⟩ What is the wrong number in the series-13,16,21,27,39,52,69?
here's d sol:27 shud hv bn 28 as d difference dat d nos.in
d series carry b/w dm is dat of a prime no.
16-13=3
21-16=5
28-21=7
39-28=11
52-39=13
69-52=17
thus,27 is d wrng no.
here's d sol:27 shud hv bn 28 as d difference dat d nos.in
d series carry b/w dm is dat of a prime no.
16-13=3
21-16=5
28-21=7
39-28=11
52-39=13
69-52=17
thus,27 is d wrng no.
If You are the SMS administrator for ComPany.com. The Hardware Inventory Client Agent isenabled with the default configuration settings. You need to ensure that the Hardware InventoryClient Agent is run every Tuesday at 1900. What should you do?A. Configure the Hardware Inventory Client Agent to use a Full schedule.B. Add an IDMIF file to each client that sets the new schedule.C. Configure the Hardware Inventory Client Agent to use a Simple schedule.D. Change the SMS_def.mof to comply with the new schedule.
You are the SMS administrator for ComPany.com. Your SMS hierarchy consists of a singleprimary site. Your SMS site consists of a single site server configured as a management point, aclient access point, a server locator point, and a distribution point. Employees use Pocket PCdevices. They only access the company network over a wireless connection. You want to useSMS to manage the Pocket PC devices. You install and configure the Device ManagementFeature Pack on the SMS site server. You now need to deploy the client software to the mobiledevices. What should you do?A. Create an advertisement to install the Device Client on the computers running MicrosoftActiveSync.B. Create an advertisement to install the Device Client on the mobile devices.C. Use Client Push Installation to install the Device Client.D. Use a Web site to make the Device Client installation available.
You are the SMS administrator for ComPany.com. The SMS hierarchy consists of a singleprimary site. You use SMS to deploy a program that examines the latest version of the antivirussoftware that is used by the computers on the network. Two advertisements use this program.One advertisement runs daily on servers and portable computers. Another advertisement runsweekly on desktop computers. You discover a security flaw in the program that collects theantivirus software information. You need to prevent computers from running the program until youfix the security flaw. You need to ensure that all other advertisements function normally. You wantto achieve this goal by using the least amount of administrative effort. What should you do?A. Disable the program.B. Delete the program.C. Disable the Advertised Programs Client Agent.D. Delete each advertisement.
Can you explain You are the SMS administrator for ComPany.com. Your network consists of a single ActiveDirectory domain. The network contains a Microsoft SQL Server 7.0 SP3 computer. The SMS siteserver runs Microsoft Windows 2000 Server SP3. The SMS site server is configured as amanagement point, client access point, server locator point, and reporting point. You want to usea server that runs Microsoft Windows NT Server 4.0 SP4 as a distribution point. The SMS sitecurrently uses the standard security mode. You need to migrate from the standard security modeto the advanced security mode. You want to achieve this goal by using the least amount ofadministrative effort. Which two actions should you perform? (Each correct answer presents partof the solution. Choose two.)A. Upgrade the computer you want to configure as a distribution point to Windows NT Server4.0 SP6.B. Upgrade the computer you want to configure as a distribution point to Windows 2000 ServerSP3.C. Upgrade the SQL Server comp
You are the SMS administrator for ComPany.com. ComPany uses Active Directory SystemDiscovery when configuring SMS to discover computers. The Organizational Unit (OU) structureis shown in the following exhibit**MISSING**You need to configure Active Directory System Discovery to discover the computers in theInformation Services OU, but not the Help Desk OU.Which two actions should you perform? (Each correct answer presents part of the solution.Choose two.)A. Ensure that the Recursive search option is selected.B. Query the local domain location.C. Query the local forest location.D. Ensure that the Recursive search option is not selected.E. Create a custom LDAP or GC query that points to the Information Services OU.
You are the SMS administrator for ComPany.com. All servers run Microsoft Windows Server2003. All desktop computers run Microsoft Windows XP Professional. The company has a singleSMS site. The SMS Advanced Client is installed on all computers on the network. You need toinventory the network to discover only the followinG.1. The version of Microsoft Word that is being used by each computer2. A list of applications that is installed on each computer3. The version of the definition file named Av.dat that is used by the antivirus softwareYou need to modify the default settings for the SMS Software Inventory Client Agent to collectthis information. You need to achieve this goal by using the least amount of administrative effort.Which entry or entries should you add? (Choose all that apply.)A. *.exeB. Av.datC. Winword.exeD. *.*
You are the SMS administrator for ComPany.com. The company has a single SMS site.Employees use Windows mobile devices. You use the Device Client to manage these deviceswith the SMS Device Management Feature Pack. You want to ensure that the mobile devicesmeet the following security guidelines1. Passwords comply with complexity requirements.2. Desktop computers use digital certificates while connecting over the virtual privatenetwork (VPN).You need to configure the mobile devices to comply with these guidelines.Which two tasks should you perform? (Each correct answer presents part of the solution. Choosetwo.)A. Use an advertisement to run a Microsoft Visual Basic Scripting Edition (VBScript) script toconfigure VPN settings.B. Use an advertisement to run a Microsoft Visual Basic .NET assembly to configure VPNsettings.C. Use Device Settings Manager to configure the VPN settings.D. Use Device Settings Manager to configure the password policy.
Suppose You are writing a conceptual diagram of the modules that must be developed for your solution.Which module or modules should be included?(Choose all that apply)A. a Web application for Team Leads and Business PlannersB. a timesheet entry databaseC. a billing databaseD. a notification engine that sends timesheet entry remindersE. a timesheet entry applicationF. a Windows CE applicationG. a utility that uploads information to the billing application
Explain Which business constraint poses the greatest potential risk to completing your project for BlueYonder Airlines?A. The current IT staff must support the solution in the futureB. All testing scenarios and all necessary rework must be completed during the one-month testingperiod.C. The scheduling vendor will begin providing access by XML Web service in three monthsD. The application must be completed within a five-month development period before it is tested
Suppose Web application used by Team Leads and Business Planners requires an authenticationmechanism. Which pair of authentication technologies should you recommend?A. IIS Anonymous authentication with ASP.NET Passport authenticationB. IIS Anonymous authentication with ASP.NET Forms authenticationC. IIS Basic authentication with SSL and ASP.NET Windows authenticationD. IIS Integrated Windows authentication with ASP.NET Windows authenticationE. IIS Basic authentication with SSL and ASP.NET Forms authentication