Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

All of the following are benefits for query expressions allowed by Language-integrated query except for which one?

A.

Rich metadata

B.

Compile-time syntax checking

C.

Static typing and IntelliSense

D.

Imperative code

John works as a Web Developer for TechCom Inc. He creates an ASP.NET application, named MyApp1, using Visual Studio .NET. Only registered users of the company will be able to use the application. The application contains a page, named NewAccount.aspx that allows new users to register themselves to the registered user list of the company. The NewAccount page contains several TextBox controls that accept users' personal details such as username, password, confirm password, first name, last name, home address, zip code, phone number, etc. One of the TextBox controls on the page is named txtZipCode in which a user enters a Zip code.

John wants to ensure that when a user submits the NewAccount page, txtZipCode must contain five numeric digits. He wants least development effort. Which of the following validation controls will he use to accomplish the task?

Each correct answer represents a part of the solution. Choose all that apply.

A.

CompareValidator

B.

RequiredFieldValidator

C.

RangeValidator

D.

RegularExpressionValidator

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You are creating a custom control library using .NET Framework 3.5. Developers will use this custom control on Web pages in multiple applications. Each and every ASP.NET application will be configured by using different state management approaches. You have to ensure consistent state management for all instances of the custom control. Which of the following states will you use to accomplish this task?

A.

Session state

B.

Application state

C.

Control state

D.

View state

Georgina works as a Software Developer for BlueChip Inc. She develops an application named App1 using Visual Studio .NET. The company wants her to deploy App1 to a customer's laptop. Georgina creates an assembly named Assembly1 to be stored in the Global Assembly Cache so that the Common Language Runtime (CLR) can locate and bind Assembly1.

As the application executes, the CLR locates the path of Assembly1 through the codebase setting. But, it finds no element in the app.config file, and fails to bind Assembly1. Now, the CLR tries to locate Assembly1 through probing. Which of the following will the CLR check to locate Assembly1?

Each correct answer represents a part of the solution. Choose all that apply.

A.

Previously loaded assemblies

B.

The application base or root directory

C.

The Gacutil.exe tool in the Global Assembly Cache

D.

Sub-directories in the application's root directory

E.

The culture attribute of the assembly

F.

The correct version of the assembly

G.

The assembly's name

John works as a Software Developer for InfoTech Inc. He develops an application named

SerializeObj. He creates a custom class and wants to serialize its object. He also wants the object to be stored into an XML file named File1.xml. He writes the following code: public class Employees

{

public string EmpID;

public string EmpName;

public decimal Salary;

}

Which of the following code statements will John add in the application?

A.

XmlSerializer ObjectSerializer = new XmlSerializer(typeof(Employees), ObjectTypes);

B.

XmlSerializer ObjectSerializer = new XmlSerializer(typeof(Employees));

C.

XmlSerializer ObjectSerializer = new XmlSerializer(Employees);

D.

XmlSerializer ObjectSerializer = new XmlSerializer();

John works as a Web Developer for ABC Inc. He develops an ASP.NET application, named MyApp1, using Visual Studio .NET. The application will be used in the Sales department to generate monthly reports. John wants to deploy the application on the company's intranet. The company uses Microsoft Windows authentication. John wants to deny access to all the members of the Guest1 role. Which of the following attributes will he use in the <authorization> element of the application's Web.config file to accomplish the task?

A.

B.

C.

D.

Which of the following data structures is used for storing reference data types?

A.

Stack

B.

Queue

C.

Hard disk

D.

Heap

George works as a Software Developer for GenTech Inc. He creates an application named App1 using Visual Studio .NET. App1 uses the version 2.0.0.0 of an assembly named Assembly1. However, he wants App1 to use a new version i.e. 2.1.0.0 of Assembly1. Therefore, he needs to specify Assembly1's location so that App1 can use version 2.1.0.0 of Assembly1. What will George use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

A.

An unmanaged code.

B.

A managed code.

C.

The element.

D.

The element.

What is the difference between Data Encryption Standard (DES) and Data Encryption Algorithm (DEA)?

A.

DES is the modified Lucifer algorithm and DEA is the original.

B.

DES itself is referred to as DEA.

C.

DES is insecure, whereas DEA is secure.

D.

DES is a standard and DEA is an algorithm.

Sam works as a Software Developer for GenTech Inc. He develops an application named App1 using Visual Basic .NET. App1 uses a non-COM DLL named Value1.dll, which contains unmanaged code. Sam writes a method named Method1 in Value1.dll as follows:

Method1 Lib "Value1.dll"(ByVal InputVar As String, ByRef WordsVar As String, ByRef

NumbersVar As Integer) As Integer

Sam wants to use Method1 for parsing a string into an array of string values and an array of integers. Sam wants to enable App1 to call this function. Which of the following statements about the method are true?

Each correct answer represents a complete solution. Choose all that apply.

A.

The value of the first parameter cannot be changed by a procedure or a function.

B.

The second parameter will contain all string values found in the first parameter.

C.

The third parameter will contain all integer values found in the second parameter.

D.

The third parameter will contain all string values found in the second parameter.