You are designing a CLR stored procedure that will access a remote Web service. You need to ensure that the CLR stored procedure can access the remote Web service. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Grant EXECUTE on the CLR stored procedure.
B. Implement a custom trust level policy.
C. Configure the CLR stored procedure to use the SAFE permission set.
D. Configure the CLR stored procedure to use the EXTERNAL_ACCESS permission set.
You are a database developer. You develop solutions by using SQL Server 2008 in an enterprise environment. You plan to create a stored procedure that queries a sales table and produces forecast data. You do not have administrative permissions, and you are not the owner of the database. You have permissions to create stored procedures. Users will only have permissions to execute your stored procedures. You need to ensure that users can execute the stored procedures. What should you do?
A. Set the TRUSTWORTHY property of the database to ON.
B. Include an EXECUTE AS OWNER clause when you create each stored procedure.
C. Include an EXECUTE AS CALLER clause when you create each stored procedure.
D. Include a SETUSER statement before you query the sales table in each stored procedure.
You have a table that contains 5 million rows. The table has a clustered index. You plan to add an additional index on a column that contains 80 percent null values. The column is used extensively in WHERE clauses. You need to implement an index strategy for the column. The solution must minimize the amount of storage space required for the index. Which type of index should you use?
You are a database developer. You plan to design a database solution by using SQL Server 2008. A database contains a table named Employee_Vacation.
You are given an updated list of employee vacations used. The list is in an XML formatted file. The extract of the XML format is written in the following manner.
<Company Name =”ABC Company Pvt Ltd”>
<Employee ID = “1” Name=”Jim Reeves” />
<Leave Date=”2008-02-12″ />
<Leave Date=”2008-02-13″ />
<Leave Date=”2008-02-14″ />
You plan to import the data and update the Employee_Vacation table. You design a query to calculate the number of vacation days used by each employee. You need to ensure that vacation days are accurately counted for each employee. What should you do?
You are designing a database that will store telephone numbers. You need to ensure that only phone numbers that use a specific format are written to the database. What should you create?
A. a CHECK constraint
B. a computed column
C. a DEFAULT constraint
D. a persisted computed column
You are a database developer. You develop a database application for a SQL Server 2008 instance.
The instance hosts a third-party database. You are not allowed to modify the database schema. The database contains two tables that are as shown in the following diagram. You plan to extract address information about full-time employees based on the FullTimeIndicator flag. You need to design a data access layer to simplify the extraction process. What should you do?
A. Design an Entity Data Model that contains the EMPLOYEES and ADDRESS entities.
B. Create a view on the database to include full-time employees and their address details.
C. Re-design the underlying database model to include employee and address information in one table.
D. Design a conceptual Entity Data Model that contains an entity named EMPLOYEE_ADDRESS.
Ensure that this entity contains information about employees and their addresses.