PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

What should you do?

You have a portable computer that runs Windows Vista, and a Windows Mobile 6.5 device. The portable computer and the Windows Mobile device are Bluetooth enabled. The portable computer does not have Internet connectivity. The Windows Mobile device connects to the Internet through a cellular data connection. You pair the Windows Mobile device with the portable computer through the Bluetooth connection. You need to connect the portable computer to the Internet through the Windows Mobile device by using the Bluetooth connection. What should you do?

achieve this goal?

You are designing a SharePoint 2010 solution. The solution includes the rendering of a highly interactive control
that must allow the following functionality:
Fading items in and out.
.Dragging items around the display.
.Seamlessly updating information on the server without affecting other items on the page.
You need to design the interactive control according to these requirements. What are two possible ways to
achieve this goal? (Each correct answer presents a complete solution. Choose two.)

Which code segment should you add at line 19?

You create a Web Part that queries a list.

The Web Part contains the following code segment. (Line numbers are included for reference only.)

01 protected override void Render(HtmlTextWriter writer)
02 {
03 SPUserToken spInToken = GetTheContext(SPContext.Current.Site);
04 using (SPSite aSite = new SPSite(curSiteCtx.ID, spInToken))
05 {
06
07 }
08 }
09 private SPUserToken GetTheContext(SPSite nWeb)
10 {
11 nWeb.CatchAccessDeniedException = false;
12 SPUserToken spToken = null;
13 try
14 {
15 spToken = nWeb.SystemAccount.UserToken;
16 }
17 catch (UnauthorizedAccessException generatedExceptionName)
18 {
19
20 }
21 return spToken;
22 }

You need to ensure that users without permissions to the list can view the contents of the list from the Web Part.

Which code segment should you add at line 19?

What should you do?

Your company has a Microsoft Exchange Server 2007 environment. Employees have Windows Mobile 6.5 devices. You manage the Windows Mobile devices by using Microsoft System Center Mobile Device Manager (MDM) 2008. You enable Bluetooth capabilities on the Windows Mobile devices, but employees are not able to transfer files to and from their Windows Mobile devices by using Bluetooth. You need to ensure that Windows Mobile devices can transfer files by using Bluetooth. What should you do?

What should you do?

Your company has a Microsoft Exchange Server 2007 environment. Employees have Windows Mobile 6.5 devices. You manage the Windows Mobile devices by using Microsoft System Center Mobile Device Manager (MDM) 2008. You enable Bluetooth capabilities on the Windows Mobile devices, but employees are not able to transfer files to and from their Windows Mobile devices by using Bluetooth. You need to ensure that Windows Mobile devices can transfer files by using Bluetooth. What should you do?

Which approach should you recommend?

You have a social networking site in SharePoint 2010 that allows users to post content for all other users to view.
Users have read-only access to documents that they did not upload themselves. You are designing a way for
users to easily flag content as objectionable so that the site administrators can evaluate and remove this content as necessary.
You need to add this objectionable content functionality to all document libraries.
Which approach should you recommend?

Which code segment should you add at line 03?

You have a list named Projects that contains a column named ClassificationMetadata.

You need to create a Web Part that updates the ClassificationMetadata value to NA for each item in the Projects list.

You write the following code segment. (Line numbers are included for reference only.)

01 foreach (SPListItem currentItem in SPContext.Current.Web.Lists[“Projects”].Items)
02 {
03
04 }

Which code segment should you add at line 03?

What should you do?

You are developing a run-time image by using Windows Embedded Standard. You copy the image to a Compact Flash (CF) device. The System Cloning Tool settings for the image are as shown in the exhibit. (Click the Exhibit button.) You plan to use the CF device to start up several devices and to install the image. After installation, you discover that the devices are unable to communicate with the domain controller. However, they are able to communicate with some other devices. You need to ensure that the devices that were installed by using the image can communicate with the domain controller. What should you do?