单项选择题
A.This can be achieved using the Sys.Debug.fail method.
B.This can be achieved using the Sys.Debug.traceDump method.
C.This can be achieved using the Sys.Debug.trace method.
D.This can be achieved using the Sys.Debug.assert method.
单项选择题 Certkiller.com has employed you as a system administrator. You are in the process of creating anASP.NET application using Microsoft.NET Framework v3.5. This application will be hosted on aserver named CERTKILLER-SR01. CERTKILLER-SR01 is configured to run Microsoft IIS 5.0. You are assigned a computer named CERTKILLER-WS02. You make use of CERTKILLER-WS02to log on to the companies domain with an account named CKUser. CERTKILLER-SR01 andCERTKILLER-WS02 are both members of the Certkiller.com domain. To ensure productivity youneed to establish the necessary permissions to allow remote debugging. What should you do?()
多项选择题 You are the newly appointed administrator at Certkiller.com. You are in the process of creating anASP.NET application using Microsoft .NET Framework v3.5. During routine monitoring you discover that a JavaScript code fragment in the AJAX application isnot exhibiting the desired behavior. You notice an error icon in the status bar of Microsoft InternetExplorer but is does not prompt you to debug the script. You need to determine the appropriateaction you should take in order to configure Internet Explorer to prompt you to debug the script. What should you do?()
多项选择题 You work as a Web Developer at Certkiller.com. You make use of Microsoft ASP.NET 3.5 tocreate a Web application. The Certkiller.com network contains a test server named CERTKILLER-SR01. You deploy theapplication to CERTKILLER-SR01 and enable debugging. The application is hosted in MicrosoftInternet Information Services (IIS) 6.0. The application pool makes use of Network Serviceidentity. You need to determine a way to configure the environment in order to permit you to debug theapplication from your development computer. What should you do?()