PrepAway - Latest Free Exam Questions & Answers

Tag: 70-548

Exam 70-548: PRO: Designing and Developing Windows-Based Applications by Using the Microsoft .NET Framework

Which lines of code should you add to your report?

You create Microsoft Windows-based applications. You are designing the integration test for an application. You write the following lines of code. (Line numbers are included for reference only.)

01 private void cmdCompare_Click(object sender, EventArgs e) { 02 decimal flightFare, carRental, hotelPrice, travelCost; 03 flightFare = wsFlyHigh.GetBestFare(txtOrigin.Text, txtDest.Text, datDateOut, datDateBack); 04 cmdGetRentalPrice.Parameters.Add(“@DAYS”,SqlDbType.Int); 05 cmdGetRentalPrice.Parameters[0].Value=int.Parse(txtDays.Text); 06 carRental = cmdGetRentalPrice.ExecuteScalar();
07 hotelPrice = bigDeal.GetHotelPrice(int.Parse(txtDays.Text)); 08 travelCost = flightFare + carRental + hotelPrice;
09 txtTravelCost.Text = travelCost.ToString(“C”);
10 }

You analyze the code and discover the following features:

wsFlyHigh is a Web service that is hosted on a partners extranet. cmdGetRentalPrice runs a stored procedure on a corporate database server.
bigDeal is a COM component.

You need to create a report that lists the parts of the code to be considered during integration testing.
Which lines of code should you add to your report?

What should you do?

You create Microsoft Windows-based applications. You design a composite user control that is used to enter e-mail addresses. The control is as shown in the following exhibit. (Refer to the Exhibit.) The control validates the user input by using a regular expression. The control validates e-mail addresses and prevents the user from submitting blocked e-mail addresses. The control must permit the user to correct the entry if the user enters a blocked e-mail address. You need to provide feedback if the user enters a blocked e-mail address in the txtEmailAddress text box. What should you do?

Which action should you perform?

You create Microsoft Windows-based applications. You participate in the planning phase of an incident tracking tool for technical support analysts.

The incident tracking tool must meet the following requirements:

Technical support analysts must open multiple incidents simultaneously.
The application can run only one instance at a time.
Users must be able to adjust the order and layout of the incident screens.

You need to design an application user interface that meets these requirements with the minimum amount of code. Which action should you perform?

Which action should you perform to achieve this goal?

You create Microsoft Windows-based applications. You are designing a reusable composite control for a customer service application. The composite control contains three TextBox controls. The first TextBox control is used for the customers account number. The second TextBox control is used for the customers phone number. The third TextBox control is used to hold the last four digits of the customers social security number. The composite control is used to retrieve a customers insurance data. You need to ensure that data is entered in the valid format for all the three TextBox controls. Which action should you perform to achieve this goal?

What should you test?

You create Microsoft Windows-based applications. You are creating an application that consumes both an internally developed Web service and an externally developed Web service. The application uses only some of the methods that both the Web services expose. You need to design an integration testing strategy for the application. You want to achieve this goal by using the minimum amount of programming effort. What should you test?

Which two actions should you perform?

You create Microsoft Windows-based applications.
You are designing a class to be used by multiple client applications. This class will be used to generate unique account numbers. Your company guidelines state that unique number generating components must comply with the following design pattern:

Classes must be designed so that they cannot be instantiated directly by client applications. Only a single instance of the class must be used by all the client applications. Instance methods and properties for these classes must be accessible to client applications.

You need to define how this class will implement the design pattern. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

What should you conclude?

You create Microsoft Windows-based applications. You are creating a component that will encapsulate a data source. Dozens of applications will use the component.

The component must meet the following design requirements:
1.The component must be able to be modified within a Rapid Application Development environment.
2.The component must be without a user interface.

You propose to derive the component from the System.Windows.Forms.Control class and to implement the IComponent interface. You need to decide whether the component will meet the requirements. What should you conclude?

Which risk should you identify?

You create Microsoft Windows-based applications. You are creating an application to manage projects. Your current customers use Microsoft Windows 2000, Windows XP Professional, and Windows Server 2003, in workgroup and domain settings.

The application must meet the following requirements:
Identify the user for workflow functionality.
Store data in a central location on your companys network.
Permit data to be stored locally for offline access.

Your application relies on Windows domainCbased authentication to identify the user without logging on to the application itself. You decide to use Microsoft SQL Server 2005 as the database engine and save the data locally in XML format for offline access. You need to identify the risks that are related to your design. Which risk should you identify?

What should you conclude?

You create Microsoft Windows-based applications. You are creating a sales management application. This application will permit sales personnel to search for customer information in a Microsoft SQL Server 2005 database. All communication with the database server is done by using an SSL channel.

When a user needs to search for customer information based on a name, the following sequence of actions occurs:

1.The user types a name into a text box.
2.The user clicks a button to initiate the search.
3.The component validates that the value the user types is less than 200 characters. 4.The value that is typed is passed as a string to a component. 5.The component concatenates the typed value to a Select statement in the Where clause of the component.
6.The statement is executed to generate a DataTable object. 7.The DataTable object is used to display the results to the user. You need to identify the risk factor in this application design. What should you conclude?

What should you conclude?

You create Microsoft Windows-based applications. You are creating a sales management application. The application will consume Web services to retrieve and save data to a database server. These Web services will be exposed to a partner extranet so that partners can write applications that will access the same data. The deployment diagram for the entire solution is as shown in the following exhibit. (Refer to the Exhibit.) After deploying the solution, local users and partners report that they are not able to retrieve any data. You find that the client computers are able to access Web applications and Web services hosted by the Web server. You also find that the local applications are able to access other databases on the database server. You need to troubleshoot the issue. What should you conclude?


Page 2 of 912345...Last »