PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which code fragment should you add at line 15?

You are creating an ASP.NET application by using the .NET Framework 3.5.

Your application contains the following code segment. (Line numbers are included for reference only.)

01 DataTable table = new DataTable (“Produces”);

02 table.Columns.Add ( ” ProductName “, typeof (string));

03 . . .

04 table.Columns.Add (” UnitsInStock “, typeof ( int ));

05 DataSet ds – new DatoSet ();

06 ds.Tables.Add (table);

07 var productList = new[] {

08 new< ProductID = 1, ProductName = ” Chai “, Category = “Beverages”, UnitPrice – 18.0000M, UnitsInStock = 39>, new{ ProductID = 2, ProductName = “Chang”, Category = “Beverages”, UnitPrice = 19.0000M, UnitsInStock = 17), . . . )

09 foreach ( var x in productList ) {

10 table.Rows.Add (new object[]

11 { x.ProductID , x.ProductName , x.Category ,

12 x.UnitPrice , x.UnitsInStock ));

13 >

14 var products = ds.Tables [“Products”]. AsEnumerable ();

15 . . .

You need to return a list of 25 products that have a UnitsInStock value lower than 60. You also need to sort the list in ascending order by ProductName.

You need to return a list of 25 products that have a UnitsInStock value lower than 60. You also need to sort the list in ascending order by ProductName.

Which code fragment should you add at line 15?

What should you do?

You are an enterprise application developer. You are creating a component for a distributed application for your company. The application manages the users access to sensitive company data. The company data is stored in an NTFS file system. Each file has permissions defined for domain users in an access control list (ACL).
The application must meet the following requirements in the same order of priority:

* Secure access to sensitive information based on the users credentials.
* Log authorization failures.

You need to use an appropriate authorization mechanism for the application. You need to achieve this by using the least amount of development effort.
What should you do?

What should you do?

You are assigned to the User Administrator role for a PerformancePoint Planning Server application.

A business analyst performs the following tasks:

Creates business rules for a model named Model1.

Adds a subsite named Subsite1 to Model1.

Creates a business rule named Rule1 for Subsite1.

You need to ensure that you can execute Rule1.

What should you do?

Which data tier object should you use?

You are creating ASP.NET applications by using the .NET Framework 3.5.

You plan to create a component that retrieves data from a Microsoft SQL Server database, a Microsoft Access database, or a variety of third-party databases.

The component must meet the following requirements:

Use minimum memory.

Prevent data from being updated or deleted.

Provide access to individual records as quickly as possible.

You need to design a data access strategy to meet the requirements.

Which data tier object should you use?

What are the two possible layers to achieve this goal?

You are an enterprise application developer. You are creating an e-commerce Web application. The application architecture consists of layers as shown in the following diagram. The application layers are described in the following tables.

You need to package the required cryptographic services into a single component. You also need to identify suitable locations for the cryptography component.
What are the two possible layers to achieve this goal? (Each correct answer presents a complete solution. Choose two.)

What should you do?

Your company adopts a new security policy. The policy requires that changes made to the PerformancePoint Planning Server system configuration must be automatically recorded in a log file. The size of the log file must not exceed 30 MB. You need to ensure that a new log file is created when the size of an existing log file reaches 30 MB. What should you do?

What should you do?

You are creating an ASP.NET application by using the .NET Framework 3.5.

The application will reference a third-party component. The component might throw an unhandled exception from a background thread, causing the ASP.NET worker process to be terminated.

You need to ensure that any unhandled exceptions are logged before the application terminates.

What should you do?

What should you do?

You are an enterprise application developer. You are creating a component to process geospatial data. The component retrieves large sets of data from a Microsoft

SQL Server database. Each data point consists of two decimal values: one value represents longitude and the other value represents latitude. You need to design a data format that minimizes the managed heap memory allocation needed for each data point within the component.
What should you do?