5E76-11d4-95A7-

Trang 24

helpstring(“xyzinf

Interface”),

pointer_default(unique)

HRESULT Add ([in] int

x, [in] int y, [out] int* res);

};

0000E2102452), helpstring(“xyzinf Interface”),

pointer_default(unique) ]

//Interface xyzinf Definition

interface xyzinf : IUnknown

{

HRESULT Add ([in]

int x, [in] int y, [out] int*

pointer_default(unique) ]

Which of the following are true with regard to the snippet above?

[1.5]

a) The contents within the

square brackets are a set of

MIDL attributes specifying

the characteristics of the

interface definition.

c) The attribute ‘uuid(…)’ specifies the interface ID (IID) to be associated with that interface

b) The attribute ‘helpstring(…)’

indicates that the interface is a

COM interface and directs the

MIDL compiler to generate the

proxy/stub code for that

interface

d) The attribute ‘object’ provides the description of the interface that will be placed in the type library

Trang 25

113 Consider the following IDL snippet.

//Interface xyzinf Definition

interface xyzinf : IUnknown

a) The ‘out’ attribute informs the

MIDL compiler that the

direction of the parameter is

from the client application to

the component server

c) The ‘in’ attribute specifies

that the direction of the parameter is from the component to the client application

b) The ‘in’ attribute ensures

that no return value is being

sent from the component to

the client through the

parameter.

d) The ‘out’ attribute ensures that no return value is being sent from the client

115 Statement 1: IID stands for an interface ID.

Statement 2: IID registers new interfaces by associating an interface name with an interface ID

[2.0]

a) Statement 1 is true c) Both statements are true

b) Statement 2 is false d) Both statements are false

116 Which of the following is true?

Statement 1:Version Independent ProgID refers to the currently

installed version of the application's class

Statement 2:Version Dependent ProgID refers to the currently installed version of the application's class

[2.0]

a) Statement 1 is true c) Both statements are true

Trang 26

b) Statement 2 is false d) Both statements are false

117 Which of the following are true in relation with ProgID? [2.0]

a) It can start with a digit and

have spaces

c) It can have a maximum of

39 characters.

b) It can contain no punctuation

including underscores except

one or more periods

d) Like the CLSID, the ProgID identifies a class, but with less precision.

118 Statement 1: File extensions are sub keys of the

HKEY_CLASSES_ROOT key

Statement 2:ProgIDs are the subkeys of the HKEY_CLASSES_ROOT key

[2.0]

a) Statement 1 is true c) Both statements are true

b) Statement 2 is false d) Both statements are false

119 Statement 1: The regedt32.exe editor provides the capability to view

and modify the registry permissions that allow and deny read-write

access to different users and user groups

Statement 2: The user interface for regedt32.exe and regedit.exe editor is the same

[2.0]

a) Statement 1 is true c) Both statements are true

b) Statement 2 is false d) Both statements are false

120 The following are the two statements regarding IDL file.

Statement 1: The server stub module provides entry points on the

client for each of the operations defined in the input IDL file

Statement 2: The client stub provides entry points on the server for each of the operations defined in the input IDL file

[2.0]

a) Statement 1 is true c) Statement 1 is false

b) Statement 2 is true d) Statement 2 is false

Trang 27

121 Statement 1: Object Description Language (ODL) is a scripting

language used to describe exposed libraries, objects, types, and

interfaces

Statement 2: The MIDL compiler compiles ODL scripts into type libraries

[2.0]

a) Statement 1 is true c) Statement 1 is false

b) Statement 2 is true d) Statement 2 is false

122 Which of the following is true regarding a type library [2.0]

a) It is a file having an extension

of tlb

c) Through it, an application or

browser can determine the interfaces an object supports, and invokes an object's interface methods even if the object and client applications were written in different programming languages

b) It is a binary file that stores

information about a COM or

DCOM object's properties and

methods in a form that is

accessible to other

applications at runtime

d) All of the above.

123 Which of the following is true regarding IDL file? [2.5]

a) It is a file that contains

interface and type library

definitions.

d) In it, the interface header

contains attributes that do not apply to the entire interface

b) It has an .idm file name

extension

e) The body of the interface contains the interface definitions.

Trang 28

c) In it, each interface consists

of a header and a body.

f) All of the above

124 Which of the following are true with regards to AppID key? [2.5]

a) It groups the configuration

options or a set of named

values for one or more

distributed COM objects into

one location in the registry.

c) It does not simplify the

management of common security and configuration settings

b) Subkeys under this key are

used to map an application

identifier to a remote server

name.

d) All of the above.

125 What is the right sequence of operations?

a With CLSID, COM can start an instance of the object

b After the ProgID is located, COM can determine the object CLSID

c COM binds the file to the object

d COM looks for the file extension key value that indicates where

it should look to find the ProgID for the COM object type

Trang 29

131 In Microsoft terms, a NET component that utilizes COM+ services is

132 A Network Load Balance (NLB) cluster helps in balancing the IP traffic

133 SQL Server does not use failover clustering [0.5]

134 Internet Information Server or IIS is installed as a network service in

Windows 2000 operating system

[0.5]

135 Microsoft’s Host Integration Server is responsible for accessing

existing legacy systems from Windows platform

[0.5]

Trang 30

136 SOAP allows access to services, objects and servers in a

platform-independent manner

[0.5]

137 Internet Security is a firewall used to protect LAN users from

unauthorized intrusion through Internet connection

[1.0]

a) Statement 1 is true c) Statement 1 is false

b) Statement 2 is false d) Statement 2 is true

139 Visual Studio.NET provides an application building tool for developing

applications using languages like VB.NET, C#, VC++ and JAVA

[1.0]

140 is a set of computers working together to run a single

application in order to make it continuously available even if a failure occurs

[1.0]

a) Universal Data Access

(UDA) Model allows any

type of data source like

mainframe databases,

b) Windows DNA uses UDA

model through ODBC

Trang 31

spreadsheets etc to be used

in the data-tier.

142 Which of the following is true regarding middle-tier in the DNA

architecture?

[1.0]

a) It is the business logic built

using COM+ components,

which have no visual

representation.

c) The COM+ components in it

must be written using only one language

143 Statement 1: Any COM-enabled client can use existing COM

components, once they are configured and deployed to make its capabilities available through the operating system

Statement 2: COM components like ADO interact with the data-tier to avail data services

[1.0]

a) Statement 1 is true c) Statement 1 is false

b) Statement 2 is false d) Statement 2 is true

145 Which of the following are the optional elements of Windows DNA? [1.0]

b) Site Server 3.0 d) Application Center Server

146 Which of the following are the elements of Windows DNA? [1.0]

a) Windows NT with its features

Trang 32

b) Site Server 3.0 d) ISA Server 2000

a) Two servers running in series

with each server configured to

take over the other in the

event of failure of one server

c) Two servers running in

series but do not take over the other server in the event

of failure of one server

b) Two servers running in

parallel with each server

configured to take over the

other server in the event of

failure of one server.

d) All of the above

148 Which of the following are true regarding ASP? [1.0]

a) Active Server Pages can

form a part of the

Presentation Tier.

c) Active Server Pages cannot

form a part of the Presentation Tier

b) Active Server Pages can

form a part of the middle-tier

or the business tier.

d) All of the above.

149 Statement 1: Microsoft.NET is a new platform, based on the idea of a

web service to make data available to the user from anywhere, and at

any time, using any device

Statement 2: Microsoft.NET is a multi-tiered architecture used to build distributed applications

[1.0]

a) Statement 1 is true c) Statement 1 is false

b) Statement 2 is false d) Statement 2 is true

a) Windows DNA stands for

Distributed interNet

c) It provides guidelines to build multi-tier, large-

Trang 33

application Architecture scale, enterprise-level,

mission-critical applications.

b) DNA is Microsoft’s solution

for building Distributed

Applications using Windows

2000 Operating System and

its native services.

d) Windows DNA does not

follow three-tier architecture

a) ODBC is a mechanism for

accessing RDBMS provided

by the same vendor only

d) Applications can interact with the OLE DB directly

or through ADO.

b) OLE DB is a set of COM

interfaces used to access

any type of data.

Directory helps clients in locating the components present in the middle-tier

or Business tier.

c) Windows DNA uses UDA

model through ODBC

152 Statement 1: Issues like scalability or availability were not taken care

of by the Transaction Processing Coordinators in case of mainframes

and minicomputers

Statement 2: Earlier in the original DNA, MTS served the purpose by allowing the COM components to be deployed and managed by an administrator However, nowadays it is done by COM+

[1.5]

a) Statement 1 is false c) Both statements are true

b) Statement 2 is true d) Both statements are false

153 Which of the following are true regarding NET Enterprise servers? [1.5]

a) Exchange Server 2000 is a

mail server, integrated with c) LCB is the feature of COM+ that allows the scaling of

Trang 34

Microsoft Active Directory and

IIS that supports only HTML

documents and no MIME

154 Which of the following are the ways of configuring COM+ services into

by making use of .NET framework SDK.

b) Configuring various property

settings programmatically

using coadmin.dll API

d) All of the above.

a) Availability refers to a failover

mechanism for different

processes

d) Microsoft’s Cluster Services

(MSCS) can be used to protect critical resources to make the application available all the time

b) SQL Server maintains a

transaction log, which can be

rerun in the event of a failure

e) All of the above

c) With Exchange Server,

messages are stored in the

server until they can be

delivered to the recipients

Trang 35

156 Which of the following are true regarding Autonomy, the design

objective for DNA?

b) It is an extension of the

concept of Inheritance e) All of the above

c) Earlier in DNA, MTS was a

tool for implementing

Autonomy through DTC

(Distributed Transactions

Coordinator).

a) SNA Server helps in

integrating applications across

platforms that pass data in the

form of messages

c) BizTalk Server 2000 helps

Windows platform to access legacy applications running

158 Which of the following are true with regards to Application Center

a) Statement 1 is true c) Statement 1 is false

b) Statement 2 is false d) Statement 2 is true

Trang 36

159 Statement 1: In Windows DNA, data-tier makes use of SQL Server to

manage relational data

Statement 2: In Windows DNA Data services are made available through the data-tier, which provides easy access to structured data through the ADO along with OLE DB and ODBC

[1.5]

a) Statement 1 is false c) Both statements are true

b) Statement 2 is true d) Both statements are false

160 Statement 1: Windows DNA enables organizations to build business

solutions to improve the flow of information within and without the

organization

Statement 2: Windows DNA enables organizations to build business solutions that can be centrally managed, maintained but cannot be integrated with existing systems and data

[2.0]

a) Statement 1 is true c) Both statements are true

b) Statement 2 is false d) Both statements are false

a) Microsoft introduced no-touch

deployment concept to make the need to register components in the system necessary

b) Microsoft introduced touch deployment concept

no-to eliminate problem referred to as DLL Hell

Windows systems.

162 Which of the following is true regarding the NET Framework? [2.0]

a) WinForms is a new forms

package that enables

b) In WinForms, data actually

runs on the server machine

Ngày đăng: 09/04/2013, 09:10

TỪ KHÓA LIÊN QUAN

w