What should you do?
You are creating two user-defined functions (UDFs) of Excel Services in Microsoft Office SharePoint Server 2007.
You write the following code segment.
public class Class1
{
public double MyDouble (double d)
{
return d * 9;
}
public DateTime ReturnDateTimeToday ()
{
return ( DateTime.Today );
}
}
You need to ensure that the MyDouble method and the ReturnDateTimeToday method are recognized as UDFs of Excel Services. What should you do?
Which code segment should you use?
You are changing the security settings of a file named MyData.xml. You need to preserve the existing inherited access rules. You also need to prevent the access rules from inheriting changes in the future.
Which code segment should you use?
Which three tasks should you perform?
You are an enterprise application developer. You are creating a component that will be deployed as part of a class library. The component must meet the following specifications:
The interface of the component must be accessible to components outside the hosting assembly.
The interface of the component must be interoperable with components written in any other .NET Framework languages.
The implementation of the component cannot be expanded upon by a derived class.
You need to design the interface of the component.
Which three tasks should you perform? (Each correct answer presents part of the solution.
Choose three.)
What should you do?
You create a Web site that you must copy from a development server to a testing server, along with all source files. You do not have terminal access to the testing server. You need to create the virtual directory. Then you must copy the Web site to the virtual directory on the testing server without precompiling the site.
What should you do?
Which two actions should you perform?
You are designing a Microsoft Office SharePoint Server 2007 solution. A Microsoft SQL Server 2005 Analysis Services cube stores key performance indicators (KPIs). You need to display details of a KPI in a Web Part. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
Which code segment should you use?
You are developing a method to hash data with the Secure Hash Algorithm. The data is passed to your method as a byte array named message. You need to compute the hash of the incoming parameter by using SHA1. You also need to place the result into a byte array named hash.
Which code segment should you use?
What should you do?
You are an enterprise application developer. You are creating a component that will be used in an order fulfillment process.
The component performs the following two tasks:
Modifies data in a local Microsoft SQL Server database Adds data to a remote SQL Server database
The application that uses the component is multithreaded. Each application thread that uses the component creates its own instances of the component classes. You need to ensure that the component either performs both tasks successfully or performs neither task. What should you do?
which base type should your custom event type inherit?
You create a large, n-tier Web application that has a custom event tracking system. You need to create a custom event type that enables your event tracking system to record all relevant event details for all types of events. The events must be stored in Microsoft SQL Server.
From which base type should your custom event type inherit?
Which two steps should you perform?
You create a service center site for a SharePoint portal. You need to display a new column named “Completion Date” on a Search Core Results Web Part.
Which two steps should you perform? (Each answer represents part of the solution, select two)
Which method should you use on the DirectorySecurity object?
You create a DirectorySecurity object for the working directory. You need to identify the user accounts and groups that have read and write permissions.
Which method should you use on the DirectorySecurity object?