Archive for February, 2012:

83-640 Q & A / Study Guide / Testing Engine

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
You work as the network administrator at CERTKINGDOM.com. The CERTKINGDOM.com network has a
domain named CERTKINGDOM.com. All servers on the CERTKINGDOM.com network run Windows Server 2008.
Only one Active-Directory integrated zone has been configured in the CERTKINGDOM.com domain.
CERTKINGDOM.com has requested that you configure DNS zone to automatically remove DNS records
that are outdated.
What action should you consider?

A. You should consider running the netsh /Reset DNS command from the Command prompt.
B. You should consider enabling Scavenging in the DNS zone properties page.
C. You should consider reducing the TTL of the SOA record in the DNS zone properties page.
D. You should consider disabling updates in the DNS zone properties page.

Answer: B

Explanation: In the scenario you should enable scavenging through the zone properties because
scavenging removes the outdated DNS records from the DNS zone automatically. You should
additionally note that patience would be required when enabling scavenging as there are some
safety valves built into scavenging which takes long to pop.
Reference: http://www.gilham.org/Blog/Lists/Posts/Post.aspx?List=aab85845-88d2-4091-8088-
a6bbce0a4304&ID=211


QUESTION 2
You work as the network administrator at CERTKINGDOM.com. The CERTKINGDOM.com network has a
domain named CERTKINGDOM.com. All servers on the CERTKINGDOM.com network run Windows Server
2008.
The CERTKINGDOM.com network has a server named CERTKINGDOM-SR15. You install the Active
Directory Lightweight Directory Services (AD LDS) on CERTKINGDOM-SR15.
Which of the following options can be used for the creation of new Organizational Units (OU’s) in
the application directory partition of the AD LDS?

A. You should run the net start command on CERTKINGDOM-SR15.
B. You should open the ADSI Edit Microsoft Management Console on CERTKINGDOM-SR15.
C. You should run the repadmin /dsaguid command on CERTKINGDOM-SR15.
D. You should open the Active Directory Users and Computers Console on CERTKINGDOM-SR15.

Answer: B

Explanation: You need to use the ADSI Edit snap-in to create new OUs in the AD LDS
application directory partition. You also need to add the snap-in in the Microsoft Management
Console (MMC).


QUESTION 3
You work as the network administrator at CERTKINGDOM.com. The CERTKINGDOM.com network has a
domain named CERTKINGDOM.com. All servers on the CERTKINGDOM.com network run Windows Server
2008.
The CERTKINGDOM.com network has two domain controllers CERTKINGDOM-DC01 and CERTKINGDOMDC02.
CERTKINGDOM-DC01 suffers a catastrophic failure but it is causing problems because it was
configured to have Schema Master Operations role. You log on to the CERTKINGDOM.com domain as
a domain administrator but your attempts to transfer the Schema Master Operations role to
CERTKINGDOM-DC02 are unsuccessful.
What action should you take to transfer the Schema Master Operations role to CERTKINGDOMDC02?

A. Your best option would be to have the dcpromo /adv command executed on CERTKINGDOMDC02.
B. Your best option would be to have the Schema Master role seized to CERTKINGDOM-DC02.
C. Your best option would be to have Schmmgmt.dll registered on CERTKINGDOM-DC02.
D. Your best option would be to add your user account to the Schema Administrators group.

Answer: B

Explanation: To ensure that CERTKINGDOM-DC02 holds the Schema Master role you need to seize
the Schema Master role on CERTKINGDOM-DC02. Seizing the schema master role is a drastic step
that should be considered only if the current operations master will never be available again. So to
transfer the schema master operations role, you have to seize it on CERTKINGDOM-DC02.
Reference: http://technet2.microsoft.com/windowsserver/en/library/d4301a14-dd18-4b3c-a3ccec9a773f7ffb1033.
mspx?mfr=true


QUESTION 4
You work as the network administrator at CERTKINGDOM.com. The CERTKINGDOM.com network has a
single forest. The forest functional level is set at Windows Server 2008.
The CERTKINGDOM.com network has a Microsoft SQL Server 2005 database server named
CERTKINGDOM-DB04 that hosts the Active Directory Rights Management Service (AD RMS).
You try to access the Active Directory Rights Management Services administration website but
received an error message stating:
“SQL Server does not exist or access is denied.”
How can you access the AD RMS administration website?

A. You need to restart the Internet Information Server (IIS) service and the MSSQLSVC service on
CERTKINGDOM-DB04.
B. You need to install the Active Directory Lightweight Directory Services (AD LDS) on
CERTKINGDOM-DB04.
C. You need to reinstall the AD RMS instance on CERTKINGDOM-DB04.
D. You need to reinstall the SQL Server 2005 instance on CERTKINGDOM-DB04.
E. You need to run the DCPRO command on CERTKINGDOM-SR04

Answer: A

Explanation: You need to restart the internet information server (IIS) to correct the problem. The
starting of the MSSQULSVC service will allow you to access the database from AD RMS
administration website.


QUESTION 5
You work as an enterprise administrator at CERTKINGDOM.com. The CERTKINGDOM.com network has a
domain named CERTKINGDOM.com. The CERTKINGDOM.com network has a Windows Server 2008
computer named CERTKINGDOM-SR03 that functions as an Enterprise Root certificate authority (CA).
A new CERTKINGDOM.com security policy requires that revoked certificate information should be
available for examination at all times.
What action should you take adhere to the new policy?

A. This can be accomplished by having a list of trusted certificate authorities published to the
CERTKINGDOM.com domain.
B. This can be accomplished by having the Online Certificate Status Protocol (OCSP) responder implemented.
C. This can be accomplished by having the OCSP Response Signing certificate imported.
D. This can be accomplished by having the Startup Type of the Certificate Propagation service set to Automatic.
E. This can be accomplished by having the computer account of CERTKINGDOM-SR03 added to the
PGCertificates group.

Answer: B

Explanation: You should use the network load balancing and publish an OCSP responder. This
will ensure that the revoked certificate information will be available at all times. You do not need to
download the entire CRL to check for revocation of a certificate; the OCSP is an online responder
that can receive a request to check for revocation of a certificate. This will also speed up certificate
revocation checking as well as reducing network bandwidth tremendously.


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


Continue Reading

70-562 Q & A / Study Guide / Testing Engine

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
You work as a Web Developer at CERTKINGDOM.com. You make use of Microsoft .NET Framework 3.5 to
develop ASP.NET Web applications.
CERTKINGDOM.com has a server, named CERTKINGDOM-SR13, which runs an instance of Microsoft SQL Server 2005
locally and is configured to make use of Windows Authentication. You have developed a Web
application named CERTKINGDOMApp1 that will be hosted on CERTKINGDOM-SR13.
You are preparing to configure the role management and membership providers on CERTKINGDOM-SR13.
Which of the following actions should you take?

A. You should consider making use of the Aspnet_compiler.exe command.
B. You should consider making use of the aspnet_regiis.exe command.
C. You should consider making use of the Aspnet_merge.exe command
D. You should consider making use of the ASP.NET SQL Server registration tool.

Answer: A,B

Explanation:


QUESTION 2
You work as a Web Developer at CERTKINGDOM.com. You make use of Microsoft .NET Framework 3.5 to
develop ASP.NET Web applications.
You have recently developed a Web application named CERTKINGDOMWebApp1, and configured it to make
use of Windows Authentication. After specific group is granted NTFS permissions to access a
specific file named CERTKINGDOM.doc, you are informed that you have to make sure that users not
belonging to the group are prevented from accessing the file.
Which of the following actions should you take?

A. You should configure the machine.config file to include the <identity impersonate=”true”/> element.
B. You should configure the machine.config file to include the <authentication mode=”[None]”> element.
C. You should configure the app.config file to include the <authentication mode=”[None]”> element.
D. You should configure the Web.config file to include the <identity impersonate=”true”/> element.
E. You should configure the Web.config file to include the <authentication mode=”[None]”> element.
F. You should configure the app.config file to include the <authentication mode=”[None]”> element.

Answer: D

Explanation:


QUESTION 3
You work as a Web Developer at CERTKINGDOM.com. You make use of Microsoft .NET Framework 3.5 to
develop ASP.NET Web applications.
You have developed a web application named CERTKINGDOMWebApp. You are now preparing to configure
authentication for CERTKINGDOMWebApp so that clients are not allowed to access it anonymously. You also
need to make sure that access for users from untrusted domains are allowed.
You have written the code segment shown below:
<system.web>
<authentication mode=”Forms”>
<forms loginUrl=”login.aspx” />
</authentication>
<authorization>
<deny users=”?” />
</authorization>
</system.web>
Which of the following actions should you take NEXT?

A. You should consider adding the code segment to the web.config file.
B. You should consider adding the code segment to the project’s property pages.
C. You should consider adding the code segment to the app.config file.
D. You should consider adding the code segment to the workstation’s machine.config file.

Answer: A


QUESTION 4
You work as a Web Developer at CERTKINGDOM.com. An MS ASP.NET Web application, named CERTKINGDOMApp1,
has been developed using the 3.5 version of MS Net Framework.
Subsequent to retrieving the most recent project version from the source control repository, you try
to compile it on your workstation and find that the reference to the assembly is absent.
You want to add a reference path that connects to the absent assembly.
Which of the following options should you access to achieve this?

A. The project’s property pages.
B. CERTKINGDOMApp1’s web.config file.
C. CERTKINGDOMApp1’s app.config file.
D. Your workstation’s machine.config file.

Answer: A

Explanation:


QUESTION 5
You work as a Web Developer at CERTKINGDOM.com. You make use of Microsoft .NET Framework 3.5 to
develop Microsoft ASP.NET Web applications.
An existing Web application was developed using Microsoft .NET Framework 1.0. the Web
application makes use of Microsoft Internet Information Services (IIS) 6.0, but does not make use
of any features of Microsoft .NET Framework 3.5.
You want to configure the Web application for .NET Framework 3.5 with as little administrative
effort as possible.
Which of the following actions should you take?

A. You should consider accessing Microsoft Internet Information Services (IIS) 6.0 to modify the
handler runtime version.
B. You should consider accessing the machine.config file to modify the handler runtime version.
C. You should consider accessing the app.config file to modify the handler runtime version.
D. You should consider accessing the web.config file to modify the handler runtime version.

Answer: A

Explanation:


 

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


Continue Reading

Avaya Is Said to Plan $1 Billion IPO for as Soon as April

Avaya Holdings Corp., the communications-gear maker owned by private-equity firms Silver Lake and TPG Capital, plans to hold its initial public offering as soon as April, two people with knowledge of the matter said.

Cisco CCNA Training, Cisco CCNA Certification

Best Avaya Certification Training and Avaya Exams Training  and more Cisco exams log in to Certkingdom.com

The company, based in Basking Ridge, New Jersey, filed in June to raise $1 billion in an IPO. It put off the sale amid stock-market swings that left some investors reluctant to buy shares in newly minted companies, said the people, who asked not to be identified. The timing could slip, the people said.

Cisco Systems Inc., the top manufacturer of networking equipment and a competitor to Avaya, slumped 11 percent last year, while rival Juniper Networks Inc. dropped 45 percent. The weakness reflected concerns that customers would delay upgrades amid economic turmoil. The outlook brightened in recent weeks after quarterly results from Cisco exceeded profit and sales estimates and analysts predicted that AT&T Inc., the largest U.S. telephone company, would step up capital spending.

Avaya Inc., which is owned by Avaya Holdings, reported on Feb. 13 that its fourth quarter net loss narrowed to $26 million from $180 million a year earlier while sales rose 1.5 percent to $1.39 billion. The company cut costs in fiscal 2011 by eliminating jobs and consolidating facilities.

Market Share

Synergy Research Group said in August that Avaya gained share in the global market for voice equipment for corporate customers. It ranks No. 2 in the market behind Cisco.

Telecommunications capital spending began increasing last year for the first time since 2009, according to Yankee Group. The research firm said last May that global expenditures will rise to $302.2 billion in 2014 from $275.7 billion in 2011.

Stacey Torman, a representative of Avaya, declined to comment.

AT&T, based in Dallas, is planning to make “reasonably healthy” orders from networking companies this year, Jefferies Group Inc. said in report yesterday.

Avaya was spun off from Lucent Technologies Inc. in 2000 and taken private in 2007 for $8.2 billion. Later, it acquired an equipment business from Nortel Networks Corp. for $943 million.

Morgan Stanley, Goldman Sachs Group Inc. and JPMorgan Chase & Co. are leading the IPO, Avaya said in its June 9 filing with the U.S. Securities and Exchange Commission. The company didn’t disclose how many shares it will sell or give a price range in the filing.


Continue Reading

Techniques to Success for Passing the MCSE Exam!

MCSE certification course is really a a part of MCP courses linked to diverse technologies and merchandise in the Microsoft company. MCSE is an acronym for Microsoft Certified System Engineer. Holding this certificate certifies how the person is a Microsoft certified professional in the field of system engineering. MCSE Practice Exams can be a means to pay off the actual MCSE exams effectively. Their need arose because of Microsofts policy allowing aspirants to show up only once or twice for almost any certification course performed by them.

The main element aspects these MCSE practice tests cover consists of installing, configuring and applying the Windows Server 2000 and 2003, implementing network infrastructure on their behalf, implementing and administering directory semelle for Windows2000 and 2003 servers, installing windows systems, designing the directory is important structure, designing investments and managing the network environment.

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com

The MCSE practice exam covers each of the elements of the genuine MCSE exam. The advantage of appearing for any practice test before the actual MCSE exam is they help someone to understand those locations he needs to further progress up on improve his knowledge. In line with the rules and regulations for appearing in the MCSE exam test or some other exam to the Microsoft certification test, the candidate is qualified for can be found in this exam only once. After that the candidate cannot reappear for your exam.

Candidates can join extensive training programs for MCSE exam. Hoyouver, it’s important for the candidate to hold a tab through to his/her capacity to clear the exam a single attempt. With the, he/she can choose a practice test. These practice tests are difficult and typical than actual papers. This is accomplished so that you can prepare the applicant for the toughest situations that he/she could face in the real exam paper.

A number of MCSE practice exam out there that give an opportunity to the candidate to learn where they stand vis-‘e0-vis the genuine test. A+ certification test is certainly one such test that the candidate can select.

Success features a careful planning and use. Step one is usually to pick the Microsoft certification length of choice. Then before enrolling for any form of training, you will need to acquire some hands on experience for the technology where you have chosen to find the certificate. If you find it alright, only you then moves for many training curriculum. After completing working out program, you need to anticipate the practice exam to get a feel of the actual exam pattern. Then finally select the actual exam. Whether MCSE Practice Exam or any other practice exam for the different certification course, the look is going on in similar ways to help you succeed in these examinations.


Continue Reading

70-561 Q & A / Study Guide

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
You work as an application developer at CertKingdom.com. You are making use of .NET Framework
3.5, as well as Microsoft ADO.NET for application development.
You have recently developed an application that references a database named, CKDDatabase1,
which is hosted by a server, named CERTKINGDOM-SR13. You then created a storage schema
definition file, a conceptual schema definition file, and a mapping schema definition file. The files
are named CertKingdom.ssdl, CertKingdom.csdl, and CertKingdom.msl respectively.
After modifying the contents of the conceptual schema definition file and the mapping schema
definition file, you are required to create the .NET Framework entities from the modified schema
definitions.
You have decided to make use of the Edmgen.exe tool.
Which of the following actions should you take?

A. You should consider making use of the EntityClassGeneration mode.
B. You should consider making use of the FromSsdlGeneration mode.
C. You should consider making use of the ValidateArtifacts mode.
D. You should consider making use of the FullGeneration mode.

Answer: A


QUESTION 2
You work as an application developer at CertKingdom.com. You are making use of .NET Framework
3.5, as well as Microsoft ADO.NET for application development.
You have recently developed an application that has two entities named CKDClient and CKDOrders.
The CKDClient entity has a navigable property, named CKDOrders, which returns a collection of
CKDOrders entity instances.
You have been instructed to create code that returns the corresponding CKDOrders entity instances
when a CKDClient entity instance is queried.
Which of the following actions should you take?

A. You should construct the following code:
CKDEntities context = new CKDEntities();
ObjectQuery<CKDClient> query;
query = context.Client.Include(“CKDOrders”);
B. You should construct the following code:
CKDEntities context = new CKDEntities();
ObjectQuery<CKDClient> query;
query = context.Client.Insert(“CKDOrders”);
C. You should construct the following code:
CKDEntities context = new CKDEntities();
ObjectQuery<CKDClient> query;
query = context.Client.Release(“CKDOrders”);
D. You should construct the following code:
CKDEntities context = new CKDEntities();
ObjectQuery<CKDClient> query;
query = context.Client.Remove(“CKDOrders”);

Answer: A


QUESTION 3
You work as an application developer at CertKingdom.com. You are making use of .NET Framework
3.5, as well as Microsoft ADO.NET for application development.
CertKingdom.com has a server, named CERTKINGDOM-SR35, which hosts a Microsoft SQL Server
2005 database named CKDDatabase1. You are in the process of developing a new application that
is linked to CKDDatabase1, which hosts has two tables. Each table is displayed in its own GridView
control using its own SqlConnection object.
You have received instructions to reconfigure the way that the tables are displayed, so that it
makes use of one SqlConnection object to display the tables at the same time.
Which of the following actions should you take?

A. You should consider making use of a SqlCommand object to simultaneously implement two
SqlDataReader objects.
B. In the connection string of the application, have the Multiple Active Result Sets (MARS)
enabled.
C. You should consider making use of the xsd.exe tool.
D. In the connection string of the application, have the Default Result Set enabled.

Answer: B


QUESTION 4
You work as an application developer at CertKingdom.com. You are making use of .NET Framework
3.5, as well as Microsoft ADO.NET for application development.
You are in the process of configuring an application that you recently developed. You have to
configure the application so that it is able to connect to all kinds of databases.
You start by specifying the database driver name in the application’s connection string.
Which of the following actions should you take NEXT?

A. You should make use of ODBC Connection Pooling for creating the connection object.
B. You should make use of the OLE DB Connection Manager for creating the connection object
C. You should consider making use of the subsequent code to construct the connection object:
DSProviderFactory factory = DSProviderFactories.GetFactory(“System.Data”);DbConnection =
CreateConnection();
D. You should consider making use of the subsequent code to construct the connection object:
DbProviderFactory factory =
DbProviderFactories.GetFactory(databaseProviderName);DbConnection connection =
factory.CreateConnection();

Answer: D


QUESTION 5
You work as an application developer at CertKingdom.com. You are making use of .NET Framework
3.5, as well as Microsoft ADO.NET for application development.
You have recently created a new application that has Microsoft OLE DB Provider configured as its
data provider.
You received instruction to reconfigure the application so that the data provider is Microsoft
SqlClient. Subsequent to the reconfiguration, you find that errors are thrown when the application
performs parameterized queries.
You are required to make sure that this does not occur.
Which of the following actions should you take?

A. You should make use of the OracleClient Provider instead of the OLE DB Provider.
B. You should insert an XSD file to the schema collections of the XmlReader object.
C. Use the Unicode attribute in the connection string to false.
D. You should consider reconfiguring the the application code by replacing the positional
parameters with named parameters.

Answer: D


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


Continue Reading

Government Moves Toward Cloud Computing ‘Perfect Storm’

Amid mounting budget pressures and a maturing set of technologies, the federal government is poised for the rapid adoption of cloud computing services over the next several years, according to one of the senior agency leaders helping craft a government-wide cloud strategy.

Cisco CCNA Training, Cisco CCNA Certification

Best Avaya Certification Training and Avaya Exams Training  and more Cisco exams log in to Certkingdom.com

While federal tech chiefs have long envisioned an environment in which agency storage and applications are hosted and shared throughout the government, the policy reforms required for such a shift, though still very much a work in progress, have recently come into focus and figure to precipitate a major migration to the cloud over the next several years, said David McClure, the associate administrator of the General Services Administration’s Office Citizen Services and Innovative Technologies.


Continue Reading

The Rewards of Microsoft Certification

Microsoft certification is a vast combination of rich and varied spectrum of job and responsibilities. To successfully perform the critical IT function we should earn a specific credential providing objective validity of the ability. One of the most effective ways to reach a long-term career goal, which is even embraced by industry professionals worldwide, is Microsoft certification.

Advancing with long-term career goals Microsoft certification has helped countless IT professionals work more effectively. Individuals have started quoting their valuable experiences during the Microsoft certification course on the websites available. The professionals of Microsoft certification course are very different from the IT counterparts. They not only keep on fighting the challenges of IT field but also have keep themselves a step ahead from them by developing and improving their skills. These certification processes gives one a kind of knowledge to know how to get recognized in any field.

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com

The professionals of Microsoft certification are called at the Microsoft certified professionals or MCP. For the this Microsoft certification they have to pass current Microsoft certification exam which will proved a reliable and valid measure of professional and technical expertise. The validity of a current exam is only considered and not which is retired. Microsoft certification exams reflect how Microsoft products are used in the organization.

Microsoft certification exams are developed from the inputs received from the IT industry professionals. The independent testing organizations administer these exams. There is one very big reason why IT professionals and developers become Microsoft certified professionals is that they all know that their clients, peers, employees and the IT industry shall acknowledge their expertise in working with the Microsoft products and technologies.

There are various steps towards obtaining Microsoft certification. Firstly, one should decide which Microsoft certification is correct for the person. As Microsoft offers a vast variety of professions within the IT industry one should understand which course would be the best for him. One should also get handy with the Microsoft products, which can be done only after working in the IT industry. Experience should be expanded with training by taking advantage of the training resources.

For obtaining Microsoft certification, it is also better to know what to expect in the exam. Previous question papers or taking consultation from those who have appeared or cleared the test is always a good choice. Taking helps from the help guides for Microsoft certification exams is also an added advantage. These help provide guidelines and suggestions to the person appearing for the exam. It is also suggested to take trial tests before appearing for the final exam. The test center should be selected from the worldwide locations. Also certain details like area of study, testing program and region etc should be mentioned.

Even after polishing our skills set Microsoft certification provides other specific advantages. They are like the recognition of our knowledge and proficiency in the industry. One can also be accessed as MCP member on the websites and can obtain various offers and discounts on products and services. One can also get career information and simultaneously get invitations to conferences, special events and training sessions.

A Microsoft certification shows technical leadership over other peers as well as ability to successfully implement Microsoft business solutions for any organizations or clients.


Continue Reading

Microsoft extends operator billing platform for Windows Phone apps

Microsoft has struck a deal which will make it easier for more Windows Phone users to pay for Marketplace apps via their phone bill. Payments on Microsoft Marketplace are handled by Microsoft’s new Commerce Platform, which it has now integrated with the Direct Billing Gateway (DBG) developed by Mach.

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com

The integration makes it easier for mobile carriers to add operator billing, according to Mach. Among the first to profit from the new arrangement will be customers of Canadian operator Telus Communications.

For users, operator billing makes the payment process easier, according to Charles Damen, vice president Mobile Billing and Payments at Mach. They can just click to buy, without having to enter credit card details or store them on the app store servers, Damen said.

Microsoft made its first connection to Mach’s gateway in January last year, but, so far, take-up has been slow. Mach says 50 operators use DBG to bill for content downloads and applications, but only two are using it to offer direct billing for Windows Phone users: Telus and Australia’s Telstra.

The growing variety of Windows Phones has increased the interest for Microsoft’s operating system, according to Damen, who expects more carriers will join Telus and Telstra this year, but isn’t willing to announce any details. Mobile carriers have also been upgrading their own systems to be able to handle the billing method, he said.

Operator billing options on Android and Windows Phone allow carriers to be part of app stores, in contrast to Apple’s App Store, which completely excludes operators from the application billing process.

Today, operators such as Vodafone, Telenor, Sprint and AT&T offer users the option to pay for apps on their monthly bill. Orange and T-Mobile have also added operator billing for Windows Phone apps using other payment platforms.


Continue Reading

70-542 Q & A / Study Guide

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
There is a web site CertKingdomWS.
CertKingdomWS uses MS Office SharePoint Server 2007 Search Center.
CertKingdomWS runs a fixed keyword query.
If the result of this query is a fail to return any data.
How can this be achieved?

Answer:


QUESTION 2
There is a MS Office SharePoint Server 2007 application CertKingdomApp.
CertKingdomApp uses two tables Employees and EmployeesDetails.
They are related through a one-to many relation.
Two entities Employees and EmployeesDetails are defined in a BDC definition.
The metadata of this definition need to be defined.
Which code is appropriate?

Answer:


QUESTION 3
There is a MS Office SharePoint Server 2007 web site CertKingdomWS.
There is a MS Office SharePoint Server 2007 application CertKingdomApp.
There is a security group named DOMAIN\Employees.
In CertKingdomWS there is content that this group should have access to.
How can this be ensured? Select two.

A. Add a custom Web Part…
B. Add an audience…
C. Add a site group…
D. Use a filter…
E. ..based on the DOMAIN\Employees group.
F. ..that has the DOMAIN\Employees group as a member.
G. …that shows only the members of the DOMAIN\Employees group.

Answer: B,E

Explanation:


QUESTION 4
There is a MS Office SharePoint Server 2007 web site CertKingdomWS.
There is a MS Office SharePoint Server 2007 application CertKingdomApp.
There is a MS Excel 2007 workbook which contain employee data such as name, city, salary.
End users must be able to filter the workbook on city.
How can this be achieved through MS Office SharePoint Server 2007 Excel services? Select two.

A. Add an Excel VBA application…
B. Add an ActiveX control…
C. Use the Data-Filter option…
D. …in the workbook.
E. ..in CertKingdomApp.
F. ..in CertKingdomWS.

Answer: C,D

Explanation:


QUESTION 5
There is a MS SQL Server 2005 database CertKingdomDB.
There is a BDC definition which is used to search for employee data in CertKingdomDB.
Incremental crawls must be performed for indexing in CertKingdomDB.
How can this be ensured? Select two or three.

A. Add method
B. Add function..
C. Add stored procedure…
D. ..Finder
E. ..GenericInvoker
F. .. IDEnumerator
G. .. ViewAccessors
H. ..to have a return field representing the last update time of CertKingdomDB.
I. .. to return a different set of columns from the CertKingdomDB.

Answer: A,F,H

Explanation:


QUESTION 6
Exhibit:
public class CertKingdomClass
{
public double CertKingdom1 (double d)
{
return d * 9; }
public DateTime CertKingdom2 {
return ( DateTime.Today );
}
}
There are two UDFs CertKingdom1 and CertKingdom2.
These are defined as Excel Services in MS Office SharePoint Server 2007.
The code is displayed in the exhibit.
What action should you take?

Answer:


QUESTION 7
There is a ASP.NET web site CertKingdomWS.
There is a MS Office SharePoint Server 2007 application CertKingdomApp.
There is a Microsoft Office InfoPath form CertKingdomForm.
There is a custom control CertKingdomC that is derived from the XMLFormView class.
CertKingdomC will show CertKingdomForm inside an ASP.NET page on CertKingdomWS.
How can this be ensured?

Answer:


QUESTION 8
There is a web site CertKingdomWS.
There is a portal site template CertKingdomTempl.
CertKingdomTempl is used within CertKingdom Ltd. To recreate site hierarchies,
Extra sites must be added to the hierarchy.
What steps should be taken?
Your company uses a portal site template to recreate site hierarchies. You need to add additional
sites to the hierarchy that is defined in the portal site template. What should you do?

A. Modify file Webtemp*.xml…
B. Modify file webconfig…
C. Modify file global.aspx…
D. Modify the XML definition file..
E. Modify CertKingdomTempl…
F. Modify CertKingdomWS…
G. ..by adding a Template element that contains the site definitions for the new sites.
H. ..by adding extra Web elements to the XML definition file of the portal site template.
I. .. to include the new hierarchy and create a new site template on the Site Settings page.

Answer: D,H

Explanation:


 

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


Continue Reading

70-536 Q & A / Study Guide

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
You work as the application developer at CertKingdom.com. CertKingdom.com uses Visual Studio.NET
2005 as its application development platform.
You are in the process of storing numerical values up to 2,100,000,000 into a variable and may
require storing negative values using a .NET Framework 2.0 application. You are required to
optimize memory usage
What should you do?

A. Int32
B. UInt16
C. UInt32
D. Int16

Answer: A

Explanation:
The Int32 type should be used in the scenario as it can be used to store positive and negative
numerical values from -2,147,483,648 to +2,147,483,647.
Incorrect Answers:
B: The UINT32 and UInt16 type should not be used in the scenario because they are used to store
only unsigned positive numbers.
Reference types
C: The UINT32 and UInt16 type should not be used in the scenario because they are used to store
only unsigned positive numbers.
Attributes
D: The Int16 type should not be used as you will only be allowed to store values from -32768 to
+32768.


QUESTION 2
You work as an application developer at CertKingdom.com. You are currently in the process of
creating a class that stores data about CertKingdom.com’s customers.
CertKingdom.com customers are assigned unique identifiers and various characteristics that may
include aliases, shipping instructions, and sales comments. These characteristics can change in
both size and data type.
You start by defining the Customer class as shown below:
public class Customer
{
private int custID;
private ArrayList attributes;
public int CustomerID
{
get {return custID;}
}
public Customer (int CustomerID)
{
this.custID = CustomerID;
this.attributes = new ArrayList ();
}
public void AddAttribute (object att)
{
attributes.Add (att);
}
}
You have to create the FindAttribute method for locating attributes in Customer objects no matter
what the data type is.
You need to ensure that the FindAttribute method returns the attribute if found, and you also need
to ensure type-safety when returning the attribute.
What should you do?

A. Use the following code to declare the FindAttribute method:
public T FindAttribute (T att)
{
//Find attribute and return the value
}
B. Use the following code to declare the FindAttribute method:
public object FindAttribute (object att)
{
//Find attribute and return the value
}
C. Use the following code to declare the FindAttribute method:
public T FindAttribute <T> (T att)
{
//Find attribute and return the value
}
D. Use the following code to declare the FindAttribute method:
public string FindAttribute (string att)
{
//Find attribute and return the value
}

Answer: C

Explanation:
This code declares the method FindAttribute and specifies an argument named att using the T
placeholder as the argument and return data type. To ensure the FindAttribute method accepts
arguments of different types, you should specify an argument using a generic placeholder. The
argument att in this generic method will accept any valid data type and ensures type-safety by
returning that same data type.
Incorrect Answers:
A: You should not use this code because it does not declare the placeholder T. when declaring a
generic method, you have to use the < > bracketsto declare the place holder before using it.
B: You should not use this code because it does not guarantee type-safery.
D: You should not use this code because it will only accept a string argument and return a string
argument.
Generic types


QUESTION 3
You work as an application developer at CertKingdom.com. You are creating a custom exception
class named ProductDoesNotExistException so that custom exception messages are displayed in
a new application when the product specified by users is unavailable.
This custom exception class will take the ProductID as an argument to its constructor and expose
this value through the ProductID. You are now in the process of creating a method named
UpdateProduct. This method will be used to generate and manage the
ProductDoesNotExistException exception if the ProductID variable contains the value 0.
You need to ensure that use the appropriate code for the UpdateProduct method.
What should you do?

A. Make use of the following code:
public void UpdateProduct ()
{
try
{
if (ProductID == 0)
throw new ProductDoesNotExistException (ProductID);
}
catch (ProductDoesNotExistException ex)
{
MessageBox.Show (“There is no Product” + ex. ProductID);
}
}
B. Make use of the following code:
public void UpdateProduct ()
{
try
{
if (ProductID = = 0)
throw new Exception (“Invalid ProductID”);
}
catch (ProductDoesNotExistException ex)
{
MessageBox.Show (ex.Message);
}
}
C. Make use of the following code:
public void UpdateProduct ()
{
if (ProductID = = 0)
throw new ProductDoesNotExistException (ProductID);
}
D. Make use of the following code:
public void UpdateProduct ()
{
if (ProductID = = 0)
throw new Exception (“Invalid ProductID”);
}

Answer: A

Explanation:
This code verifies the value of the ProductID variable by using the if statement. If the ProductID
variable contains a value of 0, this code generates an exception of type
ProductDoesNotExistException . To explicitly generate an exception, you are required to use the
throw statement. The exception generated by using the throw statement can be handled by the
try…catch block. This code generates the custom exception by calling the constructor of the
custom exception class named ProductDoesNotExistException . The constructor argument is the
ProductID attached to the ProductDoesNotExistException object. This code then handles the
custom exception named ProductDoesNotExistException by using a catch block, which handles
exceptions by using a variable named ex of the type ProductDoesNotExistException . This code
displays the ” There is no Product ” error message by using the MessageBox.Show method and
concatenating the ex. ProductID to it.
Incorrect Answers:
B: You should not use the code that generates an exception of the type Exception and handles the
exception of the type ProductDoesNotExistException in the catch block. This code is incorrect
because you are required to generate a custom exception named ProductDoesNotExistException.
C: You should not use the codes that do not use a try…catch block because the application an
unhandled exception.
D: You should not use the codes that do not use a try…catch block because the application an
unhandled exception.


QUESTION 4
You work as the application developer at CertKingdom.com. CertKingdom.com uses Visual Studio.NET
2005 as its application development platform.
You have recently finished development of a class named TestReward and package the class in a
.NET 2.0 assembly named TestObj.dll. After you ship the assembly and it is used by client
applications, you decide to move the TestReward class from TestObj.dll assembly to the
TestRewardObj.dll Assembly. You are to ensure when you ship the updated TestObj.dll and
TestRewardObj.dll assemblies that the client applications continue to work and do not require
recompiling.
What should you do?

A. The TypeForwardedTo attribute should be used
B. The TypeConvertor.ConvertTo method should be used
C. The InternalsVisibleTo attribute should be used
D. The Type Convertor.ConvertFrom method should be used

Answer: A

Explanation:
The statement used for you to add a type from one assembly into another assembly is the
TypeForwardTo attribute which enables you not to have the application recompiled.
Incorrect Answers:
B: The TypeConverter class provides a unified way of converting different types of values to other
types and can not be used to move a type.
C: The method in question here specifies all nonpublic types in an assembly are visible to other
assemblies but can not be used to move types.Part 2: Manage a group of associated data in a
.NET Framework application by using collections. (Refer System.Collections namespace)
D: The TypeConverter class provides a unified way of converting different types of values to other
types and can not be used to move a type.


QUESTION 5
You work as an application developer at CertKingdom.com. You have recently created a custom
collection class named ShoppingList for a local supermarket. This custom class will include
ShoppinItem objects that have the public properties listed below.
* Name
* AisleNumber
* OnDiscount
You are required to enable users of your class to iterate through the ShoppingList collection, and
to list each product name and aisle number using the foreach statement.
You need to achieve this by declaring the appropriate code.
What code should you use?

A. public class ShoppingList : ICollection
{
// Class implementation
}
B. public class ShoppingList : IEnumerator, IEnumerable
{
// Class implementation
}
C. public class ShoppingList : Ilist
{
// Class implementation
}
D. public class ShoppingList : Enum
{
// Class implementation
}

Answer: B

Explanation:
You should implement the IEnumerable and IEnumerator interfaces of the System.Collections
namespace to ensure that your collection class supports foreach iteration. The IEnumerable
interface defines only one method named GetEnumerator that returns an object of type
IEnumerator of the System.Collections namespace and is used to support iteration over a
collection. The IEnumerator interface supports methods, such as Current , MoveNext , and Reset
to iterate through a collection. The Current method returns the current element of the collection.
The Move method positions the enumerator to the next available element of the collection. The
Reset method positions the enumerator before the first element of the collection.
Incorrect Answers:
A: You should not use the code that implements the ICollection interface because this interface is
used to define properties in a collection. Implementing this interface will not ensure that your
collection class supports foreach iteration because it does not inherit the IEnumerator interface.
C: You should not use the code that implements the Ilist interface because this interface is used to
define properties of a non-generic list of items accessed by index. Implementing this interface will
not ensure that your collection class supports foreach iteration because it does not inherit the
IEnumerator interface.
D: You should not use the code that inherits the Enum because this structure is used as a base
class for those classes that provide enumeration values. Inheriting the Enum structure will not
ensure that your collection class supports foreach iteration.


QUESTION 6
You work as the application developer at CertKingdom.com. CertKingdom.com uses Visual Studio.NET
2005 as its application development platform.
You are developing a .NET Framework 2.0 application used to store a type-safe list of names and
e-mail addresses. The list will be populated all at ones from the sorted data which means you well
not always need to perform insertion or deletion operations on the data. You are required to
choose a data structure that optimizes memory use and has good performance.
What should you do?

A. The System.Collections.Generic.SortedList class should be used
B. The System.Collections.HashTable class should be used
C. The System.Collections.Generic.SortedDictionary class should be used
D. The System.Collections.SortedList class should be used

Answer: A

Explanation:
The SortedList generic class should be used in the scenario class as it provides type safety
compared against the System.Collections.SortedList class.
Incorrect Answers:
B: The System.Collections.HashTable class should not be used as this class provides no type
safety.
Collection interfaces
C: Although this is very similar to the SortedList class the SortedList class should be used instead
in the scenario.
Iterators
D: Although this is very similar to the SortedList class the SortedList class should be used instead
in the scenario.


QUESTION 7
You work as an application developer at CertKingdom.com. You are currently in the process of
reviewing an application that was created by a fellow developer.
The application that you are reviewing includes a declaration for a collection named EmployeeList,
which stores Employee objects. The declaration is shown below:
public class EmployeeList : Enumerator, IEnumerable
{
// Class implementation
}
You require the ability to iterate through the EmployeeList with minimum development effort.
What should you do?

A. Utilize the switch statement
B. Utilize the dowhile statement
C. Utilize the foreach statement
D. Utilize the if statement

Answer: C

Explanation:
the IEnumerable and IEnumerator interfaces of the System.Collections namespace are used to
ensure that your collection class supports foreach iteration. The IEnumerable interface defines
only one method named GetEnumerator that returns an object of type IEnumerator of the
System.Collections namespace and is used to support iteration over a collection. The
IEnumerator interface supports methods, such as Current , MoveNext , and Reset to iterate
through a collection. The Current method returns the current element of the collection. The Move
method positions the enumerator to the next available element of the collection. The Reset
method positions the enumerator before the first element of the collection.
Incorrect Answers:
A: These statements will not allow you to iterate through the EmployeeList collection.
B: You should not use this statement because it will require manually calling the MoveNext and
Current methods. The scenario states that you need to “…iterate through the EmployeeList with
minimum development effort.”
D: These statements will not allow you to iterate through the EmployeeList collection.
Hashtable class


QUESTION 8
You work as an application developer at CertKingdom.com. CertKingdom.com has been contracted to
develop an application for the local bank.
You have been given the responsibility of creating this application and need to store each
transaction record, which is identified using a complex transaction identifier, in memory. The bank
informs you that the total amount of transaction records could reach 200 per day.
To achieve this, you decide to utilize one of the existing collection classes in the .NET 2.0 class
library.
You need to ensure that you the collection class you select is the most efficient one for storing
transaction records.
What should you do?

A. Select the ListDictionary collection class.
B. Select the HashTable collection class.
C. Select the Queue collection class.
D. Select the StringCollection collection class.

Answer: B

Explanation:
You should select the HashTable class to store transaction records because each element is
identified using a unique identifier and the size of the collection is large. Elements in the
HashTable collection are stored with a key/value pair where each key is created using a hash
code. The default capacity of a HashTable class is zero, and you can use the Add method to add
a new element to the collection. The Count property provides the total number of elements in the
HashTable collection. An element of the HashTable class can be accessed using the
DictionaryEntry class. You can use the Key and Value properties of the DictionaryEntry class to
access the key associated with the element and the value of the element, respectively.
Incorrect Answers:
A: You should not select this collection class because this class is used if the total number of
elements to be stored in a collection is less than 10 elements in length.
C: You should not select this collection class because you need to access transaction records
using a transaction identifier, not in sequential order.
D: You should not select this collection class because this class is used to manage a collection of
string values.


QUESTION 9
You work as an application developer at CertKingdom.com. CertKingdom.com has been hired by a small
local private school to develop a class library that will be used in an application named
ManageAttendance for the purpose of managing student records.
You are responsible for developing this class library. CertKingdom.com has instructed you to create a
collection in the application to store learners’ results.
The school has informed you that they currently only have seven learners, but that this value will
triple in the following year. Due to the limited resources, you need to ensure that the collection you
create consumes a minimum amount of resources.
What should you use to create the collection?

A. The HybridDictionary collection class.
B. The HashTable collection class.
C. The ListDictionary collection class.
D. The StringCollection collection class.

Answer: A

Explanation:
You should use the HybridDictionary class to create the collection because this class is useful in
scenarios where the number of elements is unknown or could grow in size. A collection of the
HybridDictionary type manages the collection depending on the number of elements. The
HybridDictionary type collection uses the ListDictionary class to manage the collection when there
are only a few elements. When the number of elements exceeds ten, the HybridDictionary type
collection automatically converts the elements into HashTable management.
Incorrect Answers:
B: You should not use this collection class because this class is used if the total number of
elements to be stored in a collection is known and is greater than ten elements in length.
C: You should not use this collection class because this class is used if the total number of
elements to be stored in a collection is known and is less than ten elements in length.
D: You should not use this collection class because this class is used to manage a collection of
string values.


QUESTION 10
You work as an application developer at CertKingdom.com. CertKingdom.com wants you to develop an
application that stores and retrieves client information by means of a unique account number.
You create a custom collection class, which implements the IDictionary interface, named
ClientDictionary. The following code have been included into the new application.
//Create Client objects
Client c1 = new Client (“AReid”, “Andy Reid”, Status.Current);
Client c2 = new Client (“DAustin”, “Dean Austin”, Status.New);
//Create ClientDictionary object
IDictionary cData = new ClientDictionary ();
cData.Add (“10001”, c1);
cData.Add (“10002”, c2);
You use the same method to add other Client objects to the collection. You need to ensure that
you are able to retrieve client information associated with the account number 10111.
What should you do?

A. Use the following code:
Client foundClient;
foundClient = (Client) cData.Find (“10111”);
B. Use the following code:
Client foundClient;
if (cData.Contains (“10111”))
foundClient = cData [“10111”];
C. Use the following code:
Client foundClient;
if (cData.Contains (“10111”))
foundClient = (Client) cData [“10111”];
D. Use the following code:
Client foundClient;
foreach (string key in cData.Keys
{
if (key == “10111”)
foundClient = (Client) cData.Values [“10111”];
}

Answer: C

Explanation:
This code invokes the Contains method of the IDictionary interface to determine whether a value is
associated with the key 10111. If a value exists for that key, then the clientData [“10111”]
statement retrieves the client data as a generic object. The code casts the generic object into a
Client object, and it is stored in the foundClient variable
Incorrect Answers:
A: You should not use the code that uses the Find method because no such method exists in the
IDictionary interface.
B: You should not use the code that assigns the foundClient variable to a generic object because
the foundClient variable is declared as a Client type.
D: You should not use the code that iterates through the Keys collection because it is unnecessary
and process-intensive.

 

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


Continue Reading

Software Development Services – IT consulting

There are many services that are available to many people. Among the most valuable services is IT consulting. Information technology consulting is a type of consulting in which a company helps another company or individual find ways to improve the operation, implementation and quality of their computer systems.

MCTS Certification, MCITP Certification

Microsoft CCNA Certification, CCNA Training and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com

Information technology consultants do many things and are therefore among the most useful services in the economy. These types of companies provide many services including software consulting, software development and software development programming services.
One of the first services that an IT consulting firm provides is software consulting. This is a type of service that includes advice and consultation on various software packages. The firm will be able to discuss certain software and how it can help a company meet its objectives. With this service organizations can also receive feedback on what types of software should be developed and used for various purposes.

Another key service that IT consultants provide is software development. With software development the firm will help a company devise, design and create a specific type of software. They will help with things such as designing the software features, benefits and also helping companies make the software easy to install for an everyday user.

The last and most vital service that these types of firms provide is software development programming services. This service will help companies actually put together the software packages they plan to use or sell. The consulting firm will provide them advice on how to program the software, what features to put in, and how to design the software as well. Software programming services are yet another very useful service that IT consulting firms provide to their clients.
IT consulting firms also do many other things and fulfill certain needs. These companies provide attention to quality which will help clients achieve the outcomes that they expect. The IT consulting firms will therefore help their clients achieve the IT related goals they have for their organization. Other things such as identifying strategy initiatives, planning action, performing numerous IT related assessments, performing audits and also helping organizations find solutions to achieve their objectives.

As with any other service IT consulting is one that can be very helpful to many businesses. Since information technology has become a very vital industry in the economy, many businesses will need to have their computer systems and programs up to date and of high quality. As a result they will at times need the help of information technology consultants. By using the services of an information technology consultant, companies will have a very valuable resource to use when looking to improve the quality of their information technology systems. The expertise, feedback, advice and consultation of an information technology consultant will help businesses better adapt to current technological trends.

To get the most out of your information technology consulting services you should look at the various companies that provide it. Meeting with various information technology consultants and discussing your needs is a good start. Once you find an information technology consultant then you will need to go over things such as how to improve software, improve hardware and also improve the overall operation of your computer systems. With these consultants your company will be able to be more competitive and successful in the modern economy.


Continue Reading

70-523 Q & A / Study Guide

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

 

QUESTION 3
There is a service WCF (Windows Communication Foundation) Data Services CertKingdomService.
CertKingdomService has been developed with MS .NET Framework 4 and MS Visual Studio 2010.
An application CertKingdomApp uses CertKingdomService.
There is a problem. Whenever CertKingdomApp sends DELETE and PUT requests to
CertKingdomService there is an error.
What should be done in this scenario? Select three.

A. When accessing CertKingdomService CertKingdomApp should use header..
B. When accessing CertKingdomService CertKingdomApp should use footer..
C. ..HTTP-Method..
D. .. X-HTTP-Method..
E. .. HTTP ContentType..
F. .. XML ContentType..
G. .. XLS-Method..
H. ..as part of a DELETE request.
I. ..as part of a GET request.
J. ..as part of a POST request.
K. ..as part of a PUT request.

Answer: A,D,J

Explanation:


QUESTION 4
There is an application CertKingdomApp.
CertKingdomApp has been developed with MS .NET Framework 4 and MS Visual Studio 2010.
There is a server CertKingdomSrv.
There is a Microsoft SQL Server 2008 database CertKingdomDb on CertKingdomSrv.
CertKingdomApp connects to CertKingdomDb.
CertKingdomDb includes a table CertKingdomProducts.
CertKingdomProducts includes product information.
CertKingdomProducts has a column ProductType.
ProductType is used to identify if the product is digital or physical.
There is Product entity base type.
There is an Association entity Digital inheriting from the Product entity base type.
All digital products must be bound to Digital class.
What should be done? Select three.

A. The Entity Data Model Designer should be used to..
B. Change the file..
C. ..code-behind to include..
D. ..global.aspx to include..
E. .. .edmx file to include..
F. ..to set up a referential constraint..
G. .. to set up an association between..
H. .. the primary key of the Digital class and ProductType.
I. .. between the Digital class and ProductType.
J. <NavigationProperty Name=”Type” FromRole=”ProductType” ToRole=”Digital” />
K. <Condition ColumnName=”ProductType” Value=”Digital” />

Answer: B,E,J

Explanation:


QUESTION 5
There is an application CertKingdomApp.
CertKingdomApp has been developed with MS .NET Framework 4 and MS Visual Studio 2010.
To model entities CertKingdomApp ADO.NET Entity Framework is used.
CertKingdomApp make sure that users can update entities even if they are not connected to the
central store. In such a case, when the user reconnects: changes the local data must be persisted,
latest updates from the central data store are loaded to the local store (when no local changes
have been made).
What should be done in this scenario? Select three.

A. Use method…
B. Use library..
C. Use attribute..
D. ..Execute..
E. ..Refresh of ObjectContext class..
F. ..Refresh of ViewContext class..
G. ..through usage of MergeOptions.OverwriteChanges
H. ..through usage of RefreshMode.StoreWins.AppendOnly
I. ..through usage of RefreshMode.ClientWins
J. ..through usage of MergeOptions.AppendOnly

Answer: A,E,I

Explanation:


QUESTION 6
There is an application CertKingdomApp.
CertKingdomApp has been developed with MS .NET Framework 4 and MS Visual Studio 2010.
You are implementing the CertKingdomApp data layer.
In particular when the GetDataReader method returns a SqlDataReader, the SqlDataReader can
retrieve rows from the database.
Also when the SqlDataReader is closed the active SQL connections, opened with the
GetDataReader method, must be closed.
What code should be used in this scenario?

Answer:


QUESTION 7
Sales Exhibit:
Sales Properties:
SalesID
CustomerID
OrderDate
ShipAddress
Sales_details Exhibit:
Properties:
SalesID
ProductID
UnitPrice
Quantity
There is an application CertKingdomApp.
CertKingdomApp has been developed with MS .NET Framework 4 and MS Visual Studio 2010.
There is a server CertKingdomSrv.
There is a Microsoft SQL Server 2008 database CertKingdomDb on CertKingdomSrv.
CertKingdomApp connects to CertKingdomDb.
LINQ is used to created the Sales and Sales_details in the exhibit.
There is a one- to-many relation from the SalesID of Sales to the SalesID of Sales_details.
The primary key of Sales is SalesID column.
The primary key of Sales_details is the SalesID and ProductID columns.
You are required to provide SQL code that produces the sum of the price of each Sales record.
Which code should be used?

Answer:

 

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


Continue Reading

‘microsoft’ Accreditation : Overview and focus Techniques

Like all specialist technical qualifications, the particular Microsof company variety of certificates is obviously expanding as well as becoming current to ensure that understanding of the latest operating systems is needed in order to receive these.

These types of qualification are believed skilled and also comparable to degree-level, and therefore the same amount of research and effort needs to be put in them as with a university level.

The bottom line is knowing that certification you actually need for that work opportunities you intend to make an application for. Here are some examples regarding some of the more common qualification.

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com

Microsoft Certified Specialist (MCP)

Microsoft Qualified Systems Supervisor (MCSA)

Microsoft Accredited Programs Professional (MCSE)

Microsoft Certified Computer’s desktop Support Specialist (MCDST)

The first will be acquired through passing no less than one test arranged through ‘microsoft’ (there are several exceptions to this particular).

The particular MCSA requires individuals to feed 5 assessments as well as the MCSE requires A couple of extra exams, that need candidates to show that they can either satisfy as well as exceed the information requirements for that related qualifications.

The main one with all the most affordable price will be the MCDST, since this centers specifically in assisting users who will be having trouble along with desktops. This specific qualification is, nevertheless, well suited for anybody desperate to be employed in a trip middle or even anywhere like a Initial collection assistance specialist.

This type of certification is also perfect for anybody who should be licensed quickly, because it only demands applicants to pass through A couple of tests, as likely to the much greater number essential for the opposite accreditations, with all the MCP certification as an different to this guideline.

Even though the MCP qualifying measures only needs a single examination, this doesn’t happen provide consultant and particular understanding identification, like the MCDST can, that’s what companies are searching for currently.

For Subsequent and also 3rd collection support, the very least qualifying measures involving MCP would likely almost certainly be required, and also perhaps a few extra hardware-based certification, for example the CompTIA series of tests made available from Cisco.

Although there are lots of publications an internet-based examine means obtainable, the very best sources on offer are individuals produced by Microsof company by themselves by means of ‘microsoft’ Media guides. These often include reduced prices for the actual tests in the event that obtained in just a particular interval.

In addition to improving your premiums, this is also a bonus to gain qualifications in a very smaller length of time. Along with with your guides, another really good approach is to plan out when you do every single part as well as notice the times of day each and every exercise will require (there are occasion estimations for many portions throughout Microsof company Media publications).

Based on equally your looking at velocity and existing degree of technological information, time that is required to perform the actual workout routines can vary drastically. As being a information, it might acquire an authority laptop or computer consumer about Two months to accomplish all these publications.

There exists, even so, almost no time reduce between Microsof company accreditation tests, meaning that you can study your personal rate, and so hold the finest chance of getting established track record experience and knowledge. It is a great deal more important to possess the expertise for these qualifications than to give exams, meaning that you must never dash over the books hoping involving increasing more quickly benefits.


Continue Reading

70-519 Q & A / Study Guide

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
There is ASP NET 3.5 Web application CertKingdomApp.
You are required to upgrade CertKingdomApp to ASP.NET 4.0.
You need to make sure that CertKingdomApp is optimized for search engines.
In particular this optimization must include HTML that is generated by CertKingdomApp and URLs
local within CertKingdomApp.
Within CertKingdomApp there is a Data List control CertKingdomC.
CertKingdomApp must be able to load data at runtime into CertKingdomC with the help of the current
URL.
What is appropriate in this scenario? Select four.

A. Use property Repeat Layout of..
B. Use property Data List Layout of..
C. Use property Render Outer table Layout of..
D. ..Web Forms routing and set the property to…
E. .. permanent redirect and set the property to..
F. .. temporary redirect and set the property to..
G. ..Null..
H. ..True..
I. ..False..
J. ..Table..
K. ..List..
L. .. on all list controls.
M. ..on all controls.
N. .. all Form View controls.

Answer: B,D,I,N

Explanation:


QUESTION 2
There a ASP.NET MVC 2 application CertKingdomApp.
Consider unhandled exceptions.
CertKingdomApp must manage and log these unhandled exceptions.
What would be best to achieve this if you want to put the logic into a single place?

A. Use a custom Handle Error attribute to…
B. Use the default Handle Error attribute to…
C. For every method..
D. For each controller..
E. .. override the Exception method.
F. .. override the OneException method.
G. .. and apply it to all controllers.
H. ..use try and catch.

Answer: A,G

Explanation:


QUESTION 3
There is an ASP.NET Web application CertKingdomApp.
CertKingdomApp has pages that are available for public users.
CertKingdomApp has pages that are available for only administrative purposes.
Consider error handling code for these pages.
The same code must be used for the public pages and the administrative pages.
Errors must be handled in one way for the public pages and in another way for the administrative
pages.
How can this be achieved? Select two.

A. Use file Global.asax.cs (or Global.asax.vb)
B. Use file code-behind.
C. Use the Page_Error method(s).
D. ..for every public page and for every administrative page.
E. ..of the subclasses of System.Web.UI.Page.
F. ..of the subclasses of System.Web.URL.Page.
G. ..use the Application_error method.
H. .. for each master page.

Answer: C,E

Explanation:


QUESTION 4
CertKingdom has multiple ASP.NET Web applications.
There is a class library CertKingdomLib that are used by all these application.
There is a variable CertKingdomVar in CertKingdomLib.
CertKingdomVar is within the helper class.
CertKingdomVar contains secret information.
CertKingdomVar must not be seen by developers debugging applications.
How can this be achieved?

Answer:


QUESTION 5
There is an ASP.NET Web application CertKingdomApp.
CertKingdomApp has a Menu Control CertKingdomMC.
For unauthorized users CertKingdomMC shows a menu of public pages.
For authorized users CertKingdomMC shows a menu of both public pages and some private pages.
For security you need to ensure that the private pages (both the menu options and the URLs) are
not shown to unauthorized user.
What is appropriate in this scenario? Select four.

A. The event handler..
B. The attribute..
C. The method..
D. The exception handler..
E. ..Page_Refresh should be used..
F. ..Page_Load should be used..
G. ..window.onload should be used..
H. ..window.update should be used..
I. ..window.onupdate should be used..
J. ..Page_Init should be used..
K. .. JavaScript document ready should be used..
L. ..VBS (or C# script) document ready should be used..
M. …to add pages to CertKingdomMC that are to be accessed by all users
N. ..to hide the private pages from the list of pages shown on CertKingdomMC.
O. ..to add pages to CertKingdomMC that are to be accessed by authorized users.
P. ..to add pages to CertKingdomMC that are to be accessed by unauthorized users.

Answer: C,F,O

Explanation:

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


Continue Reading

Making lame excuses for Microsoft’s decision to drop the Start button in Windows 8

Is there method ot Microsoft’s madness, or is the decision pure madness?

Over the past few days I’ve seem a number of Microsoft pundits come up with lame excuses to try to justify Microsoft’s decision to drop the on-screen Start button in Windows 8. Is there method ot Microsoft’s madness, or is the decision pure madness?

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com

Here’s Paul Thurrott’s justification:

While it’s technically true that the Start button/Orb, which used to adorn the left end of the taskbar on the Windows desktop, is missing in action, most people are missing out on two salient points. First, the Windows desktop is not the primary user interface in Windows 8 anymore. That’s the Start screen.

Second, the Start button isn’t gone, and it’s not going away at all. In fact, it will be present on every single Windows 8 device sold going forward.

He goes on to post a picture of a physical Windows button on a tablet, and points out that a physical Windows Key is required for any PC or device to get the Certified for Windows 8 logo from Microsoft.

Well, I’ve got two counterpoints to Thurrott’s argument. First, and I’m surprised he didn’t mention this, it’s just the visual ‘orb’ hat’s being removed from the left-hand-side of the taskbar. There will still be an invisible hotspot in that part of the screen that does what the button currently does. Microsoft is kinda assuming that everyone will still go there looking for the Start button and will continue to offer the functionality, albeit without the UI.

Secondly, and I think that this is an important point – is a physical button a step forward or a step back compared to an on-screen button?

Before we answer that, let’s consider Apple’s iPhone and iPad. Neither of these devices have any sort of on-screen Home/Start button. Did Microsoft ‘copy’ Apple here? maybe, but that doesn’t matter. The difference is that the iOS platform has never had an on-screen Start/Home button. Windows, on the other hand, has had this feature since Windows 95, and people have come to expect it, so I expect that it’s removal (even if just the symbolic gesture of removing the UI element) will raise (and possibly knit) a few eyebrows.

Personally, I think that removing an on-screen UI element and replacing it with a physical button (a physical button that most systems already have) seems like a step backwards to me because it penalizes people who prefer using a mouse than a keyboard. I’m happy with the Windows key on keyboards, but the idea of having to rely on a physical button on a device that OEMs can put wherever they want puts me off because I know that OEMs can do boneheaded things. If Microsoft was bold enough to remove the functionality as well as the UI element, that would be one thing, but adopting some sort of halfway gesture seems like sitting on the fence to me, and all the lame excuses are just making that decision seem even lamer.

Either keep the Start button in or remove it completely.

Do you think Microsoft was right to follow in Apple’s footsteps and remove the on-screen Start button, or do you think that it’s one UI change too far?


Continue Reading

Follow Us

Bookmark and Share


Popular Posts