There are four types of group that can be used in the iBase designer security manager, to control the access that users have to data in an iBase database and to the iBase features.
Which one of the 4 types of group denies access to specific commands? For example, a user may be able to add records but may be denied access to the Import command.
Answer : B
The MSI install process automatically sends notices of its activity to the system event log.
Any events logged by the MSI install process have their source set to MsiInstaller. Which of the below is not an event message from the MsiInstaller?
Answer : C
Which of the following is False for iBase SQL server?
Answer : D
Which of the following false statement about iBase Designer?
Answer : A
To make more significant changes to the way an MSI installation takes place, you can edit the database that an MSI file contains. This requires you to create a transform. The tool used to create a transform is which of the following?
Answer : D
You will often need to find or search individual records, or groups of records, for adding to or editing the information in your database or to analyze data for a particular task. There are a number of ways that you can find records, and each is designed for a particular type of enquiry. Which of the below is NOT a 'Find or search' method in iBase user?
Answer : H
In the iBase Designer security manager, which one of the following security groups are mandatory and must be used when adding new users?
Answer : D
Which of the following iBase security features is not supported by iBase Scheduler, and any restrictions imposed by this features will be ignored in iBase Scheduler:
Answer : A
A charting scheme controls how the properties of items added to Analyst's Notebook charts from iBase are updated. Which is NOT True ?
Answer : D
Which of the following is NOT true about the user who switches on and configures alerting for a database?
Answer : E
Which is not correct when using the Index Service Configuration tool?
Answer : B
At version 8.9, IBM i2 iBase _______________.
Answer : D
Which of the following is NOT true for creating iBase SQL server databases?
Answer : D
IBM i2 iBase is supported on a number of virtual machine environments. Which of the following is not listed within the IBM i2 iBase 8.9.1 release notes?
Answer : C
Which file extension does an iBase security file or iBase security connection file for SQL
Server have?
Answer : B
Have any questions or issues ? Please dont hesitate to contact us