David works as a Software Developer for McRobert Inc. He develops a Web application named App1 using Visual Studio .NET. App1 contains several Web forms that display information about an online shopping process. David wants to provide a Web-based shopping catalog to users. However, he wants to ensure that the information about the shopping catalog is secure and requires no server resources.
What will David do to accomplish the task?
Patrick works as a Software Developer for GenTech Inc. He develops an application, named App1, using Visual C# .NET. He implements security using the security classes of the .NET Framework. He defines the following statements in the application:
PrincipalPermission Principal_Perm1 = new PrincipalPermission("Nick", "General
Manager");
PrincipalPermission Principal_Perm2 = new PrincipalPermission("Jack", "Accountant");
Patrick wants to check whether all demands that succeed for Principal_Perm1 also succeed for Principal_Perm2. Which of the following methods of the PrincipalPermission class will he use to accomplish this?
Maria works as a Software Developer for BlueWell Inc. She develops an application, named App1, using Visual C# .NET. The application displays employee details from a SQL Server database. Maria wants to use a string array, named MyArray, in the application code to store employee names. Which of the following statements will she use to declare MyArray?
All of the following are benefits for query expressions allowed by Language-integrated query except for which one?
John works as a Web Developer for TechCom Inc. He creates an ASP.NET application, named MyApp1, using Visual Studio .NET. Only registered users of the company will be able to use the application. The application contains a page, named NewAccount.aspx that allows new users to register themselves to the registered user list of the company. The NewAccount page contains several TextBox controls that accept users' personal details such as username, password, confirm password, first name, last name, home address, zip code, phone number, etc. One of the TextBox controls on the page is named txtZipCode in which a user enters a Zip code.
John wants to ensure that when a user submits the NewAccount page, txtZipCode must contain five numeric digits. He wants least development effort. Which of the following validation controls will he use to accomplish the task?
Each correct answer represents a part of the solution. Choose all that apply.
Mark works as a Software Developer for GenTech Inc. He develops an application, named App1, using Visual Studio .NET. The application contains a Form control, named Form1, which enables users to edit information in a SQL Server database. Mark wants to save all the changes made by users in the database. He defines a boolean variable, named DataIsSaved, in the application code. DataIsSaved indicates whether or not all data are saved in the database. Mark wants to prevent Form1 from closing until all the changes are saved in the database. Which of the following code will he use to accomplish this?
John works as a Software Developer for DawnStar Inc. He creates a class, named MyClass1. He wants to generate a key pair that he will use to give the compiled assembly a strong name. Which of the following tools will he use to accomplish the task?
You work as a Software Developer for ABC Inc. The company has several branches worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You have recently finished the development of an application using .NET Framework 2.0. The application can be used only for cryptography. Therefore, you have implemented the application on a computer. What will you call the computer that implemented cryptography?
Allen works as a Software Developer for ABC Inc. The company uses Visual Studio.NET as its application development platform. He creates an application using .NET Framework. He wants to encrypt all his e-mails that he sends to anyone. Which of the following will he use to accomplish the task?
Which of the following is a reference type in Visual C#?
Which of the following methods is not used to handle the SoapExtensions?
You work as an Application Developer for ABC Inc. You are assigned with developing a Web site that will handle information related to monthly sales of the company. You wish to secure the Web site so that only employees of the Accounts department can view the Web pages. You need to create roles for the employees of this department. The user account information will be stored in a SQL Server database named Database. You decide to do all this by using the Web Site Administration Tool. Which of the following types of security will you use to accomplish the task?
Which class allows checks against the active principal using the language constructs defined for the declarative and imperative security actions?
Which of the following modes can be used to configure the Remote Debugging Monitor for remote debugging?
You work as a Software Developer for Webtech Inc. You plan to migrate the existing Active Server Pages (ASP) pages to ASP.NET Web pages in order to implement rich functionalities of a Web browser in your Web pages. Therefore, you want to add controls to Web pages of your existing application named WebApp1. Which of the following controls will be most suitable to implement?
You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2005 as its application development platform. You have recently finished development of a Windows application using .NET Framework. Users report that the application is not running properly. When the users try to complete a particular action, the following error message comes out:
Unable to find assembly 'myservices, Version=1.0.0.0, Culture=neutral,
PublicKeyToken=29b5ad26c9de9b95'.
You notice that the error occurs as soon as the application tries to call functionality in a serviced component that was registered by using the following command:
regsvcs.exe myservices.dll
You must make sure that the application can call the functionality in the serviced component with no exceptions being thrown. What will you do to accomplish this task?
You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You are creating an application using .NET Framework 2.0. The application will be used by school children to read a sequential chain of characters. What will you do to accomplish this task?
You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You create a Web service using .NET Framework 2.0. You want the Web service to utilize a two step process to map XML generated by Web methods to .NET objects. What will you do to accomplish the task?
Each correct answer represents a part of the solution. Choose two.
John works as a Web Developer for ABC Inc. He develops an ASP.NET application, named MyApp1, using Visual Studio .NET. The application will be used in the Sales department to generate monthly reports. John wants to deploy the application on the company's intranet. The company uses Microsoft Windows authentication. John wants to deny access to all the members of the Guest1 role. Which of the following attributes will he use in the <authorization> element of the application's Web.config file to accomplish the task?
You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create an ASP.NET Web application using .NET Framework 3.5. The application uses the health monitoring events to raise application audit events in the following situations:
l When users login
l When users modify their password
l When users perform other security-related actions
You must ensure that the application logs all audit events for all applications on the Web server.
What will you do?
You work as a Software Developer for ABC Inc. The company has several branches worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You are creating an application for the branch in China. You are also implementing encoding in the application for Chinese language. Which of the following encoding types will you use to support Chinese language?
Each correct answer represents a complete solution. Choose all that apply.
You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2008 as its application development platform. You create an ASP.NET Web application using the .NET Framework 3.5. The application contains two HTML pages named Error.htm and
PageNotFound.htm. You want to make sure that the following requirements are met:
l When any user requests a page that does not exist, the PageNotFound.htm page is displayed.
l When any other error occurs, the Error.htm page is displayed.
Which of the following code segments will you add to the Web.config file to accomplish this task?
You work as a Software Developer for ManSoft Inc. You create an application using Visual Studio .NET
2005. You write the following code snippet in the application:
int amt = 50;
String s = "John gave me " + amt + " dollars";
Console.WriteLine(s);
What will be the output of the above code?
You work as a Software Developer for ManSoft Inc. You create an application using Visual Studio .NET 2005. You are using the Custom authentication provider in the application. In order to enable the Custom authentication provider, you have to make an entry in the Web.config file for the application. Which of the following entries will you use to accomplish the task?
You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You are creating an application using the .NET Framework. The application contains a class named globalInfo. You need to serialize all public and nonpublic data of the globalInfo class to ensure that the class generates the minimum byte stream so that the minimum load is placed upon network resources. What will you do?
Maria works as a Software Developer for MarcLync Inc. She creates an XML Web service, named MyWebService, using Visual Studio .NET. Maria wants to debug MyWebService. Therefore, she attaches a debugger to the Web service process. However, Maria notices that whenever MyWebService is executed, it throws an exception System.Net.WebException after a certain time period. The exception displays the message "The current operation has timed-out." Maria wants to modify the code in MyWebService. Which of the following actions will Maria take in order to resolve this issue?
Henry works as a Software Developer for InfoTech Inc. He develops a Web application for registered employees of the company. The application requires accessing several XML data stored in a database named Database1. However, Henry wants to ensure that the XML data is validated before being accessed. Which of the following classes will Henry use to validate the XML data?
You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You are in process of creating an application using the .NET Framework 2.0. The application must collect data from different streams by performing the following operations:
l Reading data from the byte stream
l Reading data from the memory stream
l Reading data from the file stream
Which of the following stream classes will you use to accomplish the task?
Each correct answer represents a part of the solution. Choose all that apply.
You work as a Windows Application Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create a Windows application using .NET Framework 3.5. The application uses a SQL Server 2008 database on the network.
You use ADO.NET Data Services that exposes data as resources that are addressable by URIs. You need to access and change data, specifically the standard HTTP verbs of GET, PUT, POST, and DELETE. What will you do to accomplish this?
Maria works as a Software Developer for BlueWell Inc. She develops an application, named App1, using Visual C# .NET. App1 contains a Form control, named Form1, for collecting users' contact information. Form1 contains a TextBox control, named TextBox1. App1 requires users to enter data in TextBox1. Maria writes a method, named Method1, to validate the entered data. She adds an ErrorProvider control, named Control1, to Form1. Maria wants to ensure that App1 notifies the users if they enter invalid data in TextBox1. Which of the following code will she use to accomplish this?
You work as a Windows Application Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You are developing an application for the customer support using the .NET Framework. The customer support application accepts phone numbers. While running a report, you notice that the phone numbers displayed do not pursue similar format. Furthermore, there are cases of missing digits and missing area codes. You are required to ensure that the phone numbers are entered in the following format:
(###) ###- ####
You need to accomplish this task with the least amount of code. What will you do?
You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You are creating a Windows service application using the .NET Framework. The service is used to execute several tasks that require background processing. You do not want to actively manage threads in the service application, but you must make sure that security checks are performed during the execution of the task. What will you do to accomplish the task?
You work as a Web Application Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You create a Web application using the .NET Framework.
The application uses a MS SQL server database. The application creates and manages online advertising campaigns. You need the Web application to track the effectiveness of the forthcoming campaigns by evaluating advertising results with operation parameters. This necessitates adding a Web form that executes the following tasks:
l It uses a target URL for all online advertising.
l It logs the referrer URLs.
l It offers live reporting of referral data.
You are required to find out the most effective storage mechanism to log the referral data. What will you do?
Emily works as a Programmer in an Eye Research Center. The center keeps several records such as case history records for old patients and newly admitted patients, and records for outdoor patients. The Head of the Research Center wants Emily to generate reports for each outdoor patient with minimum network traffic. Emily develops an application named OutdoorPatientReport by using Visual Studio .NET. She needs to utilize the data repository as maintained by the center.
She wants to ensure that the application is displayed to all the doctors. Which of the following actions will Emily take to accomplish this task?
Mark works as a Web Developer for ABC Inc. He develops an ASP.NET application, named MyApp1, using Visual Studio .NET. MyApp1 allows users to view and purchase company products.
It includes several pages. The start-up page of the application is Page1.aspx. He configures the application's Web.config file to use form-based authentication.
Mark wants users to log on to Page1.aspx by providing their user names and passwords. To accomplish this, he creates an ASP.NET page named UsersLogIn.aspx that allows each user to specify a user name and password. He then writes the following syntax in the Web.config filE.
loginUrl="/UsersLogIn.aspx" protection="All" timeout="60" slidingExpiration="true">
</authentication>
What will be the result?
Each correct answer represents a part of the solution. Choose two.
Kathy works as a Software Developer for BlueWell Inc. She creates a serviced component named
Com1. She wants to ensure that all the employees of the company are able to use Com1. Therefore, she wants to install Com1 in the Global Assembly Cache (GAC). Before the installation, she wants to register the serviced component manually with COM+. Which of the following tools will Kathy use to register Com1?
You work as a Software Developer for ABC Inc. The Company uses .NET Framework 2.0 as its application development platform. You are creating an application that will perform different types of comparison operations. Therefore, you decide to use only those methods that are available in all the classes of .NET Framework 2.0. Which of the following methods will you use to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.
John works as a Web Developer for ProLabs Inc. He develops an ASP.NET application, named
MyWebApp1, using Visual Studio .NET. One of the pages in the application is named as Page1.aspx, which does not need to maintain session state. To improve the performance of the application, John wants to disable session state for Page1. Which of the following actions will he take to accomplish the task?
You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You are creating an application using .NET Framework 2.0. You are using regular expression in the application to validate email, phone number, etc. You are required to match any single character except "\n". Which of the following wildcard characters will you use to accomplish the task?
You work as a Software Developer for Hi-Tech Inc. You develop an application using Visual Studio .NET 2005. You create an unregistered COM DLL file named Com1.dll. You want to use this Com1.dll file in your application code. However, Com1.dll needs to be registered in the Windows Registry before it is used by the application. Which of the following tools will you use to accomplish the task?
You work as a Software Developer for ManSoft Inc. The company uses Visual Studio.NET 2005 as its application development platform. You have recently created an application that includes the code shown below.
string str1 = "ABC";
string str2 = "u";
str2 += "Certify";
Console.WriteLine(str1 == str2);
Console.WriteLine((Object) str1 == (Object) str2);
Console.WriteLine(str1.Equals(str2));
What will be the output of the above code?
Dilton works as a Software Developer for GREC Research Center (Central). This research center has its subsidiaries in several different cities. Dilton wants to retrieve a Soil Test Report for the Geological Survey Department. He wants the test report to be available to all the members of the department over the Internet. He creates an XML Web service named SampleReport. SampleReport contains a Web method named SoilTestDetails that requires additional security.
Dilton decides to use generic role-based security to secure the SoilTestDetails method from unauthorized users. Dilton writes code to ensure that once a user is authenticated, a user identity named Generic is created. The Generic user identity has a group membership named GeoSurvey to allow the authenticated users access to the SoilTestDetails Web method. Which of the following code segments should Dilton use to accomplish the task?
Allen works as a Software Developer for ABC Inc. He develops a Windows application. He adds a form to the application named Form1, which contains a Label control named Label1. A text file named File1.txt contains a list of products. File1.txt is located in the application directory. Each product name is listed in a new line in File1.txt. Allen wants to retrieve a list of products from File1.txt and display it in Label1. He adds the following code to the application:
1. StreamReader Reader1 = new StreamReader((Stream)File.OpenText(Server.MapPath
("File1.txt")));
2. Stream MyStream;
3. string InputString;
4. // Insert statement here.
5. while (InputString != null)
6. {
7. Label1.Text = String.Format("{0}{1}", Label1.Text, InputString);
8. Reader1.ReadLine();
9. }
10. Reader1.Close();
Which of the following statements will Allen add at line 4 to accomplish the task?
You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You are creating an application using .NET Framework 2.0. The application will perform security related operations. You want to manage the role-based security in the application. What will you do to accomplish the task?
You work as a Software Developer for ABC Inc. The company has several branches worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You are creating an application using .NET Framework 2.0. The application will be used by all the branches of the company. You sometimes require a variable number of arguments to be passed to a method. For example, you may require a sum method, which calculates the total of the numbers passed to it no matter how many numbers are passed. What will you do to accomplish the task?
You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You create a Windows Forms application by using the .NET Framework. The application executes a background thread. You are required to create the thread to exit, but you must also inform the main thread when the background thread has finished. What will you do to accomplish this?
Jerry works as a Web Developer for Soft Solutions Inc. He creates an assembly named
MyAssembly so that it can be shared among several existing client applications. He verifies that MyAssembly can be installed into the global assembly cache of the client computer. However, he does not want to use a Windows setup for installing the assembly. Which of the following actions should Jerry take to install the assembly into the global assembly cache?
Each correct answer represents a complete solution. Choose two.
You work as a Software Developer for ABC Inc. You develop a multi-threaded application named MyMultThreadApp using Visual Studio .NET. The application logs all warning and informational messages in an event log that keeps track of significant events when the application is running. The event log records information that might be useful for troubleshooting or performance analysis. Which of the following are the considerations that you must keep in mind when logging events with multithreaded components?
Each correct answer represents a complete solution. Choose three.
You work as a Software Developer for Mansoft Inc. You create an application using Visual Studio .NET 2005. You write code in the application and execute it, but it caused an error. Now, you want to find out the reason that has thrown the exception. Which of the following properties will you use to accomplish this task?
Mark works as a Software Developer for BlueWell Inc. He is required to create a class, named Members. Each element of this class has a unique ID stored in a database field, named Member_ID. Which of the following options will he use to represent Member_ID, while designing the Members class?
You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You create a Windows service application that will be used by Visual Studio .NET applications. You want to ensure that an access to the Windows service is restricted. Therefore, you decide to use the ServiceInstaller class. You want to specify the security context of the Windows service application. Whic
Maria works as a Software Developer for BlueWell Inc. She develops an application, named App1, using Visual C# .NET. The application displays employee details from a SQL Server database. Maria wants to use a string array, named MyArray, in the application code to store employee names. Which of the following statements will she use to declare MyArray?
You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create an ASP.NET Web application using .NET Framework 3.5. You need to represent a strongly typed lambda expression as a data structure in the form of an expression tree. Which of the following classes will you use to accomplish the task?
You work as Enterprise Application Developer in SunInfo Inc. The company uses Microsoft .NET Framework 3.5. You design an application. You are required to execute queries against a collection and file directories. Which of the following data access technologies will you use to accomplish the task?
You work as a Software Developer for ManSoft Inc. The company has several branches worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You create an application that will be used by all the branches of the company. You use the Regex class in the application to validate some strings. You want to search an input string for an occurrence of a regular expression. Which of the following methods of the Regex class will you use to accomplish the task?
You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You are creating an application using .NET Framework 2.0. You are using string datatype in the application to store text based information. You want to match character in a string in such a way that the match must occur at the point where the previous match ended. Which of the following characters will you use to accomplish the task?
You work as a Windows Application Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You create a Windows application using .NET Framework 2.0. The application provides accessibility features. The forms in the application display a background image. You want to remove the image whenever a user selects Use High Contrast in the Accessibility Options in Control Panel. You are required to add an event to handle this accessibility setting change. Which of the following events will you use to accomplish this task?
You work as a Software Developer for Mansoft Inc. The company uses Visual Studio.NET as its application development platform. You create an ASP.NET Web application using the .NET Framework. You want to authenticate the application and then deploy it on a server running
Microsoft Windows Server 2003 Standard Edition hosting Microsoft Internet Information Services 6.0. Which of the following authentication methods will you use to accomplish the task?
Each correct answer represents a complete solution. Choose two.
You work as a Software Developer for ABC Inc. The company has several branches worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You are creating an application that generates summary reports. These reports will be viewed by all the chief executives in the Korean branch. Therefore, you need to ensure that the summary reports must contain Korean characters. Which of the following encoding types will you use to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.
Julia works as a Software Developer for Mansoft Inc. She develops an application using Visual Studio .NET. The application uses a method named MyMethod, which is located in an unmanaged DLL. Julia wants MyMethod to require the application to allocate unmanaged memory, fill the data, and pass the memory address to the application. She also wants to ensure that on returning from MyMethod, the application de-allocates the unmanaged memory. What will Julia do to accomplish the task?
You work as a Web Application Developer for SunInfo Inc. The company uses Visual Studio 2008 as its application development platform. You create a Web application using .NET Framework 3.5. You create a data-bound control. You want to retrieve data from a relational database and edit data on the Web page by using the data-bound control. Which of the following data source classes will you use to accomplish the task?
Sam works as a Software Developer for BlueWell Inc. He develops two applications: MyApp1 and MyApp2 using Visual Studio .NET 2005. He wants to ensure that both these applications use the same assembly named Assembly1. Therefore, he signs Assembly1 with a strong name for each application. What is significant about the strong name that consists of the assembly's identity?
Each correct answer represents a part of the solution. Choose all that apply.
Janet works as a Software Developer for Blue Well Inc. The company management wants its project team members to be registered so that they can access the company's Website. To ensure that the team members can work together effectively, Janet creates an XML Web service named MyWebService by using Visual Studio .NET. She wants to ensure that the team members have a valid username and password in order to maintain strict security against unauthorized access. Which of the following authentication methods will Janet implement in her application to accomplish this task?
You work as a Software Developer for ABC Inc. The Company uses .NET Framework as its application development platform. You are writing a method that might throw an exception at several points during its execution. You need to run several lines of code after the method runs, whether or not an exception occurs. Which of the following blocks will you use to accomplish this task?
You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2008 as its application development platform. You create an ASP.NET Web application using the .NET Framework 3.5. The application contains a data-bound control. The user interface (UI) for modifying data from a LinqDataSource control is typically provided through the data-bound control. You are required to perform automatic data modifications. Which of the following conditions are required to enable automatic data modifications?
Each correct answer represents a part of the solution. Choose all that apply.
You work as a Software Developer for Blue Well Inc. The company uses Visual Studio .NET 2005 as its application development platform. You create an application using Visual C# .NET and perform the following operations:
l Create a static array.
l Sort the array.
l Display the sorted array.
Which of the following code snippets will you use to accomplish the task?
You work as an Enterprise Application Developer for ABC Inc. The company uses Visual Studio 2008 as its application development platform. You create a web application using .NET Framework 3.5. You have created a form named Form1. You have added Textbox controls for taking Name, Address, and Phone Number of user as input in Form1. You want to ensure that a user enters a value in the Name field. Which of the following validation server controls will you use to accomplish the task?
You work as a Software Developer for ABC Inc. You create a Web page named MyWebForm1.aspx that displays a student's registration form. The page uses three CheckBox controls and several other Web server controls on the page. The CheckBox controls contain information about the educational qualifications. You want to ensure that a message containing educational status and relevant information is displayed as soon as a user clicks the CheckBox controls. Which of the following actions will you take to accomplish the task?
Each correct answer represents a part of the solution. Choose two.
Allen works as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. He develops an application that manipulates files containing confidential information. He wants to make a copy of the existing file, named
ConfidentInfo1 to a new file, named ConfidentInfo2 in the local drive by using an instance method. However, Allen wants to ensure that the existing file does not overwrite the new file.
Which of the following classes' instance method will Allen consider in the application to accomplish the task?
You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You create a Web service using .NET Framework 2.0. You want the Web service to utilize a two step process to map XML generated by Web methods to .NET objects. What will you do to accomplish the task?
Each correct answer represents a part of the solution. Choose two.
Mario works as a Software Developer for BlueWell Inc. He develops an application, named App1, by using Visual Studio .NET. He deploys the application on a client computer. He wants to use the existing assembly named Assembly1. However, Assembly1 needs to be configured in the global assembly cache so that App1 is able to use it. He wants to ensure that the application data transferred to and from the server to the client computer is well secured. Which of the following tools will Mario use to accomplish the task?
Allen works as a Software Developer for ManSoft Inc. He develops an application using Visual Studio .NET 2005. Only the employees of the company use the application. Allen wants to ensure that when a request on a page is made by a user the application asks for his authentication. Which of the following actions will Allen take to accomplish the task?
Each correct answer represents a part of the solution. Choose two.