Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


How to use a user of domain as a SQL server database login.

Answers were Sorted based on User's Feedback



How to use a user of domain as a SQL server database login...

Answer / rahul patil

Windows authentication.
MS SQL supports both type of authentication for users - SQL
& Windows. You have Active Directory & SQL is a member of
that then your can can use windows authentication.

Is This Answer Correct ?    4 Yes 0 No

How to use a user of domain as a SQL server database login...

Answer / vinayblr

select the login option as Windows authentication.

Is This Answer Correct ?    1 Yes 0 No

How to use a user of domain as a SQL server database login...

Answer / kiran

the first answer given i wrong

Is This Answer Correct ?    0 Yes 2 No

Post New Answer

More Networking AllOther Interview Questions

What is the difference between boundary level masking and non- boundary level masking? Give examples

1 Answers  


hi , can you Suggest me the books (with author names) to learn Network programming from basics. Thanks in Advance... Prakash

0 Answers  


If the transmitted code word is 10011000 and the received code word is 11001001. What is the error word ? Write transmitted code word , received code word and error word as polynomials.

0 Answers  


what is colour port? what is the use with it?

0 Answers   Mphasis,


packet switching methods ?

1 Answers   KPIT,


Could u Pl. explain all the 7 layers of network?

1 Answers  


How do cryptography-based keys ensure the validity of data transferred across the network?

1 Answers  


what is vpn and describe the diffrence between ras and vpn

1 Answers   jetking,


What is the difference between Win xp & win 2003?

1 Answers  


Explain what is meant by the term ‘integrated service digital network’. Give three reasons a company might choose an ISDN link in preference to a leased line.

0 Answers  


Why Use VSATs?

0 Answers   Hughes,


Discuss the following terms with respect to ATM: VPI, UNI, asynchronous, AAL, Cell, PVC.

0 Answers  


Categories
  • Networking Protocols Interview Questions Networking Protocols (671)
  • Networking Administration Interview Questions Networking Administration (1008)
  • Networking Security Interview Questions Networking Security (196)
  • Networking General Interview Questions Networking General (266)
  • Networking AllOther Interview Questions Networking AllOther (430)