PrepAway - Latest Free Exam Questions & Answers

Category: 70-548

Exam 70-548: PRO: Designing and Developing Windows-Based Applications by Using the Microsoft .NET Framework

Which component members should you test?

You create Microsoft Windows-based applications. Two of your Windows-based applications require the use of graphical progress indicators. These indicators are based on bitmap files. Such a component is not available in the .NET Framework.

To facilitate the search for a component, you identify the following requirements:

Component exposes a property to set a bitmap file that is used for the progress bar. Component permits the use of at least two types of progress bars. These progress bars are named percent progress and numeric progress.
Component exposes a method to increment the progress bar.

You find a component that fulfills all the requirements. You create a new component that extends the original component and overrides the Increment method. The Windows-based applications might use either the original component or the extended component. You write a test project to test the component. You need to ensure that all the requirements are met. You want to achieve this goal by using the minimum amount of programming effort. Which component members should you test?

What should you do?

You create Microsoft Windows-based applications. You are creating a stock trading application. The application keeps track of stock prices and raises events when the stock prices increase or decrease. The events are raised based on specific thresholds. When the events are raised, users specify whether to buy, sell, or hold the stocks. The stock trading application currently uses the Trace class to log the events raised by the application and the user responses. The raised events and the user responses are then logged to a Windows application log.

You change the application logging mechanism to meet the following requirements:

Log entries are saved in a central database.
Log entries are also saved to the local application log.
Other applications are able to use the same logging mechanism.
The application code is changed as little as possible.
You create a central database to store log entries for multiple databases. You need to choose a system-wide logging mechanism that is reused by the application and is a part of the application design structure. What should you do?

Which three settings should you store?

You create Microsoft Windows-based applications. You are creating an application that uses Windows Authentication.

After authentication, the application retrieves a list of databases that are available to the logged-on user. The application also permits the user to select the following features:

A model database to work on
A type of chart to create
Display settings for the chart

The application must store default values as application settings to be retrieved the next time the user
logs on. The settings will be stored in the registry under the HKEY_CURRENT_USER hive. You need to decide on the settings you must store. Which three settings should you store? (Each correct answer presents part of the solution. Choose three.)

What should you do?

You create Microsoft Windows-based applications. You create an application that accesses data on a Microsoft SQL Server 2005 database. You write the following code segment. (Line numbers are included for reference only.)

01 private void LoadData()
02 {
04 cn.Open();
05 daProducts.Fill(ds);
06 daCategories.Fill(ds);
07 cn.Close();
09 }

The cn variable points to a SqlConnection object. The SqlConnection object will be opened almost every time this code segment executes. You need to complete this code segment to ensure that the application continues to run even if the SqlConnection object is open. You also need to ensure that the performance remains unaffected. What should you do?

Which two actions should you perform?

You create Microsoft Windows-based applications. You are creating a component that will be used by several client applications. The component contains the following code segment. (Line numbers are included for reference only.)

01 namespace MyComponent {
02 public class Account {
03 private string mAccountNo;
04 private decimal mBalance;
05 public Account(string AcctNo) {
06 …
07 }
08 public void Withdraw(decimal Amount) {
09 …
10 }
11 public void Deposit(decimal Amount) {
12 …
13 }
14 }
15 public class SavingsAccount:Account {
16 public SavingsAccount(string AcctNo):base(AcctNo) {
17 …
18 }
19 public void ApplyInterestRate(decimal Amount) {
20 …
21 }
22 }
23 }
You need to redesign the Account class and the SavingsAccount class to meet the following requirements:

Developers must not be able to instantiate the Account class from client applications. Developers must not be able to extend the functionality of the SavingsAccount class. Developers must be able to instantiate the SavingsAccount class from client applications.

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two).

Which three data handling mechanisms should you select?

You create Microsoft Windows-based applications. You are designing an inventory management solution for a warehouse. The solution must address the following requirements:

Access inventory data in a Microsoft SQL Server 2005 database. Generate XML documents representing purchase orders based on an XML schema provided by a trading partner.
Use the minimum amount of C# code possible.
Use the minimum amount of I/O operations possible.

You need to develop the data handling capabilities of the solution to meet the requirements. Which three data handling mechanisms should you select? (Each correct answer presents part of the solution. Choose three.)

Which three CAS permissions should you choose?

You create Microsoft Windows-based applications. You create an application that is used by the marketing department.
The application permits users to browse through a list of products obtained from a local XML file. The XML file is generated by a business layer process. The business layer process performs the following tasks:

accesses a Microsoft SQL Server 2005 database
accesses a Microsoft Office Access database
combines data from both databases

The application must meet the following requirements:

Enable users to print reports based on data contained in the XML file.
Enable users to save the reports.

You need to define the appropriate Code Access Security (CAS) permissions that must be applied to this
application. You want to follow the concept of least privilege to achieve this goal. Which three CAS permissions should you choose? (Each correct answer presents part of the solution. Choose three.)

which tier of the application architecture this component will belong to. Where should you place the component

You create Microsoft Windows-based applications. You are upgrading an application that contains custom data-centric user controls. Each of these controls implements its own custom data-binding logic. Much of the data-binding code is similar from control to control. You create a new component that combines the common data-binding logic. You change the existing controls so they use this new component. You need to decide which tier of the application architecture this component will belong to. Where should you place the component?

What should you do?

You create Microsoft Windows-based applications. You are creating a component for an application. You will use the component to process a high rate of business transactions. The performance of the component is critically important to maximize the performance of the application. The operations of the component differ depending on the properties of the business transaction that is processed at any given time. You need to ensure that performance issues are identified quickly over the life of the component. What should you do?

Which two changes should you propose?

You create Microsoft Windows-based applications. You are creating a sales management application. An overview of the logical design for the application is as shown in the following exhibit. (Refer to the Exhibit.) The application will be used by 300 users in the company. The application will connect directly to the sales database and use stored procedures. The data will also
be accessed through the Internet by applications developed by your companys business partners. The security settings must be configured to permit external applications to access the database from the Internet. You need to ensure that the outlined requirement is met by changing the network and security settings to the minimum extent possible. Which two changes should you propose? (Each correct answer presents part of the solution. Choose two.)


Page 5 of 9« First...34567...Last »