1. Question: What is the data type of the parameter "Audit_file_offset" of function "fn_get_audit_file()" in SQL Server 2008?

    A
    varchar

    B
    nvarchar

    C
    int

    D
    bigint

    Note: Not available
    1. Report
  2. Question: Which of the following queries is used to rename a database in SQL Server 2008?

    A
    sp_renamedb oldname,newname

    B
    sp_renamedb newname,oldname

    C
    sp_dbrename oldname,newname

    D
    sp_rename oldname,newname

    Note: Not available
    1. Report
  3. Question: Which of the following is the correct precedence order of the data types in SQL Server 2008? 1.xml 2.text 3.bigint 4.image 5.float 6.datetime

    A
    1,2,3,4,5,6

    B
    6,5,4,3,2,1

    C
    1,6,5,3,2,4

    D
    1,4,2,3,6,5

    Note: Not available
    1. Report
  4. Question: Suppose e1 and e2 denote two decimal expressions with precisions p1 and p2 and scales s1 and s2, respectively. What is the result precision of the following operation on the two expressions? Operation: e1 / e2

    A
    p1 - s1 + s2 + max(6, s1 + p2 + 1)

    B
    max(s1, s2) + max(p1 - s1, p2 - s2) + 1

    C
    p1 + p2 + 1

    D
    None of these

    Note: Not available
    1. Report
  5. Question: Which of the following is used to comment a portion of an SQL Server 2008 script?

    A
    Double asterisk (**)

    B
    Double forward slash (//)

    C
    Double dash (--)

    D
    Double back slash (\\)

    Note: Not available
    1. Report
  6. Question: Before you deserialize, you want to make sure that the XML you are about to deserialize will map into the class with which you instantiated this serializer. Which of the following methods will you use to verify this?

    A
    Deserizable

    B
    Compatible

    C
    Equals

    D
    CanDeserialize

    E
    None of these

    Note: Not available
    1. Report
  7. Question: Creating a hash with a public key encryption is the ability to verify the integrity of data without necessarily encrypting it. Which of the following are correct with regard to HASH?

    A
    The hash is a nearly unique digest of the message

    B
    The hash is encrypted using the public key of the sender

    C
    The encrypted hash serves as a signature of the sender and is sent separately from the decrypted message

    D
    The hash is the opposite of the usual process used in encryption, in which the public key is used to encrypt, and the plain text is not sent

    Note: Not available
    1. Report
  8. Question: Client access is accomplished via custom proxy classes that use the WebRequest and HttpWebRequest classes. Which kinds of .NET applications use these proxy classes?

    A
    Windows form

    B
    Web form

    C
    Web service

    D
    All of these

    Note: Not available
    1. Report
  9. Question: Which of the following is correct with regard to the statements given below? Statement 1: RPC-encoded clients are very similar to document-encoded ones. Statement 2: RPC-encoded clients need to set the Use property of the [SoapRpcMethod("http://mySoapAction")] attribute to indicate that this client is encoded, and not literal XML.

    A
    Statement 1 is true but statement 2 is false

    B
    Statement 1 is false but statement 2 is true

    C
    Both the statements are true

    D
    Both the statements are false

    Note: Not available
    1. Report
  10. Question: You are developing a Web service in ASP.NET. Which of the following .net classes will be extended by your service?

    A
    System.Web.WebService

    B
    System.Web.Service

    C
    System.Web.Services.Service

    D
    System.Web.Services.WebService

    E
    None of these

    Note: Answer not sure
    1. Report
Copyright © 2024. Powered by Intellect Software Ltd