How should you complete the diagram?
You are an enterprise application developer. You are developing an application that runs in an N- tier environment. You need to design your N-tier layers to enforce client-based certificate security.
How should you complete the diagram? (To answer, drag the appropriate layers to the correct locations in the answer area.)
What should you do?
You are an enterprise application developer. You design an application that communicates with other applications through .NET Remoting. The application has a large DataSet. You need to improve the performance of the application.
What should you do?
Which two services should you choose?
You are an enterprise application developer. You develop a solution by using Microsoft Visual Studio .NET 2005 and .NET Framework 2.0. The application will be used to receive and process sales orders. The application is designed as a three-tiered application. The logical design of the application identifies the following services:
* Update the ship date on an order.
* Verify sales quantity on an order.
* Store sales order information.Display product information.
* Display order details.
The security policy has the following specifications:
* Changes to the database must be handled through stored procedures.
* Other services must be handled in other layers.
*
You need to identify the services that must be placed into the stored procedures.
Which two services should you choose? (Each correct answer presents part of the solution. Choose two.)
What should you do?
You are an enterprise application developer. You plan to review the design of a component. The component is used to process purchase orders from distributors. You need to ensure that the component meets the following requirements:
* It is highly available.
* It is transaction-oriented.
* It is accessible over the company intranet.
* It requires the minimum amount of coding effort.
What should you do?
Which class should you use?
You are an enterprise application developer. You are developing a distributed application that contains a business object. The client applications must be able to access the business object from another process. The business object implementation must minimize serialization. You need to extend a class to implement the business object.
Which class should you use?
Which code segment should you use?
You are an enterprise application developer. You create an application to provide an enterprise- wide barcode printing solution. You are developing a component that contains a method named InitializePrinter. The method will call a private function named IsPrinterLicensed to verify the license of the printer for the application. You need to ensure that the exceptions raised by the IsPrinterLicensed function bubble up to the application that calls the InitializePrinter method.
You
also need to ensure that the exceptions contain contextual information. Which code segment should you use?
Which monitoring mechanism should you use?
You are an enterprise application developer. You are designing a monitoring mechanism for an enterprise application. You need to ensure that the monitoring mechanism meets the following requirements: Logs errors and warningsConfigures source for eventsEnables logging for particular countersTraces the execution path of a process through multiple physical tiers.
Which monitoring mechanism should you use?
What should you do?
You are an enterprise application developer. You are designing a monitoring mechanism for a Web service. The Web service uses a custom header for authentication. You must send an e- mail message to the server administrators whenever the number of consecutive failed authentication attempts reaches three. You need to design the monitoring mechanism by using the minimum amount of development effort.
What should you do?
What should you do?
You are an enterprise application developer. You are working on an accounting application. The application is designed in a modular manner. Each module provides a different set of accounting features. The modules are implemented as a set of component assemblies. The module versions will be upgraded with new features and bug fixes in a regular maintenance release schedule. You need to ensure that the application is configured to use the updated versions of the modules.
What should you do?
Which strategy should you use?
You are an enterprise application developer. You plan to create a data access layer for an application. The application will store the data in a relational database. The application supports multiple database implementations. The application must use the vendor-provided database interaction component libraries whenever they are available. You need to identify a strategy to access data that supports these criteria.
Which strategy should you use?