Which two actions should you perform?
A Web service exposes the following Web method.
[WebMethod(CacheDuration=60)]
public byte[] GetImage(string imageId)
{
…
}
The Web method generates responses that are greater than 1 MB in size.
You need to configure the Web method to minimize memory usage on the server.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
What should you do?
You build Web services by using Microsoft Visual Studio 2005.
Some of the Web services are hosted in IIS.
You need to ensure that remote systems cannot dynamically discover which Web services are hosted in IIS.
What should you do?
What should you do?
An application contains .NET Framework Web services that are built by using Microsoft Visual Studio 2005.
Discovery information for these Web services must be made available to client applications.
You need to expose the Disco files for all Web services in the application.
What should you do?
Which two actions should you perform?
You write a client application that uses a Web service.
The Web service is hosted in a Windows service application.
The Web service can be called only by using TCP.
You are provided with the proxy that is enabled by Web Services Enhancements (WSE) 3.0.
The proxy was generated by adding a Web reference by using Microsoft Visual Studio 2005.
You need to ensure that the proxy calls the Web service correctly.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
What should you do?
A Web service application provides security data about employees to applications that control access to company facilities.
The Web service is accessed by using TCP and is protected by using Web Services Enhancements (WSE) 3.0 security for message encryption.
The company has added fingerprint readers to grant employees access to the facilities.
Images of employee fingerprints are maintained by the Web service application.
You need to ensure that the existing WSE security encryption policy can be applied to the fingerprint image.
Your solution must minimize the size of the Web service message.
What should you do?
Which three stored procedures should you recommend?
You are an enterprise application developer. You are designing a Web-based application to maintain appointment details.
You consider implementing the following steps to delete an appointment:
Enter a date range or a client ID, or enter a date range and a client ID to get a list of appointments.
Click the Appointment hyperlink. The appointment details are retrieved and displayed.
Click the Delete button.
You need to analyze the requirements and recommend stored procedures. Which three stored procedures should you recommend? (Each correct answer presents part of the solution. Choose three.)
What should you recommend?
You are an enterprise application developer. Your company operates a Microsoft Windows-based client application. The application is deployed to 50 client computers on the network. The application uses a separate class library as a data access layer. The data access layer is currently deployed to the application folder of the client application. It is time consuming to deploy new versions of the data access layer. You need to evaluate the current physical design of the application and recommend changes to speed up deployment of new versions of the data access layer.
What should you recommend?
What should you conclude?
You are an enterprise application designer. You are designing a three-tier enterprise application. The application currently consists of a business layer and a data layer.
The application must perform the following tasks:
Support a smart client interface and a Web client interface. Achieve maximum reuse between the smart client interface and the Web client interface.
Reduce code duplication.
The systems analyst recommends adding a UI layer to perform the required tasks. You need to evaluate this recommendation. What should you conclude?
What should you conclude?
You are an enterprise application developer. You are evaluating a database design for a human resource application. The existing database schema meets the following criteria:
* The database has an Employee table.
* The Employee table has an Employee ID field and several other fields.
*
You must accommodate the following new requirements:
* Employees are either supervisors or line workers.
* A supervisor will supervise zero or more line workers.
* An employee will be supervised by only one supervisor.
A database administrator suggests creating a table named Supervisor and copying the supervisor data from the Employee table to the new table. The database administrator also wants to create a foreign key in the Supervisor table to reference the Employee table. You need to evaluate the suggested change to ensure that there is minimal impact on the existing database schema.
What should you conclude?
Which two dependencies should you identify?
You are an enterprise application developer.
You create an application that has three layers:
* Layer 1 contains the Microsoft Windows client and the input validation logic.
* Layer 2 contains business entities, business workflows, and business rules.
* Layer 3 contains the data access classes and stored procedures.
You need to analyze the layers and identify dependencies that exist between these layers.
Which two dependencies should you identify? (Each correct answer presents part of the solution. Choose two.)