(Exam 70-667): Configuring Microsoft® Sharepoint® 2010

Total Page:16

File Type:pdf, Size:1020Kb

(Exam 70-667): Configuring Microsoft® Sharepoint® 2010 ● ● ● ● ● ● ● ● ● ● ● How to access your CD files The print edition of this book includes a CD. To access the CD files, go to http://aka.ms/638853/files, and look for the Downloads tab. Note: Use a desktop web browser, as files may not be accessible from all ereader devices. Questions? Please contact: [email protected] Microsoft Press Exam 70-667: Pro: Configuring Microsoft SharePoint 2010 objective Location in book inStaLLinG AND CONFiGURinG a SHaRePoint ENVIRonMent Deploy new installations and upgrades. Chapter 1, Lessons 1, 2, and 3 Chapter 2, Lesson 2 Chapter 9, Lessons 1 and 2 Configure SharePoint farms. Chapter 1, Lessons 2 and 3 Chapter 2, Lesson 2 Chapter 3, Lessons 1, 2 and 3 Chapter 8, Lesson 2 Chapter 9, Lessons 1 and 2 Chapter 11, Lesson 1 Configure service applications. Chapter 5, Lessons 1 and 2 Chapter 6, Lessons 1 and 2 Chapter 8, Lessons 1, 2, 3, 4, 5, and 6 Chapter 9, Lessons 1 and 2 Configure indexing and search. Chapter 7, Lessons 1, 2 and 3 ManaGinG a SHaRePoint ENVIRonMent Manage operational settings. Chapter 4, Lesson 1 Chapter 12, Lessons 1, 2, and 3 Manage accounts and user roles. Chapter 1, Lessons 2 and 3 Chapter 2, Lessons 1 and 2 Chapter 4, Lessons 1 and 2 Chapter 9, Lesson 2 Manage authentication providers. Chapter 3, Lesson 2 DePLoYinG AND ManaGinG aPPLicationS Manage Web Applications. Chapter 1, Lesson 3 Chapter 2, Lesson 2 Chapter 3, Lesson 1, 2 and 3 Chapter 4, Lessons 1 and 2 Manage site collections. Chapter 1, Lesson 3 Chapter 2, Lesson 2 Chapter 4, Lessons 1 and 2 Chapter 5, Lessons 1 and 2 Chapter 9, Lessons 1 and 2 Chapter 10, Lessons 1, 2 and 3 Chapter 12, Lesson 4 Deploy and manage SharePoint solutions. Chapter 10, Lessons 2 and 3 MaintaininG a SHaRePoint ENVIRonMent Back up and restore a SharePoint environment. Chapter 11, Lesson 2 Monitor and analyze a SharePoint environment. Chapter 12, Lessons 1, 2 and 3 Optimize the performance of a SharePoint environment. Chapter 9, Lesson 2 Chapter 12, Lesson 4 e xam objectives The exam objectives listed here are current as of this book’s publication date. Exam objectives are subject to change at any time without prior notice and at Microsoft’s sole discretion. Please visit the Microsoft Learning Web site for the most current listing of exam objectives: http://www.microsoft.com/learning/en/us/Exam .aspx?ID=70-667#tab2. MCTS Self-Paced Training Kit (Exam 70-667): Configuring Microsoft SharePoint 2010 Dan Holme Alistair Matthews PUBLISHED BY Microsoft Press A Division of Microsoft Corporation One Microsoft Way Redmond, Washington 98052-6399 Copyright © 2011 by Alistair Matthews (Content); Alistair Matthews (Sample Code); Dan Holme (Content); Dan Holme (Sample Code); GrandMasters (Content); GrandMasters (Sample Code); Orin Thomas (Content); Orin Thomas (Sample Code) All rights reserved. No part of the contents of this book may be reproduced or transmitted in any form or by any means without the written permission of the publisher. Library of Congress Control Number: 2011934666 ISBN: 978-0-7356-3885-3 Printed and bound in the United States of America. Second Printing Microsoft Press books are available through booksellers and distributors worldwide. If you need support related to this book, email Microsoft Press Book Support at [email protected]. Please tell us what you think of this book at http://www.microsoft.com/learning/booksurvey. Microsoft and the trademarks listed at http://www.microsoft.com/about/legal/en/us/IntellectualProperty/ Trademarks/EN-US.aspx are trademarks of the Microsoft group of companies. All other marks are property of their respective owners. The example companies, organizations, products, domain names, email addresses, logos, people, places, and events depicted herein are fictitious. No association with any real company, organization, product, domain name, email address, logo, person, place, or event is intended or should be inferred. This book expresses the author’s views and opinions. The information contained in this book is provided without any express, statutory, or implied warranties. Neither the authors, Microsoft Corporation, nor its resellers, or distributors will be held liable for any damages caused or alleged to be caused either directly or indirectly by this book. Acquisitions Editor: Jeff Koch Developmental Editor: Karen Szall Project Editor: Karen Szall Editorial Production: Christian Holdener, S4Carlisle Publishing Services Technical Reviewer: Bob Hogan; Technical Review services provided by Content Master, a member of CM Group, Ltd. Copyeditor: Becka McKay Indexer: Maureen Johnson Cover: Twist Creative • Seattle [2012-04-20] Contents at a Glance Introduction xxiii Che aPt R 1 Creating a SharePoint 2010 Intranet 1 Che aPt R 2 Administering and Automating SharePoint 53 Che aPt R 3 Managing Web Applications 107 Che aPt R 4 Administering and Securing SharePoint Content 213 Che aPt R 5 Service Applications and the Managed Metadata Service 283 Che aPt R 6 Configuring User Profiles and Social Networking 341 Che aPt R 7 Administering SharePoint Search 393 Che aPt R 8 Implementing Enterprise Service Applications 453 Che aPt R 9 Deploying and Upgrading to SharePoint 2010 521 Che aPt R 10 Administering SharePoint Customization 571 Che aPt R 11 Implementing Business Continuity 625 Che aPt R 12 Monitoring and Optimizing SharePoint Performance 675 Answers 741 Index 773 Contents introduction xxiii System Requirements. .xxiii Using the Companion CD . .......................................xxvi Acknowledgments . .............................................xxix Support & Feedback. xxix chapter 1 Creating a SharePoint 2010 intranet 1 Before You Begin. 1 Lesson 1: Prepare for SharePoint 2010 . .............................. 3 Prepare the Server Infrastructure 3 Prepare User Accounts for SharePoint Administration and Services 8 Install SharePoint Prerequisites 12 Lesson Summary 19 Lesson Review 19 Lesson 2: Install and Configure SharePoint 2010. 21 Prepare for Installation and Configuration 21 Install the SharePoint Binaries 22 Configure the SharePoint Server 26 Configure the Farm 28 Perform Post-Installation Configuration 31 Lesson Summary 37 Lesson Review 37 What do you think of this book? We want to hear from you! Microsoft is interested in hearing your feedback so we can continually improve our books and learning resources for you. To participate in a brief online survey, please visit: www.microsoft.com/learning/booksurvey/ vii Lesson 3: Create a SharePoint Intranet . ............................. 39 SharePoint Logical Structure 39 Request a Page from a SharePoint Site 40 Create a Web Application 41 Create a Site Collection 43 Create a List or Library 45 Lesson Summary 49 Lesson Review 50 Chapter Review . ................................................. 51 Chapter Summary. 51 Key Terms. 51 Case Scenario: Deploying SharePoint Servers and Farms . ............. 52 Take a Practice Test. 52 chapter 2 Administering and automating SharePoint 53 Before You Begin. 53 Lesson 1: SharePoint Administrative Roles and Interfaces. 55 Administrative Roles 55 SharePoint Administrative Tools 61 Stsadm 61 Windows PowerShell 62 SharePoint 2010 Management Shell 62 Central Administration 62 Lesson Summary 66 Lesson Review 66 Lesson 2: Automate SharePoint Operations with Windows PowerShell. 68 Introducing Windows PowerShell 69 SharePoint 2010 Management Shell 70 cmdlets 70 Get-Help 71 Objects 72 Pipeline 73 Aliases 75 viii contents Examine and Document the SharePoint Logical Structure Using Windows PowerShell 76 Create a SharePoint Intranet Using Windows PowerShell 87 Variables 89 Iterate with ForEach-Object (Aliases: %, ForEach) 90 Create Multiple Websites with a Windows PowerShell Script 92 Iterate with the For-Each Statement 92 Windows PowerShell Scripts 93 Local, Global, and Remote Commands 95 The SharePoint Management Shell Windows PowerShell Profile 96 Delegate Permissions to Use Windows PowerShell 96 Lesson Summary 102 Lesson Review 102 Chapter Review . ................................................ 104 Chapter Summary. 104 Key Terms. 104 Case Scenario: Reporting Properties of the SharePoint Farm. 105 Suggested Practices . ............................................ 105 Practice 1: Explore the Security-Trimmed Administrative Interfaces 105 Practice 2: Administer User Roles Using Windows PowerShell 105 Take a Practice Test. 106 chapter 3 Managing Web applications 107 Before You Begin. 107 Lesson 1: Configure Web Applications . ............................ 109 Understand Web Applications and IIS Web Sites 110 Configure a New Web Application 113 Delete a Web Application 119 Secure Communication with a Web Application Using SSL 120 Configure Web Applications 123 Lesson Summary 137 Lesson Review 137 contents ix Lesson 2: Configure Authentication. 139 Configure Anonymous Access 139 Understand Authentication Types 144 Configure Classic Mode Authentication 144 Windows Authentication Methods 148 Configure Kerberos Authentication 151 Additional Windows Authentication Methods 155 Understand Claims Based Authentication 157 Configure Windows-Claims Authentication 162 Configure Forms Based Authentication 165 Configure SAML Token Authentication 173 Multiple Authentication Providers 175 Choose an Authentication Type 175 Convert Web Applications to Claims Authentication 176 Lesson Summary 181 Lesson Review 182 Lesson 3: Configure Authentication Zones and Alternate Access Mappings. 185 Requesting SharePoint Content: Access Mappings, Zones, and URLs 185 Access Mappings 189 Manage Zones 195 Multiple Zones 198 Lesson Summary 204 Lesson Review
Recommended publications
  • Security on the Mainframe Stay Connected to IBM Redbooks
    Front cover Security on the IBM Mainframe Operating system and application security IBM Security Blueprint and Framework IBM mainframe security concepts Karan Singh Lennie Dymoke-Bradshaw Thomas Castiglion Pekka Hanninen Vincente Ranieri Junior Patrick Kappeler ibm.com/redbooks International Technical Support Organization Security on the IBM Mainframe April 2010 SG24-7803-00 Note: Before using this information and the product it supports, read the information in “Notices” on page ix. First Edition (April 2010) This edition applies to the IBM System z10 Enterprise Class server, the IBM System z10 Business Class server, and Version 1, Release 11, Modification 0 of z/OS (product number 5694-A01). © Copyright International Business Machines Corporation 2010. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . ix Trademarks . .x Preface . xi The team who wrote this book . xi Now you can become a published author, too! . xii Comments welcome. xii Stay connected to IBM Redbooks . xiii Part 1. Introduction . 1 Chapter 1. Introduction. 3 1.1 IBM Security Framework. 4 1.1.1 People and identity . 5 1.1.2 Data and information. 5 1.1.3 Application and process . 5 1.1.4 Network, server, and endpoint . 5 1.1.5 Physical Infrastructure . 6 1.2 Framework and Blueprint . 7 1.3 IBM Security Blueprint. 7 Chapter 2. Security of the IBM Mainframe: yesterday and today . 13 2.1 Operating systems . 14 2.1.1 z/OS operating system family . 14 2.1.2 z/VM Hypervisor family .
    [Show full text]
  • Microsoft Software License Terms for a Virtual Hard Disk Image of Evaluation Copies of the Microsoft Products Identified in Exhibit A
    MICROSOFT SOFTWARE LICENSE TERMS FOR A VIRTUAL HARD DISK IMAGE OF EVALUATION COPIES OF THE MICROSOFT PRODUCTS IDENTIFIED IN EXHIBIT A These license terms are an agreement between Microsoft Corporation (or based on where you live, one of its affiliates) and you. Please read them. They apply to the evaluation software named above, which includes the media on which you received it, if any. The terms also apply to any Microsoft Internet-based services for this software. BY ACCESSING OR USING THE SOFTWARE, YOU ACCEPT THIS AGREEMENT. IF YOU DO NOT ACCEPT THIS AGREEMENT, YOU MAY NOT ACCESS OR USE THE SOFTWARE. AS DESCRIBED BELOW, USING SOME FEATURES ALSO OPERATES AS YOUR CONSENT TO THE TRANSMISSION OF CERTAIN STANDARD COMPUTER INFORMATION FOR INTERNET-BASED SERVICES. If you comply with this agreement, you have the rights below. 1. ACCESS AND USE RIGHTS. The terms of this agreement supersede the terms of any Microsoft software license term agreement that you may encounter in this software. You may use the Virtual Hard Disk (VHD) formats, including Microsoft Virtual PC or Microsoft Virtual Server. You may use the software only to demonstrate and internally evaluate it. You may not use the software in a live operating environment. The software is licensed as a single piece of software. You may not separate its component parts. You may access or use on more than one device. The Exceptions and Additional Terms for Particular Products as included in Exhibit A. 2. INTERNET-BASED SERVICES. Microsoft may provide Internet-based services with the software. It may change or cancel them at any time.
    [Show full text]
  • Starting from Gabry.125Q + Questions in Other Dumps Starting from Last
    Starting from Gabry.125q + questions in other dumps Number : 70-518 Passing Score : 800 Time Limit : 120 min File Version : 10.0 http://www.gratisexam.com/ Starting from last one of Garby.125q + questions from other dumps The questions in the sections: - Investigate (16) - From Other Dumps (19) - From Other Dumps 70-511? (5) require further investigation (though other answers given maybe questionable as well) In Short: Find your own answers! Some Q&A's seem duplicates, but they are mostly slight variations. Q36, Q37 and Q142 Q49, Q89 and Q143 Q76 and Q141 Q99 and Q130 (copies exist in Exam B for easy comparison) Sections 1. Investigate 2. From Other Dumps 3. From Other Dumps 70-511? Exam A QUESTION 1 You are designing a .NET Framework 4 solution. The solution contains a Windows Presentation Foundation (WPF) application and a Windows Communication Foundation (WCF) Web service. The WPF application uses the WCF Web service to store data in a Microsoft SQL Server 2008 database. You have the following requirements: Ensure that the WPF application functions while users' computers are offline. Minimize the time spent sending data to the WCF Web service. Minimize disk space requirements for data storage. You need to recommend an approach for synchronizing data between the WPF application and the database. Which two actions should you recommend? (Each correct answer presents part of the solution. Choose two.) A. Store data in custom business objects. Serialize data locally by using custom serialization. B. Create a local caching solution that periodically checks for Internet connectivity, uses local memory, and batches changes to the WCF Web service.
    [Show full text]
  • IBM Security Access Manager Version 9.0.7 June 2019: Advanced Access Control Configuration Topics Contents
    IBM Security Access Manager Version 9.0.7 June 2019 Advanced Access Control Configuration topics IBM IBM Security Access Manager Version 9.0.7 June 2019 Advanced Access Control Configuration topics IBM ii IBM Security Access Manager Version 9.0.7 June 2019: Advanced Access Control Configuration topics Contents Figures .............. vii Configuring authentication ........ 39 Configuring an HOTP one-time password Tables ............... ix mechanism .............. 40 Configuring a TOTP one-time password mechanism 42 Configuring a MAC one-time password mechanism 45 Chapter 1. Upgrading configuration ... 1 Configuring an RSA one-time password mechanism 46 Upgrading external databases with the dbupdate tool Configuring one-time password delivery methods 50 (for appliance at version 9.0.0.0 and later) .... 2 Configuring username and password authentication 54 Upgrading a SolidDB external database (for Configuring an HTTP redirect authentication appliance versions earlier than 9.0.0.0) ...... 3 mechanism .............. 56 Upgrading a DB2 external runtime database (for Configuring consent to device registration .... 57 appliance versions earlier than 9.0.0.0) ...... 4 Configuring an End-User License Agreement Upgrading an Oracle external runtime database (for authentication mechanism ......... 59 appliance versions earlier than 9.0.0.0) ...... 5 Configuring an Email Message mechanism .... 60 Setting backward compatibility mode for one-time HTML format for OTP email messages .... 62 password ............... 6 Configuring the reCAPTCHA Verification Updating template files ........... 6 authentication mechanism ......... 62 Updating PreTokenGeneration to limit OAuth tokens 7 Configuring an Info Map authentication mechanism 64 Reviewing existing Web Reverse Proxy instance point Embedding reCAPTCHA verification in an Info of contact settings ............ 8 Map mechanism ............ 66 Upgrading the signing algorithms of existing policy Available parameters in Info Map .....
    [Show full text]
  • Middleware in Action 2007
    Technology Assessment from Ken North Computing, LLC Middleware in Action Industrial Strength Data Access May 2007 Middleware in Action: Industrial Strength Data Access Table of Contents 1.0 Introduction ............................................................................................................. 2 Mature Technology .........................................................................................................3 Scalability, Interoperability, High Availability ...................................................................5 Components, XML and Services-Oriented Architecture..................................................6 Best-of-Breed Middleware...............................................................................................7 Pay Now or Pay Later .....................................................................................................7 2.0 Architectures for Distributed Computing.................................................................. 8 2.1 Leveraging Infrastructure ........................................................................................ 8 2.2 Multi-Tier, N-Tier Architecture ................................................................................. 9 2.3 Persistence, Client-Server Databases, Distributed Data ....................................... 10 Client-Server SQL Processing ......................................................................................10 Client Libraries ..............................................................................................................
    [Show full text]
  • Pdf/Idm Tech Wp 11G R1.Pdf
    Oracle® Fusion Middleware Integration Overview for Oracle Identity Management Suite 11g Release 1 (11.1.1) E15477-03 August 2012 Oracle Fusion Middleware Integration Overview for Oracle Identity Management Suite, 11g Release 1 (11.1.1) E15477-03 Copyright © 2010, 2012, Oracle and/or its affiliates. All rights reserved. Primary Author: Vinaye Misra Contributors: Sidhartha Das, Ellen Desmond, Subbu Devulapalli, Sandy Lii, Kavya Muthanna, Sanjay Rallapalli, Vinay Shukla, Olaf Stullich, Lyju Vadassery, Mark Wilcox This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs.
    [Show full text]
  • Sinhronizacija Podatkovnih Virov Z Uporabo Sinhronizacijskega Ogrodja Microsoft Sync Framework
    UNIVERZA V LJUBLJANI FAKULTETA ZA RAČUNALNIŠTVO IN INFORMATIKO Martin Breskvar Sinhronizacija podatkovnih virov z uporabo sinhronizacijskega ogrodja Microsoft Sync Framework DIPLOMSKO DELO NA UNIVERZITETNEM ŠTUDIJU Mentor: doc. dr. Matija Marolt Ljubljana, 2011 I Z J A V A O A V T O R S T V U diplomskega dela Spodaj podpisani Martin Breskvar, z vpisno številko 63030139 sem avtor diplomskega dela z naslovom: Sinhronizacija podatkovnih virov z uporabo sinhronizacijskega ogrodja Microsoft Sync Framework. S svojim podpisom zagotavljam, da: sem diplomsko delo izdelal samostojno pod mentorstvom doc. dr. Matije Marolta so elektronska oblika diplomskega dela, naslov (slov., angl.), povzetek (slov., angl.) ter ključne besede (slov., angl.) identični s tiskano obliko diplomskega dela soglašam z javno objavo elektronske oblike diplomskega dela v zbirki „Dela FRI“ V Ljubljani, dne 15.9.2011 Podpis avtorja: ZAHVALA Na tem mestu se zahvaljujem mentorju doc. dr. Matiji Maroltu za nasvete, predloge in potrpežljivost pri nastajanju tega diplomskega dela. Zahvaljujem se Mateji za neumorno vzpodbudo ter vsem ostalim, ki so me nesebično podpirali v času mojega študija. Iskrena hvala. To delo je posvečeno moji mami. Kazalo 1 Uvod ......................................................................................................................... 1 1.1 Motivacija in namen diplomskega dela ...................................................................... 2 1.2 Predvideni rezultati in možnost njihove uporabe .....................................................
    [Show full text]
  • Comparing OLE DB and ODBC This Document Compares the Basic Features of OLE DB to the Basic Features of ODBC (Open Database Connectivity)
    Comparing OLE DB and ODBC This document compares the basic features of OLE DB to the basic features of ODBC (Open Database Connectivity). It is intended to help clarify when to use one over the other. Introduction OLE DB and ODBC are both specifications created by Microsoft to address universal data access. Each is intended as an industry standard that will make access between one vendor's data store and another vendor's data consumer seamless. Microsoft's definition of OLE DB is a strategic system-level programming interface to data across the organization. OLE DB is an open specification designed to build on the success of ODBC by providing an open standard for accessing all kinds of data. And the definition of ODBC is an industry standard and a component of Microsoft® Windows® Open Services Architecture (WOSA). The ODBC interface makes it possible for applications to access data from a variety of database management systems (DBMSs). ODBC permits maximum interoperability—an application can access data in diverse DBMSs through a single interface. Furthermore, that application will be independent of any DBMS from which it accesses data. Users of the application can add software components called drivers, which create an interface between an application and a specific DBMS. The two primary differences between the two are • OLE DB is a component based specification and ODBC is a procedural based specification • SQL is the core of accessing data using ODBC but just one of the means of data access through OLE DB • ODBC is constrained to relational data stores; OLE DB supports all forms of data stores (relational, hierarchical, etc) In general, OLE DB provides a richer and more flexible interface for data access because it is not tightly bound to a command syntax (like SQL in the case of ODBC).
    [Show full text]
  • Technical Reference for Microsoft Sharepoint Server 2010
    Technical reference for Microsoft SharePoint Server 2010 Microsoft Corporation Published: May 2011 Author: Microsoft Office System and Servers Team ([email protected]) Abstract This book contains technical information about the Microsoft SharePoint Server 2010 provider for Windows PowerShell and other helpful reference information about general settings, security, and tools. The audiences for this book include application specialists, line-of-business application specialists, and IT administrators who work with SharePoint Server 2010. The content in this book is a copy of selected content in the SharePoint Server 2010 technical library (http://go.microsoft.com/fwlink/?LinkId=181463) as of the publication date. For the most current content, see the technical library on the Web. This document is provided “as-is”. Information and views expressed in this document, including URL and other Internet Web site references, may change without notice. You bear the risk of using it. Some examples depicted herein are provided for illustration only and are fictitious. No real association or connection is intended or should be inferred. This document does not provide you with any legal rights to any intellectual property in any Microsoft product. You may copy and use this document for your internal, reference purposes. © 2011 Microsoft Corporation. All rights reserved. Microsoft, Access, Active Directory, Backstage, Excel, Groove, Hotmail, InfoPath, Internet Explorer, Outlook, PerformancePoint, PowerPoint, SharePoint, Silverlight, Windows, Windows Live, Windows Mobile, Windows PowerShell, Windows Server, and Windows Vista are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication.
    [Show full text]
  • Dot Net Programming CLASS: TYBBA(CA) V SEM (2013 PATTERN)
    DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45 Subject: 503 : Dot Net Programming CLASS: TYBBA(CA) V SEM (2013 PATTERN) Unit 1 :Introduction to .Net Framework Introduction to .NET Framework .NET is a software framework which is designed and developed by Microsoft. The first version of the .Net framework was 1.0 which came in the year 2002. In easy words, it is a virtual machine for compiling and executing programs written in different languages like C#, VB.Net etc. It is used to develop Form-based applications, Web-based applications, and Web services. There is a variety of programming languages available on the .Net platform, VB.Net and C# being the most common ones. It is used to build applications for Windows, phone, web, etc. It provides a lot of functionalities and also supports industry standards. .NET Framework supports more than 60 programming languages in which 11 programming languages are designed and developed by Microsoft. The remaining Non-Microsoft Languages which are supported by .NET Framework but not designed and developed by Microsoft. Common Language Runtime(CLR): CLR is the basic and Virtual Machine component of the .NET Framework. It is the run-time environment in the .NET Framework that runs the codes and helps in making the development process easier by providing the various services such as remoting, thread management, type-safety, memory management, robustness, etc.. Basically, it is responsible for managing the execution of .NET programs regardless of any .NET programming language. It also helps in the management of code, as code that targets the runtime is known as the Managed Code and code doesn’t target to runtime is known as Unmanaged code.
    [Show full text]
  • Syncstudio Requirements
    Hardware and Software Requirements The SyncStudio Sync Management Console and the custom generate Sync Web Service run on Windows OS systems. We support Windows 7, 8.1, 10 and Windows Server 2012 or 2016. Win XP is not supported. For production environments, we recommend Windows Server. We support both virtual and physical machines. The machine needs to have IIS 7 or above installed, enabled and with the features/roles as per our quick start guide. .NET Framework 3.5 is the minimum but 4.6 or higher is recommended. The server database can be either MS SQL SERVER or MS SQL EXPRESS versions 2008, 2010, 2012, 2014, 2016. Version 2014 and above is recommended. If you don’t have MS SQL Server, you can download SQL Server Express from this link: MS SQL Server 2016 Express Edition In SQL add login NT AUTHORITY\NETWORK SERVICE and make it a db owner of the selected SQL database. Visual Studio – SyncStudio depends on portions of Visual Studio to perform automated code generation. If you’ve installed a full license of Visual Studio 2010 or above, then you are good to go. If you do not own a full license, then you can use the Free Visual Studio Express or Visual Studio Integration Shell 2010. Minimum Microsoft Visual Studio 2010 or 2012 SyncStudio does not require that you own a full license of Visual Studio. You do however need to have installed one of the following… - Microsoft Visual Studio Integration Shell 2010 - Microsoft Visual Studio Express for Web 2010 or 2012 - Microsoft Visual Studio 2010 or 2012 full license Windows Firewall - Turn off firewall or configure pass thru as needed.
    [Show full text]
  • Autocad 2008 驱动程序和外围设备手册
    <$nopage>: <$nopage>: <$nopage>, <$nopage>: <$nopage>: <$nopage><$nopage>, <$nopage> (DWT) :, <$nopage> (DWT) : , <$nopage> (DWT) :, <$nopage> (DWT) :, <$nopage>, <$nopage>, <$nopage>, <$nopage>: <$nopage>, <$nopage>, <$nopage>: <$nopage>:, <$nopage>:, <$nopage>:, <$nopage>:, <$nopage>:, <$nopage>:, <$nopage>:, <$nopage>:, <$nopage>: , <$nopage>:, <$nopage>:, <$nopage>:, <$nopage>:, <$nopage> , <$nopage>: <$nopage>: <$nopage>:, <$nopage>:, <$nopage>:: <$nopage>, <$nopage> (UCS): <$nopage>: <$nopage>:, <$nopage>: , <$nopage>:, <$nopage>:, <$nopage>:, <$nopage>:, <$nopage> :, <$nopage>:, <$nopage>:, <$nopage>:, <$nopage>:, <$nopage>:, <$nopage>:, <$nopage><$nopage>, <$nopage>:, <$nopage>, <$nopage>Intellimouse, AutoCAD 2008 > 10 1 AutoCAD 2008 > > > OPTIONS OPTIONS PAN ZOOM MBUTTONPAN SHORTCUTMENU ZOOMFACTOR AutoCAD 2008 > > > OPTIONS OPTIONS REINIT / TABLET TABMODE <$nopage>D3D <$nopage>OGL AutoCAD 2008 > AutoCAD AutoCAD AutoCAD OpenGL (OGL) Direct 3D (D3D) AutoCAD 2008 > > > 3DCONFIG AutoCAD 2008 > > > 3DCONFIG AutoCAD 2008 > HDIHeidi ® HDI HDI (PC3) PC3 “” PC3 “” PC3 “” (PC3) Windows “” AutoCAD 2008 > > > PLOT PLOTTERMANAGER “” AutoCAD 2008 > > > PAGESETUP PCINWIZARD PCP PC2 “” PLOT PLOTTERMANAGER “” AutoCAD 2008 > > > PLOTTERMANAGER “” AutoCAD 2008 > > PC3 > PC3 PLOTTERMANAGER “” AutoCAD 2008 > > PC3 > PC3 PC3 PMP PMP HDI AutoCAD 2008 > > PC3 > > PLOTTERMANAGER “” AutoCAD 2008 > > PC3 > > PLOTTERMANAGER “” AutoCAD 2008 > > PC3 > > PLOTTERMANAGER “” AutoCAD 2008 > > PC3 > > PLOTTERMANAGER “” AutoCAD 2008 > > PC3 > > PLOTTERMANAGER “”
    [Show full text]