PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

What should you do?

You create an application by using Microsoft Visual Studio .NET 2008 and the .NET Framework 3.5.
You create a component to handle user authorization. The component contains a class named SecurityManager that has a method named CheckRights.
The CheckRights method is called by several classes within the component. You need to prevent the CheckRights method from being called directly by
the applications that consume the component.
What should you do?

What should you do?

You are creating a Windows application by using the .NET Framework 3.5. The application stores customer details in a database within the corporate network. The application has a form that contains a TextBox control to capture the customer name. The auto-complete feature must be used in the TextBox control to display the
customer names entered since the application started.You need to ensure that the application meets the following requirements:

* It is available in the offline mode.
* It provides the fastest response time for the auto-complete feature.

What should you do?

Which two actions should you perform?

You are an enterprise application developer. You are designing an event logging mechanism for a multi-tiered application. You need to ensure that the event logging mechanism meets the following requirements:
* Event data is available for at least three years.
* Event data is accessible through a central location.
* Access to event data is controlled for different types of events and users.
* The development effort is minimized.

Which two actions should you perform? (Each answer presents part of the solution. Choose two.)

What should you do?

You create an application by using Microsoft Visual Studio .NET 2008 and the .NET Framework 3.5.
The application includes a data tier component that communicates with multiple databases. Some databases are hosted on Microsoft SQL Server 2008.
Other databases are hosted on third- party database servers. The data tier component receives custom business objects from client application components.
You need to ensure that the data tier component saves property values from the business objects to the databases.
What should you do?

What should you do?

You are creating a Windows application by using the .NET Framework 3.5. The application connects to a database within the corporate network. It retrieves data from a read-only database. The database contains a table named Customers. An XML file that contains new customer data is periodically provided to the application. The XML file has the following specifications:

* It has the same schema as that of the Customers table.
* It will be integrated into the Customers table.
* It will be removed after data integration.

The application requires data from the Customers table and the XML file to bind to a DataGridView control.

You need to ensure that data can be retrieved together from the two data sources by using minimum development effort. What should you do?

What should you do to meet the outlined requirements in one roundtrip to the database?

8:You are creating a Windows application by using the .NET Framework 3.5. The application will be used to retrieve information about the technical skills of the employees. The data will be retrieved from the following related tables on a Microsoft SQL Server 2008 database instance by using LINQ to SQL:

* EmployeeSkills table
* TechnicalSkills table

The application must retrieve data from the TechnicalSkills table only when the correspondingEmployeeSkills rating value is 3. In addition, the application must
minimize data returned and prevent duplicate information from being returned.

You need to meet the outlined requirements in one roundtrip to the database.What should you do?

What should you do to ensure that the requirements are met by using minimum possible development effort?

4:You are creating a Windows application by using the .NET Framework 3.5. The application must meet the following requirements:

* It records the details of the users who modify sensitive information.
* It requires a context-related stack dump for the details.
* It is executed by using the local user account without administrative privileges.

You need to ensure that the requirements are met by using minimum possible development effort. What should you do?

Which state diagram should you design?

You are an enterprise application developer. You develop an application by using Microsoft Visual Studio .NET 2005 and .NET Framework 2.0. The application will be used to track the tasks. The application has the following requirements: Any user must be able to suggest new tasks.Managers must be able to schedule or reject suggested tasks.Resources must be able to update the task progress.Managers must be able to cancel an uncompleted task at any point of time. You need to design a state diagram for the application to meet the specified requirements.
Which state diagram should you design?