Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

You work as an Enterprise Application Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You are creating an Enterprise application using .NET Framework 3.5. The application must meet the following requirements:

l The application loads XML from streams.

l The application creates XML from scratch by using functional construction.

l The application queries XML using XPath-like axes.

l The application validates XML trees using XSD.

What will you do to meet these requirements with least development efforts?

A.

Use LINQ to XML.

B.

Use LINQ to SQL.

C.

Use the XML Schema Definition Tool.

D.

Use ADO.NET Data Services.

You work as a Windows Application Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create a Windows Forms application using .NET Framework 3.5. The application needs a thread that accepts an integer parameter. You write the following code segment in the application:

Thread myThread = new Thread(new ParameterizedThreadStart(doWork));

myThread.Start(125);

You are required to declare the signature of the doWork method. Which of the following method signatures will you use?

A.

public void doWork(int nCount)

B.

public void doWork(Object oCount)

C.

public void doWork()

D.

public void doWork(Delegate oCount)

Sophia works as a Software Developer for BlueWell Inc. She creates a component, named MyComp, using Visual Studio .NET. MyComp includes a method named MyMethod1, which is used to process user requests. MyMethod1 calls a private method, named MyMethod2. Sophia wants to ensure that if an error occurs during the execution, the exceptions encountered by MyMethod2 are caught and passed on to MyMethod1 for exception handling. Which of the following combinations of the exception handler should she use to accomplish the task?

A.

try, catch, and throw

B.

catch, finally, and throw

C.

try, catch, and finally

D.

try and throw

You work as a Windows Application Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create a Windows application using .NET Framework 3.5. The application uses a SQL Server 2008 database on the network.

You use ADO.NET Data Services that exposes data as resources that are addressable by URIs. You need to access and change data, specifically the standard HTTP verbs of GET, PUT, POST, and DELETE. What will you do to accomplish this?

A.

Use Object Relational Mapping.

B.

Use GDI objects.

C.

Use Representational State Transfer.

D.

Use a WCF Service.

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You have recently finished development of an ASP.NET Web application using .NET Framework 3.5. You deploy the application on a test server and enable the debugging. The application is hosted in IIS 6.0 and uses the default authentication. Integrated

Windows authentication is enabled and anonymous access is disabled. You have not got the administrative rights on the test server. The following configuration is present in the Web.config filE.

You are required to configure the Web.config file to debug the application from your development computer. Which of the following configurations will you use in the Web.config file?

A.

B.

C.

D.

You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You create a message queue named SecureQ using .NET Framework. The message queue requires each incoming message to be encrypted. You want to ensure that a message can be sent to SecureQ without an exception being thrown. What will you do to accomplish this task?

A.

Use the CryptoStream class to encrypt the Body property on the message.

B.

Set the HashAlgorithm property to a value from the HashAlgorithm enumeration on the me ssage.

C.

Set the EncryptionAlgorithm property to a value from the EncryptionAlgorithm enumeration on the message.

D.

Set the UseEncryption property to true on the message.

You work as a Software Developer for ManSoft Inc. You use Microsoft Visual Studio to create a Web service named MyWebService. You create a SOAP message that is not secure in the Web service. You want to use the ReceiveSecurityFilter class in the Web service to handle the receiving and securing of SOAP messages. Which of the following code segments will you use to accomplish the task?

Each correct answer represents a part of the solution. Choose all that apply.

A.

public class MyReceiveSecurityFilter : ReceiveSecurityFilter

{

public MyReceiveSecurityFilter(string service, Boolean client)

{

base(service, client);

}

public override void ValidateMessageSecurity(SoapEnvelope envelope, Security security)

{

// Implementation validation here

}

}

B.

public class MyReceiveSecurityFilter : ReceiveSecurityFilter

{

public MyReceiveSecurityFilter(string service, Boolean client) : base(service, client)

{ }

public override void ValidateMessageSecurity(SoapEnvelope envelope, Security security)

{

// Implementation validation here

}

}

C.

public class MyReceiveSecurityFilter : ReceiveSecurityFilter

{

public MyReceiveSecurityFilter(string service, Boolean client)

{ }

public override void ValidateMessageSecurity(SoapEnvelope envelope, Security security)

{

// Implementation validation here

}

}

D.

public class MyReceiveSecurityFilter : ReceiveSecurityFilter

{

public MyReceiveSecurityFilter(string service, Boolean client) : base(service, client)

{ }

public void ValidateMessageSecurity(SoapEnvelope envelope, Security security)

{

// Implementation validation here

}

}

Emily works as a Programmer in an Eye Research Center. The center keeps several records such as case history records for old patients and newly admitted patients, and records for outdoor patients. The Head of the Research Center wants Emily to generate reports for each outdoor patient with minimum network traffic. Emily develops an application named OutdoorPatientReport by using Visual Studio .NET. She needs to utilize the data repository as maintained by the center.

She wants to ensure that the application is displayed to all the doctors. Which of the following actions will Emily take to accomplish this task?

A.

Use Microsoft SQL Server stored procedures for data calculations.

B.

Implement a batch processing system for data calculations.

C.

Create more than one database for data manipulations.

D.

Use SQL Server indexes to optimize data calculations.

You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET as its application development platform. You create an application using .NET Framework. The application is using an assembly. You want to ensure that the application provides the best performance. Security is not a consideration. Which of the following permission sets will you use to accomplish the task?

A.

Everything

B.

FullTrust

C.

Nothing

D.

Execution

E.

LocalIntranet

F.

Internet

Samantha works as a Software Developer for InfoWorld Inc. She develops a Web page named SalesReport.aspx for the employees of the company. However, she wants to ensure that all the requests for a particular employee are not stored on the server's memory. She also wants to ensure that no data is lost even after each user session has expired. Which of the following actions will Samantha take to accomplish the task?

A.

Use a cookieless session state for storing information.

B.

Use the profile properties feature for storing information.

C.

Use the application state for storing information.

D.

Use the session state with cookie for storing information.