Certification Questions

Q:

The procurement documents to be used, the supplier management processes and the types of contracts that will be used are to be found in which document?

A) Solicitation management plan. B) Contracting management plan.
C) Organizational policies. D) Procurement management plan.
 
Answer & Explanation Answer: D) Procurement management plan.

Explanation:

Key elements in the procurement management plan are enumerated in this PMBOK section. [12.1.3.1]

Report Error

View Answer Report Error Discuss

Filed Under: PMP Certification

0 4023
Q:

What network service is the most likely problem if you can ping a computer by IP address but not by name?

A) DNS B) DHCP
C) ARP D) ICMP
 
Answer & Explanation Answer: A) DNS

Explanation:

 The most likely problem if you can ping a computer by IP address but not by name is a failure of DNS.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 4008
Q:

A company that you previously worked for is seeking new employees and you are trying to exolain the culture to a potential candidate. The company has strict policies, supervisory control, and rules. Team members are not encouraged to be individualistic nor offer feedback to upper management. Many times, the team feels its input is not valuable or implemented. This explanation describes a company that utilizes what employee management theory?

A) Meridith and Mann's Autocratic Management Theory B) Deming's Zero Defects Theory
C) Kerzner's Earned value Theory D) DMcGregor's X Theory
 
Answer & Explanation Answer: D) DMcGregor's X Theory

Explanation:

Answer A is incorrect because Meridith and Mann did not develop an autocratic management theory.Answer B is incorrect because Deming's theories did not involve any of the X and Y theories that were developed by McGregor. Answer C is incorrect because Earned value is not related to X or Y management theories.

Report Error

View Answer Report Error Discuss

Filed Under: PMP Certification

0 4006
Q:

You use Microsoft Visual Studio 2010 and Microsoft .NET Framework 4 to create an
application. You use the ADO.NET Entity Framework to model entities. You write the following code segment. (Line numbers are included for reference only.)


01AdventureWorksEntities context = New AdventureWorksEntities
02
03var q = from c in context.Customers
04where c.City == "London"
05orderby c.CompanyName
06select c;


You need to ensure that the application meets the following requirements: "Compares the current values of unmodified properties with values returned from the data source". Marks the property as modified when the properties are not the same. Which code segment should you insert at line 02?

A) context.MergeOption = MergeOption.AppendOnly; B) context.MergeOption = MergeOption.PreserveChanges;
C) context.MergeOption = MergeOption.OverwriteChanges; D) context.MergeOption = MergeOption.NoTracking;
 
Answer & Explanation Answer: B) context.MergeOption = MergeOption.PreserveChanges;

Explanation:
Report Error

View Answer Report Error Discuss

17 4002
Q:

You are an administrator of a SQL Server 2000 computer. The server contains a database that stores inventory data. Another database administrator has created a number of scheduled jobs to maintain the inventory database. Each weeknight the following jobs occur.


- A BULK INSERT job imports data at 10:00 P.M
- Indexes are rebuilt at 10:15 P.M
- Data integrity checks are performed at 10:30 P.M
- A differential backup is performed at 10:45 P.M
- A DBCC SHRINKDATABASE job runs at 11:00 P.M.


You notice that the final job often fails and returns the following error message: "Server: Msg 3140, Level 16, State 3. Could not adjust the space allocation for file  'inventory_data'."You need to ensure that the final job runs without errors.

What should you do?

A) Modify the DBCC SHRINKDATABASE job so that it uses DBCC SHRINKFILE statement to shrink each file individually. B) Create a new DBCC SHRINKFILE job to shrink the inventory_data file. Schedule the new job to run at the same time as the DBCC SHRINKDATABASE job.
C) Increase the time between the differential backup and the DBCC SHRINKDATABASE job. D) Increase the time between the data integrity checks and the differential backup.
 
Answer & Explanation Answer: C) Increase the time between the differential backup and the DBCC SHRINKDATABASE job.

Explanation:

The DBCC SHRINKDATABSE cannot be executed until the previous job step, the differential backup, has been completed. We should increase the time between these two job steps, or even better configure the last job step to run only after the differential backup has been completed.

 

Note: The DBCC SHRINKDATABASE statement shrinks data files on a per-file basis but shrinks log files as if all the log files existed in one contiguous log pool. The target size for the data and log files cannot be smaller than the minimum size of a file that was specified when the file was originally created, or the last explicit size set with a file size changing operation such as the ALTER DATABASE statement with the MODIFY FILE option or the DBCC SHRINKFILE statement.

Report Error

View Answer Report Error Discuss

0 3993
Q:

Which among the following keys are used to identify each row of the table uniquely?

A) Primary key B) Unique key
C) Partial key D) None of the above
 
Answer & Explanation Answer: A) Primary key

Explanation:

Primary key helps us to identify a row uniquely in a relation

Report Error

View Answer Report Error Discuss

2 3985
Q:

Given the following network range 192.168.0.0/24. We want minimum 50 hosts on each of the available subnets. What will be the subnet mask?

A) /24 B) /25
C) /26 D) /27
 
Answer & Explanation Answer: C) /26

Explanation:

Explanation: 50 hosts require 6 bits of the last octet giving us 64 -2 = 62 possible hosts this satisfies our requirement and leaves us 2 bits over for the subnets. The default mask is /24 or 255.255.255.0 adding the 2 bits for the subnets it becomes 255.255.255.192 or /26

Report Error

View Answer Report Error Discuss

Filed Under: CCENT

1 3979
Q:

Which of the following master data can/must you use for pipeline meterials?

A. BOM(ascomponent)

B. Purchasing info record

C. Material master record

D. Vendor master record

E. Source list

Answer

Answer : A , B , C , D , E [all these]


 


Explanation:You must have created a material master record with a purchasing info record. To do this, you need a vendor master record. You can use the source list and BOM in connection with the pipeline material.

Report Error

View answer Workspace Report Error Discuss

Subject: SAP MM

8 3972