Monday, August 5, 2013

Nonvolatile Data

Nonvolatile Data
Data extracted from the various operational systems and pertinent data obtained from outside sources are transformed, integrated, and stored in the data warehouse, the data in the data warehouse is not intended to run the day-to-day business. When you want to process the next dater received from a customer, you do not look into the data ware-house to find the current stock status. The operational order entry application is meant for that purpose. In the data warehouse, you keep the extracted stock status data as snap-shots over time. You do not update the data warehouse every time you process a single order.

Data from the operational systems are moved into the data warehouse at specific intervals. Depending on the requirements or the business, these data movements take place twice a day, once a day, once a week, or once in two weeks. In fact, in a typical data warehouse, data movements to different data sets may take place at different frequencies. The .changes to the attributes of the products may he moved once a week. Any revisions to geographical setup may be moved once a month. The units of sales may be moved once a day. You plan and schedule the data movements or data loads based on the requirements or your users.

As illustrated in Figure 2-3, every business transaction does not update the data ilk the data warehouse. The business transactions update the operational system databases in real time. We add, change. or delete data from an operational system as each transaction hap-pens but do not usually update: the data in the data warehouse. You not delete the data in the data warehouse in real lime. Once the data is captured in the data warehouse, you do not run individual transactions to change the data there. Data updates are commonplace in an operational database; not Si) in it data warehouse. The data in a warehouse is not as the data in an operational database is. The data in it data warehouse is primarily for query and analysis.

Tuesday, June 25, 2013

70-412 Question 18

70-412 Question 18

Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2. Both servers have the IP Address Management (IPAM) Server feature installed. You have a support technician named Tech1. Tech1 is a member of the IPAM Administrators group on Server1 and Server2. You need to ensure that Tech1 can use Server Manager on Server1 to manage IPAM on Server2. To which group on Server2 should you add Tech1? To answer, select the appropriate group in the answer area.
Hot Area:

Correct Answer:

Section: (none)
Explanation


Explanation/Reference:
http://www.microsoft.com/en-us/download/dlx/ThankYou.aspx?id=29012


Both WinRMRemoteWMIUsers_ and Remote Management Users have the exact same description. As such, I tested connecting with server manager remotely with a non-administrative account. I tried before adding to either group and got this error:

I then added to Remote Management Users and got this error:

--Note that this is due to access to the event log only.

Next I removed from Remote Management Users and added to WinRMRemoteWMIUsers_ and got this error:

The error is exactly the same and the explanation is due to event log.

In summary, Either one of these answers is correct, however since the document explicitly says use the "WinRMRemoteWMIUsers_" group, then that's what we gotta do

70-412 Question 17

70-412 Question 17

Your network contains an Active Directory domain named contoso.com. Domain controllers run either Windows Server 2008, Windows Server 2008 R2, or Windows Server 2012. You have a Password Settings object (PSOs) named PSO1. You need to view the settings of PSO1. Which tool should you use?

A. Get-ADDomainControllerPasswordReplicationPolicy
B. Get-ADDefaultDomainPasswordPolicy
C. Server Manager
D. Get-ADFineGrainedPasswordPolicy

Correct Answer: D
Section: (none)


Explanation
Explanation/Reference:

http://technet.microsoft.com/en-us/library/ee617231.aspx

70-412 Question 16

70-412 Question 16

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012. Server1 and Server2 have the Network Load Balancing (NLB) feature installed. The servers are configured as nodes in an NLB cluster named Cluster1. Cluster1 hosts a secure web application named WebApp1. WebApp1 saves user state information locally on each node. You need to ensure that when users connect to WebApp1, their session state is maintained. What should you configure?

A. Affinity - None
B. Affinity - Single
C. The cluster quorum settings
D. The failover settings
E. A file server for general use
F. The Handling priority
G. The host priority
H. Live migration
I. The possible owner
J. The preferred owner
K. Quick migration
L. The Scale-Out File Server

Correct Answer: B
Section: (none)

Explanation
Explanation/Reference:

http://technet.microsoft.com/en-us/library/bb687542.aspx



70-412 Question 15

70-412 Question 15

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012. Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. Cluster1 hosts an application named Appl. You need to ensure that Server2 handles all of the client requests to  the cluster for Appl. The solution must ensure that if Server2 fails, Server1 becomes the active node for Appl. What should you configure?

A. Affinity - None
B. Affinity - Single
C. The cluster quorum settings
D. The failover settings
E. A file server for general use
F. The Handling priority
G. The host priority
H. Live migration
I. The possible owner
J. The preferred owner
K. Quick migration
L. The Scale-Out File Server

Correct Answer: J
Section: (none)


Explanation
Explanation/Reference:

http://blogs.msdn.com/b/clustering/archive/2008/10/14/9000092.aspx
The preferred owner in a 2 server cluster will always be the active node unless it is down.