Avatar billede aras2000 Nybegynder
30. april 2002 - 09:55 Der er 2 kommentarer og
1 løsning

HJÆLP : SP3 ødelagde min enterprise manager..

Hej Alle.

Jeg har fornyligt installeret sp3 på min SQL server7 (u.s. version) på en NT4 u.s. version, ligeledes. Installationen forløb gnidningsfrit men nu kan jeg ikke logge på min server med Enterprise manageren ! Jeg får følgende fejl når jeg prøver at klikke på serveren (for at åbne databaselisten etc.) :

"A connection could not be established to <maskine navn> -
SqlDumpExceptionHandler: Process 22 generated fatal exception c0000005
EXCEPTION_ACCESS_VIOLATION. SQL Server is terminating this process.

Please verify SQL server is running and check your SQL Server registration
properties (by right-clicking on the <maskine navn> node) and try again."

I event vieweren kommer der 2 beskeder hver gang jeg prøver at ovenstående:

"Error: 0, Severity: 19, State: 0
language_exec: Process 12 generated an access violation. SQL Server is terminating this process."

"Error: 0, Severity: 19, State: 0
SqlDumpExceptionHandler: Process 12 generated fatal exception c0000005 EXCEPTION_ACCESS_VIOLATION. SQL Server is terminating this process."

Jeg afprøvede sp3 på en "test maskine" (identisk hardware/software) inden den røg på produktionsmaskinen. Alt virker på denne :(

En lille ting er at jeg i tidernes morgen lavede en rebuildm.exe på produktionsmaskinen for at ændre karaktersættet (til dansk/norsk).

Jeg vil sætte stort pris på ethvert forsøg på svar da det er en kritisk fejl.

Mvh
Allan R.
Avatar billede aras2000 Nybegynder
30. april 2002 - 10:34 #2
Hej. Link #2 er nytting men giver desværre ikke noget svar :(

Her er et uddrag fra log filen :

2002-04-29 15:48:29.04 kernel  Microsoft SQL Server  7.00 - 7.00.961 (Intel X86)
    Oct 24 2000 18:39:12
    Copyright (c) 1988-1998 Microsoft Corporation
    Standard Edition on Windows NT 4.0 (Build 1381: Service Pack 6)

2002-04-29 15:48:29.04 kernel  Copyright (C) 1988-1997 Microsoft Corporation.
2002-04-29 15:48:29.04 kernel  All rights reserved.
2002-04-29 15:48:29.04 kernel  Logging SQL Server messages in file 'e:\MSSQL7\log\ERRORLOG'.
2002-04-29 15:48:29.09 kernel  initconfig: Number of user connections limited to 32767.
2002-04-29 15:48:29.09 kernel  SQL Server is starting at priority class 'normal'(2 CPUs detected).
2002-04-29 15:48:29.18 kernel  User Mode Scheduler configured for thread processing
2002-04-29 15:48:31.40 server  Directory Size: 37867
2002-04-29 15:48:31.42 spid1    Using dynamic lock allocation. [2500] Lock Blocks, [5000] Lock Owner Blocks
2002-04-29 15:48:31.42 kernel  Attempting to initialize Distributed Transaction Coordinator.
2002-04-29 15:48:32.81 spid1    Starting up database 'master'.
2002-04-29 15:48:32.81 spid1    Opening file e:\MSSQL7\data\master.mdf.
2002-04-29 15:48:32.82 spid1    Opening file e:\MSSQL7\data\mastlog.ldf.
2002-04-29 15:48:32.89 spid1    Loading SQL Server's  Unicode collation.
2002-04-29 15:48:32.92 spid1    Loading SQL Server's  non-Unicode sort order and character set.
2002-04-29 15:48:33.03 spid1    5 transactions rolled forward in database 'master' (1).
2002-04-29 15:48:33.48 spid1    0 transactions rolled back in database 'master' (1).
2002-04-29 15:48:33.62 spid1    Starting up database 'model'.
2002-04-29 15:48:33.62 spid1    Opening file e:\MSSQL7\DATA\model.mdf.
2002-04-29 15:48:33.68 spid1    Opening file e:\MSSQL7\DATA\modellog.ldf.
2002-04-29 15:48:33.76 spid1    Clearing tempdb database.
2002-04-29 15:48:33.81 spid1    Creating file e:\MSSQL7\DATA\TEMPDB.MDF.
2002-04-29 15:48:33.93 spid1    Closing file e:\MSSQL7\DATA\TEMPDB.MDF.
2002-04-29 15:48:33.99 spid1    Creating file e:\MSSQL7\DATA\TEMPLOG.LDF.
2002-04-29 15:48:34.04 spid1    Closing file e:\MSSQL7\DATA\TEMPLOG.LDF.
2002-04-29 15:48:34.09 spid1    Opening file e:\MSSQL7\DATA\TEMPDB.MDF.
2002-04-29 15:48:34.10 spid1    Opening file e:\MSSQL7\DATA\TEMPLOG.LDF.
2002-04-29 15:48:34.37 spid1    Closing file e:\MSSQL7\DATA\TEMPDB.MDF.
2002-04-29 15:48:34.43 spid1    Closing file e:\MSSQL7\DATA\TEMPLOG.LDF.
2002-04-29 15:48:34.46 spid1    Starting up database 'tempdb'.
2002-04-29 15:48:34.46 spid1    Opening file e:\MSSQL7\DATA\TEMPDB.MDF.
2002-04-29 15:48:34.48 spid1    Opening file e:\MSSQL7\DATA\TEMPLOG.LDF.
2002-04-29 15:48:34.56 spid1    Server name is 'WWW5'.
2002-04-29 15:48:34.56 kernel  Using 'SQLEVN70.DLL' version '7.00.961'.
2002-04-29 15:48:34.56 kernel  Using 'OPENDS60.DLL' version '7.00.00.0961'.
2002-04-29 15:48:34.56 ods      Using 'SSNMPN70.DLL' version '7.0.694' to listen on '\\.\pipe\sql\query'.
2002-04-29 15:48:34.57 ods      Using 'SSMSSO70.DLL' version '7.0.694' to listen on '1433'.
2002-04-29 15:48:34.60 ods      Using 'SSMSRP70.DLL' version '7.0.961' to listen on 'WWW5'.
2002-04-29 15:48:35.01 spid6    Starting up database 'msdb'.
2002-04-29 15:48:35.01 spid6    Opening file e:\MSSQL7\DATA\msdbdata.mdf.
2002-04-29 15:48:35.01 spid7    Starting up database 'pubs'.
2002-04-29 15:48:35.01 spid7    Opening file e:\MSSQL7\DATA\pubs.mdf.
2002-04-29 15:48:35.06 spid8    Starting up database 'Northwind'.
2002-04-29 15:48:35.06 spid8    Opening file e:\MSSQL7\DATA\northwnd.mdf.
2002-04-29 15:48:35.06 spid9    Starting up database 'SydbankLikviditetsWeb'.
2002-04-29 15:48:35.06 spid9    Opening file e:\MSSQL7\data\SydbankLikviditetsWeb.mdf.
2002-04-29 15:48:35.10 spid10  Starting up database 'SydbankLikviditetsWeb_test'.
2002-04-29 15:48:35.10 spid10  Opening file e:\MSSQL7\data\SydbankLikviditetsWeb_test.mdf.
2002-04-29 15:48:35.17 spid9    Opening file e:\MSSQL7\data\SydbankLikviditetsWeb_log.ldf.
2002-04-29 15:48:35.18 spid7    Opening file e:\MSSQL7\DATA\pubs_log.ldf.
2002-04-29 15:48:35.21 spid6    Opening file e:\MSSQL7\DATA\msdblog.ldf.
2002-04-29 15:48:35.23 spid8    Opening file e:\MSSQL7\DATA\northwnd.ldf.
2002-04-29 15:48:35.28 spid10  Opening file e:\MSSQL7\data\SydbankLikviditetsWeb_test_log.ldf.
2002-04-29 15:48:35.57 spid1    Recovery complete.
2002-04-29 15:48:35.57 spid1    SQL Server's Unicode collation is:
2002-04-29 15:48:35.57 spid1            'norsk (bokmål)' (ID = 1044).
2002-04-29 15:48:35.57 spid1            comparison style = 196609.
2002-04-29 15:48:35.57 spid1    SQL Server's non-Unicode sort order is:
2002-04-29 15:48:35.57 spid1            'danno_nocasepref' (ID = 183).
2002-04-29 15:48:35.57 spid1    SQL Server's non-Unicode character set is:
2002-04-29 15:48:35.57 spid1            'iso_1' (ID = 1).
2002-04-29 15:48:42.14 spid10  Using 'sqlimage.dll' version '4.0.5'
2002-04-29 15:48:52.12 spid16  Using 'xpstar.dll' version '2000.12.12' to execute extended stored procedure 'sp_MSgetversion'.
Stack Dump being sent to e:\MSSQL7\log\SQL00222.dmp
2002-04-29 15:48:58.54 spid10  Error: 0, Severity: 19, State: 0
2002-04-29 15:48:58.54 spid10  SqlDumpExceptionHandler: Process 10 generated fatal exception c0000005 EXCEPTION_ACCESS_VIOLATION. SQL Server is terminating this process.
.
*******************************************************************************
*
* BEGIN STACK DUMP:
*  04/29/02 15:48:58 spid 10
*
*  Exception Address = 04004697 (Ordinal6 + 297)
*  Exception Code    = c0000005 E
*  Access Violation occurred writing address 00000004
* Input Buffer 54 bytes -
*  e x e c  s p _ M S d b u s e r p r i v  N ' v e r '
*
*
*  MODULE                          BASE      END      SIZE
* sqlservr                      00400000  008cffff  004d0000
* ntdll                          77f60000  77fbdfff  0005e000
* KERNEL32                      77f00000  77f5dfff  0005e000
* ADVAPI32                      77dc0000  77dfefff  0003f000
* USER32                        77e70000  77ec4fff  00055000
* GDI32                          77ed0000  77efbfff  0002c000
* RPCRT4                        77e10000  77e66fff  00057000
* ole32                          77b20000  77bd6fff  000b7000
* OLEAUT32                      65340000  653d1fff  00092000
* VERSION                        77a90000  77a9afff  0000b000
* SHELL32                        77c40000  77d7bfff  0013c000
* COMCTL32                      71590000  71616fff  00087000
* LZ32                          779c0000  779c7fff  00008000
* opends60                      41060000  41085fff  00026000
* ums                            41090000  4109cfff  0000d000
* MSVCRT                        78000000  7803ffff  00040000
* sqlsort                        04000000  0408efff  0008f000
* MSVCIRT                        780a0000  780b1fff  00012000
* sqlevn70                      410a0000  410a6fff  00007000
* rpcltc1                        77bf0000  77bf6fff  00007000
* COMNEVNT                      410b0000  410fefff  0004f000
* ODBC32                        1f700000  1f734fff  00035000
* comdlg32                      77d80000  77db1fff  00032000
* SQLWOA                        41100000  4110bfff  0000c000
* odbcint                        1f7f0000  1f803fff  00014000
* NDDEAPI                        75a80000  75a86fff  00007000
* WINSPOOL                      77c00000  77c17fff  00018000
* SQLTrace                      41130000  4117dfff  0004e000
* NETAPI32                      77800000  77839fff  0003a000
* NETRAP                        77840000  77848fff  00009000
* SAMLIB                        777e0000  777ecfff  0000d000
* SSNMPN70                      41190000  41195fff  00006000
* SSMSSO70                      411a0000  411aafff  0000b000
* WSOCK32                        776d0000  776d7fff  00008000
* WS2_32                        776b0000  776c3fff  00014000
* WS2HELP                        776a0000  776a6fff  00007000
* SSMSRP70                      411b0000  411b7fff  00008000
* ENUDTC                        69140000  69156fff  00017000
* XOLEHLP                        69360000  69368fff  00009000
* MTXCLU                        69790000  6979cfff  0000d000
* ADME                          69120000  69132fff  00013000
* DTCUtil                        69000000  69009fff  0000a000
* DTCTRACE                      68ff0000  68ff6fff  00007000
* CLUSAPI                        7f230000  7f23cfff  0000d000
* RESUTILS                      7f250000  7f259fff  0000a000
* MSDTCPRX                      69420000  69450fff  00031000
* DTCCM                          690b0000  690cdfff  0001e000
* msafd                          77660000  7766efff  0000f000
* wshtcpip                      77690000  77698fff  00009000
* rpclts1                        77e00000  77e05fff  00006000
* RpcLtScm                      74fa0000  74faafff  0000b000
* MSWSOCK                        77670000  77684fff  00015000
* rnr20                          74ff0000  74ffdfff  0000e000
* RpcLtCcm                      74fc0000  74fcefff  0000f000
* security                      76e70000  76e81fff  00012000
* msapsspc                      71700000  71710fff  00011000
* MSVCRT40                      779d0000  779e4fff  00015000
* schannel                      77400000  77428fff  00029000
* MSOSS                          14ef0000  14f14fff  00025000
* CRYPT32                        14f20000  14f7dfff  0005e000
* msnsspc                        716d0000  716eefff  0001f000
* digest                        14f80000  14f8dfff  0000e000
* SQLRGSTR                      156d0000  156d4fff  00005000
* sqlimage                      72a00000  72a2cfff  0002d000
*
*    Edi: 00000003:
*    Esi: 00000004:
*    Eax: 00000006:
*    Ebx: 00000006:
*    Ecx: 00000004:
*    Edx: 15314944: 00575825 1531c6e8 00000000 00000000 00760072 00650073
*    Eip: 04004697: 66847589 f6330000 015f840f ffff0000 b93c81f8 4d8b0e89
*    Ebp: 15314904: 00000006 000fff10 00000000 00000414 005bea83 15314954
*  SegCs: 0000001B:
* EFlags: 00010202: 005c003a 0043003b 006e0069 0042005c 00720065 006b006f
*    Esp: 153147EC: 00000000 00000000 02020ea2 02020e8a 02020e21 02020e91
*  SegSs: 00000023:
*******************************************************************************
-------------------------------------------------------------------------------
Short Stack Dump
0x04004697 Module(sqlsort+4697) (Ordinal6+297)
0x005bea83 Module(sqlservr+1bea83) (GetUnicodeRange+e7)
0x00575825 Module(sqlservr+175825) (CLikeRangeUtil::LikeRangeTransW+2ec)
0x00647680 Module(sqlservr+247680) (CXVariant::LikeRangeStart+7b)
0x0056d35b Module(sqlservr+16d35b) (COptExpr::PexprFoldMain+103c)
0x00443d71 Module(sqlservr+43d71) (COptExpr::PexprFoldMain+b8)
0x00443c08 Module(sqlservr+43c08) (COptExpr::PexprFold+3f)
0x004e0d3b Module(sqlservr+e0d3b) (CCvtTree::BuildSte+12e)
0x004e0c15 Module(sqlservr+e0c15) (BuildSteFromTree+39)
0x004e0b97 Module(sqlservr+e0b97) (CStmtCond::Init+4e)
0x00438530 Module(sqlservr+38530) (CCompPlan::FCompileStep+f23)
0x0043d00f Module(sqlservr+3d00f) (CProchdr::FCompile+5d9)
0x0040ec53 Module(sqlservr+ec53) (CSQLSource::FTransform+234)
0x0042140c Module(sqlservr+2140c) (CSQLObject::FTransform2+1ab)
0x004e1cdc Module(sqlservr+e1cdc) (CSQLObject::FGetFromDisk+627)
0x00420f96 Module(sqlservr+20f96) (CSQLObject::FTransform+21a)
0x0040e7b9 Module(sqlservr+e7b9) (CSQLSource::Execute+11d)
0x0046225f Module(sqlservr+6225f) (CStmtExec::XretLocalExec+127)
0x0046211e Module(sqlservr+6211e) (CStmtExec::XretExecute+253)
0x0040f487 Module(sqlservr+f487) (CMsqlExecContext::ExecuteStmts+11b)
0x0040ef35 Module(sqlservr+ef35) (CMsqlExecContext::Execute+16b)
-------------------------------------------------------------------------------
2002-04-29 15:48:59.06 spid10  Error: 0, Severity: 19, State: 0
2002-04-29 15:48:59.06 spid10  language_exec: Process 10 generated an access violation. SQL Server is terminating this process.
.
2002-04-29 15:50:26.54 spid9    Using 'sqlimage.dll' version '4.0.5'
Stack Dump being sent to e:\MSSQL7\log\SQL00223.dmp
2002-04-29 15:50:43.54 spid9    Error: 0, Severity: 19, State: 0
2002-04-29 15:50:43.54 spid9    SqlDumpExceptionHandler: Process 9 generated fatal exception c0000005 EXCEPTION_ACCESS_VIOLATION. SQL Server is terminating this process.
.
*******************************************************************************
*
* BEGIN STACK DUMP:
*  04/29/02 15:50:43 spid 9
*
*  Exception Address = 04004697 (Ordinal6 + 297)
*  Exception Code    = c0000005 E
*  Access Violation occurred writing address 00000004
* Input Buffer 54 bytes -
*  e x e c  s p _ M S d b u s e r p r i v  N ' v e r '
*
*
*  MODULE                          BASE      END      SIZE
* sqlservr                      00400000  008cffff  004d0000
* ntdll                          77f60000  77fbdfff  0005e000
* KERNEL32                      77f00000  77f5dfff  0005e000
* ADVAPI32                      77dc0000  77dfefff  0003f000
* USER32                        77e70000  77ec4fff  00055000
* GDI32                          77ed0000  77efbfff  0002c000
* RPCRT4                        77e10000  77e66fff  00057000
* ole32                          77b20000  77bd6fff  000b7000
* OLEAUT32                      65340000  653d1fff  00092000
* VERSION                        77a90000  77a9afff  0000b000
* SHELL32                        77c40000  77d7bfff  0013c000
* COMCTL32                      71590000  71616fff  00087000
* LZ32                          779c0000  779c7fff  00008000
* opends60                      41060000  41085fff  00026000
* ums                            41090000  4109cfff  0000d000
* MSVCRT                        78000000  7803ffff  00040000
* sqlsort                        04000000  0408efff  0008f000
* MSVCIRT                        780a0000  780b1fff  00012000
* sqlevn70                      410a0000  410a6fff  00007000
* rpcltc1                        77bf0000  77bf6fff  00007000
* COMNEVNT                      410b0000  410fefff  0004f000
* ODBC32                        1f700000  1f734fff  00035000
* comdlg32                      77d80000  77db1fff  00032000
* SQLWOA                        41100000  4110bfff  0000c000
* odbcint                        1f7f0000  1f803fff  00014000
* NDDEAPI                        75a80000  75a86fff  00007000
* WINSPOOL                      77c00000  77c17fff  00018000
* SQLTrace                      41130000  4117dfff  0004e000
* NETAPI32                      77800000  77839fff  0003a000
* NETRAP                        77840000  77848fff  00009000
* SAMLIB                        777e0000  777ecfff  0000d000
* SSNMPN70                      41190000  41195fff  00006000
* SSMSSO70                      411a0000  411aafff  0000b000
* WSOCK32                        776d0000  776d7fff  00008000
* WS2_32                        776b0000  776c3fff  00014000
* WS2HELP                        776a0000  776a6fff  00007000
* SSMSRP70                      411b0000  411b7fff  00008000
* ENUDTC                        69140000  69156fff  00017000
* XOLEHLP                        69360000  69368fff  00009000
* MTXCLU                        69790000  6979cfff  0000d000
* ADME                          69120000  69132fff  00013000
* DTCUtil                        69000000  69009fff  0000a000
* DTCTRACE                      68ff0000  68ff6fff  00007000
* CLUSAPI                        7f230000  7f23cfff  0000d000
* RESUTILS                      7f250000  7f259fff  0000a000
* MSDTCPRX                      69420000  69450fff  00031000
* DTCCM                          690b0000  690cdfff  0001e000
* msafd                          77660000  7766efff  0000f000
* wshtcpip                      77690000  77698fff  00009000
* rpclts1                        77e00000  77e05fff  00006000
* RpcLtScm                      74fa0000  74faafff  0000b000
* MSWSOCK                        77670000  77684fff  00015000
* rnr20                          74ff0000  74ffdfff  0000e000
* RpcLtCcm                      74fc0000  74fcefff  0000f000
* security                      76e70000  76e81fff  00012000
* msapsspc                      71700000  71710fff  00011000
* MSVCRT40                      779d0000  779e4fff  00015000
* schannel                      77400000  77428fff  00029000
* MSOSS                          14ef0000  14f14fff  00025000
* CRYPT32                        14f20000  14f7dfff  0005e000
* msnsspc                        716d0000  716eefff  0001f000
* digest                        14f80000  14f8dfff  0000e000
* SQLRGSTR                      156d0000  156d4fff  00005000
* xpstar                        17fb0000  17fe1fff  00032000
* SQLWID                        17ff0000  17ff5fff  00006000
* SQLSVC                        18000000  18018fff  00019000
* odbcbcp                        18020000  18025fff  00006000
* SQLRESLD                      18040000  18045fff  00006000
* W95SCM                        18050000  18057fff  00008000
* SQLSVC                        18060000  18065fff  00006000
* sqlimage                      72a00000  72a2cfff  0002d000
*
*    Edi: 00000003:
*    Esi: 00000004:
*    Eax: 00000006:
*    Ebx: 00000006:
*    Ecx: 00000004:
*    Edx: 16F24944: 00575825 16f2c6e8 00000000 00000000 00760072 00650073
*    Eip: 04004697: 66847589 f6330000 015f840f ffff0000 b93c81f8 4d8b0e89
*    Ebp: 16F24904: 00000006 000fff10 00000000 00000414 005bea83 16f24954
*  SegCs: 0000001B:
* EFlags: 00010202: 005c003a 0043003b 006e0069 0042005c 00720065 006b006f
*    Esp: 16F247EC: 00000000 00000000 02020ea2 02020e8a 02020e21 02020e91
*  SegSs: 00000023:
*******************************************************************************
-------------------------------------------------------------------------------
Short Stack Dump
0x04004697 Module(sqlsort+4697) (Ordinal6+297)
0x005bea83 Module(sqlservr+1bea83) (GetUnicodeRange+e7)
0x00575825 Module(sqlservr+175825) (CLikeRangeUtil::LikeRangeTransW+2ec)
0x00647680 Module(sqlservr+247680) (CXVariant::LikeRangeStart+7b)
0x0056d35b Module(sqlservr+16d35b) (COptExpr::PexprFoldMain+103c)
0x00443d71 Module(sqlservr+43d71) (COptExpr::PexprFoldMain+b8)
0x00443c08 Module(sqlservr+43c08) (COptExpr::PexprFold+3f)
0x004e0d3b Module(sqlservr+e0d3b) (CCvtTree::BuildSte+12e)
0x004e0c15 Module(sqlservr+e0c15) (BuildSteFromTree+39)
0x004e0b97 Module(sqlservr+e0b97) (CStmtCond::Init+4e)
0x00438530 Module(sqlservr+38530) (CCompPlan::FCompileStep+f23)
0x0043d00f Module(sqlservr+3d00f) (CProchdr::FCompile+5d9)
0x0040ec53 Module(sqlservr+ec53) (CSQLSource::FTransform+234)
0x0042140c Module(sqlservr+2140c) (CSQLObject::FTransform2+1ab)
0x004e1cdc Module(sqlservr+e1cdc) (CSQLObject::FGetFromDisk+627)
0x00420f96 Module(sqlservr+20f96) (CSQLObject::FTransform+21a)
0x0040e7b9 Module(sqlservr+e7b9) (CSQLSource::Execute+11d)
0x0046225f Module(sqlservr+6225f) (CStmtExec::XretLocalExec+127)
0x0046211e Module(sqlservr+6211e) (CStmtExec::XretExecute+253)
0x0040f487 Module(sqlservr+f487) (CMsqlExecContext::ExecuteStmts+11b)
0x0040ef35 Module(sqlservr+ef35) (CMsqlExecContext::Execute+16b)
-------------------------------------------------------------------------------
2002-04-29 15:50:43.87 spid9    Error: 0, Severity: 19, State: 0
2002-04-29 15:50:43.87 spid9    language_exec: Process 9 generated an access violation. SQL Server is terminating this process.
.
2002-04-29 15:52:51.54 spid12  Using 'sqlimage.dll' version '4.0.5'
Stack Dump being sent to e:\MSSQL7\log\SQL00224.dmp
2002-04-29 15:53:08.53 spid12  Error: 0, Severity: 19, State: 0
2002-04-29 15:53:08.53 spid12  SqlDumpExceptionHandler: Process 12 generated fatal exception c0000005 EXCEPTION_ACCESS_VIOLATION. SQL Server is terminating this process.
.
*******************************************************************************
Avatar billede aras2000 Nybegynder
02. maj 2002 - 10:53 #3
En microsoft gut ledte mig i retningen af løsningen. Sqlsort.dll var corrupted.
Avatar billede Ny bruger Nybegynder

Din løsning...

Tilladte BB-code-tags: [b]fed[/b] [i]kursiv[/i] [u]understreget[/u] Web- og emailadresser omdannes automatisk til links. Der sættes "nofollow" på alle links.

Loading billede Opret Preview
Kategori
Computerworld tilbyder specialiserede kurser i database-management

Log ind eller opret profil

Hov!

For at kunne deltage på Computerworld Eksperten skal du være logget ind.

Det er heldigvis nemt at oprette en bruger: Det tager to minutter og du kan vælge at bruge enten e-mail, Facebook eller Google som login.

Du kan også logge ind via nedenstående tjenester