Tuesday, January 31, 2012

Mozilla OKs Firefox 10 launch this week

Mozilla developers have given the green light to ship Firefox 10 on Tuesday.

Notes from a Mozilla meeting last week said that the upgrade was on for Jan. 31, the next ship date in the every-six-week schedule that the company adopted last year.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com



The new version includes one of the first components of Firefox's planned silent update mechanism: The browser automatically disables incompatible add-ons and marks all others as compatible.

Add-ons that work with Firefox 4 or later will be marked as compatible in Firefox 10, Mozilla said.

Complaints about incompatible add-ons have been common since Mozilla shifted to the faster release schedule, as add-on developers have been slow to revamp their code or at least mark their extensions as suitable for the newest browser.

Mozilla began automatically marking add-ons as compatible back in March 2011 when it launched Firefox 4, but limited that move to extensions distributed through its own website; the new feature in Firefox 10 does the same for all add-ons, including those not available from Mozilla.

According to the company, extensions offered outside its own download store account for 75% of all add-ons.

"Add-on compatibility has always been a huge barrier to releasing more often, so it was critical we have a plan that wouldn't leave add-ons or users behind," Justin Scott, who leads Mozilla's add-on team, said in a September 2011 blog post. "For this new [rapid-release] system to work, we wanted a compatibility process that didn't require developers to lift a finger unless their add-on was one of the few broken."

As Scott hinted, automatic add-on compatibility is one of several features Mozilla is working on so it can offer "silent updates" that upgrade Firefox in the background and without any user interaction. Other parts of the service will debut in future versions of the browser.

Mozilla's current plans are to complete silent update with Firefox 13, now set to launch on June 5.

Also on Tuesday, Mozilla will ship Firefox 3.6.26, a security update for that two-year-old browser. This week's update will be followed by two more before Firefox 3.6 is retired from support in late April.

Firefox 10 will also be the first edition in the Extended Support Release (ESR) line that Mozilla has created for enterprises that cannot -- or will not -- upgrade every six weeks. Firefox ESR will be upgraded every 42 weeks, or seven times slower than the "standard" build of the browser.

Friday, January 27, 2012

Cloud platform supports product development activities

OneDesk collects feedback and ideas from internal sources and social media; a new API allows it to integrate with apps from NetSuite, Oracle, SAP and Salesforce.com.

MCTS Certification, MCITP Certification

Microsoft Oracle Exam Training , Oracle Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com


When you talk about the sorts of internal collaboration activities that companies of any size need to support, those related to product development should be right up near the top of the list.

That’s why your organization might want to take a peek at a platform called OneDesk, a cloud-based application that is explicitly intended too coordinate product managers, engineers, marketing teams and even customer support professionals.

I spoke a few weeks back with Catherine Constantinides, one of the OneDesk team members, a few weeks back about how the platform might be used and the sorts of features that are included.

She describes it as a place for companies to declare and manage all the “needs requirements” associated with a given product or product development project.

Internally speaking, there are places to share ideas for the next releases, which can bubble up from anywhere. As some of these ideas are embraced for future features, the team can track the progress as well as any challenges or objections that might occurs along the way.

From an external perspective, OneDesk can be used to monitor and gather feedback about a product that is emerging in social media or social networks.

Ultimately, the main benefit is that all feedback — whether it is internal or external — can be gathered and searched from one location. “You can see all of the requirements, feedback and tasks associated with a particular product release,” Constantinides said. Then again, you can turn off any particular module that isn’t relevant to your organization.

There are two flavors of OneDesk, one that is free, which supports up to 30 people within a company (which is great if you are small small business) and that comes with up to 100 megabytes of data storage. OneDesk Pro will cost your organization $30 per user, per month. That essentially pays for the much larger storage capacity each users gets, up to 1 gigabyte per person.

For midsize businesses that need to worry about such things, OneDesk just released an application programming interface (API) that enables its application to be integrated with enterprise resource planning and CRM applications including Oracle, SAP, Salesforce.com and NetSuite (they aren’t the only applications supported, but are among the most relevant, of course).

Wednesday, January 25, 2012

The Internet Makes It Possible To Earn A Health Care Degree Online

Many people enjoy working in the health care field, the career being an attractive one for many reasons. After all, you're helping others, the job opportunities abound and the field of medicine is an exciting one that's developing constantly. A career in health care is an exciting one, with hands-on experience and being personally satisfying. However, individuals wanting to break into the medical world need strong credentials and up-to-date training to have good employment opportunities with hospitals, private practices and ambulatory care centers. Finding that training can be difficult, but there are options available, thanks to technology and a widening recognition of virtual instruction. Obtaining a health care degree online is a smart choice for landing satisfying employment.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com



Online education is transforming the way individuals receive instruction for top careers. The fields of opportunities are expanding and being able to earn your health care degree online is a perfect example of just how far education has come. Accredited universities and colleges provide high-quality instruction, leading to Bachelors and Masters Degrees that are recognized by employers. The training has a leading reputation amongst hospitals and health care facilities of all kinds, making individuals valuable assets to the medical field.


Obtaining your health care degree online can help with upward mobility on the ladder of success and increase job opportunities in the medical field. Expanding your education can improve communication skills and promote individual value to the mid-level management section, allowing students to respond to ever-widening community diversity. Interpreting and analyzing data as well as identifying human values, moral choices and fundamental beliefs are just part of what a health care degree online can provide to individuals. Courses within this field of online education touch on varied subjects, such as anatomy, legal issues, the aging process and research methods.

There are other reasons why pursuing a health care degree online is advantageous. Education in the virtual world allows students to easily balance studies with employment, meaning that individuals can continue to work and earn income while earning credits towards a degree in their own time. Home life, education and employment blend very easily, allowing students to combine all three areas of their lives without needing to take time off work to study or put off raising children to obtain an education. Also, pursuing an online degree allows individuals to save money on costs of transportation and commuting to educational facilities or having to pay for lodgings on or near a campus.


Employment opportunities in the health care field are continually broadening as the world's population ages. Research and technology allow people to live longer, providing ample careers to those who pursue a profession in the medical field. As our population of senior citizens continues to expand, the needs for skilled professionals able to tend to individuals increases and finding employment is usually easy, for those who have the qualifications and credentials of accredited educational facilities. Top schools and universities have responded to the demands and offer excellent, recognized training to students in a manner that matches the technological revolution of today's computer-based world.

Government offices continually demand high-quality workers and their predictions claim that having solid training is a must for those entering the health care world. Consumers and clients of hospitals, private practices, ambulatory care centers and home health agencies are also asking for better-quality care from those who tend to their needs. The advantages to earning a health care degree from a reputable educational facility are many and the long-term results will provide individuals with solid, satisfying and exciting careers.

Do you want to find out about how to remove tan? Browse the How To Remove Tan website. Read up on work experience ideas at the Work Experience Ideas site. Information on how to forget someone can be found at the How To Forget Someone site.

Tuesday, January 24, 2012

Microsoft's SQL Server 2012 to launch on March 7

Microsoft’s SQL Server 2012 database will launch on March 7.

The launch date for SQL Server 2012 is out of the bag: It’s March 7.

MCTS Certification, MCITP Certification

Best Microsoft MCTS Certification, Microsoft MCITP Training at examkingdom.com



On the SQL Server 2012 Launch site, Microsoft is featuring the agenda of the Webcast timed to coincide with launch.

(Launch, as Microsoft historians know, may or may not equate to general availability. RTM, or release to manufacturing, also may precede or follow product launches at Microsoft these days. In the case of SQL Server 2008 R2, Microsoft’s release to manufacturing (RTM) of the product preceded by about a month the date on which most customers could actually get the bits.)

Microsoft Server and Tools chief Satya Nadella revealed last fall that SQL Server 2012 (codenamed “Denali”) would launch in the early part of 2012. Microsoft delivered the final public test build of SQL Server 2012 in November 2011.

The March 7 launch event topic list includes everything from big data, to StreamInsight complex event processing, to the new data-visualization and analysis tools that are part of the SQL Server 2012 release.

Microsoft already has revealed much of its SQL Server 2012 pricing and licensing plans, including availability of a new business-intelligence (BI) SKU.

Monday, January 23, 2012

RIM's new CEO wants to focus more on consumers

RIM's new CEO, Thorsten Heins, wants the company to improve its product development while also becoming better at marketing, he said during a conference call on Monday.

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com


Heins is taking over from Mike Lazaridis and Jim Balsillie, who had co-CEO roles and will remain with the company.

"I pledge to do everything possible to exceed the expectations of all of the company's shareholders," said Heins.

RIM's decision to pick its new CEO from within the company makes it clear that it won't budge from current strategy, which is based on its acquisition of the QNX operating system, according to Geoff Blaber, analyst at CCS Insight. QNX is already used on its PlayBook tablet, and will also be used on its smartphones with the arrival of BlackBerry 10, Blaber said.

"Eighteen months ago Mike and Jim took a bold step when we had to make a major decision around our future platform, and they purchased QNX to shepherd the transformation of the BlackBerry platform for the next decade," Heins said. "Right now, with PlayBook 2.0 coming out in February, we are more confidant than ever that this was the right path to go."

At first, Heins will focus on improving the company's marketing efforts, which include hiring a new chief marketing officer as soon as possible, and the way it develops products.

"We need to be more marketing driven, and we need to be more consumer-oriented because that is where a lot of our growth is coming from," said Heins.

RIM will also change how it develops products. The company has been innovating while developing the products, and that needs to stop, Heins said.

Innovation will take place with much more emphasis on prototyping, and RIM has great teams that can try new ideas out, he said.

"But when we say a product is defined ... execution has to be really, really precise, with no churn in existing development programs," said Heins.

Heins didn't address rumors about RIM being acquired, but emphasized that its current model is the way forward.

"I will not in any way split this up or separate it into different businesses," said Heins, adding that while he will listen to anyone who wants to license BlackBerry 10, it is not his main focus.

Picking a new CEO from within was the right decision, according to analysts.

"Heins has been the COO for some time. He has been at RIM for over four years now, and he has been leading the current product transition," said Blaber. "It will be about delivering on the strategy they have already embarked on."

Pete Cunningham, analyst at market research company Canalys agreed: "RIM has been stagnating and needed an injection of fresh leadership."

Bringing someone in from the outside would have been riskier, according to Cunningham.

The big challenge now is to get BlackBerry 10 smartphones to market as soon as possible. In December, RIM said it would not start selling phones with the software platform until the "later part" of 2012, because it wanted to wait for the arrival of more advanced chipsets.

"It is hard to see that a change of leadership at the company can accelerate that schedule terribly much," said Cunningham.

Products based on the BlackBerry 10 platform were expected to arrive earlier, and the delay has hurt RIM, according to Blaber.

"The reality is that creating a new platform, albeit be it on a pre-existing operating system in QNX, was always going to take some time," said Blaber, who thinks that the development of the PlayBook distracted RIM's engineering department to the detriment of new smartphones.

Another of Heins' main challenges will also be to help RIM regain some of former glory in the U.S. The company watched its market share drop from 24 percent in the third quarter of 2010 to just 9 percent in the same period last year, according to Canalys.

However, the picture for RIM in other parts of the world is more positive. The Middle East and Africa and Southeast Asia were particular bright spots during the third quarter, Canalys said.

"There are a number of markets where BlackBerries are still selling really well, but the problem RIM has that everyone is focused on the U.S. market, and that is where is has taken a real beating," said Cunningham.

It is likely to get worse before its gets better for RIM. Just like vendors such as Sony Ericsson, Motorola Mobility and HTC RIM struggled during the fourth quarter.

RIM has its BlackBerry World conference coming up at the beginning of May. That will be one of the first opportunities for Heins to present his vision for the company, and bring back some excitement.

"But that will not be an easy job," said Cunningham.

Sunday, January 22, 2012

Microsoft gives details on mobile broadband improvements in Windows 8

Microsoft has given details on a variety of ways in which the upcoming Windows 8 operating system does a better job than its predecessors at letting users manage their connections to Wi-Fi and mobile broadband networks.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com



"We looked at the fundamentals of wireless connectivity and re-engineered Windows 8 for a mobile and wireless future, going beyond incremental improvements," reads a blog post published on Friday.

Windows 8 has been designed to simplify the process of connecting to mobile broadband networks and of managing those connections, including monitoring data usage and controlling costs.

"We knew that if we were to give you true mobility, that Wi-Fi alone would not be enough. Therefore, for Windows 8, we fully developed and integrated mobile broadband (MB) as a first-class connectivity experience within Windows -- right alongside Wi-Fi," wrote Billy Anders, a Microsoft group program manager and the blog post's author.

Windows 7 allows users to connect to mobile broadband networks, but it's up to users to find and install required drivers and software, including searching for them online at times.

Windows 8 comes with a common mobile-broadband class driver that works with devices from a variety of mobile operators and vendors, eliminating the need for users to install device driver software. "You just plug in the device and connect. The driver stays up to date via Windows Update," Anders wrote.

Another enhancement in Windows 8 is that it provides native management within a single console of mobile broadband device functions, such as turning on and off their radios and configuring their connection settings. Previously, users had to perform these tasks in the individual management application for each device.

"Prior to Windows 8, you needed these applications to compensate for functionality not provided natively in Windows. This additional software confused and frustrated users by conflicting with the Windows connection manager, showing different networks, network status, and a separate user interface," he wrote. "Windows 8 eliminates this confusion by providing simple, intuitive, and fully integrated radio and connection management."

Wi-Fi and Bluetooth device functions can also be managed centrally from within Windows 8. The operating system's network settings console also lets users establish connection priorities, so that their machine will automatically opt to, say, connect to a Wi-Fi network as the first option if available, and, if it's not, then seek a mobile broadband connection.

Windows 8 also "learns" about the user's connection priorities based on their actions. As a result, when returning from "standby" mode, a Windows 8 machine is able to reconnect faster than Windows 7 -- in about a second.

"You do not have to do anything special for this -- Windows just learns which networks you prefer and manages everything for you. This work was a major part of the architectural work we did in the networking stack and with our hardware partners," Anders wrote.

Windows 8 has also been designed to help users be aware of mobile broadband data limits and costs. "Prior to Windows 8, we maintained consistent behavior on all types of networks relative to bandwidth usage. With Windows 8, we now take the cost of the network into consideration: we assume that mobile broadband networks have restrictive data caps with higher overage costs -- vs. Wi-Fi --, and adjust networking behavior with these metered networks accordingly," the post reads.

To help with managing mobile broadband data usage and costs, the Windows 8 task manager lists how much data specific applications have used up, so users are aware of which applications consume more data.

Thursday, January 19, 2012

Oracle calls school's revised lawsuit over software project a 'transparent ploy'

Oracle is asking a judge to throw out some of the claims made in a lawsuit filed against the vendor by Montclair State University over an allegedly failed ERP (enterprise-resource-planning) software project, according to a filing made this week in U.S. District Court for the District of New Jersey.

MCTS Certification, MCITP Certification

Microsoft Oracle Exam Training , Oracle Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com


MSU sued Oracle in May 2011, blaming the vendor for a series of problems and delays on the PeopleSoft project, which was supposed to replace 25-year-old legacy applications. The parties had signed a US$15.75 million contract for software and implementation services in 2009.

The New Jersey school ended up firing Oracle and has said completing the project will cost up to $20 million more than the original budget. Oracle has countersued, seeking money it says MSU owes it and blaming school officials for the project's woes.

In December, the school filed an amended complaint that added new allegations, including that Oracle had conducted a "rigged" demonstration of the software package at issue.

Oracle's motion this week responds to that filing, asking that its allegations of fraudulent inducement, gross negligent misrepresentation, grossly negligent performance of contractual obligations and willful anticipatory repudiation of contract be dismissed.

The school's initial complaint "was premised on the alleged breach of the Consulting Agreement between Oracle and MSU," Oracle wrote in its filing this week. "Now, recognizing that there was no breach by Oracle and that the contract contains valid and enforceable limitations of liability, MSU has conjured up claims which completely contradict the allegations it filed initially."

This amounts to a "transparent ploy" that "fails as a matter of law because, try as it may, MSU cannot avoid the fully integrated, extensively negotiated contract which covers the exact terms that form the basis of MSU's new tort claims," Oracle added.

MSU's amended complaint includes claims of wrongdoing by Oracle that are "directly contradicted by a number of contractual provisions," according to the filing.

For example, the school had alleged that Oracle said its base PeopleSoft system for higher education institutions would satisfy 95 percent of MSU's more than 3,000 business requirements.

But "the Consulting Agreement makes clear, however, that 596 of the 3,071 requirements laid out in Attachment C-1 of the Fixed Price Exhibit were 'Not in Scope,' that 60 of the requirements were designated as 'Undefined,' and 52 of the requirements were to be met by customization of the base product," Oracle said. "Thus, the Consulting Agreement provides that roughly 23% of MSU's requirements were not to be met by the Oracle base product."

Oracle's motion also denies MSU's allegation that the software vendor misrepresented how much MSU staff and resources would be required to finish the project on Oracle's proposed schedule.

Once again, the parties' consulting agreement contradicts the allegation since its wording "put the onus on MSU, not Oracle, to assure that MSU had the required personnel and resources," the filing states.

If the school can provide documentation for all of its allegations in the 60-plus-page amended complaint, "they're going to be in a real strong position," but it's not yet clear how the case will play out, said one IT consultant and expert witness who has testified in several cases involving Oracle software.

For example, the amended complaint included a long list of original project requirements. "Many of them are stated in general enough terms that it's entirely possible there was a legitimate misunderstanding on the part of Oracle as to what those requirements involved," said the consultant, who requested anonymity because of current involvement in another case regarding Oracle.

To that end, Oracle's motion to dismiss cites an "assumption" in the consulting agreement regarding the project requirements.

If the base PeopleSoft product could do "what" a particular requirement called for, but not "how" MSU wanted it addressed, "it is MSU's responsibility to change MSU's business process to accommodate how the base product's business process addresses the requirement," the motion states.

"It's entirely possible when you look at what was delivered it will be a judgment call, rather than a clear-cut determination, as to whether what Oracle delivered met those requirements or not," the consultant said.

MSU plans to oppose Oracle's motion, according to a spokeswoman, who declined further comment.

Overall, the case presents a cautionary tale for vendors and software customers.

"This is why both sides should document the process," said analyst Ray Wang, CEO of Constellation Research. "When a project goes down, fingers point everywhere."

Tuesday, January 17, 2012

Microsoft is rated third most-valuable brand in the world, but there are dangers signs ahead

Microsoft was just rated the third most-valuable brand in the world by Interbrand, but there are trouble signs ahead. The company's brand value dipped 3%, the only top-tend brand to lose value in 2011. And both Apple and Google's value surged during the year, with Apple's value jumping 58% and Google's 27%. At this rate, Google will soon surpass Microsoft and Apple won't be far behind.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com



Interbrand rates the value of the top 100 global brands, and publishes that list every year. The value of Microsoft's brand, Interbrand found, was nearly $59.1 billion in 2011, down 3% from the year previous. It ranked behind Coca Cola, which was at number 1, and IBM at number 2.

Google came in at number 4, with a value of $55.3 billion. Its value surged 27% over last year. Its relative ranking is unchanged from last year.

Apple's value, meanwhile, skyrocketed 58% in the past year, to nearly $33.5 billion, jumping to number 8, up from 17 a year ago.

Microsoft has been the number 3 most valuable brand since 2008. From 2000 to 2007, it had been ranked number 2, so its value relative to IBM has dipped slightly in the past decade, which supplanted Microsoft at the number 2 spot in 2008.

If Google and Apple keep growing at the same rate in 2011, and Microsoft slips 3% again, next year Google will beat out Microsoft at the number 2 spot, and Apple won't be far behind.

Interbrand includes notes about each brand, and what it says about Microsoft accurately captures the company's dilemma. After noting that Microsoft dominates operating systems, server software, and office suites, Interbrand notes:

This is both a blessing and a curse as the future of computing moves to the mobile space. Competitors continue to lure customers with mobile applications that turn individual devices into ecosystems. Google's no-cost model will continue to put pressure on Microsoft's profit margins, and Google Apps could threaten the Microsoft Office business with its competing cloud integration and collaborative tools.

I don't agree that Google Apps will threaten Microsoft Office any time soon, but otherwise, I think Interbrand is on target. Interbrand also correctly rightly out that the Nokia deal, Windows 8, Kinect, and Xbox may help Microsoft in 2012.

Monday, January 16, 2012

Windows 8 is a big risk to the consumer PC industry

Windows 8 represents the biggest change between versions of the operating system on most consumer PCs, and for better or worse it is going to be very important for that industry.

MCTS Certification, MCITP Certification

Best Microsoft MCTS Certification, Microsoft MCITP Training at examkingdom.com



The consumer PC industry is in the doldrums, with sales down at bothersome levels and a near-tangible lack of enthusiasm in the air. The Ultrabook is launching in full force, and while that is intended to reignite consumer passion it alone is not going to do the trick. Windows 8 will launch in the consumer market with great fanfare this year, and how the average PC buyer will react to an OS that is such a radical departure from past versions of Windows is a big question mark.

Adopting the Metro interface in Windows 8 is a major effort by Microsoft to make the PC OS appeal to the average consumer, but it’s not a given what that reaction will be. Fact is, some consumers have an aversion to new things that are radically different from what they are used to, and that may be especially the case with PCs that many already find intimidating.

One risk Microsoft has taken with the move to such a radically different interface in Metro is the message it sends about current versions of Windows. In a way, it is an admission to consumers that Windows 7 and older versions are too outdated, and not good enough for today’s PC user. This may bite them if the reaction to Metro in the mainstream market is not positive at launch.

PC makers depend on new versions of Windows to jumpstart sales, as most consumers upgrade the OS by buying new systems. Systems with Windows 7 will still be available for a while, but Windows 8 is going to be needed to really get systems flying off the shelves. Windows 8 is so different, if buyers are reluctant to make such a big change then system manufacturers are going to be in a real pickle. They won’t sell new systems with Windows 8 due to the radical changes, and they might not be able to continue selling PCs with the older Windows if it’s viewed as too outdated.

Microsoft has a lot riding on the market acceptance of Windows 8, but it’s not alone. PC makers have even more to lose if the market has a knee-jerk reaction to the Metro style.

The marketing message from Microsoft better be well-thought out for Windows 8. Consumers need to believe it is so much easier, so much better that they have to have it. This is critical to market acceptance for something so different. If this is left up to the OEMs, the message will end up being confusing at best and negative at worst. It is the most important marketing campaign Microsoft has ever undertaken, and it better already be under careful construction.

If Microsoft and OEMs begin the Windows 8 message to address how it not only covers “regular” PCs but fancy tablets and other forms, massive confusion will follow. Consumers don’t want to run the same Windows on PCs and tablets, they are likely only in the market for one or the other at a given time. Multiple device support, Intel and ARM support, touch and non-touch support is not the message for consumers. Just show what the buyer can do with Windows 8, nothing else.

Windows 8 is a big risk to the consumer PC industry, and a lot is riding on it. Microsoft better get it ready like no other Windows before, and sell it the right way. I am excited by Windows 8 and the Metro interface, but I’m not who they need to sell. It’s all the people who haven’t even seen Windows Phone yet that they need to convince how good Windows 8 will be, and that’s most everyone.

Saturday, January 14, 2012

Lumia 900 release window confirmed

One of the hottest devices to be announced at CES 2012 was Nokia’s Lumia 900. Nokia and Microsoft already gave us the lowdown on the big brother of the Lumia 800, but one detail that they left out was a release date. All we had to go on was “the next few months.” Now it appears that we can narrow down that timeframe: the Lumia 900 will be launching on AT&T in March.

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com


The info was spilled via the Nokia Developer portal. In an otherwise typical press release announcing the Lumia 900, it is revealed that the Lumia 900 “will become available exclusively through AT&T in March.”

The Lumia 900 is, by most people’s measures, a gorgeous phone. Its polycarbonate build is complemented by a 4.3-inch display that uses ClearBlack technology for darker darks. Its software is the real deal too, sporting the latest edition of Windows Phone, version 7.5 Mango. The Lumia 900 will run on AT&T’s burgeoning LTE network.

Microsoft and Nokia wanted to wait until after the 2011 holiday season to launch the first fruits of its collaboration. This was allegedly because it wanted to have its own moment in the spotlight. This may prove to be a smart strategy: apart from maybe Intel’s Medfield announcement, the Lumia 900′s unveiling may have been the biggest smartphone news to come out of CES 2012. March shouldn’t be a crowded field for big smartphone releases, though the expected release of the iPad 3 will surely dominate tech headlines in that month.

There still isn’t any pricing info for the Lumia 900, but it would be wise for Nokia and AT&T to keep it at $200. Verizon’s annoying habit of pricing its new LTE phones at $300 may work for the Android fans who always want the latest-and-greatest. But it wouldn’t be a wise pricing strategy for a platform that’s still unfamiliar to most Americans. $200 would match it up evenly with the iPhone, which is a comparison that Microsoft and Nokia will gladly accept.

Friday, January 13, 2012

70-448 Q & A / Study Guide

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
You work as a database administrator at Certkingdom.com. The Certkingdom.com network contains a SQL Server
2008 database server named ABC-DB01, which hosts the SQL Server 2008 Reporting Services
(SSRS) instance.
During routine monitoring, you discover that this instance does not render any extensions for
Microsoft Office Word.
How would you modify the instance to render these extensions?

A. The Report Server database should be modified on ABC-DB01.
B. The RSReportServer.config file should be modified on ABC-DB01.
C. The XML configuration file should be modified onABC-DB01.
D. The Web.config file should be modified on ABC-DB01.

Answer: B

Explanation:


QUESTION 2
You work as a database administrator for Certkingdom.com. The Certkingdom.com network contains a SQL
Server 2008 database server named ABC-DB03.
You are in the process of designing a SQL Server 2008 Integration Services (SSIS) package for
the Certkingdom.com network. Certkingdom.com has informed you that ABC-DB03 will be hosting the package.
You receive an instruction from the CIO to devise a plan of action in the event that ABC-DB03
becomes inactive.
How can this be achieved?

A. The master database should be backed up.
B. You should back up ABC-DB03.
C. You should execute an incremental backup on a weekly basis.
D. The SSIS package should be backed up.

Answer: A

Explanation:


QUESTION 3
You work as a database administrator at Certkingdom.com. You are responsible for managing a SQL
Server 2008 database server named ABC-DB01.
You receive instruction that the SQL Server 2008 Reporting Services model needs to be deployed
on ABC-DB01 to support a data source that contains 800 tables for the Marketing division. You
have been tasked with developing a report model.
Which of the following options will make sure that the Marketing division is only able to access 10
tables? (Choose two)

A. A data source view should be developed.
B. The marketing division should be denied access to the other tables.
C. The tables and views the marketing division will not be using should be highlighted.
D. The tables and views the marketing division will use should be indicated.
E. The Dynamic Management View should be properly modified.

Answer: A,D

Explanation:


QUESTION 4
You work as a database administrator at Certkingdom.com. The Certkingdom.com network contains a SQL Server
2008 database server named ABC-DB01. ABC-DB01 is configured to host the SQL Server
Analysis Services (SSAS) role.
There is a dimension named Housing in ABC-DB01 that contains three properties named Slabs,
Cement and Bricks. The relationship between the properties is nonflexible. Currently a data source
is used that indicates the changes between the affiliations of the properties. You receive an
instruction from the CIO to ensure that any modifications will be reflected.
Identify the command that will help you to accomplish your task?

A. The ProcessDefault command
B. The ProcessAdd command.
C. The ProcessFull command.
D. The ProcessClear command.
E. The ProcessNone command.

Answer: A,D

Explanation:


QUESTION 5
You work as a database administrator at Certkingdom.com. Your duties include administering a SQL
Server 2008 Analysis Services (SSAS) sample named ABC-DB01.
You receive an instruction from the CIO to log all queries. You then decide to make the necessary
changes to the QueryLogconnection String feature.
What should your next step be?

A. You should modify the connection string to the default value.
B. A valid connection string should be set on ABC-DB01.
C. The source attribute should be set to 20.
D. You should set the default value using Discover_Query.

Answer: B

Explanation:


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Saturday, January 7, 2012

70-432 Q & A / Study Guide

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

QUESTION 4
You work as a database administrator at Certkingdom.com. Certkingdom.com is using a SQL Server 2008
instance. The SQL Server 2008 instance hosts quite a few applications. ABC also has a server
named ABC-SR43 that is used to store log files.
You have to set up a new job that stores log files on ABC-SR43. You create a new account
ABC\Log_Account. You set it up to be run by the SQL Server Agent Services.
However, your job fails to store any log files on ABC-SR43. After some investigation you notice
that the job does not have permissions to store files on ABC-SR43.
How should you remedy the situation? Select the best option.

A. You should set up ABC\Log_Accoun as a Remote Service account.
B. You should set up ABC\Log_Accoun as a Domain service account.
C. You should set up ABC\Log_Accoun as a Local Service account.
D. You should set up ABC\Log_Accoun as a Local System account.
E. You should set up ABC\Log_Accoun as a Network Service account.
F. You should set up ABC\Log_Account as a Domain account.

Answer: F

Explanation:
The service startup account defines the Microsoft Windows account in which SQL Server Agent
runs and its network permissions. SQL Server Agent runs as a specified user account. For
compatibility with earlier versions of SQL Server, SQL Server Agent can also run as the Local
System account.
In this scenario you should select a Domain account, which allows sufficient permissions and
improved security.


QUESTION 5
You work as a database administrator at Certkingdom.com. Certkingdom.com is using a SQL Server 2008
instance that has a table named ABC_Training. ABC_ Training contains a column named
ABC_Distance. A new Certkingdom.com training policy states that the training (ie. The ABC_Distance
column in the ABC_Training table) cannot be increased or decreased by more than 3%.
How should you implement the ABC Training Policy?

A. You should consider developing a view which rolls back non-compliant Certkingdom.com policy
changes to ABC_Distance.
B. You should consider developing a stored procedure which rolls back non-compliant Certkingdom.com
policy compliant changes to the ABC_Distance column.
C. You should consider developing a primary key constraint to the ABC_training table which only
contains valid values on ABC_Distance.
D. You should consider developing a create trigger which rolls back non-compliant Certkingdom.com
policy changes to the ABC_Distance column.
E. You should consider developing an update trigger which rolls back non-compliant Certkingdom.com
policy changes to the ABC_Distance column.
F. You should consider developing a delete trigger which rolls back non-compliant Certkingdom.com policy
changes to the ABC_Distance column.

Answer: E

Explanation:


QUESTION 6
You work as a database administrator at Certkingdom.com. Certkingdom.com is using a SQL Server 2008
instance that contains a database named ABC_DB. Certkingdom.com contains a lot of customer data
which is processed by the Web application. You need to keep the customer information safe since
it is confidential. This information includes files of data, backups, and log files.
How can this be achieved and still keep the performance and functionality of the web application?
Select one or two.

A. You should consider adding a transaction Log on ABC_DB, and set the information to be
encrypted for a fixed time.
B. Use BitLocker Drive Encryption on the hard drives on the SQL Server.
C. Use EFS (Encrypting File System) on the hard drives on the SQL Server.
D. You should consider enabling the Transparent Database Encryption on ABC_DB and back up
the transaction log.
E. You should consider enabling the Transparent Database Encryption on ABC_DB and enabling
the Transparent Database Encryption on master database.
F. Use cell-level encryption for the specific data that needs to be kept safe.

Answer: D

Explanation:
With the introduction of transparent data encryption (TDE) in SQL Server 2008, users now have
the choice between cell-level encryption as in SQL Server 2005, full database-level encryption by
using TDE, or the file-level encryption options provided by Windows. TDE is the optimal choice for
bulk encryption to meet regulatory compliance or corporate data security standards. TDE works at
the file level, which is similar to two Windows® features: the Encrypting File System (EFS) and
BitLocker™ Drive Encryption, the new volume-level encryption introduced in Windows Vista®,
both of which also encrypt data on the hard drive. TDE does not replace cell-level encryption,
EFS, or BitLocker.


QUESTION 7
You work as a database administrator at Certkingdom.com. Certkingdom.com is using two SQL Server 2008
sample named ABCSmp1 and ABCSmp2. Furthermore, ABCSmp1 contains a database named
ABC_DB. A Certkingdom.com user named Mia Hamm uses her logon MiaHamm to log on to the database
on ABCSmp1. During the week you have transferred ABC_DB to ABCSmp2. You manually
recreate the Mia Hamm login on ABCSmp2. However, when she tries to login on ABC_DB at
ABCSmp2, she received an error message stating that she is not allowed access. Mia Hamm
needs to access ABC_DB and you need to make it happen.
What T-SQL code should you use? (Each correct option is part of the answer. Choose TWO)

A. Use Certkingdom.com;
B. Use ABC_DB; *
C. Use ABCSmp1;
D. Use ABCSmp2;
E. ALTER LOGIN MiaHamm WITH DEFAULT_DATABASE = ABC_DB;
F. CHANGE LOGIN MiaHamm WITH DEFAULT_DATABASE = ABC_DB;
G. ALTER LOGIN MiaHamm WITH PASSWORD = 'pwd1234' UNLOCK;
H. CHANGE LOGIN MiaHamm WITH PASSWORD = 'pwd1234' UNLOCK;
I. CHANGE USER MiaHamm WITH LOGIN = MiaHamm;
J. ALTER USER MiaHamm WITH LOGIN = MiaHamm; *
K. ALTER LOGIN MiaHamm ENABLE;
L. CHANGE LOGIN MiaHamm ENABLE;

Answer: B,J

Explanation:


QUESTION 8
You work as a database administrator at Certkingdom.com. Certkingdom.com is using a SQL Server 2008 instance.
Your junior assistant is curious about on how to move a table, such as ABC_table, from its current
scheme (scheme1) to another scheme (scheme2)
How can you accomplish this in T-SQL?

A. You should consider using the following:
ALTER TABLE Schema1.ABC_Table SWITCH TO Schema2.ABC_table;

B. You should consider using the following:
ALTER AUTHORIZATION ON Schema1.ABC_Table TO Schema2;

C. You should consider using the following:
ALTER SCHEMA schema2 TRANSFER schema1.ABC_table;

D. You should consider using the following:
ALTER SCHEMA schema1 TRANSFER schema2.ABC_table;

E. You should consider using the following:
ALTER USER Schema1 WITH DEFAULT_SCHEMA = Schema2;

F. You should consider using the following:
MOVE ABC_Table FROM SCHEMA schema1 TO schema2

G. You should consider using the following:
MOVE ABC_Table FROM schema1 TO schema2

Answer: C

Explanation:
ALTER SCHEMA can only be used to move securables between schemas in the same database.
To change or drop a securable within a schema, use the ALTER or DROP statement specific to
that securable.


QUESTION 9
You work as a database administrator at Certkingdom.com. Certkingdom.com is using a SQL Server 2008
instance. You have received instructions from management to allow the users at Certkingdom.com on the
SQL Server sample to use the OPENROWSET() function to search remote information sources.
You study incomplete code in the exhibit carefully. (Line numbers are used for reference purposes only)
Exhibit:
01. sp_configure 'show advanced options', 1
02. RECONFIGURE
03.
04. RECONFIGURE
05. GO
06.
07. SELECT a.*
08. FROM OPENROWSET('SQLNCLI', 'Server=Madrid;Trusted_Connection=yes;',
09. 'SELECT GroupName, Name, DepartmentID
10. FROM AdventureWorks.HumanResources.Department
11. ORDER BY GroupName, Name') AS a;
12. GO
Which T-SQL statement should you insert at line 03 to make the batch meet the requirement in
this scenario?

A. sp_configure 'Router control', 1
B. sp_configure 'Router control', 0
C. sp_configure 'Transaction Logs', 1
D. sp_configure 'Transaction Logs', 0
E. sp_configure 'Ad Lib Distributed Queries ', 1
F. sp_configure 'Ad Lib Distributed Queries ', 0
G. sp_configure 'Ad Hoc Distributed Queries', 1
H. sp_configure 'Ad Hoc Distributed Queries', 0

Answer: G

Explanation:
By default, SQL Server does not allow ad hoc distributed queries using OPENROWSET and
OPENDATASOURCE. When this option is set to 1, SQL Server allows ad hoc access. When this
option is not set or is set to 0, SQL Server does not allow ad hoc access.
Ad hoc distributed queries use the OPENROWSET and OPENDATASOURCE functions to
connect to remote data sources that use OLE DB. OPENROWSET and OPENDATASOURCE
should be used only to reference OLE DB data sources that are accessed infrequently. For any
data sources that will be accessed more than several times, define a linked server.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Thursday, January 5, 2012

70-431 Q & A / Study Guide

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
You work as the database administrator at CertKingdom.com. The CertKingdom.com network consists of
a single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run Windows 2000 Server. The CertKingdom.com network contains a SQL Server 2000 database
server named CERTKINGDOM-DB01 that runs on Windows 2000 Server. CERTKINGDOM-DB01
contains a database named CKD_Sales.
CertKingdom.com intends migrating CERTKINGDOM-DB01 to SQL Server 2005 in the near future. To
prepare for the migration, you decide to install SQL Server 2005 Express on a server named
CERTKINGDOM-SR31. You verify that CERTKINGDOM-SR31 exceeds the minimum recommended
hardware requirements for SQL Server 2005.
What should you do next?

A. Upgrade CERTKINGDOM-SR31 to Windows Sever 2003 and install Service Pack 1.
B. Install and run the SQL Server Upgrade Advisor on CERTKINGDOM-SR31.
C. Install SQL Server 2000 on CERTKINGDOM-SR31.
D. Download and install the .NET Framework 2.0.

Answer: D

Explanation:
SQL Server 2005 requires the.NET Framework 2.0. This is automatically installed when SQL
Server 2005 is installed but is not automatically installed when SQL Server 2005 Express is installed.

Incorrect Answers:
A: You do not need to upgrade CERTKINGDOM-SR31 to Windows Sever 2003 Service Pack 1 as
SQL Server 2005 Express can be installed on Windows 2000 Server. You will need to install
Service Pack 4 for Windows 2000 Server though.
B: You should run the SQL Server Upgrade Advisor when you want to upgrade an instance of a
SQL Server 2000 database to SQL Server 2005.
C: You do not need to install SQL Server 2000 before installing SQL Server 2005 Express.

Reference: Microsoft SQL Server 2005 Books Online (2006), Index: installing SQL Server
Express, before installing


QUESTION 2
You work as a database administrator at CertKingdom.com. The CertKingdom.com network consists of a
single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run Windows Server 2003 with the latest Service Packs and Hotfixes, while the client computers
run Windows XP Professional, Windows 98 Second Edition, and Novell NetWare 6.5.
You install SQL Server 2005 on a member server named CERTKINGDOM-SR21. CERTKINGDOMSR21
will host a database named CKD_Sales. All CertKingdom.com users must be able to connect to
CERTKINGDOM-SR21 by computer name. A CertKingdom.com network administrator named Rory Allen
must ensure that the client computers will be able to connect to CERTKINGDOM-SR21.
Which protocols can CertKingdom.com users use to CERTKINGDOM-SR21?

A. TCP/IP and Named Pipes
B. TCP/IP and IPX/SPX
C. Virtual Interface Adapter (VIA)
D. Shared Memory

Answer: A

Explanation:
By default, clients have TCP and Named Pipes as available protocols. You can manipulate the
protocol ordering by using the SQL Server Client utility. The client application uses the protocols
in the order specified on the client computer. If you are using SQL Server 2005, the protocol order
is stored in the ProtocolOrder registry entry under the following registry subkey:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSSQLServer\Client\SNI9.0
Incorrect Answers:
B: SQL Server 2005 does not support IPX/SPX. The newer versions of NetWare, such as
NetWare 6.5, support TCP/IP which makes it the common protocol for all clients.
C: The Virtual Interface Adapter (VIA) can be used only by VIA hardware.
D: Shared Memory can only be used on the local computer and cannot be used as a network protocol.

Reference:Microsoft SQL Server 2005 Books Online (2006), Index: client connections
[SQL Server], about client network connections, choosing a network protocol


QUESTION 3
You work as the database administrator at CertKingdom.com. The CertKingdom.com network consists of
a single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run Windows 2000 Server. The CertKingdom.com network contains a SQL Server 2000 database
server named CERTKINGDOM-DB01 that runs on Windows 2000 Server. CERTKINGDOM-DB01
contains a database named CKD_Sales.
CertKingdom.com intends migrating CERTKINGDOM-DB01 to SQL Server 2005 in the near future. To
prepare for the migration, you decide to install SQL Server 2005 Express on a server named
CERTKINGDOM-SR23. CERTKINGDOM-SR31 was used for previously used by application developer
and contains Microsoft Visual Studio 2003, .NET Framework 1.2 and Internet Explorer 5.5. You
verify that CERTKINGDOM-SR23 exceeds the minimum recommended hardware requirements for
SQL Server 2005.
What should you do next? (Each correct answer provides part of the solution. Choose THREE.)

A. Upgrade CERTKINGDOM-SR23 to Windows Sever 2003 and install Service Pack 1 for Windows Sever 2003.
B. Install Service Pack 4 for Windows 2000 Sever on CERTKINGDOM-SR23.
C. Upgrade the .NET Framework 1.2 to .NET Framework 2.0 on CERTKINGDOM-SR23.
D. Uninstall the .NET Framework 1.2 and install the .NET Framework 2.0 on CERTKINGDOM-SR23.
E. Upgrade Internet Explorer 5.5 to Internet Explorer 6.0 and install Service Pack 1 for Internet
Explorer 6.0 on CERTKINGDOM-SR23.
F. Upgrade Microsoft Visual Studio 2003 to Microsoft Visual Studio 2005 and install Service Pack
1 for Microsoft Visual Studio 2005 on CERTKINGDOM-SR23.

Answer: B,D,E

Explanation:
SQL Server 2005 requires Service Pack 4 for Windows 2000 Sever, Internet Explorer 6.0 with
Service Pack 1 and the .NET Framework 2.0. The .NET Framework 2.0 is automatically installed
with other versions of SQL Server 2005 but is not automatically installed with SQL Server 2005
Express. You can upgrade .NET Framework 1.0 and upgrade .NET Framework 1.1 to .NET
Framework 2.0 but .NET Framework 1.2 must be uninstalled first.
Incorrect Answers:
A: You do not need to upgrade CERTKINGDOM-SR31 to Windows Sever 2003 Service Pack 1 as
SQL Server 2005 Express can be installed on a Windows 2000 Server once you install Service
Pack 4 for Windows 2000 Server.
C: You can upgrade .NET Framework 1.0 and upgrade .NET Framework 1.1 to .NET Framework
2.0 but .NET Framework 1.2 must be uninstalled first.
F: SQL Server 2005 Express does not require any version of Microsoft Visual Studio.
Reference:Microsoft SQL Server 2005 Books Online (2006), Index: installing SQL Server
Express, before installing


QUESTION 4
You work as a database administrator at CertKingdom.com. The CertKingdom.com network consists of a
single Active Directory domain named CertKingdom.com.
You have received instruction from the CIO to prepare a new installation of SQL Server 2005. The
new SQL Server 2005 database server is named CERTKINGDOM-DB01. A CertKingdom.com user
named Mia Hamm is a member of the Marketing department. You instruct her to identify the
protocols that the client computers might use to connect to the server. Mia Hamm needs to identify
the protocols that are needed to accomplish this goal.
What should she identify? (Choose all that apply)

A. She should use the Multiprotocol.
B. Mia Hamm should use the Named Pipes.
C. She should use the Shared Memory.
D. She should use the TCP/IP
E. Mia Hamm should use the Virtual Interface Adapter (VIA).

Answer: B,D

Explanation:
The clients have by default TCP and Named Pipes as available protocols. You can make use of
the SQL Server Client utility to manipulate the protocol ordering. The client application uses the
protocols in the order specified on the client computer. When you make use of the SQL Server
2005, the protocol order is stored in the ProtocolOrder registry entry under the following registry
subkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSSQLServer\Client\SNI9.0
Incorrect Answers:
C: Shared Memory can only be used on the local computer and cannot be used as a network
protocol.
E: The Virtual Interface Adapter (VIA) can be used only by VIA hardware.Reference:Microsoft SQL
Server 2005 Books Online (2006), Index: client connections [SQL Server], about client network
connections, choosing a network protocol


QUESTION 5
You work as the database administrator at CertKingdom.com. The CertKingdom.com network consists of
a single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run Windows 2000 Server. The CertKingdom.com network contains a SQL Server 2000 database
server named CERTKINGDOM-DB01 that runs on Windows 2000 Server Service Pack 4.
CERTKINGDOM-DB01 contains a database named CKD_Trading.
CertKingdom.com wants to migrate CERTKINGDOM-DB01 to SQL Server 2005 but wants to retain the
CKD_Trading database with the same instance name. You decide to perform an in-place upgrade to
SQL Server 2005. You verify that CERTKINGDOM-DB01 exceeds the minimum recommended
hardware requirements for SQL Server 2005.
What should you do next?

A. Upgrade CERTKINGDOM-DB01 to Windows Sever 2003 Service Pack 1.
B. Run the SQL Server Upgrade Advisor on CERTKINGDOM-DB01.
C. Detach the CKD_Trading database on CERTKINGDOM-DB01.
D. Run the SQL Server 2005 Setup utility.

Answer: B

Explanation:
Before you perform an in-place upgrade of an existing database, you should run the SQL Server
Upgrade Advisor. The SQL Server Upgrade Advisor produces a list of items that must be
addressed before and after performing the upgrade. This list of items is specific to the existing
installation.
Incorrect Answers:
A: You do not need to upgrade CERTKINGDOM-DB01 to Windows Sever 2003 Service Pack 1 as
SQL Server 2005 can be installed on Windows 2000 Server with Service Pack 4.
C: You need to detach a database when you need to move the database to another database
instance or another database server. You do not need to detach the database before performing
an in-place upgrade.
D: You should run the SQL Server Upgrade Advisor before you run the SQL Server 2005 Setup
utility. The SQL Server Upgrade Advisor produces a list of items that must be addressed before
and after performing the upgrade. This list of items is specific to the existing
installation.Reference:Microsoft SQL Server 2005 Books Online (2006), Index: updating
databases, detaching and attaching databases


QUESTION 6
You work as the database administrator at CertKingdom.com. The CertKingdom.com network consists of
a single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run Windows 2000 Server. The CertKingdom.com network contains a SQL Server 7.0 database server
named CERTKINGDOM-DB01 that runs on Windows 2000 Server. Service Pack 4 for Windows 2000
Server id installed on CERTKINGDOM-DB01.
CertKingdom.com wants to migrate CERTKINGDOM-DB01 to SQL Server 2005. You decide to perform
an in-place upgrade to SQL Server 2005. You verify that CERTKINGDOM-DB01 exceeds the
recommended hardware requirements for SQL Server 2005.
What should you do next?

A. Upgrade CERTKINGDOM-DB01 to Windows Sever 2003.
B. Install Service Pack 4 for SQL Server 7.0 on CERTKINGDOM-DB01.
C. Upgrade SQL Server 7.0 on CERTKINGDOM-DB01 to SQL Server 2000.
D. Run the SQL Server 2005 Setup utility on CERTKINGDOM-DB01 and upgrade directly to SQL
Server 2005.

Answer: B

Explanation:
You can upgrade from SQL Server 7.0 with Service Pack 4 directly to SQL Server 2005. Thus you
need only install Service Pack 4 for SQL Server 7.0.
Incorrect Answers:
A: You do not need to upgrade CERTKINGDOM-DB01 to Windows Sever 2003 as SQL Server 2005
can be installed on Windows 2000 Server with Service Pack 4.
C: You do not need to upgrade CERTKINGDOM-DB01 to SQL Server 200 as SQL Server 7.0 with
Service Pack 4 can be upgraded directly to SQL Server 2005. Besides, you will need to install
Service Pack 3 for SQL Server 2000 before you can upgrade it to SQL Server 2005.
D: You need to install Service Pack 4 for SQL Server 7.0 before you can upgrade it directly to SQL
Server 2005.Reference:Microsoft SQL Server 2005 Books Online (2006), Index: upgrading SQL
Server, upgrading to SQL Server 2005


QUESTION 7
You work as the database administrator at CertKingdom.com. The CertKingdom.com network consists of
a single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run Windows Server 2003 and all client computers run Windows XP Professional. The
CertKingdom.com network contains two SQL Server 2000 database servers named CERTKINGDOMDB01
and CERTKINGDOM-DB02 that are configured for log shipping. CERTKINGDOM-DB01 is the
primary server and hosts a database named CKD_Trading. Both CERTKINGDOM-DB01 and
CERTKINGDOM-DB02 have Service Pack 3 for SQL Server 2000 installed.
CertKingdom.com wants to upgrade CERTKINGDOM-DB01 and CERTKINGDOM-DB02 to SQL Server
2005 Enterprise Edition but the CKD_Trading database must remain available during the upgrade
process. You verify that both CERTKINGDOM-DB01 and CERTKINGDOM-DB02 exceed the
recommended hardware requirements for SQL Server 2005 Enterprise Edition. You then install
Service Pack 1 for Windows Server 2003 on CERTKINGDOM-DB01 and CERTKINGDOM-DB02.
What should you do next?

A. Install Service Pack 4 for SQL Server 2000 on both database servers.
B. Enable failover in the SQL Server 2000 log shipping configuration and upgrade CERTKINGDOMDB02
to SQL Server 2005.
C. Run the Database Maintenance Plan Wizard on CERTKINGDOM-DB01 to upgrade it to SQL
Server 2005.
D. Upgrade CERTKINGDOM-DB02 to SQL Server 2005 and then upgrade CERTKINGDOM-DB01 to
SQL Server 2005.

Answer: B

Explanation:
SQL Server 2005 does not support the Database Maintenance Plan Wizard which was integral to
log shipping in SQL Server 2000. Hence, log shipping stops functioning when you upgrade a SQL
Server 2000 log shipping configuration directly to SQL Server 2005. To upgrade log shipping to
SQL Server 2005, you must migrate the database servers to SQL Server 2005. If you want the
database to remain available during the migration process, you must migrate with failover. To
migrate with failover you must enable failover and upgrade CERTKINGDOM-DB02. Then you need
to failover to CERTKINGDOM-DB02 and upgrade CERTKINGDOM-DB01. Then configure log shipping
with the CERTKINGDOM-DB02 becoming the primary server and CERTKINGDOM-DB01 becoming the
secondary server.
Incorrect Answers:
A: You do not need to install Service Pack 4 for SQL Server 2000 on the database servers as SQL
Server 2000 with Service Pack 3 can be upgraded to SQL Server 2005. However, SQL Server
2005 does not support the Database Maintenance Plan Wizard which was integral to log shipping
in SQL Server 2000. Hence, log shipping stops functioning when you upgrade a SQL Server 2000
log shipping configuration directly to SQL Server 2005.
C: SQL Server 2005 does not support the Database Maintenance Plan Wizard which was integral
to log shipping in SQL Server 2000. Hence, log shipping stops functioning when you upgrade a
SQL Server 2000 log shipping configuration directly to SQL Server 2005.
D: Removing log shipping from CERTKINGDOM-DB02 and upgrading CERTKINGDOM-DB01 to SQL
Server 2005 will not ensure that the CKD_Trading database remains available. Reference:Microsoft
SQL Server 2005 Books Online (2006), Index: log shipping [SQL Server], upgrading


QUESTION 8
You work as the database administrator at CertKingdom.com. The CertKingdom.com network consists of
a single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run Windows Server 2003. The CertKingdom.com network contains a Domain Controller named
CERTKINGDOM-DC01 and a member server named CERTKINGDOM-SR21.
CertKingdom.com wants to implement a SQL Server 2005 database that will store sales data. All
CertKingdom.com users will require access to the Sales_DB database. You have been instructed to
install SQL Server 2005 on CERTKINGDOM-SR21 and to create a database named Sales_DB. You
need to ensure that CertKingdom.com users and applications can connect to the database instance by
using only the computer name.
What should you do during the installation of SQL Server 2005 on CERTKINGDOM-SR21?

A. Select the Named Instance and use MSSQLSERVER as the instance name.
B. Select the Named Instance and use CERTKINGDOM-DC01 as the instance name.
C. Select the Default Instance and accept the default instance name.
D. Select the Named Instance and use CERTKINGDOM-SR21 as the instance name.

Answer: C

Explanation:
To ensure that users and applications can connect to the instance using the computer name, you
should select the Default Instance and accept the default instance name, MSSQLSERVER.
Incorrect Answers:
A: You cannot use a Named Instance as users and applications will need to specify the server
name and the instance name when connection to the database.
B: You cannot use a Named Instance as users and applications will need to specify the server
name and the instance name when connection to the database.
D: You cannot use a Named Instance as users and applications will need to specify the server
name and the instance name when connection to the database.


QUESTION 9
You work as the database administrator at CertKingdom.com. The CertKingdom.com network consists of
a single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run on Windows Server2003 while the client computers run Windows XP Professional, Windows
98 Second Edition, and Novell NetWare 6.5. All computers are members of the CertKingdom.com
Active Directory domain. The CertKingdom.com network contains a SQL Server 2005 database server
named CERTKINGDOM-DB01 that hosts a database instance named MSSQLSERVR.
CertKingdom.com wants to implement another SQL Server 2005 instance for a database named
Sales_DB. Sales_DB will store sales data for the company. All CertKingdom.com users will require
access to the Sales_DB database. You have been instructed to create the SQL Server 2005
instance for the Sales_DB database. You need to ensure that all users will be able to connect to
the Sales_DB database. You cannot make configuration changes to the client computers. Your
solution must optimize network traffic.
What should you do?

A. Install the instance as a Named Instance and configure it to support Mixed Mode
Authentication. The enable TCP/IP for the instance.
B. Install the instance as a Default Instance and configure it to support Windows Authentication.
The enable TCP/IP for the instance.
C. Install the instance as a Named Instance and configure it to support SQL Authentication. The
enable IPX/SPX for the instance.
D. Install the instance as a Default Instance and configure it to support Windows Authentication.
The enable IPX/SPX for the instance.

Answer: A

Explanation:
The default instance is named MSSQLSERVER. This instance name is already in use; therefore
you should use a Named Instance. You should use Mixed Mode Authentication to support
NetWare users.
Incorrect Answers:
B: You cannot use the Default Instance as the default instance is named MSSQLSERVER and is
already in use. Furthermore, you need to use Mixed Mode Authentication as Windows
Authentication does not support NetWare users.
C: You can use SQL Authentication, but this will require that you create SQL Logins for all users
and groups. It would be easier to use Windows Authentication for clients that user Windows XP
Professional and Windows 98 SE, and create SQL Logins for the NetWare 6.5 users. Also, SQL
Server 2005 does not support IPX/SPX. The newer versions of NetWare, such as NetWare 6.5,
support TCP/IP which makes it the common protocol for all clients.
D: You cannot use the Default Instance as the default instance is named MSSQLSERVER and is
already in use. Furthermore, you need to use Mixed Mode Authentication as Windows
Authentication does not support NetWare users. Also, SQL Server 2005 does not support
IPX/SPX. The newer versions of NetWare, such as NetWare 6.5, support TCP/IP which makes it
the common protocol for all clients.


QUESTION 10
You work as the database administrator at CertKingdom.com. The CertKingdom.com network consists of
a single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run on Windows Server2003 and all client computers run Windows XP Professional. The
CertKingdom.com network contains two SQL Server 2005 database servers that are configured in a
cluster with two nodes named NodeA and NodeB. NodeA hosts a default database instance
named MSSQLSERVR.
CertKingdom.com wants to implement another SQL Server 2005 instance for a database named
Sales_DB. Sales_DB will store sales data for the company. All CertKingdom.com users will require
access to the Sales_DB database. You have been instructed to create the SQL Server 2005
instance for the Sales_DB database on Node
A. You need to ensure that all users will be able to
connect to the Sales_DB database.
What should you do?

A. Run the SQL Server 2005 Setup utility on NodeA and select a Named Instance for the
Sales_DB database.
B. Run the SQL Server 2005 Setup utility on NodeA and select the Default Instance for the
Sales_DB database.
C. Move the existing instance from NodeA to NodeB. Run the SQL Server 2005 Setup utility on
Node
A. Select the Default Instance and accept the default instance name
D. Run the SQL Server 2005 Setup utility on NodeB and select a Named Instance for the
Sales_DB database.

Answer: A

Explanation:
The default instance is named MSSQLSERVER. This instance name is already in use on NodeA;
therefore you should use a Named Instance.
Incorrect Answers:
B: You cannot use the Default Instance as the default instance is named MSSQLSERVER and is
already in use.
C: You do not need to move the existing instance as you can install up to 50 instances on a SQL
Server 2005 database server.
D: You need to install the instance on NodeA not NodeB. You can install a new instance on
NodeA if you use a Named Instance.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Tuesday, January 3, 2012

70-642 Study Guide

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Table of Contents

Table of Contents................................................................................................................ 1

Course Overview ................................................................................................................ 3

Section 0.1: Introduction..................................................................................................... 5

Section 0.2: Server Management ........................................................................................ 6

Section 0.3: Remote Management ...................................................................................... 7

Section 0.4: Mathematical Foundations.............................................................................. 8

Section 1.1: IPv4 Addressing.............................................................................................. 9

Section 1.2: IPv4 Subnetting............................................................................................. 10

Section 1.3: IPv4 Host Configuration............................................................................... 11

Section 2.1: IPv6............................................................................................................... 12

Section 2.2: IPv6 Addressing............................................................................................ 13

Section 2.3: IPv6 Configuration ....................................................................................... 14

Section 2.4: IPv6 Implementation..................................................................................... 15

Section 3.1: DHCP Configuration .................................................................................... 16

Section 3.2: DHCP Options .............................................................................................. 17

Section 3.3: Advanced DHCPv4 Settings......................................................................... 18

Section 3.4: Server Placement .......................................................................................... 19

Section 3.5: Superscopes and Split Scopes....................................................................... 20

Section 3.6: DHCPv6........................................................................................................ 21

Section 4.1: DNS Concepts............................................................................................... 22

Section 4.2: Name Resolution........................................................................................... 23

Section 4.3: Zone Configuration....................................................................................... 24

Section 4.4: Active Directory-integrated Zones ............................................................... 25

Section 4.5: Resource Records ......................................................................................... 26

Section 4.6: Client Configuration ..................................................................................... 27

Section 4.7: Dynamic DNS............................................................................................... 28

Section 4.8: Stub Zones and Forwarding.......................................................................... 29

Section 4.9: Root Hints and Root Zone ............................................................................ 30

Section 4.10: Zone Delegation.......................................................................................... 31

Section 4.11: WINS and GlobalNames ............................................................................ 32

Section 4.12: DNS Features.............................................................................................. 33

Section 4.13: DNS Design ................................................................................................ 34

Section 5.1: Routing.......................................................................................................... 35

Section 5.2: RIP ................................................................................................................ 36

Section 5.3: Demand-dial Routing.................................................................................... 37

Section 5.4: ICS and NAT ................................................................................................ 38

Section 6.1: Remote Access Concepts.............................................................................. 39

Section 6.2: Dial-up and VPN .......................................................................................... 40

Section 6.3: SSTP ............................................................................................................. 41

Section 6.4: CMAK .......................................................................................................... 42

Section 7.1: Network Location Profiles............................................................................ 43

Section 7.2: Wireless ........................................................................................................ 44

Section 7.3: RADIUS........................................................................................................ 45

Section 7.4: Network Access Protection (NAP) ............................................................... 46

Section 7.5: Network Authentication................................................................................ 47

Section 7.6: Firewall ......................................................................................................... 48

Section 7.7: IPsec.............................................................................................................. 49

Section 8.1: File Services.................................................................................................. 50

Section 8.2: File Shares..................................................................................................... 51

Section 8.3: Offline Files .................................................................................................. 52

Section 8.4: NTFS Permissions ........................................................................................ 53

Section 8.5: Share and NTFS Permissions ....................................................................... 54

Section 8.6: EFS................................................................................................................ 55

Section 8.7: Distributed File System (DFS) ..................................................................... 56

Section 8.8: Shadow Copy................................................................................................ 57

Section 8.9: Backup and Restore ...................................................................................... 58

Section 8.10: Disk Quotas................................................................................................. 59

Section 8.11: FSRM Features ........................................................................................... 60

Section 8.12: Print Services .............................................................................................. 61

Section 9.1: WSUS ........................................................................................................... 62

Section 9.2: Client Configuration ..................................................................................... 63

Section 9.3: MBSA ........................................................................................................... 64

Section 10.1: Reliability and Performance Monitor ......................................................... 65

Section 10.2: Event Viewer .............................................................................................. 66

Section 10.3: Network Monitor ........................................................................................ 67

Section 10.4: SNMP.......................................................................................................... 68

Practice Exams.................................................................................................................. 69

Course Overview

This course prepares students for the 70-642 Technology Specialist exam: Windows Server 2008 Network Infrastructure, Configuring. It focuses on the details of configuring the infrastructure of a network.

Module 0 – Introduction
This module introduces Microsoft’s recommendations of the technical experience a candidate should have before attempting the certification test. Students will become familiar with server and remote management tools. This module provides the mathematical calculations of how to convert numbers from binary to decimal and hexadecimal. This mathematical foundation is necessary for students to understand the IPv4 and IPv6 addresses they will be studying in the course.

Module 1 – IPv4
This module discusses the details of configuring IPv4 addressing and subnetting. This includes topics of converting IPv4 addresses from binary to decimal, converting subnet masks to slant notation, identifying Ipv4 classes and ranges of IP addresses, and determining local and non-local hosts. Students will learn how to customize the number of subnets and hosts allowed on each subnet.

Module 2 – IPv6
In this module students will learn why it will become necessary to migrate to IPv6. They will learn the basic format of IPv6 addresses, identifying IPv6 address types, and configuring IPv6 addresses using the GUI and command line. Interoperability strategies for implementing IPv4 and IPv6 are explored.

Module 3 – DHCP
This module covers DHCP configuration, customization options, and advanced settings. Students will learn proper server placement to assure client communication with the DHCP server, the rationale for creating superscopes and split scopes, and DHCPv6 options.

Module 4 – DNS
In Module 4 students will learn the details of how DNS translates host names to IP addresses and the process of DNS name resolution for both the client and server. Topics will also include; creating zone and zone transfers, creating or converting an Active Directory-integrated zone, creating and editing resource records, configuring client registration, automatically updating DNS using Dynamic DNS, resolving queries using stub zones and forwarding, using root hints and a root zone, managing zones through zone delegation, creating WINS-integrated zones and GlobalNames zones support, and implementing strategies and goals when designing a DNS solution.

Module 5 – Routing
Module 5 teaches the students the basics of routing and how to manage routing table entries. Students will become familiar with installing RRAS components, and configuring RIP, demand-dial routing, and NAT solutions.

Module 6 – Remote Access
Module 6 discusses the details of configuring remote access and network authentication. Topics include; configuring a Remote Access server to use Dial-up and VPN connections, configuring client connections, configuring a VPN using SSTP, and using CMAK to manage remote access.

Module 7 – Network Access and Security
In Module 7 students will learn several strategies for controlling network access and enhancing network security. These will include: controlling network location profiles, configuring wireless connection, configuring a RADIUS client, server and proxy, configuring a DHCP server as an enforcement point, enforcing network authentication using Kerberos and NTLM, configuring a firewall, and configuring IPsec to protect IP packets during transmission.

Module 8 – File and Print
This module discusses managing network files and printing. Topics include: managing network file sharing and shared folders, controlling access using NTFS and share permissions, encrypting files and folders, protecting integrity of data through shadow copy, and backup and restore, restricting disk space using disk quotas and FSRM, and managing print services.

Module 9 – WSUS
In this module students will learn how to configure a WSUS server and client to manage the updating of software. They will also learn how to use MBSA to scan for security compliance.

Module 10 – Performance and Reliability
This module covers tools that are used to collect and monitor network data for performance and reliability. The Reliability and Performance Monitor provides network performance statistics. Event Viewer is used to monitor event logs. Network Monitor is used to gather information about network traffic. SNMP is used to manage networkattached devices.

Practice Exams In Practice Exams students will have the opportunity to test themselves and verify that they understand the concepts and are ready to take the certification test.


Section 0.1: Introduction

Preparation
This course prepares students for the 70-642 Technology Specialist exam: Windows Server 2008 Network Infrastructure, Configuring. Microsoft recommends at least one year experience in the following underlying technologies:
IP addressing and services
Names resolution
File and print services
Network access and remote access
Monitoring network services

This section introduces the instructor and the concepts that will be covered in this course.

Time

About 2 minutes

Section 0.2: Server Management

Preparation
This section discusses a new management console, Server Manager, used to install and manage server components. Server Manager uses the following elements:
Role
Role services
Feature

Server Core, a scaled-down version of Server 2008, provides a reduced foot print, reduced maintenance, less crashes and downtimes, and uses less disk space. To provide these benefits a limited set of server roles are supported. Student will learn how to configure and manage a server using Server Manager. They will also learn how to install roles on a Server Core server.

Configuring Server 2008 Network Infrastructure Objectives
102. Configure Dynamic Host Configuration Protocol (DHCP)
201. Configure a Domain Name System (DNS) server.

Lecture Focus Questions:
What are the differences among roles, role services, and features?
How are dependencies handled during role installation?
How does the server core installation differ from a standard server installation?
What are the limitations of a server core installation? What are the advantages?

Time
About 20 minutes

Section 0.3: Remote Management

Preparation

This section examines remote management options. Students will learn how to enable Remote Desktop on a Server Core, enable remote management of the firewall, and open firewall ports to allow remote use of MMC snap-ins.

Lecture Focus Questions:

How do firewall ports affect your ability to remotely manage a server?
What firewall port must be opened for Remote Desktop connections?
What advantage does using TS Gateway have over using Remote

Desktop?
What is the effect of enabling the Remote Administration exception in the firewall?
What are the operating system requirements for RSAT?
Which remote administration tools could you use if the firewall had only ports 80 and 443 open?

Time
About 25 minutes

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com