Which two actions should you perform?
You are creating a Windows application by using the .NET Framework 3.5. The application will be used by the shipping department of your company. The application contains a form named SchedulingForm. You plan to design a strategy to ensure the following accessibility criteria:
* SchedulingForm is accessible only to users logged on by using a particular Windows account.
* The Windows account belongs to a local group named Managers.
You need to implement the strategy by using the minimum amount of development effort. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
Which plan should you implement?
You are an enterprise application developer. You are planning the life cycle of a component. Currently, multiple versions of the component exist. You need to access the most recent version of the component. You also need to ensure that existing applications can access the most recent version and the previous versions of the component without being recompiled.
Which plan should you implement?
What should you do?
You are creating a Windows application by using the .NET Framework 3.5.
The application must import data from a legacy database.
A comma-delimited text file that has 10,000 rows of data is exported from the database frequently. The
data is displayed and processed by the Windows application.
The text file is not trusted and can contain invalid data. The application database must store valid data.
You need to create a strategy to optimally validate and process the application data.
What should you do?
What should you do?
You are creating multiple enterprise applications by using the .NET Framework 3.5. All the applications will be deployed on a single computer.
You purchase a COM component from a third-party vendor. You plan to reuse a specific functionality of the component in the applications.
The COM component will be used by 25 developers who work on different applications.
You need to ensure that the types referenced in the COM component are compatible among the developers.
What should you do?
What should you do?
You are creating a Windows application by using the .NET Framework 3.5. The application uses a Web Service to allow managers to retrieve employee performance data. The application allowsmanagers to access and modify data offline. The employee performance data is sensitive and must be protected. You need to implement an offline storage strategy. What should you do?
Which class should you choose?
You are an enterprise application developer. You develop a component that gathers data from multiple Web services and loads the data into a DataTable. You need to identify a class to persist the information stored in the DataTable to a Microsoft SQL Server database by using the most time-efficient method.
Which class should you choose?
What should you do?
You are creating a Windows application by using the .NET Framework 3.5.
The application creates lookup fields by using data from a database within the corporate network.
You use the DataAdapter object to retrieve data as a DataSet from the database.
You need to reduce the network bandwidth that is used by the application.
What should you do?
What should you do?
You create an ASP.NET application by using Microsoft Visual Studio .NET 2008 and the .NET Framework 3.5.
You need to ensure that the application meets the following requirements:
– Logs all the Web requests before authentication occurs
– Logging is performed for all types of requests
What should you do?
What should you do?
You create a Windows application by using the .NET Framework 3.5. The application is used by the employees and managers of a bank. You plan to implement role-based security for the application by using the Identity and Principal features provided by the .NET Framework 3.5. You need to ensure that application meets the
following requirements:
* All users are authenticated against credentials stored in the application database.
* Only the managers can access certain features in the application.
What should you do?
What should you do?
You are an enterprise application developer. You are developing a smart client application. You write a method that reads a registry value. Your application runs from a partially trusted environment. The method must not throw an exception when it reads the registry value. You need to ensure that your code is authorized to read the registry key before it attempts to read the value.
What should you do?