Which code segment should you use?
You create a Microsoft ASP.NET application by using the Microsoft .NET Framework
version 3.5.You create a Web page named Default.aspx in the root of the application. You
add an ImageResources.resx resource file in the App_GlobalResources folder. The
ImageResources.resx file contains a localized resource named LogoImageUrl. You need to
retrieve the value of LogoImageUrl. Which code segment should you use?
Which two actions should you perform?
You create an application by using Microsoft Visual Studio .NET 2008 and the .NET Framework 3.5. You plan to use an existing unmanaged component in the application. The unmanaged component includes two methods to calculate taxes. The first method calculates taxes for individuals and the second method calculates taxes for organizations. You need to provide a single method to calculate taxes. You also need to consume the unmanaged component within
the application. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
What conclusion can you draw?
You work as the Enterprise application developer at Domain.com. The Domain.com network consists of a single Active Directory domain named Domain.com. All servers in the domain run Windows Server 2003. Your responsibilities at Domain.com include the testing and stabilization of applications. Domain.com operates in the Credit Card Services department of a financial institution.
You and your team are currently developing an Extensible Markup Language (XML) Web service. When completed this Web service will allow merchants to verify and charge a customer’s credit card. A Web method named Verify accepts a String parameter that represents the customer’s credit card number. Verify’s main function will be to ensure that a credit card number is valid. Verify will be configured to throw an exception in the event of the card number being invalid. Following is the unit strategy testing as it will be implemented:
1. Use the automatically generated Microsoft ASP.NET Web page to test the Verify Web method.
2. Ensure that no exception is thrown when you pass a valid credit card number to the Web method.
What conclusion can you draw?
What should you do?
You have a Windows Embedded CE run-time image for an OS design. You modify the platform.reg file in the board support package (BSP). You need to apply the changes to the run-time image. What should you do?
What should you do?
You have a Windows Embedded CE run-time image for an OS design. You modify the platform.reg file in the board support package (BSP). You need to apply the changes to the run-time image. What should you do?
Which data source control should you use?
You are creating ASP.NET applications by using the .NET Framework 3.5.
You plan to evaluate an application design that has the following specifications:
* Data is stored in a Microsoft SQL Server 2008 database.
* Data is retrieved by using a DataContext object.
* Data is displayed by using GridView controls.
You need to choose an appropriate data source control that can be used in the design of the application.
Which data source control should you use?
Which code segment should you insert at line 04?
You create a Microsoft ASP.NET application by using the Microsoft .NET Framework
version 3.5.The application allows users to post comments to a page that can be viewed by
other users.You add a SqlDataSource control named SqlDS1. You write the following code
segment.(Line numbers are included for reference only.)
01 private void SaveComment()
02 {
03 string ipaddr;
04
05 SqlDS1.InsertParameters[“IPAddress”].DefaultValue = ipaddr;
06 …
07 SqlDS1.Insert();
08 }
You need to ensure that the IP Address of each user who posts a comment is captured along
with the user’s comment.Which code segment should you insert at line 04?
which they have the necessary permission. What should you do?
You create a Web Service by using Microsoft Visual Studio .NET 2008 and the .NET Framework 3.5. The Web service will retrieve data from text files in a network share. The network share uses the NTFS file system permissions. You need to design a component that allows users to access only the files for which they have the necessary permission. What should you do?
What conclusion can you draw?
You work as the Enterprise application developer at Domain.com. The Domain.com network consists of a single Active Directory domain named Domain.com. All servers in the domain run Windows Server 2003. Your responsibilities at Domain.com include the testing and stabilization of applications. Domain.com is in the business of retailing music videos online. Your team is currently busy developing a Microsoft ASP.NET Web application that is destined to allow users to purchase music videos online. A Microsoft SQL Server 2005 database is currently used to store the music video data. The Domain.com management wants the application to allow the users to search for music videos by title, artist, and genre. To this end you perform a code review for a page and then discovered the following SQL statement stored in a String variable:
SELECT * FROM Musicvideo WHERE Artist=@Artist
The code makes use of a query string value to create a SqlParameter instance that represents the @Artist parameter. The code then executes the query and displays the results in a GridView control. Now you need to make a decision as to whether the application is vulnerable to a SQL injection attack.
What conclusion can you draw?
What should you do?
You have a Windows Embedded CE run-time image for an OS design. You need to verify whether out-of-memory errors cause applications to fail. What should you do?