单选题You need to call an unmanaged function from your managed code by using platform invoke services. What should you do?()A Create a class to hold DLL functions and then create prototype methods by using managed code.B Register your assembly by using COM a

题目
单选题
You need to call an unmanaged function from your managed code by using platform invoke services. What should you do?()
A

Create a class to hold DLL functions and then create prototype methods by using managed code.

B

Register your assembly by using COM and then reference your managed code from COM

C

Export a type library for your managed code.

D

Import a type library as an assembly and then create instances of COM object.


相似考题
更多“You need to call an unmanaged function from your managed cod”相关问题
  • 第1题:

    请选择合适的选项,补充下列英文句子: Thank you for your() to my store, you can find the products you need from my store.

    • A、visitted
    • B、visited
    • C、visits
    • D、visiting

    正确答案:D

  • 第2题:

     You work with a SQL Server 2005 database that provides banking information for customers. You want customers to see banking reports that combine data that is retrieved from the database with real-time investment information that comes from a Web service provided by a third party. The investment information must be current when the reports are executed. You need to create the appropriate objects that support the reports.  What should you do?()

    • A、 Publish the data in the database as an XML Web service by using the FOR XML AUTO clause. 
    • B、 Create a table to store the banking information for each customer. Create a trigger that fires when data is inserted into the table that joins with the data coming from the Web service. 
    • C、 Create a Transact-SQL stored procedure that uses a temporary table to store the banking information for each customer. Update the table with the values from the Web service. 
    • D、 Have a developer in your company create an assembly that calls the remote Web service. Create aCLR function by using the assembly. Call the CLR function and combine the results with banking information in the database.

    正确答案:D

  • 第3题:

    You are creating a templated Web control for use in your Web application. You need to add the Web control to your Web application pages without compiling your control into a .dll file. What should you do?()

    • A、Ensure that the Web control inherits from the WebControl class.
    • B、Ensure that the Web control inherits from the Control class.
    • C、Ensure that the Web control inherits from the CompositeControl class.
    • D、Ensure that the Web control inherits from the UserControl class.

    正确答案:D

  • 第4题:

    Your network contains Mailbox servers that run Exchange Server 2007 and Exchange Server 2010.You need to ensure that all e-mail messages located in the Inbox folders of all users are deleted after 120 days.What should you create first?()

    • A、a new managed custom folder
    • B、a new message classification
    • C、a new retention policy
    • D、new managed content settings

    正确答案:D

  • 第5题:

     Application developers in your company create an assembly that contains a CLR function. This CLR function reads data from a spreadsheet, performs some calculations, and returns the data to a SQL Server 2005 computer. You need to register the assembly with SQL Server 2005 by using the CREATE ASSEMBLY statement and the least privileged security permission set.  Which permission set should you use? ()

    • A、 Default 
    • B、 SAFE 
    • C、 EXTERNAL_ACCESS 
    • D、 UNSAFE

    正确答案:C

  • 第6题:

    单选题
    You have an Exchange Server 2010 organization.You need to ensure that items in a user’s Inboxfolder that are older than 60 days are moved to a custom folder.What should you do first?()
    A

    Create a managed custom folder.Create a transport rule

    B

    Create a new mail folder by using Microsoft Office Outlook.Create a journal rule

    C

    Create a managed custom folder.Run the Managed Content Settings wizard from the Inbox managed default folder

    D

    Create a new mail folder by using Microsoft Office Outlook.Run the Managed Content Settings wizard from the Inbox managed default folder


    正确答案: C
    解析: 暂无解析

  • 第7题:

    单选题
    You have an Exchange Server 2010 organization.You need to prevent internal users from sending messages that contains the phrase °Company Confidentia?± to external use.What should you create?()
    A

    a Transport rule

    B

    a managed folder mailbox policy

    C

    a message classification

    D

    a Send connector


    正确答案: A
    解析: 暂无解析

  • 第8题:

    单选题
    The CALC function is used several times within the sales report. To simplify maintenance you want to store the function in one place and call it from within your PL/SQL trigger code. Which node would you use in object navigator to create a report level programme unit to store the function?()
    A

    Programme units. 

    B

    PL/SQL libraries. 

    C

    Database object. 

    D

    Built in packages.


    正确答案: C
    解析: 暂无解析

  • 第9题:

    单选题
    You run a Windows Defender scan on your computer.  You notice a valid program listed in Quarantined Items.  You need to use this program on your computer.  What should you do?()
    A

    Reinstall the application to another location.

    B

    Restore the program from the Quarantined Items list.

    C

    Remove the program from the Quarantined Items list.

    D

    Repair the program from the Programs option in Control Panel.


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    You run a Windows Defender scan on your computer system. The scan identifies one of your applications as having potentially unwanted behavior.  You need to continue to use the application. You also need to stop Windows Defender from alerting you about this application.  Which Windows Defender option should you use? ()
    A

    Ignore

    B

    Remove

    C

    Quarantine

    D

    Always Allow


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    You are developing a class library. Portions of your code need to access system environment variables. You need to force a runtime SecurityException only when callers that are higher in the call stack do not have the necessary permissions. Which call method should you use?()
    A

    set.Demand();

    B

    set.Assert();

    C

    set.PermitOnly();

    D

    set.Deny();


    正确答案: D
    解析: 暂无解析

  • 第12题:

    多选题
    You are the network consultant from passguide.com. In which situation you will advice your customer to implement data centers?()
    A

    An increased need for specialized IT silos

    B

    Protecting the business from information outages

    C

    IT systems grow fast

    D

    Optimizing the efficiency with which IT operates


    正确答案: A,D
    解析: 暂无解析

  • 第13题:

    You are the network consultant from passguide.com. In which situation you will advice your customer to implement data centers?()

    • A、Protecting the business from information outages
    • B、Optimizing the efficiency with which IT operates
    • C、An increased need for specialized IT silos
    • D、IT systems grow fast

    正确答案:A,B,D

  • 第14题:

    You are creating a Windows application for graphical image processing by using the .NET Framework 3.5. You create an image processing function and a delegate.You plan to invoke the image processing function by using the delegate.You need to ensure that the calling thread meets the following requirements:  (1)It is not blocked when the delegate is running   (2)It is notified when the delegate is complete What should you do?()

    • A、Call the Invoke method of the delegate.
    • B、Call the BeginInvoke and EndInvoke methods of the delegate in the calling thread.
    • C、Call the BeginInvoke method by specifying a callback method to be executed when the delegate is complete.Call the EndInvoke method in the callback method.
    • D、Call the BeginInvoke method by specifying a callback method to be executed when the delegate is complete.Call the EndInvoke method of the delegate in the calling thread.

    正确答案:C

  • 第15题:

    You need to call an unmanaged function from your managed code by using platform invoke services. What should you do?()

    • A、Create a class to hold DLL functions and then create prototype methods by using managed code.
    • B、Register your assembly by using COM and then reference your managed code from COM
    • C、Export a type library for your managed code.
    • D、Import a type library as an assembly and then create instances of COM object.

    正确答案:A

  • 第16题:

    You work as a Web Developer at Certkiller.com. You are in the process of creating a Webapplication using Microsoft ASP.NET 3.5.  You need to ensure that the application is able to load staff information from an XML file into aDataSet instance. The XML file contains an inline schema. You have to call a method of theDataSet class in order to load the information.  Identify how you can accomplish this?()

    • A、You should call the ReadXml method with the ReadSchema XML read mode.
    • B、You should call the ReadXml method with the InferTypedSchema XML read mode.
    • C、You should call the ReadXmlSchema method.
    • D、You should call the ReadXml method with the InferSchema XML read mode.

    正确答案:A

  • 第17题:

    You are responsible for managing a SQL Server 2005 database that stores sales information. Many values in nchar columns in the database tables contain preceding or trailing spaces. You need to implement a mechanism that selects the data from the tables without leading and trailing spaces. Your solution must be available for reuse in Transact-SQL statements and views. What should you do?()

    • A、Create DML triggers that query the inserted and deleted tables.
    • B、Create a stored procedure that calls the LTRIM and RTRIM built-in functions.
    • C、Create a Transact-SQL function that calls the LTRIM and RTRIM built-in functions.
    • D、Call the TRIM built-in function.

    正确答案:C

  • 第18题:

    多选题
    In your database, all the tablespaces are locally managed. You started Recovery Manager (RMAN) using recovery catalog and restored the control file by using the following command:  RMAN> RESTORE CONTROLFILE;  Which two operations do you need to perform after restoring the control file from backup?()
    A

    shut down and restart the instance

    B

    add new tempfiles to the temporary tablespaces after recovery

    C

    perform a media recovery and open the database with the RESETLOGS option

    D

    perform a media recovery and bring the database to NOARCHIVELOG mode


    正确答案: B,C
    解析: 暂无解析

  • 第19题:

    单选题
    You need to design the retrieval of advertising statistics without compromising security. What should you do?()
    A

    Design a Notification Services solution that sends the advertising statistics to specified subscribers by e-mail.

    B

    Design a SQL Server Web service that runs a stored procedure to return the statistics on a call from the advertisers application.

    C

    Design a Database Mail solution that sends the advertising statistics to e-mail addresses that are specified in a table.

    D

    Design a stored procedure to return the statistics on a call from the advertisers application.

    E

    Design a user-defined function to return the statistics on a call from the advertisers application.


    正确答案: C
    解析: 暂无解析

  • 第20题:

    单选题
    Application developers in your company create an assembly that contains a CLR function. This CLR function reads data from a spreadsheet, performs some calculations, and returns the data to a SQL Server 2005 computer. You need to register the assembly with SQL Server 2005 by using the CREATE ASSEMBLY statement and the least privileged security permission set.  Which permission set should you use? ()
    A

     Default 

    B

     SAFE 

    C

     EXTERNAL_ACCESS 

    D

     UNSAFE


    正确答案: C
    解析: 暂无解析

  • 第21题:

    多选题
    Your company uses SQL Server 2005. You are implementing a series of views that are used in ad hoc queries. The views are used to enforce your companys security policy of abstracting data.  Some of these views perform slowly. You create indexes on those views to increase performance, while still maintaining the companys security policy. One of the views returns the current date as one of the columns. The view returns the current date by using the GETDATE( ) function. This view does not allow you to create an index. You need to create an index on the view.  Which two actions should you perform?()
    A

    Remove all deterministic function calls from within the view.

    B

    Remove all nondeterministic function calls from within the view.

    C

    Schema-bind all functions that are called from within the view.

    D

    Create the view and specify the WITH CHECK OPTION clause.


    正确答案: D,C
    解析: 暂无解析

  • 第22题:

    多选题
    You write a logging function for a Web Form. You call the logging function from the Page_Unload event handler. You test the Web Form and notice that the Page_Unload event handler does not call the logging function. You need to ensure that the logging function is called. What are two possible ways to achieve this goal? ()
    A

    Set the Page attribute to AutoEventWireup=False. Remove the attribute onunload=Page_Unload from the Web Form element.

    B

    Set the Page attribute to AutoEventWireup=False. Add the attribute OnUnload=Page_Unload to the Web Form element.

    C

    Set the Page attribute to AutoEventWireup=False. Add the Web Form attribute autocomplete=on.

    D

    Set the Page attribute to AutoEventWireup=True.


    正确答案: A,B
    解析: 暂无解析

  • 第23题:

    单选题
    Your company uses Remote Desktop Services (RDS). You install and configure the Remote Desktop Gateway (RD Gateway) role service on a server that runs Windows Server 2008 R2. Employees connect to RDS from unmanaged remote computers. Employees are unable to access the RD Gateway server from the unmanaged remote computers.You need to ensure that employees can access the RD Gateway server. What should you do?()
    A

    Create a Remote Desktop resource authorization policy (RD RAP).

    B

    Create a Remote Desktop connection authorization policy (RD CAP).

    C

    On the RD Gateway server, open port 3389 on the Windows Firewall.

    D

    On the RD Gateway server, configure Network Access Protection (NAP) health policy checking.


    正确答案: B
    解析: 暂无解析