PrepAway - Latest Free Exam Questions & Answers

Category: 70-549

Exam 70-549: PRO: Designing and Developing Enterprise Applications by Using the Microsoft .NET Framework

Which approach should you choose?

You are an enterprise application developer. You are creating a component that stores employee details in a Microsoft SQL Server database. The component is implemented as a class. The class includes the public properties ID and Name. The class does not contain static methods. Both the ID field and the Name field are required in the Employee table of the database. Serialized instances of the class can be returned by XML Web services. You need to ensure that the class supports XML serialization. You also need to minimize the possibility of a developer creating a class instance by using partial data. Which approach should you choose?

What should you do?

You are an enterprise application developer. You are creating a component that encapsulates database access to an employee table. The component contains a method that retrieves an employee record by using a string input parameter.
You need to respond to error conditions in a way that meets the following requirements:

If the caller passes a variable that fails to reference a string object, the caller receives an error notice.
If the caller fails to respond to the error notice, the error condition forcefully alters the flow of execution.
If the error occurs on the main thread, the application is terminated.

What should you do?

Which two actions should you perform?

You are an enterprise application developer. You create a component that uses unmanaged resources. You need to ensure that the component permits client developers to release the unmanaged resources as soon as they are no longer needed. You also need to guarantee that unmanaged resources are always released, even if a client developer fails to release them. Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)

What should you do?

You are an enterprise application developer. You are creating a component for a distributed application for your company. The application manages the users access to sensitive company data. The company data is stored in an NTFS file system. Each file has permissions defined for domain users in an access control list (ACL).
The application must meet the following requirements in the same order of priority:
Secure access to sensitive information based on the users credentials.
Log authorization failures.

You need to use an appropriate authorization mechanism for the application. You need to achieve this by using the least amount of development effort. What should you do?

What are the two possible layers to achieve this goal?

You are an enterprise application developer. You are creating an e-commerce Web application. The application architecture consists of layers as shown in the following diagram. The application layers are described in the following tables.

You need to package the required cryptographic services into a single component. You also need to identify suitable locations for the cryptography component.

What are the two possible layers to achieve this goal? (Each correct answer presents a complete solution. Choose two.)

What should you do?

You are an enterprise application developer. You are creating a component to process geospatial data. The component retrieves large sets of data from a Microsoft SQL Server database. Each data point consists of two decimal values: one value represents longitude and the other value represents latitude. You need to design a data format that minimizes the managed heap memory allocation needed for each data point within the component.
What should you do?

What should you do?

You are an enterprise application developer. You create a component that exposes a static method. The static method performs a complex business algorithm and the method must support concurrent callers. You use asynchronous processing to implement the method. You need to ensure that the client application is notified about the completion of the method. What should you do?

Which action should you recommend?

You are an enterprise application developer. You are creating a financial application that includes a data access component. This component executes queries against a Microsoft SQL Server database. Application performance deteriorates as the volume of data in the database increases. You need to identify which database queries require the greatest time to execute. You need to minimize the impact on application performance while gathering this information. Which action should you recommend?

What should you do?

You are an enterprise application developer. You are designing a data access component to meet the following criteria:

The data access component provides data to several business components. The data access component contains methods that retrieve data. The methods retrieve data from a Microsoft SQL Server database.
The data is modified infrequently.

You need to ensure that the data access component provides current data to the business components.
You also need to minimize the number of requests sent to the SQL Server database for this data.
What should you do?

What should you do?

You are an enterprise application developer. You create a Web application to call the Web services of different trucking companies. The application retrieves transit times for different routes. You create Web service proxy classes by using the Wsdl.exe utility. You need to call different Web services concurrently. You also need to ensure that the application can continue performing other tasks while the Web services are being called. You need to achieve this by using the least amount of code possible. What should you do?


Page 15 of 21« First...10...1314151617...20...Last »