List the main ranges of severity levels and their function.
What will be an ideal response?
1-10-Messages generated by a SQL Server instance for information purposes only; these are not genuine user or system errors.
11-16-User-generated error messages that must be fixed by the user; for example, a syntax
error in a SQL query would result in a user error being generated.
17-19-System or resource-related warning messages that must be investigated further by the database administrator.
20-25-Errors in this range are considered fatal, and may be caused by a serious system or
resource failure that will result in service disruptions.
You might also like to view...
Match the following terms related to My Computer to their descriptions:
I. Copy A. Copies data from the Clipboard into the desired location. II. Cut B. A copy stored away from your computer for safekeeping. III. Paste C. Places a duplicate into a temporary storage area. IV. Drag D. Allows data to be either moved or copied between storage locations. V. Right-drag E. Removes data from a location and places it on the Clipboard. VI. Backup F. Copies data between storage devices.
How does MAC address filtering help to secure a wireless network?
a. It is used to help prevent the theft of network interface cards. b. It requires an additional login step in which the user enters his or her MAC address. c. MAC address filtering is seldom used anymore because of NIC restrictions. d. It can be used to select which networking devices can be allowed access to the network.