PrepKing. PrepKing

Size: px
Start display at page:

Download "PrepKing. PrepKing"

Transcription

1 PrepKing Number: Passing Score: 800 Time Limit: 120 min File Version: PrepKing

2 Exam A QUESTION 1 You are an enterprise application developer. You design a data access component that interacts with a Microsoft SQL Server database. The component uses a database connection string. The database connection string is stored in clear text in the ConnectionStrings section of the application configuration file. During testing, you discover that the component might be vulnerable to SQL injection attacks. You need to adopt a strategy to protect the component from SQL injection attacks. What should you do? A. Replace all dynamic SQL statements with parameterized SQL statements that use strongly typed SQL parameters. B. Construct all dynamic SQL statements by using a SecureString object. C. Modify the method so that it throws an exception if the SQL statement does not return any rows. D. Encrypt the ConnectionStrings section of the configuration file. Correct Answer: A /Reference: QUESTION 2 You are an enterprise application developer. You are implementing a new component for an application. The component accesses a database to populate a list of customer objects and exposes a method that is named GetAllCustomers. The component uses a design pattern to access the database only on an as-needed basis. A caching mechanism exists in a lower tier of the application architecture. The component must not cache data. You need to implement the logic for populating a list of customer objects by using a database query. You also need to ensure that you meet the company guidelines for the component design pattern. What should you do? A. Execute a query in the constructor of the component to populate a field of type List<Customer>. Return the List reference in the call to the GetAllCustomers method. B. Execute a query in the static constructor of the component to populate a static field of type List<Customer>. Return the List reference in the call to the GetAllCustomers method. C. Execute a query in the GetAllCustomers method to populate a local variable of type List<Customer>. Return the List reference. D. Execute a query in the GetAllCustomers method to populate a field of type List<Customer> only if the field is null. Return the List reference. Correct Answer: C /Reference: QUESTION 3 You are an enterprise application developer. You are creating the first version of an application to manage rich text documents. The application must meet the following design requirements: Support the file system and a Microsoft SQL Server database as data stores. Ensure the following for future versions: o Add support for additional data stores, including network storage. o Acquire the ability to interface with thirdparty-distributed authoring and versioning tools.

3 Bring additional storage options online without having to redeploy the entire application. You need to identify an appropriate approach to meet these requirements. Which approach should you choose? A. Create a single Document component to represent the rich text content of a document and include methods on the component to persist and retrieve rich text for each type of data store. B. Create a single Document component to represent the rich text content of a document and an enumeration to represent each available data store. Include a parameter of the enumerated type in methods interfacing with a data store. C. Create a single Document component to represent the rich text content of a document and an enumeration to represent each available data store. Include a property on the Document component to permit the selection of a data store. D. Create a Document component to represent the rich text content of a document. Create a DocumentRepository component to manage the various data stores. Correct Answer: D /Reference: QUESTION 4 You are an enterprise application developer. You are creating an application that has a layered architecture as shown in the following diagram. A component that resides in the workflow layer manages transactions across one or more activities in the business logic layer. You need to make modifications to the component. You need to identify the layers that might require modification when the component in the workflow layer is modified. Which two layers should you identify? (Each correct answer presents part of the solution. Choose two.) A. Presentation layer B. Service fa?ade layer C. Business logic layer D. Data access layer Correct Answer: AB /Reference:

4 QUESTION 5 You are an enterprise application developer. You are creating a.net Remoting component. The Version 1.0 of the component is deployed as a well-known server-activated object. The strong- named component is installed into the global assembly cache. Ten distributed applications in your company utilize the component, and each application has an independent schedule for upgrades and deployment. You add new features to the component. These additions will change the signatures of the public methods on the component. You need to devise a deployment strategy for the component. What should you do? A. Deploy the component in place of the existing well-known object. B. Deploy the component as a well-known object. C. Increment the version number of the component assembly. Deploy the component in place of the existing well-known object. D. Increment the version number of the component assembly. Deploy the component as a new well-known object. Correct Answer: B /Reference: QUESTION 6 You are an enterprise application developer. You are creating a component that processes loan requests. Your component will be used inside Microsoft Windows Forms client applications. The loan request form is complex and time consuming to complete. Loan data is saved to a Microsoft SQL Server 2005 database. You need to ensure that in case of a system failure the loan officer does not need to re-enter any loan data. What should you do? A. Implement a private Save method that saves all property values to the database. Call the Save method from inside your components finalizer. B. Implement code inside the Set accessor for each property that saves the property value to the database. C. Implement a public Save method that saves all property values to a static variable. D. Implement code inside the Set accessor that saves the property value to a static variable. Correct Answer: B /Reference: QUESTION 7 You are an enterprise application developer. You create a component that generates medical documents. Your component is used by multiple document management systems. Users generate documents throughout the entire day and most documents are generated during business hours. You notice that user load is increasing

5 and performance is degrading. You need to identify sections of code on which to focus performance tuning efforts. Which two actions should you recommend? (Each correct answer presents part of the solution. Choose two.) A. Analyze the resource usage for the objects created in the component. B. Analyze the execution time for methods in the component. C. Analyze the time periods of peak frequency of document creation. D. Analyze which application users are generating the greatest number of documents. E. Analyze which client applications are generating the greatest number of documents. Correct Answer: AB /Reference: QUESTION 8 You are an enterprise application developer. You are creating a component that will be used in an order fulfillment process. The component performs the following two tasks: Modifies data in a local Microsoft SQL Server database Adds data to a remote SQL Server database The application that uses the component is multithreaded. Each application thread that uses the component creates its own instances of the component classes. You need to ensure that the component either performs both tasks successfully or performs neither task. What should you do? A. Use the System.Threading.Monitor class to synchronize the code segment that performs the data modifications and submits the message. B. Use classes in the System.Transactions namespace to enlist both tasks in a distributed transaction. C. Enable Multiple Active Result Sets (MARS) for each database connection. D. Use ADO.NET DataAdapter objects that are configured to support batch updates. Correct Answer: B /Reference: QUESTION 9 You are an enterprise application developer. You are creating a component that will be deployed as part of a class library. The component must meet the following specifications: The interface of the component must be accessible to components outside the hosting assembly. The interface of the component must be interoperable with components written in any other.net Framework languages. The implementation of the component cannot be expanded upon by a derived class. You need to design the interface of the component. Which three tasks should you perform? (Each correct answer presents part of the solution. Choose three.) A. Apply the CLSCompliant(true) attribute to the assembly and component definition. B. Apply the abstract keyword to the component definition.

6 C. Apply the ComVisible(true) attribute to the assembly and component definition. D. Create a primary interop assembly for the assembly that hosts your component. E. Apply the sealed keyword to the component definition. F. Apply the public keyword to the component definition. Correct Answer: AEF /Reference: QUESTION 10 You are an enterprise application developer. You are creating an application that will deploy an on-demand training program. The training is a combination of documents and video files that the user can ac cess from an internal server on the LAN. Users might access this application through their home computers when they are connected to the corporate network through a virtual private network (VPN). You need to design the video portion for the on-demand training program. You also need to ensure that users can view the videos without making modifications to their computer configuration. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) A. Create one file for all demonstrations. B. Create a set of files that have different qualities for different connection speeds. C. Create a set of files that have different formats for different players. D. Create a set of files for the corporate office and one set for the branch offices. E. Create a set of files for the VPN users. F. Create a set of files that require license keys to protect the content. Correct Answer: BC /Reference: QUESTION 11 You are an enterprise application developer. You create a component that executes queries against Microsoft SQL Server. The queries are executed inside the scope of a transaction. The transaction is started by using the SqlTransaction object. The code executes the query inside a Try block. You need to create an exception handling mechanism that rolls back the transaction under any error condition and notifies the caller of the error. What should you do? A. Use a catch block to catch all exceptions. Roll back the transaction and rethrow the exception inside the catch block. B. Place code to roll back the transaction inside a finally block. C. Place the SqlTransaction object inside a using statement. D. Use a catch block to catch all exceptions. Rethrow the exception inside the catch block and roll back the transaction in the finally block. Correct Answer: A /Reference:

7 QUESTION 12 You are an enterprise application developer for Woodgrove Bank. You are creating an application to manage different loan types. All loan types share a common implementation for interacting with the financial systems of Woodgrove. Each loan type must implement its own rules for calculating interest. In the first version of the application, you must support car loans and house loans. You need to develop an architecture for the different loan types within your application. What should you do? A. Implement Loan as an abstract class. Implement CarLoan and HouseLoan as concrete classes. B. Implement Loan as an interface. Implement CarLoan and HouseLoan as concrete classes. C. Implement Loan as a concrete class. Implement CarLoan and HouseLoan as interfaces. D. Implement Loan as a sealed class. Implement CarLoan and HouseLoan as abstract classes. Correct Answer: A /Reference: QUESTION 13 You are an enterprise application developer. You are creating an application to manage the inventories of 1,000 stores in geographically dispersed locations. The stores are connected to the main office through a secure network infrastructure. Inventory data from the store servers must be consolidated at the main office everyday. The main office initiates the consolidation by calling a component at the store. Transactional integrity must be maintained during consolidation. Security policy requires the application to propagate Microsoft Windows security context throughout the system to ensure authorization and authentication. Security policy does not permit Web servers at the stores. You need to recommend a reusable component technology that permits data from the store servers to be consolidated at the main office. You also need to ensure that the security policy requirements are met. What should you recommend? A. Web services B. Serviced components C..NET Remoting over HTTP D..NET Windows service Correct Answer: B /Reference: QUESTION 14 You are an enterprise application developer. You are designing an application that manages names and descriptions for your companys products. To manipulate these items, the application requires the object that holds the strings to meet the following criteria: Be dynamically resizable. Be able to store duplicate entries. Expose methods to find all instances of the same text. You need to recommend an appropriate container for the strings. What should you recommend? A. An ArrayList class B. A StringCollection class

8 C. A Hashtable class D. A DataTable class Correct Answer: D /Reference: QUESTION 15 You are an enterprise application developer. You design and develop an event logging strategy for a distributed system. The distributed system consists of a Web-based application, a Microsoft Windows service, and several Microsoft Windows-based applications. The event logging strategy must meet the following requirements: All system errors are logged and available to a central administration application. The data is available for historical analysis. The delivery mechanism is fault-tolerant and reliable. You need to recommend a system-wide event logging strategy. What should you recommend? A. Write events to the event log on each client computer. Use File Transfer Protocol (FTP) to send the events to the central server at the end of the day. B. Write events to a DataSet object. Serialize the results to the central server on a configurable timer. C. Write events to a Message Queue and import them into a database. D. Write a Web service that logs events to the centralized data store. Correct Answer: C /Reference: QUESTION 16 You are an enterprise application developer. You create a large-scale, managed application that needs a consistent approach to event logging. The application must format and log events to 20 destinations. Events from 15 sources must be collated onto a single computer. The application must perform the following tasks: Maintain consistent logging and instrumentation practices, both within an application and across the enterprise. Ease the learning curve for developers by using a consistent architectural model. Support custom implementations of formatters and event sinks. Generate log entries as discrete events or as part of a traced process. You need to select an appropriate implementation approach. Which approach should you choose? A. Use the Logging and Instrumentation Application Block from Enterprise Library. B. Write a custom event management component based upon the Publisher-Subscriber pattern. C. Use the EventLog component from Microsoft.NET Framework. D. Use the Message Queuing components from Enterprise Services. Correct Answer: A /Reference:

9 QUESTION 17 You are an enterprise application developer. You create a distributed invoicing solution. Operating requirements state that the memory that is used by the Microsoft Windows-based applications must not exceed a specified value. Technology requirements state that all execution failures must be reported. The Windows-based application must meet the following criteria: Alert system administrators when the memory usage reaches a critical value. Alert system administrators when a technical exception occurs. Log processor and disk space usage on all client computers. You need to select an event management implementation to meet the criteria. What should you choose? A. Tracing B. System Event Log C. Performance Counters D. Microsoft Windows Management Instrumentation (WMI) Correct Answer: D /Reference: QUESTION 18 You are an enterprise application developer. You are developing several Web services that are accessed by smart client applications. The Web services might be installed on different Web servers. The smart client applications must authenticate users by using credentials issued by a single sign-on service. The single sign-on service was developed by a different group in your organization. The security policy of the application includes the following requirements: User identity must be transmitted across application boundaries. User identity must be logged for auditing purposes. You need to choose a strategy to propagate user information securely across the application boundaries. What should you choose? A. Use remote method calls to pass user information between applications that use function parameters. B. Install business components in Enterprise Services and use Kerberos tickets to authenticate users. C. Use SOAP headers to pass user identity across application assemblies and log authentication information at each boundary. D. Use NTLM tokens to authenticate users and trusted Microsoft Windows domains. Correct Answer: C /Reference: QUESTION 19 You are an enterprise application developer. A Web-based application manages the employee information in your company. A rapid increase in the number of employees renders scalability difficult. You must suggest a component strategy that permits the application to scale as the number of employees grows. The component must implement the following application features:

10 It resides completely behind a company firewall. It has complex transactional and auditing requirements. It operates across multiple servers within the company. It provides runtime identity services for each employee. You need to choose a component type that implements these features in a scalable manner. You need to achieve this goal by using the least coding effort. Which component type should you choose? A..NET Framework remoting component B. Web services component C..NET Framework class library component D. Enterprise Services component Correct Answer: D /Reference: QUESTION 20 You are an enterprise application developer. You create 10 applications. Your companys application server will host the applications. You are responsible for designing a monitoring solution for the applications. Your monitoring solution must meet the following criteria: The solution must be reusable. The solution must aggregate all data into one display. You need to design a solution to meet the requirements. What should you do? A. Add performance counters and Microsoft Windows Management Instrumentation (WMI) events to each application. View the counter data in the Performance Monitor and develop a custom application to view the WMI data. B. Write data access code in each application to update a database table. Write an ASP.NET application to display the aggregated data. C. Develop a custom monitoring object. Use the object in each application. Aggregate the information from the custom object into a report and publish it to a Web server every hour. D. Write a Web service to store the monitored information. Write one Web method per application to retrieve the monitored data. Call the Web service from each application. Correct Answer: C /Reference: QUESTION 21 You are an enterprise application developer. You create a Microsoft Windows-based service application. The application must perform the following tasks: Monitor running processes for critical events. Log critical events to an and send the to the system administrators. Record and include stack information as part of the critical event. You must be able to configure application event logging at run time. Application event logging must have minimal impact on runtime performance. You need to choose an appropriate monitoring feature to fulfill these requirements. Which feature should you choose?

11 A. Microsoft Windows Management Instrumentation (WMI) events B. The System Event Log C. A custom TraceListener D. The Application Event Log Correct Answer: C /Reference: QUESTION 22 You are an enterprise application developer. You create a distributed application that transfers data across tiers. The application transfers multiple rows of data per transaction to business components through a Microsoft.NET Framework remoting channel. The application binds this data to user interface components. The.NET Framework remoting channel is configured to use binary serialization. After the data is retrieved from the data source, the data is not changed. The distributed application must meet the following criteria: Consume minimum memory for any data location. Make minimum use of the processor for any data location. You need to identify the type of object to serialize. Which object should you choose? A. A DataSet object B. A DataReader object C. An XmlReader object D. A DataTable object Correct Answer: D /Reference: QUESTION 23 You are an enterprise application developer. You create a data access layer for an order processing application. The data access layer meets the following criteria: The data access layer contains a GetConnectionString method to retrieve and return the connection string for the database. The data access layer contains a stored procedure named GetTotalOrderAmount. The stored procedure runs a select query to return only the sum of the OrderAmount column for the active orders. At times, there might be no active orders. You create the following method to execute the stored procedure and return the total. public double GetTotalOrderAmount() { SqlConnection con = new SqlConnection(GetConnectionString()); string sql = GetTotalOrderAmount; SqlCommand cmd = new SqlCommand(sql,con); IDataReader rd; con.open(); rd = cmd.executereader(); double amt = 0.0; if (rd.read()) { amt = rd.getdouble(0); }

12 rd.close(); con.close(); return amt; } You need to review the code and recommend modifications to simplify the code and improve performance, if necessary. What should you conclude and recommend? A. The code does not need to be modified. B. The code needs to be modified. You must remove the condition that verifies whether the DataReader objec t returned any rows. C. The code needs to be modified. You must use a DataSet object instead of a DataReader object. D. The code needs to be modified. You must use the ExecuteScalar method instead of the ExecuteReader method. Correct Answer: D /Reference: QUESTION 24 You are an enterprise application developer. You are manipulating a collection of customer, product, and supplier objects. The collection objects must fulfill the following requirements: The objects must use custom sort methods on different properties of the respective classes. The objects must be strongly typed. A developer from your team decides to use the following collection classes. abstract class MyCollectionBase : System.Collections.CollectionBase { abstract public void Sort(); } public class CustomerCollection : MyCollectionBase { //Code overriding CollectionBase methods public override void Sort(){ //Customer sorting code } } public class SupplierCollection : MyCollectionBase { //Code overriding CollectionBase methods public override void Sort(){ //Supplier sorting code } } public class ProductCollection : MyCollectionBase { //Code overriding CollectionBase methods public override void Sort(){ //Product sorting code } } You need to review the code and recommend improvements to simplify maintenance, if necessary. What should you conclude and recommend? A. The code does not need to be modified. B. The code needs to be modified. The MyCollectionBase class must implement the ICollection interface instead of inheriting from the CollectionBase class. C. The code needs to be modified. Use List<T> class instead of creating custom collections.

13 D. The code needs to be modified. The child collection classes must inherit from the CollectionBase class instead of the MyCollectionBase class. Correct Answer: C /Reference: QUESTION 25 You are an enterprise application developer. You create a Web service that wraps a business component to expose it through the Web. The business component contains two classes, the Utility class and the Facade class. The Utility class has private methods and internal methods. The Facade class has public methods. The Web service component has a Web service class that is named Services. The Services class performs security verification before the functions in the business component are called. The Services class relies on a class that is named Security in the Web service to implement the security verification. You have completed unit testing both components. You need to choose the class for which to write test cases for integration testing. Which class should you choose? A. Utility B. Facade C. Services D. Security Correct Answer: C /Reference: QUESTION 26 You are an enterprise application developer. You are designing unit test cases for an account management system of a regional bank. Before creating the application, you create the unit test scenarios by using

14 use cases. Three high-level use cases are outlined as shown in the following exhibit. You need to write unit tests to test the functionality inside the system. Which three sets of unit tests should you write? (Each correct answer presents part of the solution. Choose three.) A. Write tests that verify whether a teller and a branch manager can each enter transactions. B. Write tests that verify whether the correct customer details are retrieved when a valid customer ID is given. C. Write tests that verify whether the correct rows are entered in the Account database when a transaction is entered. D. Write tests that verify whether the branch manager can create a new customer account. E. Write tests that verify the details of an account after it is created. F. Write tests that verify whether a teller can look up customers by using a valid customer ID. Correct Answer: BCE /Reference: QUESTION 27 You are an enterprise application developer. Your team has created a distributed application that permits users to generate reports. The reports aggregate data from existing databases. You must move your new application into a test environment. You propose the following criteria: Compile the application components in release mode. Publish the ASP.NET files to the test Web server. Install the serviced components in component services on the application server. Backup the development database and restore it on the test database server. You need to evaluate the proposal and recommend accordingly. What should you recommend? A. The proposal will effectively test the application. B. The proposal will not effectively test the application. The ASP.NET files must remain in the development environment. You must only move the serviced components. C. The proposal will not effectively test the application. You must not move the database. The application must be modified to use an existing production database. D. The proposal will not effectively test the application. You must not move the database. The application must be modified to use an existing test database. Correct Answer: D /Reference: QUESTION 28 You are an enterprise application developer. You create an application that consists of a data access component and a business component. The business component calls the data access component to persist business objects. The Quality Analysis team tests both components and finds errors in the data access

15 component. These errors result in retrieval of wrong data. You need to reduce the errors in your code before the components are retested by the Quality Analysis team. What should you do? A. Perform integration testing on the business component and the data access component. B. Perform unit tests on the data access component. C. Perform stress tests on the data access component. D. Perform functional tests on the business component and the data access component. Correct Answer: B /Reference: QUESTION 29 You are an enterprise application developer. You create an application that consists of a Microsoft Windows service. Your Quality Analysis team finds and reports bugs that occur in the service application. You need to debug your Windows service code to fix the bugs. What should you do? A. Set breakpoints and execute the Windows service application code from Microsoft Visual Studio B. Install the Windows service and attach the debugger to the service from Microsoft Visual Studio Set breakpoints and execute the Windows service from the Service Control Manager. C. Install the Windows service and attach the debugger to the service from Microsoft Visual Studio Set breakpoints and execute the Windows service from Microsoft Visual Studio D. Install the Windows service. Set breakpoints and execute the Windows service from the Service Control Manager. Correct Answer: B /Reference: QUESTION 30 You are an enterprise application developer. You create a business component for a contact management application that is named Contact. The Contact class contains a public read/write property that is named Company. Company is defined as a string. The Company field in the database is defined as nvarchar(20). You must test whether the property correctly handles values of any length. You decide to use a boundary condition test. You need to evaluate whether the proposed test is appropriate. What should you conclude? A. A boundary condition test is appropriate. B. A boundary condition test is not appropriate. The Company property does not need to be tested. C. A boundary condition test is not appropriate. The test must be rewritten to test duplicate values being entered into the database. D. A boundary condition test is not appropriate. The test must be rewritten to test non-ascii characters. Correct Answer: A /Reference: QUESTION 31

16 You are an enterprise application developer. You are designing an application. The database for the application currently has a one-to-one relationship between order and product. The application must meet the following business requirements: An order must contain orders for many products. An order must store the ordered quantity of each product. You need to evaluate the existing design and recommend changes to meet the business requirements. Which two changes should you recommend? (Each correct answer presents a complete solution. Choose two.) A. Change the relationship between order and product to one-to-many. B. Change the relationship between order and product to many-to-many. C. Create a new table named Order line. Establish a one-to-many relationship between order and Order line and a one-to-one relationship between product and Order line. D. Create a new table named Order line. Establish a one-to-many relationship between order and Order line and a one-to-many relationship between product and Order line. Correct Answer: BD /Reference: QUESTION 32 You are an enterprise application developer. You are designing an intranet Web application. This application must meet the following requirements: The employees must log on to use the application. The database authentication mechanism must be as secure as possible. The number of connection pools must be minimized. You decide to use Microsoft SQL Server authentication and a specific SQL Server account. You need to evaluate whether the design will meet the business requirements and make recommendations, if required. What should you conclude? A. The design meets the requirements. B. The design does not meet the requirements. Use Windows Authentication with a specific Windows account. C. The design does not meet the requirements. Use SQL Server authentication and the credentials of the logged on user. D. The design does not meet the requirements. Use Windows Authentication with the Windows account of the logged on user. Correct Answer: B /Reference: QUESTION 33 You are an enterprise application developer. You are creating an application that will track shipments. This application must support integration with applications that run on different platforms and operating systems. The application that you are creating can be invoked only through SOAP messages over HTTP. You choose Web services instead of.net Remoting to meet these requirements. You need to specify the reason for choosing Web services. Which statement should influence your decision?

17 A. SOAP messages cannot be exchanged in.net Remoting. B. Web Services Description Language documents cannot be generated from.net Remoting class definitions. C..NET Remoting objects will not be interoperable with other platforms. D..NET Remoting objects cannot be invoked through HTTP. Correct Answer: C /Reference: QUESTION 34 You are an enterprise application developer. You are evaluating the physical design of a Web- based application. Fifty customers will use the application from different regions. The use of the application will trigger events of different severities. These events must be logged, extracted, and then filtered on the basis of customer, region, or severity of events. The event details also must be persisted, backed up, and archived for later retrieval. The development team plans to use an event log for logging events. On evaluation, you find the plan does not meet the requirements. You need to explain why an event log fails to meet the requirements. What should you conclude? A. Event logs cannot track custom application events. B. Event logs cannot be filtered to meet the requirements. C. Event logs cannot be backed up or archived. D. Event logs cannot be persisted and will be deleted when the Web server shuts down. Correct Answer: B /Reference: QUESTION 35 You are an enterprise application developer. You are creating a client/server application. You need to install the application on the company network. The client/server application must meet the following criteria: The server component is a class library that is created by using the.net Framework. The client component is a Microsoft Windows-based application that is created by using the.net Framework. The client component and the server component must communicate by using a binary protocol. The fewest possible ports are opened between the client component and the server component. You need to identify a technology that permits the server to communicate with the client component through the TCP/IP protocol. Which technology should you use? A. Message Queuing B..NET Remoting C. Web services D. DCOM Correct Answer: B

18 /Reference: QUESTION 36 You are an enterprise application developer. You are creating an application. Within your application, an order contains order lines. Order lines are always contained within an order. You need to analyze this structure and show the link between the order and the order line by using a class diagram. Which diagram should you choose? A. A B. B C. C D. D Correct Answer: A /Reference: QUESTION 37 You are an enterprise application developer. You create an application that has three layers: Layer 1 contains the Microsoft Windows client and the input validation logic. Layer 2 contains business entities, business workflows, and business rules. Layer 3 contains the data access classes and stored procedures. You need to analyze the layers and identify dependencies that exist between these layers. Which two dependencies should you identify? (Each correct answer presents part of the solution. Choose two.) A. Layer 1 depends on Layer 2. B. Layer 3 depends on Layer 1. C. Layer 2 depends on Layer 3. D. Layer 1 depends on Layer 3. E. Layer 2 depends on Layer 1. Correct Answer: AC

19 /Reference: QUESTION 38 You are an enterprise application developer. You are evaluating a component that monitors a Web-based application. The component stores monitoring information in a database and performs the following functions: Retrieves the number of orders placed per second. Tracks the data for peak usage of the application and displays the data in a tabular form. Subsequently, monitoring requirements change in the following manner: Users must be able to view data graphically. Users must be able to analyze data in real time. Users must be able to correlate the number of orders placed per second with the memory usage in the Web server. You need to evaluate whether the component meets the new requirements and propose a solution, if required. What should you conclude? A. The component meets the new requirements. B. The component does not meet the new requirements. You need to update a text file by using trace statements instead of storing data in a database. C. The component does not meet the new requirements. You need to update a custom performance counter instead of a database. D. The component does not meet the new requirements. You need to update a custom event log instead of a database. Correct Answer: C /Reference: QUESTION 39 You are an enterprise application developer. You are evaluating a database design for a human resource application. The existing database schema meets the following criteria: The database has an Employee table. The Employee table has an Employee ID field and several other fields. You must accommodate the following new requirements: Employees are either supervisors or line workers. A supervisor will supervise zero or more line workers. An employee will be supervised by only one supervisor. A database administrator suggests creating a table named Supervisor and copying the supervisor data from the Employee table to the new table. The database administrator also wants to create a foreign key in the Supervisor table to reference the Employee table. You need to evaluate the suggested change to ensure that there is minimal impact on the existing database schema. What should you conclude? A. The suggested schema change will meet the requirements. B. The suggested schema change will not meet the requirements. Recommend creating a table named Supervisor and copying the supervisor data from the Employee table to the new table.

20 Create a foreign key in the Employee table to reference the Supervisor table. C. The suggested schema change will not meet the requirements. Recommend creating a column named SupervisorID in the Employee table to reference the supervisor for an employee. Create a foreign key between this column and the Employee table. D. The suggested schema change will not meet the requirements. Recommend creating a column named LineWorkerID in the Employee table to reference the line worker for a supervisor. Create a foreign key between this column and the Employee table. Correct Answer: C /Reference: QUESTION 40 You are an enterprise application developer. You are designing a Microsoft Windows-based application that will use a third-party library. The third-party library is available in a single assembly. The library contains classes inside the Com.Util namespace. You can access the source code for this library. You must provide additional functionality that is not available in the third-party library. To conform to corporate policy, the additional functionality must be available in the Com.Util namespace. A developer in your team decides to implement the additional functionality by modifying the source code of the third-party library. You need to evaluate whether this implementation simplifies maintenance when new versions of the third-party library are released. What should you conclude? A. The current implementation satisfies the requirements. B. The current implementation does not satisfy the requirements. You need to create partial classes inside the third-party library for the extra functionality. Compile the partial classes as a single assembly and use it in the application. C. The current implementation does not satisfy the requirements. You need to create a separate assembly and create classes inside the Com.Util namespace. Use this assembly along with the third-party library assembly in the application. D. The current implementation does not satisfy requirements. You need to create partial classes in a separate assembly for the classes in the third-party library assembly. Use the separate assembly along with the thirdparty library assembly in the application. Correct Answer: C /Reference: QUESTION 41 You are an enterprise application developer. You create a client application. One thousand customer service agents use the application during their core business hours, from 8:00 to 17:00. The application confirms to the following design details: The application uses separate business logic components and data access logic components. The data components run on the client computer and connect to a central Microsoft SQL Server 2005 database server. When the application starts, it retrieves datasets to populate list boxes, drop-down list boxes, and TreeView controls that have data common to all users. Users are authenticated to the database by using Active Directory. Users report that the application is slow to start. You need to recommend a solution so that the application starts normally. You want to achieve this goal with the minimum programming effort.

21 Which solution should you recommend? A. Change the data access component to use data readers instead of datasets. Redeploy the data access component. B. Implement a Least Recently Used Cache (LRUCache) on the client application in the business component. Redeploy the business component. C. Create a synchronization application to synchronize a local database with the central database. Modify the data access logic to connect to the local database if available, otherwise connect to the central database. Deploy Microsoft SQL Server 2005 Express Edition and the synchronization application. Redeploy the data access component. D. Enable SQL connection pooling by giving the application a SQL username and password. Redeploy the configuration file. E. Install the data access component on a Web server and access it through a Web service. Enable output caching on the Web service. Redeploy the business component. Correct Answer: E /Reference: QUESTION 42 You are an enterprise application developer. You are supporting a smart client application that manages customer data. The customer data is built for offline use. Company representatives use the customer data. The application performs the following steps: The application detects when it is connected to the network. The application synchronizes data by using the server component. Sometimes, data or network issues cause exceptions. In such a situation, the application waits for five minutes before attempting to synchronize again. Representatives can verify a log file for details of what has occurred. The application performs the synchronization process in the following manner: The application finds out if there are remote or local changes to the data. o If there are remote changes, the application gets updates through Web services. o If there are local changes, the application issues updates by using message queues. o Local and remote synchronizations can happen at the same time. In case conflicts occur during data updates to the remote database, the application provides the representative an opportunity to verify what data has changed since the last synchronization. o The representative can leave the current data intact. o The representative can update the data by using their local copy. You need to create an activity diagram to help you troubleshoot problems. How should you complete the activity diagram? To answer, drag the appropriate messages to the correct locations in the answer area.

22 A. B. C. D. Correct Answer: /Reference:

23 QUESTION 43 You are an enterprise application developer. You create a layered application. You must deploy the application in a three-tier environment. Tier 1 consists of the presentation components deployed on a Web server. Tier 2 consists of the business objects deployed on an application server. Tier 3 consists of a database deployed on a database server. You create a set of classes in a separate assembly as a data access layer to encapsulate the database access functionality. None of the classes in the data access layer inherits from the MarshalByRefObject class. Your team plans to deploy the data access layer component in tier 3. You need to evaluate whether the deployment plan will meet the requirements. What should you conclude? A. The deployment plan meets the requirement. B. The deployment plan does not meet the requirement. You need to deploy the data access layer component in tier 2 and tier 3. C. The deployment plan does not meet the requirement. You need to deploy the data access layer component only in tier 2. D. The deployment plan does not meet the requirement. You need to deploy the data access layer component in tier 1 and tier 2. Correct Answer: C /Reference:

24 QUESTION 44 You are an enterprise application developer. You create a three-tier application for placing orders. The application permits users to submit search requests by using a Web service. The Web service occasionally times out when search requests are submitted. You conclude that the Web service times out due to high network bandwidth utilization. You plan to create custom counters if necessary. You need to use performance counters to analyze the data. Which three performance counters should you use? (Each correct answer presents part of the solution. Choose three.) A. Network Interface: Bytes transferred/sec B. Custom: Search result rows/sec C. Microsoft SQL Server: Deadlocks/sec D. Microsoft SQL Server: Batch requests/sec E. Memory: Pages/sec F. Custom: Search requests/sec G. Custom: Number of orders placed/sec Correct Answer: ABF /Reference: QUESTION 45 You are an enterprise application developer. You are creating a Web service by using ASP.NET. The Web service estimates insurance premiums based on values passed by the client application. The Web server is on the perimeter network. The Web server uses.net Remoting to communicate to components on an application server that is on the corporate network. The components on the application server use Microsoft Windows Integrated security to authenticate to the database server. The perimeter network is configured to ensure that the following restrictions are imposed: Only port 80 is open between the perimeter network and the external network. Application-specific ports might be opened between the perimeter network and the internal network when necessary. You need to prepare a deployment verification list and a production verification list. Which five actions should you include? (Each correct answer presents part of the solution. Choose five.) A. Verify that the Web server is a member of the domain. B. Verify that the application server is a member of the domain. C. Create a SQL user name and password for the application. D. Open a port between the perimeter network and the internal network. E. Verify that the.net Framework is installed on the Web server. F. Verify that the.net Framework is installed on the application server. G. Verify that the.net Framework is installed on the database server. H. Verify that IIS is installed on the Web server. I. Verify that IIS is installed on the application server. Correct Answer: BDEFH /Reference:

25 QUESTION 46 You are an enterprise application developer. You are creating a human resource application. You identify the following relationships between the business objects: A manager is an employee. An executive is an employee. An employee works for a company. You need to translate only these relationships into a class diagram. Which diagram should you choose? A. A B. B

26 C. C D. D Correct Answer: B /Reference: QUESTION 47 You are an enterprise application designer. You are designing a three-tier enterprise application. The application currently consists of a business layer and a data layer. The application must perform the following tasks: Support a smart client interface and a Web client interface. Achieve maximum reuse between the smart client interface and the Web client interface. Reduce code duplication. The systems analyst recommends adding a UI layer to perform the required tasks. You need to evaluate this recommendation. What should you conclude? A. Adding a UI layer will meet the requirements. B. Adding a UI layer will not meet the requirements. Recommend adding a UI process layer. C. Adding a UI layer will not meet the requirements. Recommend adding a service layer. D. Adding a UI layer will not meet the requirements. Recommend adding a business workflow layer. Correct Answer: B /Reference: QUESTION 48 You are an enterprise application developer. Your company has a Web-based application that runs on a single Web server. Session information is currently being stored by using the default session mode. You are redesigning the application to run in a Web farm. You must ensure that the failure of any single server does not make session information unavailable. A developer in your team recommends using the default session mode on each server in the Web farm. You need to evaluate this recommendation. What should you conclude? A. The recommended solution meets the requirements. B. The recommended solution does not meet the requirements. Store the session information in a separate state process on each Web server in the Web farm. C. The recommended solution does not meet the requirements. Store the session information in a separate state process on a dedicated session state server. D. The recommended solution does not meet the requirements. Store the session information in a Microsoft SQL Server failover cluster. Correct Answer: D /Reference:

27 QUESTION 49 You are an enterprise application developer. Your company operates a Microsoft Windows-based client application. The application is deployed to 50 client computers on the network. The application uses a separate class library as a data access layer. The data access layer is currently deployed to the application folder of the client application. It is time consuming to deploy new versions of the data access layer. You need to evaluate the current physical design of the application and recommend changes to speed up deployment of new versions of the data access layer. What should you recommend? A. Deploy the data access layer component to the global assembly cache of a server on the network. B. Deploy the data access layer component to the Windows system folder. Use a <codebase> tag in the Windows-based client application configuration file to point to the deployed library. C. Deploy a copy of the data access layer component to the global assembly cache along with each instance of the Windows-based client application. D. Deploy the data access layer component to a server on the network. Use a <codebase> tag in the Windows-based client application configuration file to point to the deployed library. Correct Answer: D /Reference: QUESTION 50 You are an enterprise application developer. You are creating an application for the sales department. Users in the sales department are occasionally connected to the network. Users enter orders through a smart client interface. The orders are sent to a business component that is installed on an application server. The business component updates the orders. You need to ensure that the orders are reliably delivered to the server. Which technology should you choose? A..NET Remoting B. Web services C. Message Queuing D. DCOM Correct Answer: C /Reference: QUESTION 51 You are an enterprise application developer. You are creating an application. The application uses different database products for different customers. You need to ensure maximum reuse of the code that is available in the different layers of the application. You also need to ensure that the application uses the unique features of each database product. Which layer should you create for each database product? A. Business layer B. Data access layer C. Business process layer D. Service layer Correct Answer: B

28 /Reference: QUESTION 52 You are an enterprise application developer. You are designing a Web-based application to maintain appointment details. You consider implementing the following steps to delete an appointment: Enter a date range or a client ID, or enter a date range and a client ID to get a list of appointments. Click the Appointment hyperlink. The appointment details are retrieved and displayed. Click the Delete button. You need to analyze the requirements and recommend stored procedures. Which three stored procedures should you recommend? (Each correct answer presents part of the solution. Choose three.) A. Search for appointments by using client ID. B. Search for appointments by using date range. C. Search for appointments by using client ID and date range. D. Verify if an appointment exists. E. Retrieve an appointment. F. Retrieve and delete an appointment. G. Delete an appointment. Correct Answer: CEG /Reference: QUESTION 53 You are an enterprise application developer. You are creating a three-tier application. The business layer contains 10 business functions. These business functions write messages to message queues and update records in a Microsoft SQL Server database. You need to identify the transaction mechanism for these business functions to group both the activities together as one atomic transaction unit. Which transaction mechanism should you choose? A. ADO.NET transaction B. T-SQL transaction C. COM+ transaction D. ASP.NET transaction Correct Answer: C /Reference:

29 QUESTION 54 You are an enterprise application developer. You create an order processing application. The application must meet the following requirements: The order is scheduled for delivery if all products are available. The order is back-ordered if any one product is not available. The customer can cancel the back-ordered order. The order is scheduled for delivery if the customer does not cancel it. The order is closed after delivery. You need to select the state diagram that translates the requirements. Which diagram should you choose? A. A B. B C. C D. D

30 Correct Answer: A /Reference: QUESTION 55 You are an enterprise application developer. You are creating a medical application that permits surgeons to review previous recordings of surgeries. The application must meet the following requirements: Surgeons must be able to view several videos concurrently. Users send only necessary portions of the files across the network. Transmission of videos to the application might be interrupted. Videos must play instantly. Users must be able to fast-forward, reverse, pause, and stop the video. You need to ensure the application meets these requirements. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) A. Reduce the number of concurrent videos to one. B. Encode the video files into the appropriate format. C. Begin downloading the files that are part of the search results in case the user picks one of the files. D. Create a schedule in the application that only permits large files to be downloaded during non- peak hours. E. Handle exceptions if the video data is interrupted. Correct Answer: BE /Reference: QUESTION 56 You are an enterprise application developer. You create a Web application to call the Web services of different trucking companies. The application retrieves transit times for different routes. You create Web service proxy classes by using the Wsdl.exe utility. You need to call different Web services concurrently. You also need to ensure that the application can continue performing other tasks while the Web services are being called. You need to achieve this by using the least amount of code possible. What should you do? A. Use the Thread class. B. Use the AsyncCallback class and the IAsyncResult interface. C. Use the Application.DoEvents method. D. Use the ThreadPool class. Correct Answer: B /Reference: QUESTION 57 You are an enterprise application developer. You are designing a data access component to meet the following criteria: The data access component provides data to several business components. The data access component

31 contains methods that retrieve data. The methods retrieve data from a Microsoft SQL Server database. The data is modified infrequently. You need to ensure that the data access component provides current data to the business components. You also need to minimize the number of requests sent to the SQL Server database for this data. What should you do? A. Ensure that the data retrieval methods use SqlDependency objects. B. Ensure that the data retrieval methods use DataAdapter objects that have Batch Updates enabled. C. Ensure that the data retrieval methods are explicitly enlisted in distributed transactions. D. Ensure that the data retrieval methods use asynchronous methods of the SqlCommand class. Correct Answer: A /Reference: QUESTION 58 You are an enterprise application developer. You are creating a financial application that includes a data access component. This component executes queries against a Microsoft SQL Server database. Application performance deteriorates as the volume of data in the database increases. You need to identify which database queries require the greatest time to execute. You need to minimize the impact on application performance while gathering this information. Which action should you recommend? A. Use common language runtime (CLR) Profiler to examine the runtime performance of the methods that execute the database queries. B. Use Ildsam.exe to examine the disassembled code of the methods that execute the database queries. C. Create and run a SQL Profiler trace to analyze the database queries. D. Use static analysis to examine the source code of the methods that execute the database queries. Correct Answer: C /Reference: QUESTION 59 You are an enterprise application developer. You create a component that exposes a static method. The static method performs a complex business algorithm and the method must support concurrent callers. You use asynchronous processing to implement the method. You need to ensure that the client application is notified about the completion of the method. What should you do? A. Add a public static event to the component and raise the event when processing is complete. B. Pass a callback delegate from the client application as a parameter to the processing method. Invoke the delegate when processing is complete. C. Add a public static property to the component and permit the client application to poll the component for completion. D. Add a constructor that accepts a callback delegate as parameter from the client application. Invoke the delegate when processing is complete. Correct Answer: B

32 /Reference: QUESTION 60 You are an enterprise application developer. You are creating a component to process geospatial data. The component retrieves large sets of data from a Microsoft SQL Server database. Each data point consists of two decimal values: one value represents longitude and the other value represents latitude. You need to design a data format that minimizes the managed heap memory allocation needed for each data point within the component. What should you do? A. Design a custom class that contains private fields for the longitude and the latitude, and design read-only public properties for the longitude and the latitude. B. Design an XML element that contains an attribute for each longitude value and each latitude value. C. Design an ADO.NET DataRow class that contains DataColumns for the longitude and latitude values. D. Design a custom Struct that contains a public field for the longitude value and a public field for the latitude value. Correct Answer: D /Reference: QUESTION 61 You are an enterprise application developer. You are creating an e-commerce Web application. The application architecture consists of layers as shown in the following diagram. The application layers are described in the following tables.

33 You need to package the required cryptographic services into a single component. You also need to identify suitable locations for the cryptography component. What are the two possible layers to achieve this goal? (Each correct answer presents a complete solution. Choose two.) A. The presentation layer B. The service fa?ade layer C. The workflow layer D. The business logic layer E. The data access layer Correct Answer: DE /Reference: QUESTION 62 You are an enterprise application developer. You are creating a component for a distributed application for your company. The application manages the users access to sensitive company data. The company data is stored in an NTFS file system. Each file has permissions defined for domain users in an access control list (ACL). The application must meet the following requirements in the same order of priority: Secure access to sensitive information based on the users credentials. Log authorization failures. You need to use an appropriate authorization mechanism for the application. You need to achieve this by using

34 the least amount of development effort. What should you do? A. Access files by using impersonation and the WindowsIdentity class. B. Access files after comparing roles by using the WindowsIdentity class and the FileSecurity class. C. Access files from a COM+ server package that is configured to run as the interactive user. D. Host the component in an IIS server and specify authorization rules in a Web.config file. Correct Answer: A /Reference: QUESTION 63 You are an enterprise application developer. You create a component that uses unmanaged resources. You need to ensure that the component permits client developers to release the unmanaged resources as soon as they are no longer needed. You also need to guarantee that unmanaged resources are always released, even if a client developer fails to release them. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) A. Implement a Dispose method. Call the GC.Collect method from inside the Dispose method. B. Implement a Dispose method. Release the unmanaged resource from inside the Dispose method. C. Override the Object.Finalize method. Call the Object.Finalize method from inside the finalizer of your component. D. Override the Object.Finalize method. Call the Dispose method from inside the finalizer of your component. Correct Answer: BD /Reference: QUESTION 64 You are an enterprise application developer. You are creating a component that encapsulates database access to an employee table. The component contains a method that retrieves an employee record by using a string input parameter. You need to respond to error conditions in a way that meets the following requirements: If the caller passes a variable that fails to reference a string object, the caller receives an error notice. If the caller fails to respond to the error notice, the error condition forcefully alters the flow of execution. If the error occurs on the main thread, the application is terminated. What should you do? A. Invoke the Interrupt method of the current thread. B. Return a Boolean value of False from the method. C. Raise a ValidationError event. D. Throw an ArgumentNullException exception. Correct Answer: D

35 /Reference: QUESTION 65 You are an enterprise application developer. You are creating a component that stores employee details in a Microsoft SQL Server database. The component is implemented as a class. The class includes the public properties ID and Name. The class does not contain static methods. Both the ID field and the Name field are required in the Employee table of the database. Serialized instances of the class can be returned by XML Web services. You need to ensure that the class supports XML serialization. You also need to minimize the possibility of a developer creating a class instance by using partial data. Which approach should you choose? A. Provide a single constructor that requires both Name and ID parameters. B. Provide a default constructor and a constructor that requires both Name and ID parameters. C. Provide a default constructor, a constructor that requires an ID parameter, and a constructor that requires a Name parameter. D. Provide a static constructor without any parameter and a constructor that requires both Name and ID parameters. Correct Answer: B /Reference: QUESTION 66 You are an enterprise application developer. You create a Microsoft Windows client application that communicates with a business layer component. The business layer component contains the following class, named Utility. public class Utility { public Utility(){ } public void ChangeData(){ } } The application must fulfill the following criteria: Instances of the Utility class must be created only within the business component. The Windows client application must be able to invoke the functions inside the Utility class. You review the code for the Utility class and decide it requires modification. You need to recommend modifications for the code. What should you recommend? A. Change the scope of the constructor to private. B. Change the scope of the constructor to internal. C. Change the scope of the Utility class to private. D. Change the scope of the Utility class to internal. Correct Answer: B /Reference:

36 QUESTION 67 You are an enterprise application developer. You are performing a peer code review for an entry- level developer. The developer is implementing server-side business objects. The business objects must be accessed and activated by using.net Framework remoting. In addition, the business objects must meet the following requirements: Implement an interface for client-side access. Inherit from a base business object class. The developer writes the following code segment. public class UserObject : BaseBizObject, MarshalByRefObject, IUserObject { } When the developer attempts to compile the code, an error message is received. You need to review the code and recommend a solution. What should you recommend? A. The class must derive from the MarshalByRefObject class. The UserObject class can access methods in the BaseBizObject class by creating an instance of the BaseBizObject class. B. The class must derive from the BaseBizObject class. The BaseBizObject class must derive from the MarshalByRefObject class. C. Change the approach so that the client computer accesses a wrapper class that derives from the MarshalByRefObject class. D. The class must derive from the MarshalByValue class instead of the MarshalByRefObject class. Correct Answer: B /Reference: QUESTION 68 You are an enterprise application developer. You are testing authentication in a Microsoft Windows-based application. After the user enters the user name and password in the logon form of the user interface component, the following responses are triggered: The user interface component passes the user name and password to a utility component that performs the encryption. The user interface component then passes the encrypted user name and password to a Web service. The Web service invokes a business component and passes the encrypted user name and password. The business component passes the encrypted user name and password to a data access layer component that validates the user. You need to identify the component on which the business component depends. Which component should you choose? A. Utility component B. User interface component C. Data access layer component D. Web service component Correct Answer: C /Reference:

37 QUESTION 69 You are an enterprise application developer. You create a Web-based application and deploy it to your customers. The application requires the users to log on to use the application. The application does not permit impersonation. The application also requires the users to connect to the database and to a folder in the Web server. Your customers report a security bug. The bug denies access to the logged-on users every time they try to upload a file to the folder in the Web server. Your customers provide you with the following data to reproduce the bug: The version of the Web-based application The users steps in the Web-based application The version of the operating system You find that the information is insufficient to reproduce the bug. You need to identify the additional information that is required to reproduce the bug. Which two additional data should you use? (Each correct answer presents part of the solution. Choose two.) A. Security settings for the folder on the Web server B. Security settings for the logged-on user C. Security settings for the ASP.NET process account D. The file for upload E. Security settings for the file for upload Correct Answer: AC /Reference: QUESTION 70 You are an enterprise application developer. You are designing unit tests for a Customer class. The Customer class contains properties to get or set data in private fields. The Customer class also contains one default constructor and one non-default constructor. The non-default constructor accepts a Customer ID argument. When the non-default constructor is used to instantiate the Customer object, a public method named Load is invoked along with the Customer ID argument. The Customer object properties are then loaded by using values from the database. You need to design unit tests that will test the class properties. Which three test scenarios should you recommend? (Each correct answer presents part of the solution. Choose three.) A. Use the non-default constructor. Examine whether the properties return the correct values from the database. B. Use the default constructor. Examine whether the properties return the correct values from the database. C. Use the non-default constructor and examine whether the properties are empty. D. Use the default constructor along with the Load method. Examine whether the properties return the correct values from the database. E. Use the default constructor. Examine whether the properties of the default constructor are equal to those of a second instance of the Customer class instantiated by using the non- default constructor. F. Use the default constructor. Assign values to the properties of the object. Examine whether the properties

38 return values assigned to them. Correct Answer: ADF /Reference: QUESTION 71 You are an enterprise application developer. You are creating a sales application. You make several changes to a commission object within the sales application. The commission object calculates the monthly sales commissions for the sales force of the company. The sales commissions are calculated based on the following criteria: The commission object receives the following parameters: o The ID of the sales person o The monthly gross sales of the sales person The commission object calls the data access layer to execute three stored procedures. The commission object calculates the commission by performing operations on the output of the stored procedures. You need to write a unit test for the commission object. Which action should you recommend? A. Write a test method that instantiates the commission object, passes the ID of the sales person and gross sales as parameters, and verifies the calculations for commission percentage and commission owed. B. Write code to call each of the three stored procedures and to verify that they return the correct commission rates. C. Test the commission object against an extremely high threshold of connections and executions. D. Write additional code to test operability of the commission object against the data access layer that executes the stored procedures. Correct Answer: A /Reference: QUESTION 72 You are an enterprise application developer. You create a routing application that ascertains the best routes for shipment of containers. The application contains a complex routing method that examines the following parameters: The weight of the containers The length of the trailer that hauls the containers Road constraints such as weight limits and bridge heights The method returns a list of roads to use. You need to design a unit test to ensure that the routes returned do not violate any known constraints. Which test should you perform? A. Test whether the road weight limits are adhered to. B. Test whether the origin and destination passed into the method are the same as in the results. C. Perform exception testing to verify whether the method rejects invalid origins and destinations. D. Test whether all route options are evaluated during analysis. Correct Answer: A

39 /Reference: QUESTION 73 You are an enterprise application developer. An intermediate level programmer is preparing the request to place your distributed application into the production environment. According to corporate IT policies, you must specify the production server and network requirements to the production support personnel to review the application. Your application is a mission critical system. You are using three Microsoft Windows Server 2003 application servers that are clustered by using Microsoft Windows Network Load Balancing. The three application servers have the following network configurations: AppSrv1 o IP Address: o Subnet Mask: o Default Gateway: AppSrv2 o IP Address: o Subnet Mask: o Default Gateway: AppSrv3 o IP Address: o Subnet Mask: o Default Gateway: You need to validate the network settings for the three application servers, making corrections if necessary. What should you conclude? A. The network settings are correct. B. The network settings are incorrect. AppSrv1 must have an IP Address of and a Default Gateway of C. The network settings are incorrect. AppSrv1 must have an IP Address of and a Default Gateway of D. The network settings are incorrect. AppSrv1 must have an IP Address of and a Default Gateway of Correct Answer: D /Reference: QUESTION 74 You are an enterprise application developer. You create a Web-based application. When the application executes, it creates large XML documents in memory. The end users report that the application performs slowly when manipulating large XML documents. You need to analyze the cause of the problem. What should you do? A. Use a single performance counter that monitors the number of memory/pages per second. B. Create a custom performance counter that monitors the number of XML documents manipulated per second. Use the custom performance counter and a performance counter that monitors the number of memory/pages per second. C. Create a custom event log to monitor the number of memory/pages per second. D. Create a custom event log to monitor the following: the number of memory/pages per second and the number of XML documents manipulated per second. Correct Answer: B

40 /Reference: QUESTION 75 You are an enterprise application developer. You create a layered enterprise application that consists of a user interface layer, a business layer, and a data layer. The user interface layer is currently implemented as a smart client. End users now also need to access the enterprise application over the Web. To permit this, you create a Web client application. You also create a user interface process layer as a separate assembly. This assembly encapsulates the validation rules that apply to the end user interaction with the system. In the new version of the application, all user interfaces will use the new user interface process layer. The implementation of the new version of the application is as shown in the following diagram. Your team plans to deploy the user interface process assembly on the Web server. You need to evaluate whether the deployment plan fulfills the requirements and recommend change, if required. What should you conclude? A. The deployment plan fulfills the requirements. B. The deployment plan does not fulfill the requirements. You must install the user interface process assembly in the application server. C. The deployment plan does not fulfill the requirements. You must install the user interface process assembly in the smart client applications. D. The deployment plan does not fulfill the requirements. You must install the user interface process assembly in the Web server as well as in the smart client applications. Correct Answer: D /Reference: QUESTION 76 You are an enterprise application developer. You create a three-tier Web-based application that accesses 10 external Web services to retrieve currency rates. You need to calculate product prices in ten currencies. A smart client invoicing application accesses the business tier to retrieve and use the product prices in 10 currencies. The business tier calls the 10 external Web services. You create a separate service agent component to encapsulate the logic of which Web service to call. This component also makes it easier to change the Web references when required. Your team plans to deploy this service agent in the Web presentation tier. You need to evaluate whether your teams deployment plan meets the requirements and

41 recommend accordingly. What should you conclude? A. The current deployment plan meets the requirements. B. The current deployment plan does not meet the requirements. The service agent must be deployed in the business tier as well as the Web presentation tier. C. The current deployment plan does not meet the requirements. The service agent must be deployed in the business tier. D. The current deployment plan does not meet the requirements. The service agent must be deployed in the Web presentation tier as well as the smart client applications. Correct Answer: C /Reference: QUESTION 77 You are an enterprise application developer. You are creating a distributed application that requires asynchronous communication between the UI layer and the business layer. The application must ensure reliable delivery of messages between the components. There are no restrictions on the format. Messages are limited to 4 MB in size. For scalability reasons, you create the business logic components as serviced components. You need to choose the most appropriate component implementation for your business logic components. You want to achieve this goal by using the least development effort. Which implementation approach should you choose? A. Queued components B. Message Queuing triggers C. XML Web services D. Custom receivers Correct Answer: A /Reference: QUESTION 78 You are an enterprise application developer. You are designing monitoring features for an ASP.NET Webbased application. The monitoring features must meet the following requirements: Log events to a data source for later review. Read configuration settings from the Web.config file. Monitor the application after deployment to production. You decide to use a monitoring feature built into Microsoft.NET Framework. You need to choose an appropriate monitoring feature. Which monitoring feature should you use? A. Use Windows Management Instrumentation (WMI) events. B. Use the System.Diagnostics.Trace class. C. Use Performance Counters. D. Use the System.Web.TraceContext class. Correct Answer: B

42 /Reference: QUESTION 79 You are an enterprise application developer. You create a Microsoft Windows-based application for a highvolume call center. The Windows-based application performs the following tasks: The application manages incoming customer calls and requests. The application delivers event information to a company server that consolidates the call statistics into reports. Your design team recommends an event logging solution for the application to meet the following requirements: Minimize customer wait times and increase the number of calls that are handled during the workdays. Record and log all user activity for historical reporting and auditing. Reliably deliver all event information to a central server. Consolidate all event information on a central server. You need to identify a delivery mechanism and a data storage solution for event information. Which option should you choose? A. Message Queuing and Microsoft SQL Server B. Web services and Microsoft SQL Server C. and Microsoft Exchange Server D..NET Framework EventLog component and Microsoft Windows Server Correct Answer: A /Reference: QUESTION 80 You are an enterprise application developer. You create a Microsoft Windows client application that consumes a third-party Web service. The Web service is secure and requires user credentials to be passed through SOAP headers. The Web service is currently in its beta. The URL of the Web service will change after it goes live. The beta Web service will be available after the Web service goes live. You need to ensure that the Windows application can switch between the beta version and the live version of the Web service, if required. You need to achieve this goal by using the least maintenance and coding effort. What should you do? A. Save the URL in the code. Change and recompile the Windows application after switching between the beta and the live versions. B. Save the URL in the Windows application configuration file. Update the Web service proxy class. C. Save the URL in a resource file. Update the Web service proxy class. D. Add a discovery document to the Web service. Correct Answer: B /Reference: QUESTION 81

43 You are an enterprise application developer. You are creating a Microsoft Windows-based client application that manages investment portfolios and permits users to monitor stock market data. The application must meet the following requirements: It must provide asynchronous processing of transactions. It must prevent pending transactions from blocking new transactions. It must execute transactions immediately. You need to use an appropriate component implementation approach to meet the requirements. What should you do? A. Use the.net Framework ServiceController component. B. Use the.net Framework Timer component. C. Use the.net Framework BackgroundWorker component. D. Use the.net Framework PerformanceCounter component. Correct Answer: C /Reference: QUESTION 82 You are an enterprise application developer. You are creating an ASP.NET e-commerce Web site. Shoppers are able to browse products anonymously and page output caching is enabled. You are adding monitoring features to the Web site. You must track the following information: Products that are being browsed Promotions that are being clicked on Shoppers who want to sign out Shoppers who have completed more than one purchase The monitoring features are in the form of performance counters. You need to ensure that the monitoring features meet the requirements. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) A. Monitor products and promotions in the presentation tier. B. Monitor products and promotions in the middle tier. C. Monitor products and promotions in stored procedures. D. Monitor sign-outs and purchases in the presentation tier. E. Monitor sign-outs and purchases in the middle tier. F. Monitor sign-outs and purchases in stored procedures. Correct Answer: AE /Reference: QUESTION 83 You are an enterprise application developer. You create a Web-based application that manages financial transactions for an online investment company. The company requires to meet the following processes: Log all customer actions.

44 Log all application execution failures. The company security policy permits audit events to be logged. The security policy requires that there must be only one local administrator on the Web server. The policy also requires that all code must be run with the least possible privileges. The company uses Microsoft Windows Event Log as the repository for all event information. You need to recommend an appropriate solution to meet the companys requirements. You also need to ensure that you adhere to the company security policy. What should you recommend? A. Create a custom event log for the application. Grant write security permissions on that log to the ASP.NET user account. B. Route log information to a serviced component that impersonates an administrator. C. Call a Web service that runs with default privileges and writes to Windows Event Log. D. Log events to text files and import the event logs into Windows Event Log. Correct Answer: A /Reference: QUESTION 84 You are an enterprise application developer. You are creating a client-side service component for an application. The application runs in the security context of the user. The component must store proprietary information in a secure registry store that requires system service-level access by using the ACL of the user. You need to ensure that the component meets the requirement of the application with a minimum level of security risk. What should you do? A. Run the component in the system service context. B. Create the component so that it impersonates the user context. C. Create the component so that it impersonates the system service context. D. Run the secure storage code in a separate instance that runs in the system service context and recieves data through a method call. Correct Answer: B /Reference: QUESTION 85 You are an enterprise application developer. You develop a Web application by using ASP.NET that runs on Microsoft Windows Server The ASP.NET application fails to save trace and log data in an event log. You discover that the application has no write access to the registry. You need to ensure that the trace and log information is saved to the event log. You also need to minimize the risk that is associated with the solution. What should you do? A. Grant the write access to the registry for the Network Service account. B. Add the SystemConfigurationInstall DWORD key in the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Eventlog\Application hive. C. Register the event log source that is created by the System.Diagnostics.EventLogInstaller class in the Application_OnStart event. D. Add a class that inherits from the System.Configuration.Install.Installer class. The System.Configuration.Install.Installer class registers the event log source that is created by the

45 System.Diagnostics.EventLogInstaller class. Then, run the installutil.exe [assemblyname] command in the command prompt. Correct Answer: D /Reference: QUESTION 86 You are an enterprise application developer. You are designing an event logging mechanism for a serviced component. You need to ensure that the event logging mechanism meets the following requirements: All exception data must be logged after the deployment of the serviced component.access to methods that handle mathematical computations must be logged during development only. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) A. Use the System.Web.TraceContext class to log exception data. B. Use the System.Diagnostics.Trace class to log exception data. C. Use the System.Diagnostics.Debug class to log exception data. D. Use the System.Web.TraceContext class to log access to methods that handle mathematical computation. E. Use the System.Diagnostics.Trace class to log access to methods that handle mathematical computations. F. Use the System.Diagnostics.Debug class to log access to methods that handle mathematical computations. Correct Answer: BF /Reference: QUESTION 87 You are an enterprise application developer. You are designing an extranet Web application for a company. The application will be used by the employees around the world. You need to recommend a design by using an ASP.NET Web farm that is highly available. What should you do? A. Store session state and application data in clustered Microsoft SQL Server databases. B. Store session state and application data in distributed partitions in Microsoft SQL Server. C. Use an ASP.NET out-of-process state service and store application data in clustered Microsoft SQL Server databases. D. Use a middle-tier ASP.NET application server for state management and store application data in clustered Microsoft SQL Server databases. Correct Answer: A /Reference: QUESTION 88 You are an enterprise application developer. You develop a solution by using Microsoft Visual Studio.NET 2005 and.net Framework 2.0. The solution must meet the following requirements: It must be available to the local network through Windows forms.it must be available to the Internet through Web forms.it must use a predefined set of business objects and rules.it must access data from a Microsoft SQL Server 2005 database.it must avoid code duplication. You need to design application layers for the

46 solution. Which application layers and components should you design? A. B. C. D. Correct Answer: C /Reference:

47 QUESTION 89 You are an enterprise application developer. You are creating an ASP.NET Web service. You identify an existing COM component that provides the necessary functionality required by your Web service. You need to wrap the COM component so that it can be accessed by your Web service. You also need to minimize marshalling overhead. What should you do? A. Use Microsoft SOAP Toolkit to expose the COM component as a Web service. B. Use the Type Library Importer tool to create an Interop assembly for the COM component. C. Apply the DllImportAttribute attribute to create a managed definition for the necessary COM component functions. D. Use the Component Services administrative tool to add the COM component to a COM+ application. Expose the COM+ application as an XML Web service. Correct Answer: B /Reference: QUESTION 90 You are an enterprise application developer. You review the design of a component. The component processes billing for an online store application. The application is developed by using ASP.NET 2.0. The component must be highly available during business hours. You need to ensure that the component meets the following requirements: It reads all orders that must be billed. It sends an notification to the users.it receives confirmation for credit card and bank account transactions. What should you do? A. Develop the component as a Web service. Deploy the Web service on a Web farm. B. Develop the component as a Windows service.deploy the serviced component on a multiprocessor server. C. Develop the component as a Windows application. Deploy the Windows application on a multiprocessor server. D. Develop the component as a serviced component.deploy the serviced component on a Web farm that uses Network Load Balancing. Correct Answer: D /Reference: QUESTION 91 You are an enterprise application developer. You develop an application that contains a service component that is exposed as a Web service. You plan to expose the service component by using Remoting and Microsoft Message Queuing (MSMQ). You need to test the service component. You also need to ensure that the tests can be reused, regardless of the technology used for communication. What should you do? A. Create a test driver for the service interface layer. B. Create a test driver for the proxy of the Web service. C. Create a test stub to perform the functions of the Web service. D. Create a test driver for the Web service, and create test stubs for Remoting and MSMQ. Correct Answer: A

48 /Reference: QUESTION 92 You are an enterprise application developer. You are reviewing the following code segment. (Line numbers are included for reference only.) 01 public class MyResource: IDisposable {02 03 private bool disposed = false;04 05 public void Dispose() {06 Dispose(true);07 }08 09 private void Dispose(bool disposing) {10 if(!this.disposed) {11 if(disposing) {12 ReleaseManagedResources();13 }14 ReleaseUnmanagedResources();15 disposed = true;16 }17 }18 19 ~MyResource() {20 ReleaseManagedResources();21 ReleaseUnmanagedResources();22 }23 } You discover that the Dispose pattern is implemented incorrectly. You need to modify the code segment to ensure that the dispose pattern is implemented correctly. What should you do? A. Insert the following line of code after line 06. GC.SuppressFinalize(this); Replace lines 20 and 21 with the following line of code. Dispose(true); B. Insert the following line of code after line 06. GC.SuppressFinalize(this); Replace lines 20 and 21 with the following line of code. Dispose(false); C. Insert the following line of code after line 19. GC.SuppressFinalize(this); Replace lines 20 and 21 with the following line of code. Dispose(false); D. Insert the following line of code after line 19. GC.SuppressFinalize(this); Replace lines 20 and 21 with the following line of code. Dispose(true); Correct Answer: B /Reference: QUESTION 93 You are an enterprise application developer. You are creating a distributed application. The application transfers a parent table and a child table from a business component. The application modifies the two tables and transfers updates to the business component. The distributed application must enforce the constraints for referential integrity. The components must provide access to values of the correct type at compile time. You need to identify the type of object for serialization. Which type of object(s) should you choose? A. an untyped DataSet B. an array of DataTables C. a strongly typed DataSet D. a custom type that contains a strongly typed parent DataTable and a strongly typed child DataTable Correct Answer: C /Reference: QUESTION 94 You are an enterprise application developer. You plan to design the component architecture of a new largescale application. You need to design a component architecture to meet the following requirements: Class objects must consist of multiple aggregate objects.multiple aggregate objects must be instantiated only through the object that is enclosed within the class.certain aggregate objects must be directly instantiated by user code.multiple aggregate objects must allow user code to override properties within the object.all class objects must be versioned together. What should you do?

49 A. Use a nested class model for all classes. B. Use private classes for all aggregate objects. C. Use sealed classes for all aggregate objects. D. Use abstract class for all the classes contained in the component. Correct Answer: A /Reference: QUESTION 95 You are an enterprise application developer. You are creating a Web service for the application. A Web service method will implement the following validation rules: Non-critical validation rules return a warningcritical validation rules return an immediate error You create a diagram that displays the application flow as shown in the exhibit. (Click the Exhibit button.) The application contains a rule base class to abstract a validation rule and an execute method to perform validation. A critical validation error in the execution of the method will terminate the validation cycle and throw a custom exception. The Web service method must include warnings from all previous validation rules in a single response. You need to modify the diagram to incorporate the necessary corrections. What should you do? A. Display each validation rule individually. B. Indicate that the rule execution should not continue if a rule execution throws an exception. C. Indicate that the rule execution can return a warning or an error. Go to step 5 if an error-level exception is returned. D. Indicate that the rule execution can return a warning or an error. Go to step 5 if a warning-level exception is returned. Correct Answer: C /Reference: QUESTION 96 You are an enterprise application developer. You have created an application that uses a logging exception mechanism to monitor bugs. The monitoring mechanism must log the source code line number where the exception is thrown. You need to deploy the application binaries to meet the monitoring requirements. Which type of files should you deploy? A. Object files B. Debug built assemblies C. Program Database files D. Release built assemblies Correct Answer: C /Reference: QUESTION 97

50 You are an enterprise application developer. You are designing an event logging mechanism for a Web-based application. The application uses Windows authentication. The application retrieves data from a Microsoft SQL Server database. The event logging mechanism must meet the following requirements: All logon and logoff events are logged.all exceptions are logged.all access to the database is logged.all application start and end events are logged. You need to ensure that all the requirements are met by using the minimum amount of coding effort. What should you do? A. Store the log data in text files. B. Store the log data in Event Log files. C. Store the log data in the Trace.axd file. D. Store the log data in a SQL Server database. Correct Answer: B /Reference: QUESTION 98 You are an enterprise application developer. You are developing a smart client application. You write a method that reads a registry value. Your application runs from a partially trusted environment. The method must not throw an exception when it reads the registry value. You need to ensure that your code is authorized to read the registry key before it attempts to read the value. What should you do? A. Call the Assert method of the RegistryPermission class. B. Call the Demand method of the RegistryPermission class. C. Call the GetAccessControl method of the RegistryKey class. D. Call the GetAccessRules method of the RegistrySecurity class. Correct Answer: B /Reference: QUESTION 99 You are an enterprise application developer. You develop a component that gathers data from multiple Web services and loads the data into a DataTable. You need to identify a class to persist the information stored in the DataTable to a Microsoft SQL Server database by using the most time-efficient method. Which class should you choose? A. SqlBulkCopy B. SqlDataReader C. SqlClientFactory D. SqlCommandBuilder Correct Answer: A /Reference:

51 QUESTION 100 You are an enterprise application developer. You are planning the life cycle of a component. Currently, multiple versions of the component exist. You need to access the most recent version of the component. You also need to ensure that existing applications can access the most recent version and the previous versions of the component without being recompiled. Which plan should you implement? A. Store each version of the component in its own subdirectory on a network share.configure the <bindingredirect> element. B. Store all versions of the component in the Global Assembly Cache.Configure the <bindingredirect> element in the configuration file. C. Store each version of the component in its own subdirectory of the application folder.configure the <codebase> element in the configuration file. D. Store all versions of the component in the Global Assembly Cache.Configure the <codebase> element inthe configuration file. Correct Answer: B /Reference: QUESTION 101 You are an enterprise application developer. The application is used by 500 call center executives for an item tracking system. The existing application contains large custom- serializable business objects that contain no user-specific data. The objects are stored by using the session state in-memory provider. You plan to evaluate the logical design of the application. You need to ensure that the application can support long-term growth in the number of users. What should you do? A. Use server cache to store the business objects. B. Use the Enterprise Library Caching Application Block to store session data. C. Change the session provider to use the ASP.NET SQL Server session provider. D. Move the business logic layer into a set of ASMX Web services, and change the ASP.NET application to not reference the business logic assemblies directly. Correct Answer: A /Reference: QUESTION 102 You are an enterprise application developer. You are evaluating a component that monitors a Web-based application. The component stores monitoring information in a database and performs the following functions: Retrieves the number of orders placed per second.tracks the data for peak usage of the application and displays the data in a tabular form. Subsequently, monitoring requirements change in the following manner: Users must be able to view data graphically.users must be able to analyze data in real time.users must be able to correlate the number of orders placed per second with the memory usage in the Web server. You need to evaluate whether the component meets the new requirements and propose a solution, if required. What should you conclude? A. The component meets the new requirements. B. The component does not meet the new requirements. You need to update a text file by using trace statements instead of storing data in a database.

52 C. The component does not meet the new requirements. You need to update a custom performance counter instead of a database. D. The component does not meet the new requirements. You need to update a custom event log instead of a database. Correct Answer: C /Reference: QUESTION 103 You are an enterprise application developer. You are reviewing a code segment in a Windows Forms application that invokes a Web service asynchronously. You discover that there is no implementation of exception handling. You need to implement exception handling for the application and log the error in the event log by using the minimum amount of coding effort. What should you do? A. Enclose each method in a try/catch block.log the error in the catch code block. B. Enclose each public method in a try/catch block.log the error in the catch code block. C. Register a handler for the Application.ThreadException event.log the error in the event handler. D. Register a handler for the AppDomain.UnhandledException event.log the error in the event handler. Correct Answer: D /Reference: QUESTION 104 You are an enterprise application developer. You plan to design a monitoring mechanism for a Web service. The Web service contains a method named Forecast that uses a complex algorithm to forecast weather. The algorithm generates a number of exceptions. Administrators are responsible for shutting down the service when the number of exceptions is greater than 50 for every 10 seconds. You need to monitor the number of exceptions that are generated by the Forecast method during the execution of the Web service. What should you do? A. Create a CounterMultiTimer performance counter to monitor the exceptions thrown by the Forecast method in each second. B. Create a CounterTimer performance counter to monitor the exceptions that are thrown by the Forecast method in each second. C. Create a CountPerTimeInterval32 performance counter to monitor the exceptions thrown by the Forecast method in each second. D. Create a RateOfCountsPerSecond32 performance counter to monitor the exceptions that are thrown by the Forecast method in each second. Correct Answer: C /Reference: QUESTION 105

53 You are an enterprise application developer. You create a Web-based application and deploy it to your customers. The application requires the users to log on to use the application. The application does not permit impersonation. The application also requires the users to connect to the database and to a folder in the Web server. Your customers report a security bug. The bug denies access to the logged-on users every time they try to upload a file to the folder in the Web server. Your customers provide you with the following data to reproduce the bug: The version of the Web-based applicationthe users steps in the Web-based applicationthe version of the operating system You find that the information is insufficient to reproduce the bug. You need to identify the additional information that is required to reproduce the bug. Which two additional data should you use? (Each correct answer presents part of the solution. Choose two.) A. security settings for the folder on the Web server B. security settings for the logged-on user C. security settings for the ASP.NET process account D. the file for upload E. security settings for the file for upload Correct Answer: AC /Reference: QUESTION 106 You are an enterprise application developer. You create a Web Service that provides methods which return the values of a series of calculations. You identify performance problems in a component within the calculations. You need to find out the precise number of nanoseconds that were consumed by the call to the component. What should you do? A. Get the values of the Environment.TickCount property before and after the call to the component. B. Get the values of the DateTime.Ticks property before and after the call to the component. C. Get the values of the Win32 GetTickCount API property before and after the call to the component. D. Use the Win32 QueryPerformanceCounter API function in conjunction with the QueryPerformanceFrequency API function. Correct Answer: D /Reference: QUESTION 107 You are an enterprise application developer. You create a Microsoft Windows-based service application. The application must perform the following tasks: Monitor running processes for critical events.log critical events to an and send the to the system administrators.record and include stack information as part of the critical event. You must be able to configure application event logging at run time. Application event logging must have minimal impact on runtime performance. You need to choose an appropriate monitoring feature to fulfill these requirements. Which feature should you choose? A. Microsoft Windows Management Instrumentation (WMI) events B. The System Event Log C. A custom TraceListener D. The Application Event Log Correct Answer: C

54 /Reference: QUESTION 108 You are an enterprise application developer. You are developing a component to contain a large number of properties. You plan to write a method in the component that will accept an object as a parameter. The method will return a formatted string representation of all property values of the object. You need to implement the method by ensuring the minimum amount of memory usage. What should you do? A. Concatenate property values to a string, and return the string. B. Append all property values to StringBuilder, and return a string. C. Create a string array of property values, and use an XSLT transform to return the string. D. Use a custom TypeConverter that converts the business object type to a string, and return the string. Correct Answer: B /Reference: QUESTION 109 You are an enterprise application developer. You plan to design the component architecture for a new largescale enterprise application. You need to design a component architecture that meets the following requirements: The components must share common method implementations.the components must be able to support custom implementation of specific methods. What should you do? A. Use interface polymorphism. B. Define abstract classes. C. Use inheritance polymorphism. D. Define sealed classes. Correct Answer: C /Reference: QUESTION 110 You are an enterprise application developer. You are creating a component that will be part of a field-sales order system. The component will be used by a program installed on portable computers. The program will communicate with a corporate server that will use the guest network access at customer sites. You need to ensure that the component design is optimized for performance. You also need to ensure that the component design protects the local data and the communications stream without compromising the flexibility of the communication mechanism. What should you do? A. Store all the data on the corporate server and use a virtual private network for communication. B. Store all data on the corporate server and use Secure Sockets Layer for communication. C. Store the local data in a file that is created by using a RijndaelManaged filestream encryption and use a virtual private network for communication.

55 D. Store the local data in a file created by using a RijndaelManaged filestream encryption and use Secure Sockets Layer for communication. Correct Answer: D /Reference: QUESTION 111 You are an enterprise application developer. You are creating a component to load data from Microsoft SQL Server database tables into combo boxes. The retrieved data has a numeric ID column and a description column. You need to select a.net class that allows you to load the data. You also need to ensure minimal effect on the database server performance. Which class should you use? A. DataSet B. SqlDataReader C. SqlDataAdapter D. OleDbDataAdapter Correct Answer: B /Reference: QUESTION 112 You are an enterprise application developer. You are creating a set of three middle-tier Web services. Each Web service is deployed as a separate ASP.NET application. The Web services will include shared custom configuration settings. You are implementing an application configuration strategy. Your strategy must allow an administrator to do the following: Configure the default settings for all three Web services in a single XML file.override any setting for any of the Web services. You need to implement a component to store the custom configuration settings. You also need to ensure that the configuration settings can be read by using the minimum amount of development effort. What should you do? A. Extend the ConfigurationSection class. B. Extend the ApplicationsSettingBase class. C. Create a custom class that implements the IXmlSerializable interface. D. Create a custom class that implements the ISettingsProviderService interface. Correct Answer: A /Reference: QUESTION 113 You are an enterprise application developer. You develop a banking application by using Microsoft Visual Studio.NET 2005 and.net Framework 2.0. During the design phase of the application, you identify three entities named Bank, BankAccount, and Person. You need to design a class diagram so that the entities meet the following requirements: A BankAccount entity must belong to only one

56 Bank entity.a Bank entity must contain several BankAccount entities.a BankAccount entity must have one or more Person entities as account holders.a Person entity must exist independent of BankAccount entities. Which class diagram should you design? A. B. C. D. Correct Answer: D /Reference: QUESTION 114 You are an enterprise application developer. You plan to deploy an ASP.NET application. You need to ensure that the application meets the following requirements: Supports failover clustering in session state management.supports load-balanced clustering in Web traffic routing. What should you do? A. Implement a Web garden and StateServer mode configuration. B. Implement a Web garden and SQLServer mode configuration. C. Implement a Web farm and StateServer mode configuration. D. Implement a Web farm and SQLServer mode configuration. Correct Answer: D

57 /Reference: QUESTION 115 You are an enterprise application developer. You are designing unit tests for a Customer class. The Customer class contains properties to get or set data in private fields. The Customer class also contains one default constructor and one non-default constructor. The non-default constructor accepts a Customer ID argument. When the non-default constructor is used to instantiate the Customer object, a public method named Load is invoked along with the Customer ID argument. The Customer object properties are then loaded by using values from the database. You need to design unit tests that will test the class properties. Which three test scenarios should you recommend? (Each correct answer presents part of the solution. Choose three.) A. Use the non-default constructor. Examine whether the properties return the correct values from the database. B. Use the default constructor. Examine whether the properties return the correct values from the database. C. Use the non-default constructor and examine whether the properties are empty. D. Use the default constructor along with the Load method. Examine whether the properties return the correct values from the database. E. Use the default constructor. Examine whether the properties of the default constructor are equal to those of a second instance of the Customer class instantiated by using the non- default constructor. F. Use the default constructor. Assign values to the properties of the object. Examine whether the properties return values assigned to them. Correct Answer: ADF /Reference: QUESTION 116 You are an enterprise application developer. You develop a component that provides audio files for client applications. The component must meet the following requirements: Optimal performance for playback.minimal download time. You need to design a strategy that meets the requirements. What should you do? A. Use a bit rate of 128 Kbps for audio files.use the Fast Cache streaming setting. B. Use a bit rate of 64 Kbps for audio files.use the Fast Cache streaming setting. C. Use a bit rate of 128 Kbps for audio files.use no cache streaming. D. Use a bit rate of 64 Kbps for audio files.use no cache streaming. Correct Answer: B /Reference: QUESTION 117 You are an enterprise application developer. You are designing an event logging mechanism for an application. The application will be installed on all computers in your company. The company policy has the following requirements: Developers must be informed of critical events.help-desk technicians must have access to all events on each computer. You need to design the event logging storage strategy that complies with the company policy. What should you do?

58 A. Implement a custom SMTP trace listener for critical events.implement an EventLogTraceListener object for all events. B. Implement a custom database trace listener for critical events.implement a TextWriterEventListener object for all events. C. Implement a TextWriterEventListener object for critical events.implement an EventLogTraceListener object for all events. D. Implement a DefaultTraceListener object for critical events.implement a TextWriterEventListener object for all events. Correct Answer: A /Reference: QUESTION 118 You are an enterprise application developer. You create a layered enterprise application that consists of a user interface layer, a business layer, and a data layer. The user interface layer is currently implemented as a smart client. End users now also need to access the enterprise application over the Web. To permit this, you create a Web client application. You also create a user interface process layer as a separate assembly. This assembly encapsulates the validation rules that apply to the end user interaction with the system. In the new version of the application, all user interfaces will use the new user interface process layer. The implementation of the new version of the application is as shown in the following diagram. (Click the Exhibit button.) Your team plans to deploy the user interface process assembly on the Web server. You need to evaluate whether the deployment plan fulfills the requirements and recommend change, if required. What should you conclude? A. The deployment plan fulfills the requirements. B. The deployment plan does not fulfill the requirements. You must install the user interface process assembly in the application server. C. The deployment plan does not fulfill the requirements. You must install the user interface process assembly in the smart client applications. D. The deployment plan does not fulfill the requirements. You must install the user interface process assembly in the Web server as well as in the smart client applications. Correct Answer: D /Reference: QUESTION 119 You are an enterprise application developer. You plan to test the forms authentication mechanism of an ASP.NET application. You need to design an appropriate testing strategy. What should you do? A. Create Web Tests to test user interaction. B. Create Unit Tests to test the authentication provider. C. Create Generic Tests to test the authentication provider. D. Create ASP.NET Unit Tests to test the classes that involve forms authentication. Correct Answer: A

59 /Reference: Page 52 of 159 QUESTION 120 You are an enterprise application developer. You are manipulating a collection of customer, product, and supplier objects. The collection objects must fulfill the following requirements: The objects must use custom sort methods on different properties of the respective classes.the objects must be strongly typed. A developer from your team decides to use the following collection classes. abstract class MyCollectionBase : System.Collections.CollectionBase { abstract public void Sort();}public class CustomerCollection : MyCollectionBase { //Code overriding CollectionBase methods public override void Sort(){ //Customer sorting code }}public class SupplierCollection : MyCollectionBase { //Code overriding CollectionBase methods public override void Sort(){ //Supplier sorting code }}public class ProductCollection : MyCollectionBase { //Code overriding CollectionBase methods public override void Sort(){ //Product sorting code }} You need to review the code and recommend improvements to simplify maintenance, if necessary. What should you conclude and recommend? A. The code does not need to be modified. B. The code needs to be modified. The MyCollectionBase class must implement the ICollection interface instead of inheriting from the CollectionBase class. C. The code needs to be modified. Use List<T> class instead of creating custom collections. D. The code needs to be modified. The child collection classes must inherit from the CollectionBase class instead of the MyCollectionBase class. Correct Answer: C /Reference: QUESTION 121

60 You are an enterprise application developer. You are creating a component that will be deployed as part of a class library. The component must meet the following specifications: The interface of the component must be accessible to components outside the hosting assembly.the interface of the component must be interoperable with components written in any other.net Framework languages.the implementation of the component cannot be expanded upon by a derived class. You need to design the interface of the component. Which three tasks should you perform? (Each correct answer presents part of the solution. Choose three.) A. Apply the CLSCompliant(true) attribute to the assembly and component definition. B. Apply the abstract keyword to the component definition. C. Apply the ComVisible(true) attribute to the assembly and component definition. D. Create a primary interop assembly for the assembly that hosts your component. E. Apply the sealed keyword to the component definition. F. Apply the public keyword to the component definition. Correct Answer: AEF /Reference: QUESTION 122 You are an enterprise application developer. You are working on an enterprise-wide reporting application. The physical design of the application currently requires four servers that must be configured in the following manner: Two application servers as a failover cluster in the application tiertwo database servers as a failover cluster in the data tier You need to evaluate the physical design for maximum utilization of the servers and provide a solution that is scalable. What should you do? A. Approve the existing physical design. B. Use the servers in the data tier for load balancing in the application tier. C. Use the servers in the data tier for load balancing rather than using it as a failover cluster. D. Use the servers in the application tier for load balancing rather than using it as a failover cluster. Correct Answer: D /Reference: QUESTION 123 You are an enterprise application developer. You are creating a component that will be used to analyze various data sources. The component performs the following tasks in sequence: It accepts data from multiple online sources.it analyzes the data from each source.it returns a computed aggregate value. The types of data sources can change over the life of the component. You need to design the component to improve scalability. You also need to ensure that the component design allows for addition of data sources in future and also for modifications in the existing data sources. What should you do? A. Create a separate instance of the component for each data source. B. Create a component that sequentially processes the data from each source. C. Create a component that creates a thread for each data source and aggregates the values that are returned. D. Create a component that creates a separate process for each data source and aggregates the values that are returned. Correct Answer: C

61 /Reference: QUESTION 124 You are an enterprise application developer. You develop an application for a food store subsidiary of a company named Contoso, Ltd. The application contains the following components: ASP.NET applicationbusiness entitiesbusiness componentsdata access layerloggingdata access helper The application design must meet the following requirements: Use an N-tier environmentuse components that can be reuseduse assembly names that map to the first three sections of the namespaces You need to identify the structure of the namespaces. Which namespace structure should you use? A. Contoso.FoodStore.WebContoso.FoodStore.WebServiceContoso.FoodStore.BusinessEntitie s C ntoso.foodstore.busine B. Contoso.FoodStore.Ui.WebContoso.FoodStore.Business.EntitiesContoso.FoodStore.Business. omponentscontoso.foo C. Contoso.FoodStore.Web.UiContoso.FoodStore.Entities.BusinessContoso.FoodStore.Compo n en s.businesscontoso.foo D. Contoso.FoodStore.Ui.WebContoso.FoodStore.Business.EntitiesContoso.FoodStore.Business. omponentscontoso.foo Correct Answer: B /Reference: QUESTION 125 You are an enterprise application developer. You create an ASP.NET application that calls a.net remoting object named TradingEngine. The object implements an interface named ITradingEngine. This interface defines a method that returns a SecurityDataTable object. The application types are partitioned into assemblies in the following manner: The TradingEngine class is implemented in an assembly named TradingEngineLib.The ITradingEngine interface is implemented in an assembly named TradingEngineInterfaceLib.The SecurityDataTable class is implemented in an assembly named TradingEntities. You need to identify the minimum set of assemblies necessary for deployment in the ASP.NET application. Which assembly/assemblies should you include? A. TradingEngineInterfaceLib B. TradingEngineInterfaceLib and TradingEntities C. TradingEngineLib and TradingEngineInterfaceLib D. TradingEngineLib, TradingEngineInterfaceLib, and TradingEntities Correct Answer: B /Reference: QUESTION 126 You are an enterprise application developer. You create a component that has a method named IsPrinterLicensed. The method invokes a Web service named printlicensing. The Web service provides a method named checklicense. You want to recieve the feedback from the Web service when the call to the

62 Web service is completed. You write the following code segment. void pl_completed(object sender, printlicense.checklicensecompletedeventargs args){ bool Result = args.result; // process result} You need to invoke the Web service asynchronously. You also need to ensure that the component is notified when the call to the Web service is completed. Which code fragment should you use? A. pl = new printlicense.printlicensing();pl.checklicensecompleted += pl_completed;pl.checklicense (companyname, printerip); B. pl = new printlicense.printlicensing();pl.checklicensecompleted += pl_completed;pl.checklicenseasync (companyname, printerip); C. pl = new printlicense.printlicensing();pl.checklicenseasync(companyname, pl = new printlicense.printlicensing();pl.allowautoredirect = Correct Answer: B /Reference: QUESTION 127 You are an enterprise application developer. You are designing a component that will perform the following tasks: Read data from a transaction that accesses multiple data sources.display a computed result to the user. The component contains the following routines: A routine that displays the returned dataa routine that retrieves the transacted data You want data to be displayed only when the results are complete. You need to design the component to use the threading architecture to optimize performance and to minimize the usage of resources. What should you do? A. Ensure that the data display routine is in a separate thread. B. Ensure that the data retrieval routine is in a separate thread. C. Ensure that both routines are in the main process thread. D. Ensure that the two routines are in their own threads separate from the main process thread. Correct Answer: B /Reference: QUESTION 128

63 You are an enterprise application developer. You are developing an application that runs in an N- tier environment. You need to design your N-tier layers to enforce client-based certificate security. How should you complete the diagram? (To answer, drag the appropriate layers to the correct locations in the answer area.) A. B. C. D. Correct Answer: /Reference:

64 QUESTION 129 You are an enterprise application developer. You plan to evaluate the performance of an ASP.NET application. You review a performance monitoring log. You notice that the ASP.NET Worker Process Restarts performance counter shows a consistent measure over several days. However, the performance counter spikes unexpectedly at irregular intervals. You need to provide the following information: An explanation for the performance spike.a plan to ensure that the performance spike does not recur. What should you do? A. Report that an unknown problem is causing unexpected process restarts.plan to enable recycling. B. Report that an unknown problem is causing unexpected process restarts.plan to gather additional performance and logging data. C. Report that Mic rosoft Internet Information Services recycling configuration is causing the processes to recycle.plan to disable recycling. D. Report that Mic rosoft Internet Information Services recycling configuration is causing the processes to recycle.plan no further action. Correct Answer: B /Reference: QUESTION 130 You are an enterprise application developer. You have created an ASP.NET application. You need to create a unit test to test the Button1_Click event handler of an aspx page by using the minimum amount of code. What should you do? A. Create a wrapper class to the page class in the App_Code folder.create an ASP.NET unit test for the wrapper class. B. Change the scope of the Button1_Click event handler from visible to public.create a wrapper class to the

65 page class in another assembly.create a unit test for the wrapper class. C. Get a reference to the Page object by calling the TestContext.RequestedPage property.create a PrivateObject object by passing the Page object as a parameter.use the Invoke method of the PrivateObject object to invoke the Button1_Click event handler. D. Get a reference to the Page object by calling the TestContext.RequestedPage property.create a PrivateType object by passing the Page object as a parameter.use the InvokeStatic method of the PrivateType object to invoke the Button1_Click event handler. Correct Answer: C /Reference: QUESTION 131 You are an enterprise application developer. You are developing a Web service. The service will be consumed by client applications that are built on the.net and other platforms. The Web service will return a collection to the client applications. You need to ensure that the client applications can consume the collection. You want to achieve this goal by using the minimum amount of development effort. What should you do? A. Use a DataSet. B. Use a DataTable. C. Use serializable objects. D. Use the MarshalByRefObject base class. Correct Answer: C /Reference: QUESTION 132 You are an enterprise application developer. You are modifying an existing component that communicates with a single vendor. You need to ensure that the design meets the following requirements: Supports multiple vendors.supports common business rules that are applicable to all vendors.supports rules that are specific to each vendor.supports addition of new vendors easily. What should you do? A. Create individual components for each vendor. B. Update the component to accept a constructor parameter that identifies the vendor. C. Update the component to accept a parameter on each method to identify the vendor. D. Update the component to use common rules in a base class and vendor-specific rules in derived classes. Correct Answer: D /Reference: QUESTION 133 You are an enterprise application developer. An ASP.NET application accesses a Microsoft SQL Server database. You discover that the application intermittently logs the following exception: "System.InvalidOperationException: Timeout expired. The timeout period elapsed prior to obtaining a connection from the pool. This may have occurred because all pooled connections were in use and max pool

66 size was reached." You need to identify an appropriate performance counter to ascertain that the exception is caused by the leaking connections. Which performance counter should you monitor? A..NET CLR Data\SqlClient: Total # failed connects B..NET CLR Data\SqlClient: Peak # pooled connections C..NET Data Provider for SqlServer\ NumberOfPooledConnections D..NET Data Provider for SqlServer\ NumberOfReclaimedConnections Correct Answer: D /Reference: QUESTION 134 You are an enterprise application developer. You are designing an event logging mechanism for a Web service. The Web service will be hosted on a Web farm. Your company policy specifies that all events for a component must be stored in a secure location. You need to design the event logging storage strategy to comply with the company policy. Which storage mechanism should you use? A. Trace.axd B. Event log database C. System event log D. Application event log Correct Answer: B /Reference: QUESTION 135 You are an enterprise application developer. You develop an application by using Microsoft Visual Studio.NET 2005 and.net Framework 2.0. The application will be used to track the tasks. The application has the following requirements: Any user must be able to suggest new tasks.managers must be able to schedule or reject suggested tasks.resources must be able to update the task progress.managers must be

67 able to cancel an uncompleted task at any point of time. You need to design a state diagram for the application to meet the specified requirements. Which state diagram should you design? A. B. C. D. Correct Answer: B /Reference: QUESTION 136 You are an enterprise application developer. You are designing an event logging mechanism for a multi-tiered application. You need to ensure that the event logging mechanism meets the following requirements: Event data is available for at least three years.event data is accessible through a central location.access to event data is controlled for different types of events and users.the development effort is minimized. Which two actions should you perform? (Each answer presents part of the solution. Choose two.)

68 A. Use a custom class to log events. B. Use the Trace class to log events. C. Use the Debug class to log events. D. Use a custom TraceListener object to write data to a database. E. Use the EventLogTraceListener object to write data to the application Event Log file. F. Use the TextWriterEventListener object to write data to a text file in a central server. Correct Answer: BD /Reference: QUESTION 137 You are an enterprise application developer. An existing Smart Client timesheet application stores entries in a local Microsoft SQL Server database. An ASP.NET application implements the same functionality and stores entries in a corporate SQL Server database. You plan to synchronize the locally stored timesheet data with the corporate database whenever the Smart Client application is online. You make the following changes to the database schema: Add a timestamp column to the existing time entry table.add a table named history. You need to ensure that your deployment strategy enables the Smart Client application to synchronize the existing time entries. What should you do? A. Replace the existing local database with the new version. B. Execute a script to create the history table and to alter the time entry table. C. Execute a script to create the history table and to remove and recreate the time entry table. D. Modify the configured connection string of the Smart Client application to access the corporate SQL Server database. Correct Answer: B /Reference: QUESTION 138 You are an enterprise application developer. You are creating an application that has a business object named Product. The application also includes a Windows form along with a ComboBox control. You plan to display the Name property of the Product object in the ComboBox control. An application workflow allows the user to add new Product objects. You need to recommend an appropriate data structure for the Product objects. You also need to ensure that when a new Product object is added, the data structure provides notifications to update the ComboBox control automatically. Which data structure should you recommend? A. ArrayList B. List(T) C. Collection(T) D. BindingList(T) Correct Answer: D

69 /Reference: QUESTION 139 You are an enterprise application developer. You plan to create a data access layer for an application. The application will store the data in a relational database. The application supports multiple database implementations. The application must use the vendor-provided database interaction component libraries whenever they are available. You need to identify a strategy to access data that supports these criteria. Which strategy should you use? A. Use the.net Framework Data Provider for ODBC components. B. Use the.net Framework Data Provider for OLE DB components. C. Use the generic data access components that are created by using the generic factory. D. Use the.net Framework Data Provider for OLE DB components or the.net Framework Data Provider for Microsoft SQL Server components based on the input that is entered during installation. Correct Answer: C /Reference: QUESTION 140 You are an enterprise application developer. You are working on an accounting application. The application is designed in a modular manner. Each module provides a different set of accounting features. The modules are implemented as a set of component assemblies. The module versions will be upgraded with new features and bug fixes in a regular maintenance release schedule. You need to ensure that the application is configured to use the updated versions of the modules. What should you do? A. Modify the AssemblyFileVersion attribute of the module. B. Assign a Strong Name signature to the component assemblies. C. Deploy the component assemblies as private assemblies in the application folder. D. Specify the usage of another attribute class for the component assemblies by using the AttributeUsageAttribute class. Correct Answer: B /Reference: QUESTION 141 You are an enterprise application developer. You are designing a monitoring mechanism for a Web service. The Web service uses a custom header for authentication. You must send an e- mail message to the server administrators whenever the number of consecutive failed authentication attempts reaches three. You need to design the monitoring mechanism by using the minimum amount of development effort. What should you do? A. Create a performance counter to monitor failed logon attempts.write a code segment to send an message whenever the value of the counter is 3. B. Create a performance counter to monitor failed logon attempts. Create an alert in the System Monitor to send an message whenever the value of the counter is 3. C. Use an existing counter to monitor failed logon attempts.write a code segment to read the counter and to send an message whenever the value of the counter is 3.

70 D. Use an existing counter to monitor failed logon attempts.create an alert in the System Monitor to send an e- mail message whenever the value of the counter is 3. Correct Answer: B /Reference: QUESTION 142 You are an enterprise application developer. You are designing a monitoring mechanism for an enterprise application. You need to ensure that the monitoring mechanism meets the following requirements: Logs errors and warningsconfigures source for eventsenables logging for particular counterstraces the execution path of a process through multiple physical tiers Which monitoring mechanism should you use? A. Windows Management Instrumentation B. Event Tracing for Windows C. Enterprise Instrumentation Framework D. Exception Manager Application Block Correct Answer: C /Reference: QUESTION 143 You are an enterprise application developer. You create an application to provide an enterprise- wide barcode printing solution. You are developing a component that contains a method named InitializePrinter. The method will call a private function named IsPrinterLicensed to verify the license of the printer for the application. You need to ensure that the exceptions raised by the IsPrinterLicensed function bubble up to the application that calls the InitializePrinter method. You also need to ensure that the exceptions contain contextual information. Which code segment should you use? A. nresult = IsPrinterLicensed(printerName);InitPrinter(printerName); B. try { nres ult = IsPrinterLic ensed(printername); InitPrinter(printerName) ;}catch (Exception ex){ throw ex; } C. try { nresult = IsPrinterLicensed(printerName); InitPrinter(printerName) ;}catch (Exception ex){ throw new Exception("Exception thrown from InitializePrinter");} D. try { nresult = IsPrinterLicensed(printerName); InitPrinter(printerName) ;}catch (Exception ex){ throw new Exception("Exception thrown from InitializePrinter", ex);} Correct Answer: D /Reference: QUESTION 144 You are an enterprise application developer. You are developing a distributed application that contains a

71 business object. The client applications must be able to access the business object from another process. The business object implementation must minimize serialization. You need to extend a class to implement the business object. Which class should you use? A. ObjRef B. ServicedComponent C. MarshalByRefObject D. ContextBoundObject Correct Answer: C /Reference: QUESTION 145 You are an enterprise application developer. You plan to review the design of a component. The component is used to process purchase orders from distributors. You need to ensure that the component meets the following requirements: It is highly available.it is transaction-oriented.it is accessible over the company intranet.it requires the minimum amount of coding effort. What should you do? A. Develop the component as a Web service.deploy the Web service on a Web farm. B. Develop the component as a Windows service.deploy the Windows service on a multiprocessor server. C. Develop the component as a Windows application.deploy the Windows application on a multiprocessor server. D. Develop the component as a.net Remoting component.deploy the serviced component on a Network Load Balancing cluster. Correct Answer: A /Reference: QUESTION 146 You are an enterprise application developer. You develop a solution by using Microsoft Visual Studio.NET 2005 and.net Framework 2.0. The application will be used to receive and process sales orders. The application is designed as a three-tiered application. The logical design of the application identifies the following services: Update the ship date on an order.verify sales quantity on an order.store sales order information.display product information.display order details. The security policy has the following specifications: Changes to the database must be handled through stored procedures. Other services must be handled in other layers. You need to identify the services that must be placed into the stored procedures. Which two services should you choose? (Each correct answer presents part of the solution. Choose two.) A. Retrieve order details. B. Update the ship date. C. Verify sales quantity. D. Store sales order information. E. Display product information. Correct Answer: BD

72 /Reference: QUESTION 147 You are an enterprise application developer. You design an application that communicates with other applications through.net Remoting. The application has a large DataSet. You need to improve the performance of the application. What should you do? A. Set the RemotingFormat property for DataSets to SerializationFormat.Xml. B. Set the RemotingFormat property for DataSets to SerializationFormat.Binary. C. Set the SchemaSerializationMode property for DataSets to SchemaSerializationMode.ExcludeSchema. D. Set the SchemaSerializationMode property for DataSets to SchemaSerializationMode.IncludeSchema. Correct Answer: B /Reference: QUESTION 148 You are an enterprise application developer. You plan to create an application that contains a user interface. The user interface calls the business layer Web Services Enhancements (WSE) Web service. You also plan to design an integration testing strategy for the application. You need to track and correlate the messages that are exchanged between the components by using the minimum amount of coding effort. What should you do? A. Create a custom tracing mechanism that stores messages in a table that has a correlationid column.correlate messages with the same correlationid column. B. Implement WS-Addressing.Enable message trace by using WSE diagnostics.collect tracing files from the user interface and the business layer.correlate messages with the wsa:relatesto value of the SOAP header. C. Implement WS-ReliableMessage.Enable message trace by using WSE diagnostics.collect tracing files from the user interface and the business layer.correlate messages with the wsrm:groupid value of the SOAP header. D. Add a correlationid parameter to each Web service method.enable message trace by using WSE diagnostics.collect tracing files from the user interface and the business layer.correlate messages with the same correlationid value. Correct Answer: B /Reference: QUESTION 149 You are an enterprise application developer for a media organization. You create a Web service that provides large multimedia files to subscribers. The subscribers use a variety of client applications and browsers to access the content. You discover that during peak activity hours, multiple client applications simultaneously subscribe to the data. You need to ensure that the Web service meets the following requirements: It adheres to the WS-Security standards.it processes requests in a time-efficient manner. What should you do? A. Use Direct Internet Message Encapsulation. B. Use a SOAP envelope along with xml serialization. C. Use the Message Transmission Optimization Mechanism that serves the content as a single blob.

73 D. Use the Message Transmission Optimization Mechanism that serves the content as streamed data. Correct Answer: D /Reference: QUESTION 150 You are an enterprise application developer. You are creating a multilingual ASP.NET application. The development plan of the application specifies that the English version of the application must be released first, followed by the localized versions. You need to use a deployment mechanism for localization. You also need to ensure that the deployment mechanism requires the minimum amount of development and configuration efforts. What should you do? A. Use language-separated sites. B. Use language-separated pages. C. Release resource files along with the culture-specific file names. D. Retrieve language-specific resources from a Microsoft SQL Server database. Correct Answer: C /Reference: QUESTION 151 You are an enterprise application developer. You design an event logging mechanism for a serviced component. You need to ensure that the event logging mechanism conforms to the following requirements: All critical exceptions must be logged for debugging purposes.administrators must be allowed to enable and disable tracing for different types of event logging. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) A. Use a single TraceSwitch object to ascertain whether an event is to be logged. B. Use a single TraceLevelSwitch object to ascertain whether an event is to be logged. C. Raise an exception of the System.Exception type for each code segment that must be traced. D. Handle the exceptions in different CATCH blocks as specific exception types. Define the types of exceptions that must be logged, and log the exceptions. E. Handle the exceptions in a single CATCH block as a System.Exception type. Define the properties of each exception object that must be logged, and log the exceptions. Correct Answer: BD /Reference: QUESTION 152 You are an enterprise application developer. You are creating an application that will be used by patients to schedule appointments with a doctor. The functional specification of the application includes the following use case: 1. The user interface (UI) collects the following information from the user: A requested date range and a requested doctor.a choice to schedule with priority given to a requested doctor or to schedule the first available appointment. 2. The UI validates the information and calls the

74 scheduling service.3. The service queries within the date range for the requested doctor if the user chooses to schedule with priority given to the requested doctor. If no appointments are available, execute the query given in step 4.4. The service schedules with the date range if the user chooses to schedule the first available appointment. 5. The service returns a list of available appointments. The UI presents an error and returns to step 1 if no appointment is found. A team member proposes a design as shown in the exhibit. (Click the Exhibit button.) You need to make the necessary corrections to the design to ensure that the use case is correctly implemented. What should you do? A. Modify the diagram to perform steps 3 and 4, and then aggregate the results for all the requests. B. Modify the diagram to issue the request given in step 4 if the request described in step 3 returns no appointments. C. Modify the diagram to issue the request given in step 3 if the request described in step 4 returns no appointments. D. Modify the diagram to present the error described in step 3, and then issue the request given in step 5 if the request described in step 4 returns no appointments. Correct Answer: B /Reference: QUESTION 153 You are an enterprise application developer. You are reviewing an ASP.NET application that communicates with a Web service. The ASP.NET application experiences random performance issues. You plan to perform code profiling during a long-running load test. You need to define a code profiling strategy. What should you do? A. Use the sampling profiling method.use wall time. B. Use the sampling profiling method.use CPU time. C. Use the instrumentation profiling method.use wall time. D. Use the instrumentation profiling method.use CPU time. Correct Answer: A /Reference: QUESTION 154 You are an enterprise application developer. You are designing an event logging mechanism for a Web service. The Web service will be used to expose financial data. You need to ensure that the event logging mechanism meets the following requirements: Access to all financial data is logged in production for auditing purposes.arithmetic exceptions are logged only during application development.event log data is available to the administrators only on the local Web servers. Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.) A. Use the Debug class to log access to financial data. B. Use the Trace class to log access to financial data. C. Use an EventLogTraceListener object to write data to the System Event Log file. D. Use a CATCH block to handle arithmetic exceptions, and use the Debug class to log the exception data. E. Use a CATCH block to handle arithmetic exceptions, and use the Trace class to log the exception data. F. Use a TextWriterEventListener object to write event log data to a text file in the C:\Windows\System32\Logs folder.

75 Correct Answer: BCD /Reference: QUESTION 155 You are an enterprise application developer. You are developing a component for a smart client application. The component will be accessed simultaneously by user interface threads and background threads. The threads must be able to access component properties and methods. The threads must not leave the component in an invalid state. You need to select an appropriate mechanism to ensure valid component state. What should you do? A. Implement the asynchronous design pattern. B. Implement a MarshalByRefObject object. C. Implement a SynchronizationContext object. D. Implement the component, and use locks when you access the component data. Correct Answer: D /Reference: QUESTION 156 You are an enterprise application developer. You create a large-scale, managed application that needs a consistent approach to event logging. The application must format and log events to 20 destinations. Events from 15 sources must be collated onto a single computer. The application must perform the following tasks: Maintain consistent logging and instrumentation practices, both within an application and across the enterprise.ease the learning curve for developers by using a consistent architectural model.support custom implementations of formatters and event sinks.generate log entries as discrete events or as part of a traced process. You need to select an appropriate implementation approach. Which approach should you choose? A. Use the Logging and Instrumentation Application Block from Enterprise Library. B. Write a custom event management component based upon the Publisher-Subscriber pattern. C. Use the EventLog component from Microsoft.NET Framework. D. Use the Message Queuing components from Enterprise Services. Correct Answer: A /Reference: QUESTION 157 You are an enterprise application developer. You plan to create unit tests for an ASP.NET application. You need to ensure that all the resources that are obtained by the assembly during the unit tests are released. What should you do? A. Implement the IDisposable interface in each class.release the resources in the Dispose method. B. Define a method to release the resources after all the tests in each class are run.decorate the method by using the TestCleanUp attribute.

76 C. Define a method to release the resources after all the tests in each class are run.decorate the method by using the ClassCleanUp attribute. D. Define a method to release the resources after all the tests in the assembly are run.decorate the method by using the AssemblyCleanUp attribute. Correct Answer: B /Reference: QUESTION 158 You are an enterprise application developer. You create a Web site that delivers multimedia content to subscribers. The Web site uses Message Transmission Optimization Mechanism (MTOM) to send and receive large files as attachments by using a Web service. You discover that you are unable to send and receive files that are greater than 10 MB in size. You need to ensure that the Web service can send or receive files of a large size with minimum overhead. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) A. Reduce the size of the file attachments because the attachment limit imposed by MTOM is 10 MB. B. Increase the Microsoft Web Services Enhancements limit on the maximum size of SOAP messages. C. Modify the Web Service to send the file attachment by using Direct Internet Message Encoding instead of MTOM. D. Modify the httpruntime maxrequestlength configuration element to increase the maximum allowable size of SOAP messages. E. Modify the httpruntime executiontimeout configuration element to increase the number of seconds that a request is allowed to execute. Correct Answer: BD /Reference: QUESTION 159 You are an enterprise application developer. You are reviewing the design of a component. The component is used to communicate with a legacy system. The component must meet the following requirements: It must handle high-latency network communications.it must accept synchronous calls from Windows and Web-based applications developed by using.net Framework 2.0 in the local network.it must use asynchronous communications. You need to implement the design of the component. What should you do? A. Develop a Web service that creates binary files on a network share. B. Develop a Web service that creates serialized XML files on a network share. C. Develop a component that uses FTP to exchange binary files with the legacy system. D. Develop a component that uses Microsoft Message Queue to communicate with the legacy system. Correct Answer: D /Reference:

77 QUESTION 160 You are an enterprise application developer. You are working on a component in an application that provides a business workflow solution. The component will be used as a workflow to manage purchase requisitions. You discover that a WebException is raised when you use the GetApprover private method to invoke a method of a Web Service. You need identify a code that allows the component to invoke the following methods: The GetDefaultApprover method if a WebException is raisedthe ReportError method if any other exception is raisedthe GoToNextStep method if no exception is raised Which code segment should you use? A. try{ GetApprover (); GoToNextStep();}catch (WebException ex){ GetDefaultApprover ();}catch (Exception ex){ ReportError();} B. try{ GetApprover (); GoToNextStep();}catch (WebException ex){ GetDefaultApprover ();}catch (SqlException ex){ ReportError();} C. try{ GetApprover ();}catch (WebException ex){ GetDefaultApprover ();}catch (Exception ex){ ReportError();}finally{ GoToNextStep();} D. try{ GetApprover ();}catch (WebException ex){ GetDefaultApprover ();}catch (SqlException ex){ ReportError();}finally{ GoToNextStep();} Correct Answer: A /Reference: QUESTION 161 You are an enterprise application developer. You are reviewing the design of a component. The component is used to monitor an FTP folder on a Microsoft Windows 2003 Server computer. You need to ensure that the component meets the following requirements: It is transaction-oriented.it copies data from files in the FTP folder.it runs without the intervention of the user.it requires the minimum amount of development effort. What should you do? A. Develop a Web service. B. Develop a Windows service. C. Develop a Web application. D. Develop a.net Remoting component. Correct Answer: B /Reference: QUESTION 162 You are an enterprise application developer. You plan to gradually implement unit tests for an application. The application contains tests that are not ready to run. You need to count the number of tests that are not ready to run. What should you do? A. Perform a code coverage. B. Add the Ignore attribute to the tests that are not ready to run. C. Add the Assert.Fail method to the tests that are not ready to run. D. Add the Assert.Inconclusive method to the tests that are not ready to run. Correct Answer: D

78 /Reference: QUESTION 163 You are an enterprise application developer. You are creating an ASP.NET application that will have 2,000 registered users. You need to determine the number of users the application can support before reaching the 75 percent level of processor utilization. You also need to ensure that the testing strategy uses the minimum amount of iterations. Which testing strategy should you use? A. Run a load test by using a step load profile that has a maximum user count of 2,000.Analyze the collected test data to ascertain the number of users when the %Processor Time counter is 75 percent. B. Run a load test by using a constant load profile that has a user count of 2,000.Analyze the collected test data to ascertain the number of users when the %Processor Time counter is 75 percent. C. Run a load test by using a goal-based load profile to keep the %Processor Time counter between 70 percent and 80 percent.analyze the collected test data to ascertain the number of users when the % Processor Time counter is between 70 and 80 percent. D. Run a load test by using a goal-based load profile to keep the number of users between 1,800 and 2,200.Analyze the collected test data to ascertain the number of users when the %Processor Time counter is 75 percent. Correct Answer: C /Reference: QUESTION 164 You are an enterprise application developer. You develop an ASP.NETapplication that interacts with a Windows service. The application and the Windows service exchange Microsoft Message Queuing (MSMQ) messages. You need to define an integration test to ensure that the application and the Windows service interact appropriately. What should you do? A. Write a test stub for the Windows service functionality. B. Write a test stub for the application functionality. C. Write a test driver to ensure that the Windows service sends appropriate messages. D. Write a test driver to ensure that the application sends and receives appropriate messages from the Windows service. Correct Answer: D /Reference: QUESTION 165 You are an enterprise application developer. You develop an application by using Microsoft Visual Studio.NET 2005 and.net Framework 2.0. The application will use a custom authentication mechanism. Authentication information will be stored in a Microsoft SQL Server 2005 database table. You design the table and stored procedure that will be used for authentication. You need to ensure that the stored procedure design is as secure as possible. What should you do? A. Ensure that the stored procedure receives the user name as a parameter and returns the stored password.

79 B. Ensure that the stored procedure receives the user name as a parameter and returns the stored password hash. C. Ensure that the stored procedure receives the user name and password as parameters, compares this password with the stored password, and returns a Boolean value. D. Ensure that the stored procedure receives the user name and password hash as parameters, compares this password with the stored password hash, and returns a Boolean value. Correct Answer: D /Reference: QUESTION 166 You are an enterprise application developer. You are documenting the security design of a component in an application. You plan to create a diagram that will display the security zones and input data for the component in the application. You need to identify the appropriate diagram type to ensure that the diagram displays changes in zones and locations of input data. Which diagram type should you use? A. Sequence diagram B. Data flow diagram C. Use case diagram D. Component Interface diagram Correct Answer: B /Reference: QUESTION 167 You are an enterprise application developer. You develop an application by using Microsoft Visual Studio.NET 2005 and.net Framework 2.0. You are designing a data access component for the application. You need to design the data access component to meet the following requirements: It must be available to Windows and Web-based applications.it must execute distributed database transactions. What should you do? A. Use a Web service. B. Use a Windows service. C. Use a.net serviced component. D. Use a.net Remoting component. Correct Answer: C /Reference: QUESTION 168 You are an enterprise application developer. You deploy an ASP.NET application. You must establish performance counter baselines to find out the acceptable performance thresholds. You need to ascertain the appropriate time to measure performance counter baselines. What should you do? A. Take measurements at peak hours of operation.

80 B. Take measurements at off-peak hours of operation. C. Take measurements at regular intervals over a period of time. D. Take measurements when you detect degraded performance. Correct Answer: C /Reference: QUESTION 169 You are an enterprise application developer. You are designing a monitoring mechanism for a serviced component that runs on the company server. The component will be used to execute CPU-intensive operations. When the component is deployed, administrators must be able to monitor the following measures: Number of requests for each operationtime taken for each operation to complete You need to achieve this goal by using the minimum amount of coding effort. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) A. Create a single CounterMultiTimer counter for all operations. B. Create a CounterTimer counter for each operation. C. Create a single NumberOfItems64 counter for all operations. D. Create a NumberOfItems64 counter for each operation. E. Create a single NumberOfItems32 counter for all operations. Correct Answer: BD /Reference: QUESTION 170 You are an enterprise application developer. You design an application that communicates with other applications through.net Remoting. The application has a large DataSet. You need to improve the performance of the application. What should you do? A. Set the RemotingFormat property for DataSets to SerializationFormat.Xml. B. Set the RemotingFormat property for DataSets to SerializationFormat.Binary. C. Set the SchemaSerializationMode property for DataSets to SchemaSerializationMode.ExcludeSchema. D. Set the SchemaSerializationMode property for DataSets to SchemaSerializationMode.IncludeSchema. Correct Answer: B /Reference: QUESTION 171 You are an enterprise application developer. You are evaluating the physical design of a Windows Forms application. The application will be used on several computers on a corporate intranet. The application connects to different Microsoft SQL Server databases. The application relies on a series of distributed components for the business and data layers. You need to review the database connection strategy to ensure scalability and performance of the application. Which two actions should you perform? (Each correct answer

81 presents part of the solution. Choose two.) A. Ensure that the connection is acquired late and released early by the application. B. Ensure that the application uses the classes in the System.Data.OleDb namespace to access the database. C. Ensure that the connection is acquired at the start of the application and released when the application is closed. D. Use connection pooling in the application. Use a dedicated account to connect to the database. E. Use connection pooling in the application. Use the account of the currently logged-in user to connect to the database. Correct Answer: AD /Reference: QUESTION 172 You are an enterprise application developer. You develop an application to manage products. You plan to expose the products from the application to your business partners. The design solution must meet the following requirements: The service is accessible through firewalls.the service interoperates with client applications that are developed by using different frameworks. You need to ensure that the solution meets the requirements by using the minimum amount of development effort. What should you do? A. Use an ASP.NET Web service. B. Use an Enterprise Services component. C. Use an ASP.NET-hosted.NET Remoting. D. Use a managed Windows service-hosted.net Remoting service. Correct Answer: A /Reference: QUESTION 173 You are an enterprise application developer. You plan to create a data access component. You need to identify the appropriate collection that meets following requirements: Provides type safety at design time.requires minimum development effort. Which collection should you use? A. Use ArrayList. B. Use Hashtable. C. Use a generic collection. D. Create separate collection class for each data type. Correct Answer: C /Reference: QUESTION 174 You are an enterprise application developer. A Web-based application manages the employee information in your company. A rapid increase in the number of employees renders scalability difficult. You must suggest a

82 component strategy that permits the application to scale as the number of employees grows. The component must implement the following application features: It resides completely behind a company firewall.it has complex transactional and auditing requirements.it operates across multiple servers within the company.it provides runtime identity services for each employee. You need to choose a component type that implements these features in a scalable manner. You need to achieve this goal by using the least coding effort. Which component type should you choose? A..NET Framework remoting component B. Web services component C..NET Framework class library component D. Enterprise Services component Correct Answer: D /Reference: QUESTION 175 You are an enterprise application developer. You develop an application by using the Microsoft Visual Studio.NET 2005 and the.net Framework 2.0. The application will be used by financial institutions. Financial institutions can operate checking accounts, savings accounts, and credit cards to customers. Customers can use Automated Teller Machine (ATMs) to manage their accounts. You need to design a class diagram for the application to meet the following requirements: The Checking class must be a type of the BankAccount class.the Savings class must be a type of BankAccount class.the BankAccount class can be a type of the ATM interface.the CreditCard class can be a type of the ATM interface. Which class diagram should you use?

83 Page 73 of 159 A. B. C. D. Correct Answer: B /Reference:

84 QUESTION 176 You are an enterprise application developer. You develop an application by using Microsoft Visual Studio.NET 2005 and.net Framework 2.0. You are designing a business component that is used to process sales orders. You need to ensure that the component meets the following requirements: It is available to Windows and Web-based applications on the local network.it uses the most efficient network access protocol. Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.) A. Develop a Web service. B. Use the TCP protocol. C. Use binary serialization. D. Use XML serialization. E. Use the HTTP protocol. F. Develop a.net Remoting component. Correct Answer: BCF /Reference: QUESTION 177 You are an enterprise application developer. You develop a solution by using Microsoft Visual Studio.NET 2005 and.net Framework 2.0. The solution must meet the following requirements: It must be available to the local network through Windows forms.it must be available to the Internet through Web forms.it must use a predefined set of business objects and rules.it must access data from a Microsoft SQL Server 2005 database.it must avoid code duplication. You need to design application layers for the solution. Which application layers and components should you design?

85 A. B. C. D. Correct Answer: C /Reference: QUESTION 178 You are an enterprise application developer. The data access layer of an application contains the following code segment. (Line numbers are included for reference only.) 01 static public List<Employee> GetEmployees

86 (){02 List<Employee> employees = new List<Employee>();03 using (SqlConnection cnn = new SqlConnection(_cnnStr)){04 SqlCommand cmd = new SqlCommand ("GetEmployees", cnn);05 cnn.open();06 DataSet ds = new DataSet();07 SqlDataAdapter da = new SqlDataAdapter(cmd);08 da.fill(ds);09 foreach (DataRow row in ds.tables[0].rows){10 Employee emp = new Employee();11 emp.id = Convert.ToInt32(row["Id"]);12 emp.name = Convert.ToString(row["Name"]); //13 employees.add(emp);14 }15 }16 return employees;17 } You review the code segment and discover that it takes a long time to execute. You need to modify the code segment to improve the performance. What should you do? A. Create a SqlDataReader object.iterate through a DataReader object to populate the employees list. B. Fill a DataTable object by using a DataTable.Load method.iterate through the DataTable to populate the employees list. C. Fill a DataTable object by using a SqlDataAdapter object.iterate through the DataTable to populate the employees list. D. Fill a DataTable object by using a DataTable.Load method.create a DataTableReader object from the DataTable.Iterate through the DataTableReader to populate the employees list. Correct Answer: A /Reference: QUESTION 179 You are an enterprise application developer. You plan to create a data access layer for an application. The application will store the data in a relational database. The application supports multiple database implementations. The application must use the vendor-provided database interaction component libraries whenever they are available. You need to identify a strategy to access data that supports these criteria. Which strategy should you use? A. Use the.net Framework Data Provider for ODBC components. B. Use the.net Framework Data Provider for OLE DB components. C. Use the generic data access components that are created by using the generic factory. D. Use the.net Framework Data Provider for OLE DB components or the.net Framework Data installation. 1 Correct Answer: C /Reference: QUESTION 180 You are an enterprise application developer. You are designing a new component to prioritize security requirements and performance. The component contains methods as shown in the following table. Method NameFunctionBuildCompositeInputConsolidates input to the component from other components.buildprivateinputinputs data that is private to other component routines.userinputinputs data from the user. You need to identify the methods that require run time validation of inputs. You also need to ensure that these methods do not add performance overhead. Which methods should you use? A. UserInput B. BuildPrivateInput and UserInput C. BuildCompositeInput and UserInput

87 D. BuildCompositeInput, BuildPrivateInput, and UserInput Correct Answer: C /Reference: QUESTION 181 You are an enterprise application developer. You are creating an application that has a layered architecture as shown in the following diagram. A component that resides in the workflow layer manages transactions across one or more activities in the business logic layer. You need to make modifications to the component. You need to identify the layers that might require modification when the component in the workflow layer is modified. Which two layers should you identify? (Each correct answer presents part of the solution. Choose two.) A. Presentation layer B. Service facade layer C. Business logic layer D. Data access layer Correct Answer: AB /Reference: QUESTION 182 You are an enterprise application developer. You are creating the first version of an application to manage rich text documents. The application must meet the following design requirements: Support the file system and a Microsoft SQL Server database as data stores. Ensure the following for future versions: o Add support for additional data stores, including network storage. o Acquire the ability to interface with thirdparty-distributed authoring and versioning tools. Bring additional storage options online without having to redeploy the entire application. You need to identify an appropriate approach to meet these requirements. Which approach should you choose? A. Create a single Document component to represent the rich text content of a document and include methods on the component to persist and retrieve rich text for each type of data store. B. Create a single Document component to represent the rich text content of a document and an enumeration to represent each available data store. Include a parameter of the enumerated type in methods interfacing with a data store. C. Create a single Document component to represent the rich text content of a document and an enumeration to represent each available data store. Include a property on the Document component to permit the selection of a data store. D. Create a Document component to represent the rich text content of a document. Create a DocumentRepository component to manage the various data stores. Correct Answer: D /Reference:

88 QUESTION 183 You are an enterprise application developer. You are designing unit test cases for an account management system of a regional bank. Before creating the application, you create the unit test scenarios by using use cases. Three high-level use cases are outlined as shown in the following exhibit. You need to write unit tests to test the functionality inside the system. Which three sets of unit tests should you write? (Each correct answer presents part of the solution. Choose three.) A. Write tests that verify whether a teller and a branch manager can each enter transactions. B. Write tests that verify whether the correct customer details are retrieved when a valid customer ID is given. C. Write tests that verify whether the correct rows are entered in the Account database when a transaction is entered. D. Write tests that verify whether the branch manager can create a new customer account. E. Write tests that verify the details of an account after it is created. F. Write tests that verify whether a teller can look up customers by using a valid customer ID. Correct Answer: BCE /Reference: QUESTION 184 You are an enterprise application developer. You create an order processing application.

89 The application must meet the following requirements: The order is scheduled for delivery if all products are available. The order is back-ordered if any one product is not available. The customer can cancel the back-ordered order. The order is scheduled for delivery if the customer does not cancel it. The order is closed after delivery. You need to select the state diagram that translates the requirements. Which diagram should you choose? A. A B. B C. C D. D Correct Answer: A /Reference: QUESTION 185 You are an enterprise application developer. You create a Web-based application that manages financial transactions for an online investment company. The company requires to meet the following processes: Log all customer actions. Log all application execution failures. The company security policy permits audit events to be logged. The security policy requires that there must be only one local administrator on the Web server. The policy also requires that all code must be run with the least possible privileges. The company uses Microsoft Windows Event Log as the repository for all event information. You need to recommend an appropriate solution to meet the companys requirements. You also need to ensure that you adhere to the company security policy. What should you recommend? A. Create a custom event log for the application. Grant write security permissions on that log to the ASP.NET user account. B. Route log information to a serviced component that impersonates an administrator. C. Call a Web service that runs with default privileges and writes to Windows Event Log. D. Log events to text files and import the event logs into Windows Event Log. Correct Answer: A /Reference: QUESTION 186

90 You are an enterprise application developer. You plan to design the component architecture for a new largescale enterprise application. You need to design a component architecture that meets the following requirements: The components must share common method implementations.the components must be able to support custom implementation of specific methods. What should you do? A. Use interface polymorphism. B. Define abstract classes. C. Use inheritance polymorphism. D. Define sealed classes. Correct Answer: C /Reference: QUESTION 187 You are an enterprise application developer. You are designing a monitoring mechanism for an enterprise application. You need to ensure that the monitoring mechanism meets the following requirements: Logs errors and warningsconfigures source for eventsenables logging for particular counterstraces the execution path of a process through multiple physical tiers Which monitoring mechanism should you use? A. Windows Management Instrumentation B. Event Tracing for Windows C. Enterprise Instrumentation Framework D. Exception Manager Application Block Correct Answer: C /Reference: QUESTION 188 You are an enterprise application developer. You are creating an application that has a layered architecture as shown in the following diagram. A component that resides in the workflow layer manages transactions across one or more activities in the business logic layer. You need to make modifications to the component. You need

91 to identify the layers that might require modification when the component in the workflow layer is modified. Which two layers should you identify? (Each correct answer presents part of the solution. Choose two.) A. Presentation layer B. Service fa?ade layer C. Business logic layer D. Data access layer Correct Answer: AB /Reference: QUESTION 189 You are an enterprise application developer. You create a three-tier Web-based application that accesses 10 external Web services to retrieve currency rates. You need to calculate product prices in ten currencies. A smart client invoicing application accesses the business tier to retrieve and use the product prices in 10 currencies. The business tier calls the 10 external Web services. You create a separate service agent component to encapsulate the logic of which Web service to call. This component also makes it easier to change the Web references when required. Your team plans to deploy this service agent in the Web presentation tier. You need to evaluate whether your teams deployment plan meets the requirements and recommend accordingly. What should you conclude? A. The current deployment plan meets the requirements. B. The current deployment plan does not meet the requirements. The service agent must be deployed in the business tier as well as the Web presentation tier. C. The current deployment plan does not meet the requirements. The service agent must be deployed in the business tier. D. The current deployment plan does not meet the requirements. The service agent must be deployed in the Web presentation tier as well as the smart client applications. Correct Answer: C /Reference: QUESTION 190 You are an enterprise application developer. You create a large-scale, managed application that needs a consistent approach to event logging. The application must format and log events to 20 destinations. Events from 15 sources must be collated onto a single computer. The application must perform the following tasks: Maintain consistent logging and instrumentation practices, both within an application and across the enterprise.ease the learning curve for developers by using a consistent architectural model.support custom implementations of formatters and event sinks.generate log entries as discrete events or as part of a traced process. You need to select an appropriate implementation approach. Which approach should you choose? A. Use the Logging and Instrumentation Application Block from Enterprise Library. B. Write a custom event management component based upon the Publisher-Subscriber pattern. C. Use the EventLog component from Microsoft.NET Framework. D. Use the Message Queuing components from Enterprise Services.

92 Correct Answer: A /Reference: QUESTION 191 You are an enterprise application developer. You create a Web-based application that manages financial transactions for an online investment company. The company requires to meet the following processes: Log all customer actions. Log all application execution failures. The company security policy permits audit events to be logged. The security policy requires that there must be only one local administrator on the Web server. The policy also requires that all code must be run with the least possible privileges. The company uses Microsoft Windows Event Log as the repository for all event information. You need to recommend an appropriate solution to meet the companys requirements. You also need to ensure that you adhere to the company security policy. What should you recommend? A. Create a custom event log for the application. Grant write security permissions on that log to the ASP.NET user account. B. Route log information to a serviced component that impersonates an administrator. C. Call a Web service that runs with default privileges and writes to Windows Event Log. D. Log events to text files and import the event logs into Windows Event Log. Correct Answer: A /Reference: QUESTION 192 You are an enterprise application developer. You are implementing a new component for an application. The component accesses a database to populate a list of customer objects and exposes a method that is named GetAllCustomers. The component uses a design pattern to access the database only on an as-needed basis. A caching mechanism exists in a lower tier of the application architecture. The component must not cache data. You need to implement the logic for populating a list of customer objects by using a database query. You also need to ensure that you meet the company guidelines for the component design pattern. What should you do? A. Execute a query in the constructor of the component to populate a field of type List<Customer>. Return the List reference in the call to the GetAllCustomers method. B. Execute a query in the static constructor of the component to populate a static field of type List<Customer>. Return the List reference in the call to the GetAllCustomers method. C. Execute a query in the GetAllCustomers method to populate a local variable of type List<Customer>. Return the List reference. D. Execute a query in the GetAllCustomers method to populate a field of type List<Customer> only if the field is null. Return the List reference. Correct Answer: C /Reference:

93 QUESTION 193 You are an enterprise application developer. Your company operates a Microsoft Windows-based client application. The application is deployed to 50 client computers on the network. The application uses a separate class library as a data access layer. The data access layer is currently deployed to the application folder of the client application. It is time consuming to deploy new versions of the data access layer. You need to evaluate the current physical design of the application and recommend changes to speed up deployment of new versions of the data access layer. What should you recommend? A. Deploy the data access layer component to the global assembly cache of a server on the network. B. Deploy the data access layer component to the Windows system folder. Use a <codebase> tag in the Windows-based client application configuration file to point to the deployed library. C. Deploy a copy of the data access layer component to the global assembly cache along with each instance of the Windows-based client application. D. Deploy the data access layer component to a server on the network. Use a <codebase> tag in the Windows-based client application configuration file to point to the deployed library. Correct Answer: D /Reference: QUESTION 194 You are an enterprise application developer. You develop a Web application by using ASP.NET that runs on Microsoft Windows Server The ASP.NET application fails to save trace and log data in an event log. You discover that the application has no write access to the registry. You need to ensure that the trace and log information is saved to the event log. You also need to minimize the risk that is associated with the solution. What should you do? A. Grant the write access to the registry for the Network Service account. B. Add the SystemConfigurationInstall DWORD key in the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Eventlog\Application hive. C. Register the event log source that is created by the System.Diagnostics.EventLogInstaller class in the Application_OnStart event. D. Add a class that inherits from the System.Configuration.Install.Installer class. The System.Configuration.Install.Installer class registers the event log source that is created by the System.Diagnostics.EventLogInstaller class. Then, run the installutil.exe [assemblyname] command in the command prompt. Correct Answer: D /Reference: QUESTION 195 You are an enterprise application developer. You are designing unit tests for a Customer class. The Customer class contains properties to get or set data in private fields. The Customer class also contains one default constructor and one non-default constructor. The non-default constructor accepts a Customer ID argument. When the non-default constructor is used to instantiate the Customer object, a public method named Load is invoked along with the Customer ID argument. The Customer object properties are then loaded by using values from the database. You need to design unit tests that will test the class properties. Which three test scenarios should

94 you recommend? (Each correct answer presents part of the solution. Choose three.) A. Use the non-default constructor. Examine whether the properties return the correct values from the database. B. Use the default constructor. Examine whether the properties return the correct values from the database. C. Use the non-default constructor and examine whether the properties are empty. D. Use the default constructor along with the Load method. Examine whether the properties return the correct values from the database. E. Use the default constructor. Examine whether the properties of the default constructor are equal to those of a second instance of the Customer class instantiated by using the non- default constructor. F. Use the default constructor. Assign values to the properties of the object. Examine whether the properties return values assigned to them. Correct Answer: ADF /Reference: QUESTION 196 You are an enterprise application developer. You are designing an event logging mechanism for a Web service. The Web service will be used to expose financial data. You need to ensure that the event logging mechanism meets the following requirements: Access to all financial data is logged in production for auditing purposes.arithmetic exceptions are logged only during application development.event log data is available to the administrators only on the local Web servers. Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.) A. Use the Debug class to log access to financial data. B. Use the Trace class to log access to financial data. C. Use an EventLogTraceListener object to write data to the System Event Log file. D. Use a CATCH block to handle arithmetic exceptions, and use the Debug class to log the exception data. E. Use a CATCH block to handle arithmetic exceptions, and use the Trace class to log the exception data. F. Use a TextWriterEventListener object to write event log data to a text file in the C:\Windows\System32\Logs folder. Correct Answer: BCD /Reference: QUESTION 197 You are an enterprise application developer. You create an order processing application. The application must meet the following requirements: The order is scheduled for delivery if all products are available. The order is back-ordered if any one product is not available. The customer can cancel the back-ordered order.

95 The order is scheduled for delivery if the customer does not cancel it. The order is closed after delivery. You need to select the state diagram that translates the requirements. Which diagram should you choose? A. A B. B C. C D. D Correct Answer: A /Reference: QUESTION 198 You are an enterprise application developer. You are creating an application that has a layered architecture as shown in the following diagram. A component that resides in the workflow layer manages transactions across one or more activities in the business logic layer. You need to make modifications to the component. You need to identify the layers that might require modification when the component in the workflow layer is modified. Which two layers should you identify? (Each correct answer presents part of the solution. Choose two.) A. Presentation layer B. Service fa?ade layer C. Business logic layer D. Data access layer Correct Answer: AB /Reference:

96 QUESTION 199 You are an enterprise application developer. You are creating a component that will be deployed as part of a class library. The component must meet the following specifications: The interface of the component must be accessible to components outside the hosting assembly. The interface of the component must be interoperable with components written in any other.net Framework languages. The implementation of the component cannot be expanded upon by a derived class. You need to design the interface of the component. Which three tasks should you perform? (Each correct answer presents part of the solution. Choose three.) A. Apply the CLSCompliant(true) attribute to the assembly and component definition. B. Apply the abstract keyword to the component definition. C. Apply the ComVisible(true) attribute to the assembly and component definition. D. Create a primary interop assembly for the assembly that hosts your component. E. Apply the sealed keyword to the component definition. F. Apply the public keyword to the component definition. Correct Answer: AEF /Reference: QUESTION 200 You are an enterprise application developer. You are designing an application that manages names and descriptions for your companys products. To manipulate these items, the application requires the object that holds the strings to meet the following criteria: Be dynamically resizable. Be able to store duplicate entries. Expose methods to find all instances of the same text. You need to recommend an appropriate container for the strings. What should you recommend? A. An ArrayList class B. A StringCollection class C. A Hashtable class D. A DataTable class Correct Answer: D /Reference: QUESTION 201 You are an enterprise application developer. You create a Web-based application that manages financial transactions for an online investment company. The company requires to meet the following processes:

97 Log all customer actions. Log all application execution failures. The company security policy permits audit events to be logged. The security policy requires that there must be only one local administrator on the Web server. The policy also requires that all code must be run with the least possible privileges. The company uses Microsoft Windows Event Log as the repository for all event information. You need to recommend an appropriate solution to meet the companys requirements. You also need to ensure that you adhere to the company security policy. What should you recommend? A. Create a custom event log for the application. Grant write security permissions on that log to the ASP.NET user account. B. Route log information to a serviced component that impersonates an administrator. C. Call a Web service that runs with default privileges and writes to Windows Event Log. D. Log events to text files and import the event logs into Windows Event Log. Correct Answer: A /Reference: QUESTION 202 You are an enterprise application developer. You create a three-tier Web-based application that accesses 10 external Web services to retrieve currency rates. You need to calculate product prices in ten currencies. A smart client invoicing application accesses the business tier to retrieve and use the product prices in 10 currencies. The business tier calls the 10 external Web services. You create a separate service agent component to encapsulate the logic of which Web service to call. This component also makes it easier to change the Web references when required. Your team plans to deploy this service agent in the Web presentation tier. You need to evaluate whether your teams deployment plan meets the requirements and recommend accordingly. What should you conclude? A. The current deployment plan meets the requirements. B. The current deployment plan does not meet the requirements. The service agent must be deployed in the business tier as well as the Web presentation tier. C. The current deployment plan does not meet the requirements. The service agent must be deployed in the business tier. D. The current deployment plan does not meet the requirements. The service agent must be deployed in the Web presentation tier as well as the smart client applications. Correct Answer: C /Reference: QUESTION 203 You are an enterprise application developer. You are implementing a new component for an application. The component accesses a database to populate a list of customer objects and exposes a method that is named GetAllCustomers. The component uses a design pattern to access the database only on an as-needed basis. A caching mechanism exists in a lower tier of the application architecture. The component must not cache data. You need to implement the logic for populating a list of customer objects by using a database query. You also need to ensure that you meet the company guidelines for the component design pattern. What should you do? A. Execute a query in the constructor of the component to populate a field of type List<Customer>. Return the

98 List reference in the call to the GetAllCustomers method. B. Execute a query in the static constructor of the component to populate a static field of type List<Customer>. Return the List reference in the call to the GetAllCustomers method. C. Execute a query in the GetAllCustomers method to populate a local variable of type List<Customer>. Return the List reference. D. Execute a query in the GetAllCustomers method to populate a field of type List<Customer> only if the field is null. Return the List reference. Correct Answer: C /Reference: QUESTION 204 You are an enterprise application developer. You are designing an event logging mechanism for a Web service. The Web service will be used to expose financial data. You need to ensure that the event logging mechanism meets the following requirements: Access to all financial data is logged in production for auditing purposes.arithmetic exceptions are logged only during application development.event log data is available to the administrators only on the local Web servers. Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.) A. Use the Debug class to log access to financial data. B. Use the Trace class to log access to financial data. C. Use an EventLogTraceListener object to write data to the System Event Log file. D. Use a CATCH block to handle arithmetic exceptions, and use the Debug class to log the exception data. E. Use a CATCH block to handle arithmetic exceptions, and use the Trace class to log the exception data. F. Use a TextWriterEventListener object to write event log data to a text file in the C:\Windows\System32\Logs folder. Correct Answer: BCD /Reference: QUESTION 205 You are an enterprise application developer. You are creating an application that has a layered architecture as shown in the following

99 diagram. A component that resides in the workflow layer manages transactions across one or more activities in the business logic layer. You need to make modifications to the component. You need to identify the layers that might require modification when the component in the workflow layer is modified. Which two layers should you identify? (Each correct answer presents part of the solution. Choose two.) A. Presentation layer B. Service fa?ade layer C. Business logic layer D. Data access layer Correct Answer: AB /Reference: QUESTION 206 You are an enterprise application developer. You are creating a.net Remoting component. The Version 1.0 of the component is deployed as a well-known server-activated object. The strong- named component is installed into the global assembly cache. Ten distributed applications in your company utilize the component, and each application has an independent schedule for upgrades and deployment. You add new features to the component. These additions will change the signatures of the public methods on the component. You need to devise a deployment strategy for the component. What should you do? A. Deploy the component in place of the existing well-known object. B. Deploy the component as a well-known object. C. Increment the version number of the component assembly. Deploy the component in place of the existing well-known object. D. Increment the version number of the component assembly. Deploy the component as a new well-known object. Correct Answer: B /Reference: QUESTION 207 You are an enterprise application developer. You are creating a component that will be deployed as part of a class library. The component must meet the following specifications: The interface of the component must be accessible to components outside the hosting assembly. The interface of the component must be interoperable with components written in any other.net Framework languages. The implementation of the component cannot be expanded upon by a derived class. You need to design the interface of the component. Which three tasks should you perform? (Each correct answer presents part of the solution. Choose three.) A. Apply the CLSCompliant(true) attribute to the assembly and component definition.

100 B. Apply the abstract keyword to the component definition. C. Apply the ComVisible(true) attribute to the assembly and component definition. D. Create a primary interop assembly for the assembly that hosts your component. E. Apply the sealed keyword to the component definition. F. Apply the public keyword to the component definition. Correct Answer: AEF /Reference: QUESTION 208 You are an enterprise application developer. You are creating an application to manage the inventories of 1,000 stores in geographically dispersed locations. The stores are connected to the main office through a secure network infrastructure. Inventory data from the store servers must be consolidated at the main office everyday. The main office initiates the consolidation by calling a component at the store. Transactional integrity must be maintained during consolidation. Security policy requires the application to propagate Microsoft Windows security context throughout the system to ensure authorization and authentication. Security policy does not permit Web servers at the stores. You need to recommend a reusable component technology that permits data from the store servers to be consolidated at the main office. You also need to ensure that the security policy requirements are met. What should you recommend? A. Web services B. Serviced components C..NET Remoting over HTTP D..NET Windows service Correct Answer: B /Reference: QUESTION 209 You are an enterprise application developer. You create a distributed invoicing solution. Operating requirements state that the memory that is used by the Microsoft Windows-based applications must not exceed a specified value. Technology requirements state that all execution failures must be reported. The Windows-based application must meet the following criteria: Alert system administrators when the memory usage reaches a critical value. Alert system administrators when a technical exception occurs. Log processor and disk space usage on all client computers. You need to select an event management implementation to meet the criteria. What should you choose? A. Tracing B. System Event Log C. Performance Counters D. Microsoft Windows Management Instrumentation (WMI) Correct Answer: D

101 /Reference: QUESTION 210 You are an enterprise application developer. You create 10 applications. Your companys application server will host the applications. You are responsible for designing a monitoring solution for the applications. Your monitoring solution must meet the following criteria: The solution must be reusable. The solution must aggregate all data into one display. You need to design a solution to meet the requirements. What should you do? A. Add performance counters and Microsoft Windows Management Instrumentation (WMI) events to each application. View the counter data in the Performance Monitor and develop a custom application to view the WMI data. B. Write data access code in each application to update a database table. Write an ASP.NET application to display the aggregated data. C. Develop a custom monitoring object. Use the object in each application. Aggregate the information from the custom object into a report and publish it to a Web server every hour. D. Write a Web service to store the monitored information. Write one Web method per application to retrieve the monitored data. Call the Web service from each application. Correct Answer: C /Reference: QUESTION 211 You are an enterprise application developer. You create a distributed application that transfers data across tiers. The application transfers multiple rows of data per transaction to business components through a Microsoft.NET Framework remoting channel. The application binds this data to user interface components. The.NET Framework remoting channel is configured to use binary serialization. After the data is retrieved from the data source, the data is not changed. The distributed application must meet the following criteria: Consume minimum memory for any data location. Make minimum use of the processor for any data location. You need to identify the type of object to serialize. Which object should you choose? A. A DataSet object B. A DataReader object C. An XmlReader object D. A DataTable object Correct Answer: D /Reference: QUESTION 212

102 You are an enterprise application developer. You create a data access layer for an order processing application. The data access layer meets the following criteria: The data access layer contains a GetConnectionString method to retrieve and return the connection string for the database. The data access layer contains a stored procedure named GetTotalOrderAmount. The stored procedure runs a select query to return only the sum of the OrderAmount column for the active orders. At times, there might be no active orders. You create the following method to execute the stored procedure and return the total. public double GetTotalOrderAmount() { SqlConnection con = new SqlConnection(GetConnectionString()); string sql = GetTotalOrderAmount; SqlCommand cmd = new SqlCommand(sql,con); IDataReader rd; con.open(); rd = cmd.executereader(); double amt = 0.0; if (rd.read()) { amt = rd.getdouble(0); } rd.close(); con.close(); return amt; } You need to review the code and recommend modifications to simplify the code and improve performance, if necessary. What should you conclude and recommend? A. The code does not need to be modified. B. The code needs to be modified. You must remove the condition that verifies whether the DataReader objec t returned any rows. C. The code needs to be modified. You must use a DataSet object instead of a DataReader object. D. The code needs to be modified. You must use the ExecuteScalar method instead of the ExecuteReader method. Correct Answer: D /Reference: QUESTION 213 You are an enterprise application developer. You are designing monitoring features for an ASP.NET Webbased application. The monitoring features must meet the following requirements: Log events to a data source for later review. Read configuration settings from the Web.config file. Monitor the application after deployment to production. You decide to use a monitoring feature built into Microsoft.NET Framework. You need to choose an appropriate monitoring feature. Which monitoring feature should you use? A. Use Windows Management Instrumentation (WMI) events. B. Use the System.Diagnostics.Trace class. C. Use Performance Counters. D. Use the System.Web.TraceContext class. Correct Answer: B

103 /Reference: QUESTION 214 You are an enterprise application developer. You are creating a client-side service component for an application. The application runs in the security context of the user. The component must store proprietary information in a secure registry store that requires system service-level access by using the ACL of the user. You need to ensure that the component meets the requirement of the application with a minimum level of security risk. What should you do? A. Run the component in the system service context. B. Create the component so that it impersonates the user context. C. Create the component so that it impersonates the system service context. D. Run the secure storage code in a separate instance that runs in the system service context and recieves data through a method call. Correct Answer: B /Reference: QUESTION 215 You are an enterprise application developer. You review the design of a component. The component processes billing for an online store application. The application is developed by using ASP.NET 2.0. The component must be highly available during business hours. You need to ensure that the component meets the following requirements: It reads all orders that must be billed. It sends an notification to the users.it receives confirmation for credit card and bank account transactions. What should you do? A. Develop the component as a Web service. Deploy the Web service on a Web farm. B. Develop the component as a Windows service.deploy the serviced component on a multiprocessor server. C. Develop the component as a Windows application. Deploy the Windows application on a multiprocessor server. D. Develop the component as a serviced component.deploy the serviced component on a Web farm that uses Network Load Balancing. Correct Answer: D /Reference: QUESTION 216

104 You are an enterprise application developer. You are creating an application that has a layered architecture as shown in the following diagram. A component that resides in the workflow layer manages transactions across one or more activities in the business logic layer. You need to make modifications to the component. You need to identify the layers that might require modification when the component in the workflow layer is modified. Which two layers should you identify? (Each correct answer presents part of the solution. Choose two.) A. Presentation layer B. Service fa?ade layer C. Business logic layer D. Data access layer Correct Answer: AB /Reference: QUESTION 217 You are an enterprise application developer. You are creating a component that will be deployed as part of a class library. The component must meet the following specifications: The interface of the component must be accessible to components outside the hosting assembly. The interface of the component must be interoperable with components written in any other.net Framework languages. The implementation of the component cannot be expanded upon by a derived class. You need to design the interface of the component. Which three tasks should you perform? (Each correct answer presents part of the solution. Choose three.) A. Apply the CLSCompliant(true) attribute to the assembly and component definition. B. Apply the abstract keyword to the component definition. C. Apply the ComVisible(true) attribute to the assembly and component definition. D. Create a primary interop assembly for the assembly that hosts your component. E. Apply the sealed keyword to the component definition. F. Apply the public keyword to the component definition.

Microsoft CSharp. UPGRADE-MCSD MS.NET Skills to MCPD Entpse App Dvlpr Pt2.

Microsoft CSharp. UPGRADE-MCSD MS.NET Skills to MCPD Entpse App Dvlpr Pt2. Microsoft 70-554-CSharp UPGRADE-MCSD MS.NET Skills to MCPD Entpse App Dvlpr Pt2 http://killexams.com/exam-detail/70-554-csharp You need to use an appropriate component implementation approach to meet the

More information

Microsoft Exam Questions & Answers

Microsoft Exam Questions & Answers Microsoft 70-595 Exam Questions & Answers Number: 70-595 Passing Score: 800 Time Limit: 120 min File Version: 25.4 http://www.gratisexam.com/ Microsoft 70-595 Exam Questions & Answers Exam Name: TS: Developing

More information

Migrate Your Skills to Microsoft.NET Framework 2.0 and 3.0 using Visual Studio 2005 (C#)

Migrate Your Skills to Microsoft.NET Framework 2.0 and 3.0 using Visual Studio 2005 (C#) Migrate Your Skills to Microsoft.NET Framework 2.0 and 3.0 using Visual Studio 2005 (C#) Course Length: 5 Days Course Overview This instructor-led course teaches developers to gain in-depth guidance on

More information

Saikat Banerjee Page 1

Saikat Banerjee Page 1 1. What s the advantage of using System.Text.StringBuilder over System.String? StringBuilder is more efficient in the cases, where a lot of manipulation is done to the text. Strings are immutable, so each

More information

Mastering VB.NET using Visual Studio 2010 Course Length: 5 days Price: $2,500

Mastering VB.NET using Visual Studio 2010 Course Length: 5 days Price: $2,500 Mastering VB.NET using Visual Studio 2010 Course Length: 5 days Price: $2,500 Summary Each day there will be a combination of presentations, code walk-throughs, and handson projects. The final project

More information

Programming in C# for Experienced Programmers

Programming in C# for Experienced Programmers Programming in C# for Experienced Programmers Course 20483C 5 Days Instructor-led, Hands-on Introduction This five-day, instructor-led training course teaches developers the programming skills that are

More information

INTRODUCTION TO.NET. Domain of.net D.N.A. Architecture One Tier Two Tier Three Tier N-Tier THE COMMON LANGUAGE RUNTIME (C.L.R.)

INTRODUCTION TO.NET. Domain of.net D.N.A. Architecture One Tier Two Tier Three Tier N-Tier THE COMMON LANGUAGE RUNTIME (C.L.R.) INTRODUCTION TO.NET Domain of.net D.N.A. Architecture One Tier Two Tier Three Tier N-Tier THE COMMON LANGUAGE RUNTIME (C.L.R.) CLR Architecture and Services The.Net Intermediate Language (IL) Just- In-

More information

.NET-6Weeks Project Based Training

.NET-6Weeks Project Based Training .NET-6Weeks Project Based Training Core Topics 1. C# 2. MS.Net 3. ASP.NET 4. 1 Project MS.NET MS.NET Framework The.NET Framework - an Overview Architecture of.net Framework Types of Applications which

More information

Developing Windows Azure and Web Services

Developing Windows Azure and Web Services Developing Windows Azure and Web Services Course 20487B; 5 days, Instructor-led Course Description In this course, students will learn how to design and develop services that access local and remote data

More information

C exam. IBM C IBM WebSphere Application Server Developer Tools V8.5 with Liberty Profile. Version: 1.

C exam.   IBM C IBM WebSphere Application Server Developer Tools V8.5 with Liberty Profile. Version: 1. C9510-319.exam Number: C9510-319 Passing Score: 800 Time Limit: 120 min File Version: 1.0 IBM C9510-319 IBM WebSphere Application Server Developer Tools V8.5 with Liberty Profile Version: 1.0 Exam A QUESTION

More information

Microsoft Official Courseware Course Introduction to Web Development with Microsoft Visual Studio

Microsoft Official Courseware Course Introduction to Web Development with Microsoft Visual Studio Course Overview: This five-day instructor-led course provides knowledge and skills on developing Web applications by using Microsoft Visual Studio 2010. Prerequisites Before attending this course, students

More information

COURSE 20487B: DEVELOPING WINDOWS AZURE AND WEB SERVICES

COURSE 20487B: DEVELOPING WINDOWS AZURE AND WEB SERVICES ABOUT THIS COURSE In this course, students will learn how to design and develop services that access local and remote data from various data sources. Students will also learn how to develop and deploy

More information

COPYRIGHTED MATERIAL. Contents. Part I: C# Fundamentals 1. Chapter 1: The.NET Framework 3. Chapter 2: Getting Started with Visual Studio

COPYRIGHTED MATERIAL. Contents. Part I: C# Fundamentals 1. Chapter 1: The.NET Framework 3. Chapter 2: Getting Started with Visual Studio Introduction XXV Part I: C# Fundamentals 1 Chapter 1: The.NET Framework 3 What s the.net Framework? 3 Common Language Runtime 3.NET Framework Class Library 4 Assemblies and the Microsoft Intermediate Language

More information

BUILDING APPLICATIONS USING C# AND.NET FRAMEWORK (OBJECT-ORIENTED PROGRAMMING, X428.6)

BUILDING APPLICATIONS USING C# AND.NET FRAMEWORK (OBJECT-ORIENTED PROGRAMMING, X428.6) Technology & Information Management Instructor: Michael Kremer, Ph.D. Class 7 Professional Program: Data Administration and Management BUILDING APPLICATIONS USING C# AND.NET FRAMEWORK (OBJECT-ORIENTED

More information

[MS20487]: Developing Windows Azure and Web Services

[MS20487]: Developing Windows Azure and Web Services [MS20487]: Developing Windows Azure and Web Services Length : 5 Days Audience(s) : Developers Level : 300 Technology : Cross-Platform Development Delivery Method : Instructor-led (Classroom) Course Overview

More information

C# is intended to be a simple, modern, general-purpose, objectoriented programming language. Its development team is led by Anders Hejlsberg.

C# is intended to be a simple, modern, general-purpose, objectoriented programming language. Its development team is led by Anders Hejlsberg. C# is intended to be a simple, modern, general-purpose, objectoriented programming language. Its development team is led by Anders Hejlsberg. The most recent version is C# 5.0, which was released on August

More information

Microsoft Dynamics AX Installation and Configuration

Microsoft Dynamics AX Installation and Configuration Microsoft Dynamics AX 2012 - Installation and Configuration Number: MB6-872 Passing Score: 800 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ Microsoft Dynamics AX 2012 - Installation

More information

DOT NET Syllabus (6 Months)

DOT NET Syllabus (6 Months) DOT NET Syllabus (6 Months) THE COMMON LANGUAGE RUNTIME (C.L.R.) CLR Architecture and Services The.Net Intermediate Language (IL) Just- In- Time Compilation and CLS Disassembling.Net Application to IL

More information

SECURED PROGRAMMING IN.NET DETAILED TRAINING CONTENT INDUSTRIAL TRAINING PROGRAM ( )

SECURED PROGRAMMING IN.NET DETAILED TRAINING CONTENT INDUSTRIAL TRAINING PROGRAM ( ) SECURED PROGRAMMING IN.NET DETAILED TRAINING CONTENT INDUSTRIAL TRAINING PROGRAM (2013-2014) MODULE: C# PROGRAMMING CHAPTER 1: INTRODUCING.NET AND C# 1.1 INTRODUCTION TO LANGUAGES C++ C# DIFFERENCES BETWEEN

More information

70-487: Developing Windows Azure and Web Services

70-487: Developing Windows Azure and Web Services 70-487: Developing Windows Azure and Web Services Candidates for this certification are professional developers that use Visual Studio 2015112017 11 and the Microsoft.NET Core Framework 4.5 to design and

More information

MCSA Universal Windows Platform. A Success Guide to Prepare- Programming in C# edusum.com

MCSA Universal Windows Platform. A Success Guide to Prepare- Programming in C# edusum.com 70-483 MCSA Universal Windows Platform A Success Guide to Prepare- Programming in C# edusum.com Table of Contents Introduction to 70-483 Exam on Programming in C#... 2 Microsoft 70-483 Certification Details:...

More information

Microsoft Microsoft TS: MS Internet Security & Acceleration Server 2006, Configuring. Practice Test. Version:

Microsoft Microsoft TS: MS Internet Security & Acceleration Server 2006, Configuring. Practice Test. Version: Microsoft 70-351 Microsoft 70-351 TS: MS Internet Security & Acceleration Server 2006, Configuring Practice Test Version: 2.2 QUESTION NO: 1 Your network consists of a single Active Directory domain named

More information

PrepKing. PrepKing

PrepKing. PrepKing PrepKing Number: 70-548 Passing Score: 800 Time Limit: 120 min File Version: 8.5 http://www.gratisexam.com/ PrepKing 70-548 Exam A QUESTION 1 You create Microsoft Windows-based client applications. You

More information

PRO: Designing and Developing Microsoft SharePoint 2010 Applications

PRO: Designing and Developing Microsoft SharePoint 2010 Applications PRO: Designing and Developing Microsoft SharePoint 2010 Applications Number: 70-576 Passing Score: 700 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ Exam A QUESTION 1 You are helping

More information

.Net Interview Questions

.Net Interview Questions .Net Interview Questions 1.What is.net? NET is an integral part of many applications running on Windows and provides common functionality for those applications to run. This download is for people who

More information

CSharp. Microsoft. PRO-Design & Develop Enterprise Appl by Using MS.NET Frmwk

CSharp. Microsoft. PRO-Design & Develop Enterprise Appl by Using MS.NET Frmwk Microsoft 70-549-CSharp PRO-Design & Develop Enterprise Appl by Using MS.NET Frmwk Download Full Version : http://killexams.com/pass4sure/exam-detail/70-549-csharp QUESTION: 170 You are an enterprise application

More information

Developing Data Access Solutions with Microsoft Visual Studio 2010

Developing Data Access Solutions with Microsoft Visual Studio 2010 Developing Data Access Solutions with Microsoft Visual Studio 2010 Course Code: 10265A; Five days; Instructor-Led About this Course In this course, experienced developers who know the basics of data access

More information

Saikat Banerjee Page 1

Saikat Banerjee Page 1 1.What is.net? NET is an integral part of many applications running on Windows and provides common functionality for those applications to run. This download is for people who need.net to run an application

More information

Contents. Microsoft is a registered trademark of Microsoft Corporation. TRAVERSE is a registered trademark of Open Systems Holdings Corp.

Contents. Microsoft is a registered trademark of Microsoft Corporation. TRAVERSE is a registered trademark of Open Systems Holdings Corp. TPLWPT Contents Summary... 1 General Information... 1 Technology... 2 Server Technology... 2 Business Layer... 4 Client Technology... 4 Structure... 4 Ultra-Thin Client Considerations... 7 Internet and

More information

Program Contents: DOTNET TRAINING IN CHENNAI

Program Contents: DOTNET TRAINING IN CHENNAI DOTNET TRAINING IN CHENNAI NET Framework - In today s world of enterprise application development either desktop or Web, one of leaders and visionary is Microsoft.NET technology. The.NET platform also

More information

Number: Passing Score: 800 Time Limit: 120 min File Version:

Number: Passing Score: 800 Time Limit: 120 min File Version: 70-465 Number: 000-000 Passing Score: 800 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ Exam A QUESTION 1 You need to recommend a backup process for an Online Transaction Processing

More information

Introduction to Programming Microsoft.NET Applications with Visual Studio 2008 (C#)

Introduction to Programming Microsoft.NET Applications with Visual Studio 2008 (C#) Introduction to Programming Microsoft.NET Applications with Visual Studio 2008 (C#) Course Number: 6367A Course Length: 3 Days Course Overview This three-day course will enable students to start designing

More information

TOPLink for WebLogic. Whitepaper. The Challenge: The Solution:

TOPLink for WebLogic. Whitepaper. The Challenge: The Solution: Whitepaper The Challenge: Enterprise JavaBeans (EJB) represents a new standard in enterprise computing: a component-based architecture for developing and deploying distributed object-oriented applications

More information

10265: Developing Data Access Solutions with Microsoft Visual Studio 2010 Duration: 5 Days Method: Instructor-Led

10265: Developing Data Access Solutions with Microsoft Visual Studio 2010 Duration: 5 Days Method: Instructor-Led 10265: Developing Data Access Solutions with Microsoft Visual Studio 2010 Duration: 5 Days Method: Instructor-Led Course Description In this course, experienced developers who know the basics of data access

More information

Sentinet for BizTalk Server SENTINET

Sentinet for BizTalk Server SENTINET Sentinet for BizTalk Server SENTINET Sentinet for BizTalk Server 1 Contents Introduction... 2 Sentinet Benefits... 3 SOA and API Repository... 4 Security... 4 Mediation and Virtualization... 5 Authentication

More information

MOC 6232A: Implementing a Microsoft SQL Server 2008 Database

MOC 6232A: Implementing a Microsoft SQL Server 2008 Database MOC 6232A: Implementing a Microsoft SQL Server 2008 Database Course Number: 6232A Course Length: 5 Days Course Overview This course provides students with the knowledge and skills to implement a Microsoft

More information

Microsoft.CerTkiller v by.SANDRA.65q

Microsoft.CerTkiller v by.SANDRA.65q Microsoft.CerTkiller.70-518.v2014-06-30.by.SANDRA.65q Number: 70-518 Passing Score: 700 Time Limit: 120 min File Version: 20.5 http://www.gratisexam.com/ Exam Code:70-518 Exam Name:Designing and Developing

More information

Pro ODP.NET for Oracle. Database 11 g. Edmund Zehoo. Apress

Pro ODP.NET for Oracle. Database 11 g. Edmund Zehoo. Apress Pro ODP.NET for Oracle Database 11 g Edmund Zehoo Apress Contents Contents at a Glance iv Contents....v About the Author About the Technical Reviewer Acknowledgments xvii xviii xix Chapter 1: Introduction

More information

Introduction to Web Development with Microsoft Visual Studio 2010

Introduction to Web Development with Microsoft Visual Studio 2010 Introduction to Web Development with Microsoft Visual Studio 2010 Course 10267; 5 Days, Instructor-led Course Description This five-day instructor-led course provides knowledge and skills on developing

More information

2609 : Introduction to C# Programming with Microsoft.NET

2609 : Introduction to C# Programming with Microsoft.NET 2609 : Introduction to C# Programming with Microsoft.NET Introduction In this five-day instructor-led course, developers learn the fundamental skills that are required to design and develop object-oriented

More information

10267A CS: Developing Web Applications Using Microsoft Visual Studio 2010

10267A CS: Developing Web Applications Using Microsoft Visual Studio 2010 10267A CS: Developing Web Applications Using Microsoft Visual Studio 2010 Course Overview This instructor-led course provides knowledge and skills on developing Web applications by using Microsoft Visual

More information

ALPHAPRIMETECH 112 New South Road, Hicksville, NY 11801

ALPHAPRIMETECH 112 New South Road, Hicksville, NY 11801 ALPHAPRIMETECH 112 New South Road, Hicksville, NY 11801 Course Curriculum COMPUTER SYSTEM ANALYST-.NET C# Introduction to.net Framework.NET Framework OverView CLR,CLS MSIL Assemblies NameSpaces.NET Languages

More information

C# Syllabus. MS.NET Framework Introduction

C# Syllabus. MS.NET Framework Introduction C# Syllabus MS.NET Framework Introduction The.NET Framework - an Overview Framework Components Framework Versions Types of Applications which can be developed using MS.NET MS.NET Base Class Library MS.NET

More information

SharePoint 2010 Technical Case Study: Microsoft SharePoint Server 2010 Enterprise Intranet Collaboration Environment

SharePoint 2010 Technical Case Study: Microsoft SharePoint Server 2010 Enterprise Intranet Collaboration Environment SharePoint 2010 Technical Case Study: Microsoft SharePoint Server 2010 Enterprise Intranet Collaboration Environment This document is provided as-is. Information and views expressed in this document, including

More information

Configuring a Windows Server 2008 Applications Infrastructure

Configuring a Windows Server 2008 Applications Infrastructure Configuring a Windows Server 2008 Applications Infrastructure Course Number: 70-643 Course Length: 5 Days Course Overview The MCTS credential enables professionals to target specific technologies and distinguish

More information

10267 Introduction to Web Development with Microsoft Visual Studio 2010

10267 Introduction to Web Development with Microsoft Visual Studio 2010 10267 Introduction to Web Development with Microsoft Visual Studio 2010 Course Number: 10267A Category: Visual Studio 2010 Duration: 5 days Course Description This five-day instructor-led course provides

More information

Course Description. Audience. Module Title : 20483B: Programming in C# Duration : 5 days. Course Outline :: 20483B ::

Course Description. Audience. Module Title : 20483B: Programming in C# Duration : 5 days. Course Outline :: 20483B :: Module Title : 20483B: Programming in C# Duration : 5 days Course Description This training course teaches developers the programming skills that are required for developers to create Windows applications

More information

DEVELOPING MICROSOFT SHAREPOINT SERVER 2013 ADVANCED SOLUTIONS. Course: 20489A; Duration: 5 Days; Instructor-led

DEVELOPING MICROSOFT SHAREPOINT SERVER 2013 ADVANCED SOLUTIONS. Course: 20489A; Duration: 5 Days; Instructor-led CENTER OF KNOWLEDGE, PATH TO SUCCESS Website: DEVELOPING MICROSOFT SHAREPOINT SERVER 2013 ADVANCED SOLUTIONS Course: 20489A; Duration: 5 Days; Instructor-led WHAT YOU WILL LEARN This course provides SharePoint

More information

DE Introduction to Web Development with Microsoft Visual Studio 2010

DE Introduction to Web Development with Microsoft Visual Studio 2010 DE-10267 Introduction to Web Development with Microsoft Visual Studio 2010 Summary Duration 5 Days Audience Developers Level 100 Technology Microsoft Visual Studio 2010 Delivery Method Instructor-led (Classroom)

More information

Developing Microsoft Azure and Web Services. Course Code: 20487C; Duration: 5 days; Instructor-led

Developing Microsoft Azure and Web Services. Course Code: 20487C; Duration: 5 days; Instructor-led Developing Microsoft Azure and Web Services Course Code: 20487C; Duration: 5 days; Instructor-led WHAT YOU WILL LEARN In this course, students will learn how to design and develop services that access

More information

Sentinet for Microsoft Azure SENTINET

Sentinet for Microsoft Azure SENTINET Sentinet for Microsoft Azure SENTINET Sentinet for Microsoft Azure 1 Contents Introduction... 2 Customer Benefits... 2 Deployment Topologies... 3 Cloud Deployment Model... 3 Hybrid Deployment Model...

More information

Microsoft_PrepKing_70-583_v _85q_By-Cath. if u wana pass the exam with good percentage dn follow this dump

Microsoft_PrepKing_70-583_v _85q_By-Cath. if u wana pass the exam with good percentage dn follow this dump Microsoft_PrepKing_70-583_v2011-11-25_85q_By-Cath Number: 70-583 Passing Score: 800 Time Limit: 120 min File Version: 2011-11-25 http://www.gratisexam.com/ Exam : Microsoft_PrepKing_70-583 Ver :2011-11-25

More information

Pro Business Applications with Silverlight 4

Pro Business Applications with Silverlight 4 Pro Business Applications with Silverlight 4 Chris Anderson Apress* Contents at a Glance Contents About the Author Acknowledgments iv v xix xx a Chapter 1: Introduction 1 Who This Book Is For 1 About This

More information

itexamdump 최고이자최신인 IT 인증시험덤프 일년무료업데이트서비스제공

itexamdump 최고이자최신인 IT 인증시험덤프  일년무료업데이트서비스제공 itexamdump 최고이자최신인 IT 인증시험덤프 http://www.itexamdump.com 일년무료업데이트서비스제공 Exam : 70-232 Title : Implementing and Maintaining Highly Available Web Solutions with MS W2K Server Technologies Vendors : Microsoft

More information

2310C VB - Developing Web Applications Using Microsoft Visual Studio 2008 Course Number: 2310C Course Length: 5 Days

2310C VB - Developing Web Applications Using Microsoft Visual Studio 2008 Course Number: 2310C Course Length: 5 Days 2310C VB - Developing Web Applications Using Microsoft Visual Studio 2008 Course Number: 2310C Course Length: 5 Days Certification Exam This course will help you prepare for the following Microsoft Certified

More information

Neuron Change History

Neuron Change History Neuron 2.5.13.0 Change History The user can now create custom pipeline steps. The call web service step now has dynamic support for custom soap headers. New step to send and receive from Msmq New step

More information

.NET FRAMEWORK. Visual C#.Net

.NET FRAMEWORK. Visual C#.Net .NET FRAMEWORK Intro to.net Platform for the.net Drawbacks of Current Trend Advantages/Disadvantages of Before.Net Features of.net.net Framework Net Framework BCL & CLR, CTS, MSIL, & Other Tools Security

More information

Course Hours

Course Hours Programming the.net Framework 4.0/4.5 with C# 5.0 Course 70240 40 Hours Microsoft's.NET Framework presents developers with unprecedented opportunities. From 'geoscalable' web applications to desktop and

More information

Microsoft Exchange Server 2007 Implementation and Maintenance

Microsoft Exchange Server 2007 Implementation and Maintenance Microsoft Exchange Server 2007 Implementation and Maintenance Chapter 1 Exchange Server 2007 Deployment 1.1 Overview, Hardware & Editions 1.2 Exchange Server, Windows & Active Directory 1.3 Administration

More information

Alteryx Technical Overview

Alteryx Technical Overview Alteryx Technical Overview v 1.5, March 2017 2017 Alteryx, Inc. v1.5, March 2017 Page 1 Contents System Overview... 3 Alteryx Designer... 3 Alteryx Engine... 3 Alteryx Service... 5 Alteryx Scheduler...

More information

DE-2310 Developing Web Applications Using Microsoft Visual Studio 2008 SP1

DE-2310 Developing Web Applications Using Microsoft Visual Studio 2008 SP1 DE-2310 Developing Web Applications Using Microsoft Visual Studio 2008 SP1 Summary Duration 5 Days Audience Developers Level 100 Technology Microsoft Visual Studio 2008 Delivery Method Instructor-led (Classroom)

More information

10264A CS: Developing Web Applications with Microsoft Visual Studio 2010

10264A CS: Developing Web Applications with Microsoft Visual Studio 2010 10264A CS: Developing Web Applications with Microsoft Visual Studio 2010 Course Number: 10264A Course Length: 5 Days Course Overview In this course, students will learn to develop advanced ASP.NET MVC

More information

Web Serving Architectures

Web Serving Architectures Web Serving Architectures Paul Dantzig IBM Global Services 2000 without the express written consent of the IBM Corporation is prohibited Contents Defining the Problem e-business Solutions e-business Architectures

More information

Scribe Insight 6.5. Release Overview and Technical Information Version 1.0 April 7,

Scribe Insight 6.5. Release Overview and Technical Information Version 1.0 April 7, Scribe Insight 6.5 Release Overview and Technical Information Version 1.0 April 7, 2009 www.scribesoft.com Contents What is Scribe Insight?... 3 Release Overview... 3 Product Management Process Customer

More information

Microsoft SQL Server Training Course Catalogue. Learning Solutions

Microsoft SQL Server Training Course Catalogue. Learning Solutions Training Course Catalogue Learning Solutions Querying SQL Server 2000 with Transact-SQL Course No: MS2071 Two days Instructor-led-Classroom 2000 The goal of this course is to provide students with the

More information

The course introduces many of the techniques and technologies employed by modern desktop and enterprise applications, including:

The course introduces many of the techniques and technologies employed by modern desktop and enterprise applications, including: Programming in C# OD20483B; On-Demand, Video-based Course Description This training course teaches developers the programming skills that are required for developers to create Windows applications using

More information

DEVELOPING WEB APPLICATIONS WITH MICROSOFT VISUAL STUDIO Course: 10264A; Duration: 5 Days; Instructor-led

DEVELOPING WEB APPLICATIONS WITH MICROSOFT VISUAL STUDIO Course: 10264A; Duration: 5 Days; Instructor-led CENTER OF KNOWLEDGE, PATH TO SUCCESS Website: DEVELOPING WEB APPLICATIONS WITH MICROSOFT VISUAL STUDIO 2010 Course: 10264A; Duration: 5 Days; Instructor-led WHAT YOU WILL LEARN In this course, students

More information

About the Authors Introduction p. 1 Exploring Application Architectures p. 9 Introduction p. 9 Choosing the "Right" Architecture p.

About the Authors Introduction p. 1 Exploring Application Architectures p. 9 Introduction p. 9 Choosing the Right Architecture p. Foreword p. xxi Acknowledgments p. xxiii About the Authors p. xxv Introduction p. 1 Exploring Application Architectures p. 9 Introduction p. 9 Choosing the "Right" Architecture p. 10 Understanding Your

More information

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

PASS4TEST. IT Certification Guaranteed, The Easy Way!   We offer free update service for one year PASS4TEST \ http://www.pass4test.com We offer free update service for one year Exam : 70-492 Title : Upgrade your MCPD: Web Developer 4 to MCSD: Web Applications Vendor : Microsoft Version : DEMO 1 / 8

More information

HOMELESS INDIVIDUALS AND FAMILIES INFORMATION SYSTEM HIFIS 4.0 TECHNICAL ARCHITECTURE AND DEPLOYMENT REFERENCE

HOMELESS INDIVIDUALS AND FAMILIES INFORMATION SYSTEM HIFIS 4.0 TECHNICAL ARCHITECTURE AND DEPLOYMENT REFERENCE HOMELESS INDIVIDUALS AND FAMILIES INFORMATION SYSTEM HIFIS 4.0 TECHNICAL ARCHITECTURE AND DEPLOYMENT REFERENCE HIFIS Development Team May 16, 2014 Contents INTRODUCTION... 2 HIFIS 4 SYSTEM DESIGN... 3

More information

Learning C# 3.0. Jesse Liberty and Brian MacDonald O'REILLY. Beijing Cambridge Farnham Köln Sebastopol Taipei Tokyo

Learning C# 3.0. Jesse Liberty and Brian MacDonald O'REILLY. Beijing Cambridge Farnham Köln Sebastopol Taipei Tokyo Learning C# 3.0 Jesse Liberty and Brian MacDonald O'REILLY Beijing Cambridge Farnham Köln Sebastopol Taipei Tokyo Table of Contents Preface xv 1. C# and.net Programming 1 Installing C# Express 2 C# 3.0

More information

Developing Microsoft SharePoint Server 2013 Advanced Solutions

Developing Microsoft SharePoint Server 2013 Advanced Solutions 20489 - Developing Microsoft SharePoint Server 2013 Advanced Solutions Duration: 5 Days Course Price: $2,975 Software Assurance Eligible Course Description Course Overview This training course provides

More information

Automating Administration with Windows PowerShell 2.0

Automating Administration with Windows PowerShell 2.0 Automating Administration with Windows PowerShell 2.0 Course No. 10325 5 Days Instructor-led, Hands-on Introduction This course provides students with the knowledge and skills to utilize Windows PowerShell

More information

DOT NET SYLLABUS FOR 6 MONTHS

DOT NET SYLLABUS FOR 6 MONTHS DOT NET SYLLABUS FOR 6 MONTHS INTRODUCTION TO.NET Domain of.net D.N.A. Architecture One Tier Two Tier Three Tier N-Tier THE COMMON LANGUAGE RUNTIME (C.L.R.) CLR Architecture and Services The.Net Intermediate

More information

Q&As. Microsoft MTA Software Development Fundamentals. Pass Microsoft Exam with 100% Guarantee

Q&As. Microsoft MTA Software Development Fundamentals. Pass Microsoft Exam with 100% Guarantee 98-361 Q&As Microsoft MTA Software Development Fundamentals Pass Microsoft 98-361 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money

More information

BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Administration Guide

BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Administration Guide BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0 Administration Guide SWDT487521-636611-0528041049-001 Contents 1 Overview: BlackBerry Enterprise Server... 21 Getting started in your BlackBerry

More information

IBM Spectrum Protect Version Introduction to Data Protection Solutions IBM

IBM Spectrum Protect Version Introduction to Data Protection Solutions IBM IBM Spectrum Protect Version 8.1.2 Introduction to Data Protection Solutions IBM IBM Spectrum Protect Version 8.1.2 Introduction to Data Protection Solutions IBM Note: Before you use this information

More information

7. System Design: Addressing Design Goals

7. System Design: Addressing Design Goals 7. System Design: Addressing Design Goals Outline! Overview! UML Component Diagram and Deployment Diagram! Hardware Software Mapping! Data Management! Global Resource Handling and Access Control! Software

More information

Diploma in Microsoft.NET

Diploma in Microsoft.NET Course Duration For Microsoft.NET Training Course : 12 Weeks (Weekday Batches) Objective For Microsoft.NET Training Course : To Become a.net Programming Professional To Enable Students to Improve Placeability

More information

"Charting the Course... MOC A Developing Data Access Solutions with Microsoft Visual Studio Course Summary

Charting the Course... MOC A Developing Data Access Solutions with Microsoft Visual Studio Course Summary Description Course Summary In this course, experienced developers who know the basics of data access (CRUD) in Windows client and Web application environments will learn to optimize their designs and develop

More information

MSMQ-MQSeries Bridge Configuration Guide White Paper

MSMQ-MQSeries Bridge Configuration Guide White Paper MSMQ-MQSeries Bridge Configuration Guide White Paper Published: November 2000 Table of Contents Table of Contents...1 Introduction...1 Definitions... 2 How the Bridge Works...5 MSMQ-MQSeries Bridge Installation...

More information

20483BC: Programming in C#

20483BC: Programming in C# 20483BC: Programming in C# Course length: 5 day(s) Course Description The goal of this course is to help students gain essential C# programming skills. This course is an entry point into the Windows Store

More information

.Net. Course Content ASP.NET

.Net. Course Content ASP.NET .Net Course Content ASP.NET INTRO TO WEB TECHNOLOGIES HTML ü Client side scripting langs ü lls Architecture ASP.NET INTRODUCTION ü What is ASP.NET ü Image Technique and code behind technique SERVER SIDE

More information

DOT NET COURSE BROCHURE

DOT NET COURSE BROCHURE Page 1 1Pointer Technology Chacko Towers,Anna nagar Main Road, Anna Nager(Annai Insititute 2nd Floor) Pondicherry-05 Mobile :+91-9600444787,9487662326 Website : http://www.1pointer.com/ Email : info@1pointer.com/onepointertechnology@gmail.com

More information

Developing Microsoft Azure Solutions (70-532) Syllabus

Developing Microsoft Azure Solutions (70-532) Syllabus Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages

More information

Citrix Connector Citrix Systems, Inc. All rights reserved. p.1. About this release. System requirements. Technical overview.

Citrix Connector Citrix Systems, Inc. All rights reserved. p.1. About this release. System requirements. Technical overview. Citrix Connector 3.1 May 02, 2016 About this release System requirements Technical overview Plan Install Citrix Connector Upgrade Create applications Deploy applications to machine catalogs Publish applications

More information

IBM Proventia Management SiteProtector Policies and Responses Configuration Guide

IBM Proventia Management SiteProtector Policies and Responses Configuration Guide IBM Internet Security Systems IBM Proventia Management SiteProtector Policies and Responses Configuration Guide Version2.0,ServicePack8.1 Note Before using this information and the product it supports,

More information

Course Outline. Developing Microsoft Azure Solutions Course 20532C: 4 days Instructor Led

Course Outline. Developing Microsoft Azure Solutions Course 20532C: 4 days Instructor Led Developing Microsoft Azure Solutions Course 20532C: 4 days Instructor Led About this course This course is intended for students who have experience building ASP.NET and C# applications. Students will

More information

Developing Web Applications Using Microsoft Visual Studio 2008 SP1

Developing Web Applications Using Microsoft Visual Studio 2008 SP1 Developing Web s Using Microsoft Visual Studio 2008 SP1 Introduction This five day instructor led course provides knowledge and skills on developing Web applications by using Microsoft Visual Studio 2008

More information

DEVELOPING WEB AZURE AND WEB SERVICES MICROSOFT WINDOWS AZURE

DEVELOPING WEB AZURE AND WEB SERVICES MICROSOFT WINDOWS AZURE 70-487 DEVELOPING WEB AZURE AND WEB SERVICES MICROSOFT WINDOWS AZURE ACCESSING DATA(20 TO 25%) 1) Choose data access technologies a) Choose a technology (ADO.NET, Entity Framework, WCF Data Services, Azure

More information

SHAREPOINT 2016 ADMINISTRATOR BOOTCAMP 5 DAYS

SHAREPOINT 2016 ADMINISTRATOR BOOTCAMP 5 DAYS SHAREPOINT 2016 ADMINISTRATOR BOOTCAMP 5 DAYS WHY TAKE 10 DAYS AWAY FROM THE OFFICE WHEN YOU ONLY NEED 5? Need to gain knowledge for both the 203391 Planning and Administering Microsoft SharePoint 2016

More information

DEPARTMENT OF INFORMATION TECHNOLOGY Academic Year 2015-2016 QUESTION BANK-EVEN SEMESTER NAME OF THE SUBJECT SUBJECT CODE SEMESTER YEAR DEPARTMENT C# and.net Programming CS6001 VI III IT UNIT 1 PART A

More information

Learn Well Technocraft

Learn Well Technocraft Getting Started with ASP.NET This module explains how to build and configure a simple ASP.NET application. Introduction to ASP.NET Web Applications Features of ASP.NET Configuring ASP.NET Applications

More information

Course Outline. Lesson 2, Azure Portals, describes the two current portals that are available for managing Azure subscriptions and services.

Course Outline. Lesson 2, Azure Portals, describes the two current portals that are available for managing Azure subscriptions and services. Course Outline Module 1: Overview of the Microsoft Azure Platform Microsoft Azure provides a collection of services that you can use as building blocks for your cloud applications. Lesson 1, Azure Services,

More information

IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft.NET Framework Agent Fix Pack 13.

IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft.NET Framework Agent Fix Pack 13. IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft.NET Framework Agent 6.3.1 Fix Pack 13 Reference IBM IBM Tivoli Composite Application Manager for Microsoft Applications:

More information

6 Months Training Module in.net Module 1-Total Days-20

6 Months Training Module in.net Module 1-Total Days-20 6 Months Training Module in.net Visual Studio Version: 2008.net Framework: 3.5 Database: SQL Server 2005 Module 1-Total Days-20 Introduction to.net framework: History of.net.net framework.net version Features/advantages

More information

Technical and Architectural Overview

Technical and Architectural Overview 100% Web-Based Time & Labor Management Technical and Architectural Overview Copyright 2007 Time America 15990 N. Greenway-Hayden Loop Suite D-500, Scottsdale, AZ (800) 227-9766 www.timeamerica.com Table

More information

BEAAquaLogic. Service Bus. Interoperability With EJB Transport

BEAAquaLogic. Service Bus. Interoperability With EJB Transport BEAAquaLogic Service Bus Interoperability With EJB Transport Version 3.0 Revised: February 2008 Contents EJB Transport Introduction...........................................................1-1 Invoking

More information

Beginning ASP.NET. 4.5 in C# Matthew MacDonald

Beginning ASP.NET. 4.5 in C# Matthew MacDonald Beginning ASP.NET 4.5 in C# Matthew MacDonald Contents About the Author About the Technical Reviewers Acknowledgments Introduction xxvii xxix xxxi xxxiii UPart 1: Introducing.NET. 1 & Chapter 1: The Big

More information

VCE4Dumps. Latest vce dumps, valid certification dumps

VCE4Dumps.  Latest vce dumps, valid certification dumps VCE4Dumps Latest vce dumps, valid certification dumps Exam : 70-486 Title : Developing ASP.NET MVC 4 Web Applications Vendor : Microsoft Version : DEMO Get Latest & Valid 70-486 Exam's Question and Answers

More information