Академический Документы
Профессиональный Документы
Культура Документы
You are working as a leader of the project team at ABC Corp. You are developing a
Web-based application that requires various .NET applications to be integrated by
sharing common data, which rarely changes. The application has to run on the Web
server and provide online instant service to the users by solving their queries
regarding the products manufactured by the company. Fast access to the
application is required because the application provides online help to the users.
Which technique would you use to develop the application?
1,Use application objects to store the data, which is to be shared and is changed
rarely.
2,Use cookies to store the data, which is to be shared and is changed rarely.
3,Use page fragment cache to store the data, which is to be shared and is changed
rarely.
4,Use page output cache to store the data, which is to be shared and is changed
rarely.
Ans: 1
Question2:
You are working as the senior software developer at ABC Corp. The company is
developing a project on the .NET framework for the client. The project is in the
development stage. The development team is developing the various .NET
components required for the implementation of the project. The development team
is unable to understand how exactly the various tables relate with each other. They
also need to understand the level of indexing required improving the performance
of data operations of the entire application. You are given the responsibility of
explaining the tables, their relationships, and the level of indexes required. Which
key deliverable of the physical design document will you refer while providing the
required information to the development team?
2,Class diagrams
3,Database schema
4,Component specification
Ans: 3
Question 3:
You are leading a software development team of 15 people in ABC Corp. The team is
keeping their updated files in a share located in your machine. You have given share
permission only to this group of people. But one day you found that some of team
members are complaining that their files are modified. You check the log file and
found that no unauthorized user has accessed the share. You doubted that someone
from your team might have changed the files. What type of user has ede it?
1,Masquerader
3,Misfeasor
Ans: 3
Question 4:
You are working as a leader of the project team at ABC Corp. You are developing a
Web-based application that requires various .NET applications to be integrated by
sharing sensitive items, which rarely change. The application has to run on the Web
server. Various users are expected to run the application simultaneously; therefore
more than one sessions of the application are expected to run at a time. All the
sessions of the application on the Web server require sharing the session specific
data. Which technique would you use to develop the application?
1,Use cache objects to store the data, which is to be shared and is changed rarely
within a session.
2,Use cookies to store the data, which is to be shared and is changed rarely within a
session.
3,Use page fragment cache to store the data, which is to be shared and is changed
rarely within a session.
4,Use page output cache to store the data, which is to be shared and is changed
rarely within a session.
Ans: 1
Question 5:
You are working as the senior software developer at ABC Corp. The company is
developing a project on the .NET framework for the client. The project is in the
development stage. The development team is developing the various objects and
classes required in the software. The development team is unable to understand the
exact hierarchy of the classes and the parent-child relationship between various
classes. You are given the responsibility of explaining the exact structure of the
various classes and the type of relationship between them. Which key deliverable of
the physical design document will you refer while providing the required information
to the development team?
2,Class diagrams
3,Database schema
4,Programming model
Ans: 2
Questino 6:
You are assigned to identify the several security treats for an application developed
in your company. You wanted to implement the STRIDE model. You have identified
the following threats:
- A malicious user can perform unauthorized changes in the data stored in the
database.
- A user can intrude a system without being traced if a system lacks the ability to
trace the prohibited operations.
- An attacker is able to read the data that is transmitted from one computer to
another.
- A malicious attacker can make the services of an application running on the server
unavailable to clients.
Ans: 1
Quesiton 7:
You are working as a leader of the project team at ABC Corp. You are developing a
Web-based application that will provide online help to all the clients of the company
about the current products and the forthcoming products in the market. The
managing director wants you to give a competitive advantage to the application
over the similar applications developed by their competitors.
1,Use cache objects to allow the application to store the personal settings of a user
at the client side.
2,Use cookies to store the personal settings of a user at the client side.
3,Use page fragment cache to store the personal settings of a user at the client
side.
4,Use page output cache to store the personal settings of a user at the client side.
Ans: 2
Question 8:
You are working as the leader of the project team at ABC Corp. The company is
developing a project on the .NET framework for the client. The project is in the
design stage. The designing of the software includes identifying the required
functions and their calling sequence. You are given the responsibility to explain the
functions required in the software and exactly how the functions interact with each
other. Which key deliverable of the physical design document will you refer while
providing the required information to the project team?
3,Component specifications
4,Programming model
Ans: 1
Question 9:
You are assigned to identify the several security treats for an application developed
in your company. You wanted to implement the STRIDE model. You have identified
the following threats:
- A malicious user can perform unauthorized changes in the data stored in the
database.
- A user can intrude a system without being traced if a system lacks the ability to
trace the prohibited operations.
- A malicious attacker can make the services of an application running on the server
unavailable to clients.
What types of mitigation techniques you have identified to stop the following treats?
Ans: 1
Quesiton 10:
You are working as a leader of the project team at ABC Corp. You are developing a
Web-based application that will provide online help about the current and
forthcoming products in the market to the clients of the company. Various pages of
the online Web-based application are slightly different from each other. Therefore,
when a user navigates from one page to the other only some of the information on
the screen is changed. The unchanged information is the help topic names that are
retrieved from the product database. Which technique would you use to develop the
application?
1,Use cache objects to allow the application to store the personal settings of a user
at the client-side.
3,Use page fragment cache to store the personal settings of a user at the client
side.
4,Use page output cache to store the personal settings of a user at the client side.
Ans: 3
Quesiton 11:
The software programmers inform Jane about the ambiguity in the attributes of the
conceptual design, during the coding phase. The software development process
cannot proceed further because of ambiguities in the development process. Jane
observes the conceptual design and notices duplicity of data, which leads to a
difficulty in understanding the design. What is the most effective way to resolve the
problem and ensure that it does not occur in the near future?
1,Ask the team members to create a model of the application software using Entity-
Relationship (ER) model and use this model for future reference.
2,Ask the team members to create a model of the application software using Object-
Oriented (OO) model and use this model for future reference.
3,Ask the team members to create a model of the application software using Object
Role Modeling (ORM) and use this model for future reference.
4,Ask the team members to create a model the application software using the
Hierarchical model and use this model for further reference.
Ans 3
Question 12:
- The static data retrieved for a user should be stored in the memory.
Ans 4
Question 13:
You are working as a leader of the project team at ABC Corp. You are developing a
Web based application will provide online help to all the clients of the company
about the current products and the fore coming products in the market. The online
application consists of certain Web pages that are expected to be visited more
frequently by most of the users than other pages. Which technique would you use
for the commonly visited Web pages?
1,Use cache objects to allow the application to store the personal settings of a user
at the client-side.
2,Use cookies to store the personal settings of a user at the client side.
3,Use page fragment cache to store the personal settings of a user at the client
side.
4,Use page output cache to store the personal settings of a user at the client side.
Ans: 4
Quesiton 14:
XYZ Com has undertaken a project to develop application software for the
meteorological department. The meteorological department requires this
application software to predict the seismic activities taking place in different parts
of the country. 1,000 sensors are deployed in various parts of the country to gather
information about the various seismic activities. The sensors send the data to the
head office where it is stored in a database. The data collected in the database
needs to be used to create a three dimensional view of seismic activities taking
place in the country. The required application software is used to gather, store and
manipulate the required information.
The design phase of the software is complete and the coding of the software needs
to be initiated. Developers of the development team complain about the complexity
of the problem and inform their team leader that the developed design does not
match with the exact problem. What is the most effective way to resolve the above
problem?
Ans: 2
Question 15:
You are developing a secure application in the .NET framework. You are creating an
application that will describe the role of an end user in the login module of the
application. The other modules of the application can use the login module to
authenticate end users. Which class file will you use?
1,WindowsPrincipal class
2,GenericPrincipal class
Ans: 2
Quesiton 16:
Mary is a Web designer in XYZ Com . She is assigned to create a Web site that
contains 50 pages. The basic layout of the Web page, such as the header and
footer, is same for all the Web pages. How will Catherine create 50 Web pages in
Dreamweaver MX 2004?
1,Using frames
2,Using a template
4,Using layers
Ans: 2
Question 17:
David needs to create an online music mart Web site using Dreamweaver MX 2004.
The site should provide a preview of each song listed in the Web site. While creating
the site, David realizes that linking sound to most of the pages in the Web site, is
resulting in more download time for each Web page. Which of the following methods
can David implement to overcome the file download time problem?
Ans: 2
Question 18:
David is a Web designer in XYZ Com . He is creating a Web site using Dreamweaver
MX 2004. All the pages of the Web site will contain the logo of the company.
However, the logo of the company is not fixed and can be modified later. What
method will you suggest to Mark in such a scenario?
1,Use layers
Ans: 4
Question 19:
3,Use two frames, one containing the links and other displaying the content of the
various pages of the Web site
Ans: 3
Question 20:
StockLevelInfo takes a stock symbol as input and returns information about that
stock. David wants to capture all incoming SOAP messages in RetrieveStockInfo ()
method and write the messages to a file for future processing.
Ans: 2
Question 21:
David is creating an XML Web service named CustomerInfo that provides customer
information. David writes code to keep track of error messages, warning messages,
and informational messages while the service is running. David uses the Trace class
to write the messages to a log file.
On testing the Web service, David wants to see error messages and warning
messages. On the deployment of the Web service, David wants to see error
messages, but not warning messages. Which code segment should David use?
Ans 1
Question 22:
The calls to the ReChargeCard method take one minute to get completed. David
does not want the users to wait while ReChargeCard method executes. David wants
users to be taken automatically to the next Web page of the application.
Ans: 3
Quesiton 23:
2,In the Web.config file, set the HRef property of the wsdlHelpGenerator element to
bin\PropertyServicedescription.aspx.
4,In the Web.config file, enable tracing and the set TraceMode attribute to
bin\PropertyServicedescription.aspx
Ans: 2
Question 24:
David creates an XML Web service that provides stock information to the customers
of an on-line bookstore. David is implementing tracing because the service is not
giving the desired result as well as David needs to redirect the trace output to the
event log. Which of the following code should David use?
1,If (HttpContext.Trace.IsEnabled==True)
2,if (Http.Current.Trace.IsEnabled==True)
3,if (HttpContext.Current.Trace.IsEnabled==False)
4,if (HttpContext.Current.Trace.IsEnabled==True)
Ans: 4
Question 25:
David has created serviced components and he want to use COM+ roles for
securing these components. He is creating an assembly, which contains these roles.
What code snippet should he add to the project source code for ensuring that the
role-based security is implemented in assembly?
3,[assembly: ApplicationActivation(ActivationOption.Server)]
4,[assembly: ApplicationAccessControl(AccessChecksLevel =
AccessChecksLevelOption.ApplicationComponent)]
Ans: 1
Qeustion 26:
1,For the BankAppManagers group, add the SecurityRole attribute to the BankData
class.
3,Component Services tool can be used for adding a new role named
BankAppManagers.
4,Component Services tool can be used for adding the BankAppManagers group to
the existing Manager role.
Ans: 4
Question 27:
David is creating a serviced component named UserInfo for adding the details of
user accounts to transactional data sources. The UserInfo class contains the
following code for adding the new user as follows:
[Transaction(TransactionOption.Required)] [SecurityRole(“Admin”)]
Which of the following statement is correct for ensuring that AddUser method is
either saving all the information correctly or it is not at all saving any information?
1,Add the following attribute to the AddUser() method:
[AutoComplete()]
Ans: 1
Quesiton 28:
{Transaction(TransactionOption.Required)
{Transaction(TransactionOption.Required New)
{
//specify code here
{Transaction(TransactionOption.Supported)
}ContextUtil.EnableCommit();
{Transaction(TransactionOption.Not Supported)
Ans: 1
Question 29:
Ans: 1
Question 30:
if (a<b){
c=a+b;}
else{
c=a-b;}
return c;
x=Calc(5, 15);
Total=(5+x*10)/5;
trace(Total);
1,41
2,50
3,-10
4, 40
Ans; 4
Question 31:
David wants to create an SWF movie displaying a moving car. In addition, he wants
to embed the movie in a Web page titled as Moving Car. David is using a Web
browser that does not have the Flash plug-in installed. What sequence of steps
should smith follow to create and display a movie in a Web browser without Flash
plug-ins?
1,A, B, C
2,A, C, B
3,B, C, A
4,C, A, B
Ans: 2
Question 32:
You are the business requirement analyst at ABC Corp. The company develops
enterprise resource management software products for the client companies. AB
Corp is a client of Red Sky that has employee strength of 1000. You are asked by
your company to exactly gather information about business processes taking place
in AB Corp. This information is required for developing ERP software, which can fulfill
the AB Corp's requirements. To gather the required information, you need to
observe the responsibilities and type of job ede by each role in AB Corp. In addition,
it is necessary to understand the basis and consequences of the work performed by
different roles in AB Crop. Which is the best option to gather the precise required
information?
1,You will conduct a meeting with target employees and ask a variety of questions
using the interviewing technique.
2,You will ask an expert of the profession to prepare some questions, which can be
helpful in analyzing the requirements using the surveying technique.
3,You will keep a track of employees in AB Corp and gather information using the
shadowing technique.
Ans: 3
Quesiton 34:
You are the senior software developer at ABC Corp. Your team develops software for
the customer of the company. The software is deployed at the customer’s site. The
client informs you that the employees using the software are facing some problems
in understanding the user interface of the software. They also need to know the
details about the synchronization among the systems of the software. Which
document will you recommend to the client to refer to get the desired details?
1,Functional specification
2,Interface
3,Requirement
4,Scope
Ans: 1
Quesiton 35:
Analyze the scenario and determine the current development stage of the project.
3,Validating technology.
Ans: 3
Questio 36:
You are the senior leader of the project team at ABC Corp. You need to develop an
application that processes daily sales reports submitted to the sales manager of the
company by the salespersons. Salespersons submit their reports in the form of a
table containing the customer and product details. The format in which the data is
stored in the database is different from that in which the salespersons submit the
report. The database contains table consisting of composite fields. As a leader of
the project team, what should you do so that the data from the reports of
salespersons is stored in the database tables?
1,Normalize the tables in the salespersons reports to the first normal form.
2,Normalize the tables in the salespersons reports to the second normal form.
3,Normalize the tables in the salespersons reports to the third normal form.
4,Normalize the tables in the salespersons reports to the fourth normal form.
Ans: 1
Question 37:
You are working as the senior software developer at ABC Corp. The company is
developing a project on the .NET framework for the client. The project is in the
development stage. The development team is not able to understand the level of
security to be provided in the product. They are also not able to understand the
exact authentication mechanism required to be implemented. You are given the
responsibility to explain the exact authentication mechanism and the required level
of security. Which key deliverable of the physical design document will you refer
while providing the required information to the development team?
3,Component specifications
4,Programming model
Ans: 4
Question 38:
You are the business process analyst at ABC Corp. The company is suffering with
reduced production and sales since two months. You are asked by the company
management to find the cause of the retardation in production. You need to gather
information to find the cause of decreased production and this information will be
helpful to device a solution for the loss in production. You decide to understand all
the activities taking place during production. In addition you also decide to identify
the role of an activity in the production as a whole. You think that the employees
can provide the required information about loss in production. Which method will be
most suitable to obtain the information?
Ans: 1
Question 39:
You are the senior software developer at ABC Corp. Your team has developed
software for a customer. The software is deployed at the customer site. After
deployment, the customer informs you that they are unable to connect to the
database using the user interface of the software. The software is raising some
errors and they want to troubleshoot the problem. They ask you to recommend the
right document, which can be helpful to solve the problem. Which document will
you recommend to the client to refer to get the details required to troubleshoot the
problem?
2,Interface document
3,Requirement document
4,Support document
Ans: 4
Question 40:
David a senior developer with ABC Corp has developed an application using VB .NET
for the successful management of the information system in the organization. The
requirement analysis phase is complete and according to the specifications of the
application,
David has to develop the Master Project Plan and delegate roles to the team
members for the execution of the application. The Master Project Plan should
encompass the roles, tools, methodologies, sequence of events, and test methods
to synchronize the effort of the development team. Which is the topic under which
the above task is accomplished successfully?
Ans: 2
Quesiotn 41:
You are working as the senior software developer at ABC Corp. The company is
developing a project on the .NET framework for the client. The logical design of the
project is already prepared. The leader of the project team assigns you the task of
developing the physical design of the project. You need to prepare such a physical
design of the project that can be directly implemented to develop the project in the
development phase. What are the various key activities that you would perform to
prepare the physical design of the project?
1,The various key activities that need to be performed, to prepare a physical model
of the project are:
- Identifying component interfaces and business services, and validating the logical
design.
2,The various key activities that need to be performed, to prepare a physical model
of the project are;
- Identifying component interfaces and business services, and validating the logical
design.
3,The various key activities that need to be performed, to prepare a physical model
of the project are;
4,The various key activities that need to be performed, to prepare a physical model
of the project are;
- Identifying component interfaces and business services, and validating the logical
design.
Ans: 1
Quesiton 43:
You are the business process analyst at ABC Corp. The company provides business
solutions to the client companies developing custom software for the clients. AB
Corp is a client of your company, which is involved in the medical research field. AB
Corp decides to purchase software from your company to expedite its research
projects. To identify AB Corp's needs, you decide to gather the relevant information
using the Interviewing technique. What reasons will you suggest for choosing
Interviewing technique to gather information?
3,It enables you to gather information about activities that take a long span of time
months, or years.
Ans: 3:
Question 44:
You are the senior software developer at ABC Corp. Your team has developed
software for the client of the company. The software is deployed at the client site.
After deployment, the client informs you that the users of the software want to know
about the details of various types of services that are provided by the software.
Which document will you recommend to the client to refer to get the desired
details?
2,Interface document
3,Requirement document
4,Scope document
Ans: 4
Quesiton 45
David needs to verify and validate the final product that will be obtained after client
fixes have been incorporated. He is required to configure the infrastructure
components, such as hardware, automation tools for deployment, server settings
and determine the bottlenecks that disrupt the functioning of the system. How will
you perform the required task?
4,Validating technology
Ans: 3
Question 46:
You are the database administrator at ABC Corp. The employee table consists of a
key field, empID and three non-key fields, name, post, and pay_scale. The non-key
field, pay_scale is functionally dependent on another non-key field, post. Many
applications that use the database tables require all the tables to be in the
normalized form to give correct results and avoid any inconsistencies in the
database. As a database administrator, what should you do to ensure that the
applications using the database tables run properly and the database remains
consistent?
1,Normalize the tables in the salespersons reports to the first normal form.
2,Normalize the tables in the salespersons reports to the second normal form.
3,Normalize the tables in the salespersons reports to the third normal form.
4,Normalize the tables in the salespersons reports to the fourth normal form.
Ans: 3
Question 47
You are the leader of the project team at ABC Corp. You are leading a project to be
developed for the client of your company. The project is in the deployment stage.
The client informs you that the requirements of the project have changed a bit. The
infrastructure of the internal network of the company has changed and therefore,
the deployment strategy has to be changed. Now you need to send a team to the
client site to discuss the deployment plan again. Which teams will you choose to
accomplish the task?
Ans: 1
Quesiton 48:
You are the software requirement analyst at XYZ Com The company develops
software for client organization. Last two software projects developed by the
company suffered time and cost overrun. You are asked to analyze this problem and
provide appropriate solution so that the problem does not recur in future projects.
You decide to analyze organization structure to find the solution of the problem.
How analyzing organization structure helpful in solving the problem?
1,Obtaining the information about the effectiveness of the organization and the
activities present that need to be modified for providing solution.
Ans: 2
Question 49:
You are the senior software engineer at ABC Corp. You develop software for a
financial firm and the software is successfully deployed at the client site. Employees
using the software in the financial firm complain that the software does not function
correctly during peak usage hours. You are asked to debug the error. You debug the
error successfully. Which is the main activity that you will perform to ensure that the
modification does not cause any undesired effect on the software.
4,Performing User Acceptance testing on the software after fixing the bugs.
Ans: 2
Quesitn 50:
You are working as the senior software developer at ABC Corp. The company is
developing a project on the .NET framework for the client. The logical design of the
project is already prepared. The leader of the project team assigns you the task of
developing the physical design of the project. You need to prepare a list of
deliverables, which could be used later as the guidelines in the development phase.
What information will you include in the list of deliverables of the physical design?
Database schema
Class diagrams
Programming model
Database schema
Component specifications
3,The deliverables of the physical design process should include:
Database schema
Component specifications
Programming model
Database schema
Ans: 1
Quesiton 51:
You are the leader of the project team at ABC Corp. You are leading a project to be
developed for the client of your company. The project is in the design phase. The
requirements of the client are specified. These requirements need to be specified in
terms of the functional requirements before they can be developed. Which teams
will play the most part in accomplishing the task?
Ans: 2
Question 52:
You are the business process analyst at ABC Corp. You are asked by the leader of
the project team to analyze the business requirements of the organization. These
requirements need to be analyzed for developing a management information
system using .NET. You prepare a detailed report about the features of the current
system that is being currently used in the organization. What is the main purpose of
creating such a detailed report?
1,You want to identify various services provided by the current system to satisfy one
or more requirements of the system user.
2,You want to verify if the desired functions in the application are relevant to the
present and future business needs.
3,You want to identify the activities that are affecting the project development, but
are not a part of the project development process.
4,You want to identify the internal activities that affect the development of the
projects.
Ans: 1
Question 53:
You are the member of the testing team of a project at Blue Moon Corp developing
software application for an e-commerce company. The software application is being
developed using .NET platform. The development team is developing the
components for the software application. The different components need to be
integrated at a later stage of software application development phase. As a member
of the testing teams you need to ensure that the final product has lesser bugs. The
software also needs to be delivered in a short duration. The time allocated for final
testing of the software application is very less. Which will be the best option within
the given constraints to meet the requirements of the project?
1,You will perform Unit testing to test the components of the software in early stage.
2,You will perform Regression testing to test the working of the software after fixing
the bugs.
3,You will perform Integration testing to verify the correctness of the application
formed by integrating the components.
4,You will perform System testing to test the behavior of the entire software system
after development.
Ans: 1
Question 55:
You are working as the senior software developer at ABC Corp. The company is
developing a project on the .NET framework for the client. The project is in the
development stage. The development team is not able to understand the exact
calling sequence of the functions defined in the project. You are given the
responsibility to explain the exact calling sequence of the functions. Which key
deliverable of the physical design document will you refer while providing the
required information to the development team?
3,Component specifications
4,Programming model
Ans; 1
Question 56:
David, a Web designer in ABC Corp. is designing the Web site for the company. The
company wants that the primary navigation links in the Web site should be visible
even when incomplete page is downloaded. Where should David place the primary
navigation links in the Web pages?
Ans: 3
Queston 57:
While creating a Web site, David wants to consider the various factors affecting the
user’s memory. Which of the following factors should David consider:
A: The number of options for a choice should be limited between 5 to 9 for better
recognition.
B: Pages that contain information should be visually different from the normal
pages.
D: Color and style for visited and unvisited links should be different.
1,A, B, and E
2,B, C, and D
3,B, C, and E
Ans: 4
Question 58:
David is designing a home page for a Web site? Which of the following factors he
should consider for the home page:
A. It should be small in size so that it does not take long time to load.
B. It should be attractive.
D. It should be informative.
1,A, C, F and G
2,A, B, D and F
3,A, D, E and G
4,A, B, D and E
Ans: 4
Question 59:
David is planning for a navigation model for his company’s Web site. The
navigational model will contain a shallow hierarchy of Web pages where the result
pages can be accessed after three to four clicks. Which type of navigational model
he is planning for?
Ans: 2
Qeustion 60:
ABC Com. is an Electronics company that has sales offices all over the world. The
company has databases of different sizes for Intranet applications and data
warehousing applications. The information provided by the databases is crucial and
need high level of security. Which of the following DBMS should the organization use
to create the database?
1,dBase
2,SQL Server
3,FoxBase
4,MS Access
Ans: 2
Question 61:
Statement A: The Codebase attribute of the <APPLET> tag specifies the directory
where the specified applet class in the <APPLET> tag is stored.
Statement D: To run a Java applet, Java Virtual Machine (JVM) is not need.
Ans: 3
Question 62:
David has created an XML Web service. He used the Debug.Assert() method in his
code to verify parameter values and ranges. David found that the XML Web Service
did not display assertion failure messages. Instead, the service returned an HTTP
500 error message when an assertion failed. David wants to view the assertion
failure messages. What should he do?
1,Modify the Web.config file to stop the Debug.Assert() method from displaying a
message box.
2,Modify the compilation element of the Web.config file by setting the debug
attribute to “true”.
3,Set the Debug.AutoFlush property to “false” in the constructor for XML Web
service.
Ans: 2
Question 63:
David is creating an XML Web service named Service1 that processes stock
transactions. David wants to enable the ASPX debugging as well as David has to
display custom messages to the users that are not currently running on the local
Web server. Which of the following code David should use for this purpose?
1,
<compilation
defaultLanguage="c#"
debug="true"
/>
<customErrors
mode="off" >
</customErrors>
2,
<trace
enabled="false"
requestLimit="10"
pageOutput="false"
traceMode="SortByTime"
localOnly="true"
/>
<customErrors
mode="RemoteOnly" >
</customErrors>
3,
<compilation
defaultLanguage="c#"
debug="true"
pageoutput=”True”
localOnly=”False”
/>
<customErrors
mode="on" >
</customErrors>
4,
<compilation
defaultLanguage="c#"
debug="true"
/>
<customErrors
mode="RemoteOnly" >
</customErrors>
Ans: 4
Queston 64:
David is a .NET developer in SimpleSolutions Inc. He has created an XML Web
service for converting Dollars into Euros. David is also creating a consumer that will
consume that XML Web service. Which of the following step David will use to create
a proxy class?
1,Right-click Service1.asmx and then select the View Code command and write code
for the proxy class.
2,Right-click References in the Solution Explorer pane and select the Add Web
Reference command, provide the XML Web service location URL and click the Add
Reference button.
3,Open the Web.config file and then insert code for the proxy class.
4,Right-click Service1.asmx and select the Add Web Reference command, the proxy
class is automatically generated.
Ans; 2
Question 65
Questied has created an XML Web service named Service1. This XML Web service
exposes a Web method named MyWebMethod(). David needs to register Service1 in
the UDDI. For this, he adds a new business name and a new tModel in UDDI.
Which URL should David use to provide a valid access point to Service1?
1,http://Srv/AppPath/Service1
2,http://Srv/AppPath/Service1=wsdl
3,http://Srv/AppPath/Service1.asmx
4,http://Srv/AppPath/Service1.asmx?MyWebMethod
Ans: 3
Question 66:
David is creating an XML Web service named IntServ that contains a method named
Update(), for updating the status of the production work. David needs to publish
the Web service in the UDDI registry. If any user wants to consume that Web service
it is required to find the service provider. If the Service provider is SimpleSolution
Inc, which of the following code David should use for searching the service provider?
1,
<body>
</ find_business>
</body>
</Envelope>
2,
<Envelope xmlns="http://schemas.xmlsoap.org/soap/envelope/">
<body>
</ find_business>
</body>
</Envelope>
3,
<Envelope xmlsn="http://schemas.xmlsoap.org/soap/envelope/">
<body>
</ find_business>
</body>
</Envelope>
4,
<Envelope xmlns="http://schemas.xmlsoap.org/soap/envelope/">
<body>
</ find_business>
</body>
</Envelope>
Ans: 4
Question 67:
Ans: 1
Queston 68:
David has a strongly typed DataSet object named DataSet. This object contains
three DataTable objects named Clients, Orders and OrdDetails.
Cients and Orders have a data column named ClientsID. Orders and OrdDetails have
a data column named OrdID. Orders have a foreign key constraint between Clients
and Orders on ClientsID.
OrdDetails has a foreign key constraint between Orders and OrdDetails on OrdID.
David wants to populate Clients, Orders and OrdDetails with the data from Microsoft
SQL Server database.
Ans: 3
Question 69:
David is developer in ABC Com.. David is creating a Windows service and needs to
implement the Start, Stop, Pause, and Continue events in his service. What should
he do?
2,Create a Windows service application, after that create a method that calls the
ServiceController.ExecuteCommand() method, and then override the
OnCustomCommand() method.
3,Create a Windows service application, after that run the custom command method
that is created from the ServiceController class.
Ans: 2
Question 70:
David has created a Windows service that processes XML messages placed in a
MSMQ queue. David discovers that the Windows service is not functioning properly.
He needs to debug the service to correct the program. What should David do?
1,David should start the Windows service and then attach a debugger to the
process
2,David should start the Windows service and then run the .NET Services Installation
tool (Regsvcs.exe).
3,David should place a breakpoint in the Main() method of the Windows service and
then run the application within the VS.NET IDE
4,David should attach a debugger to the Windows service and then start the
Windows service.
Ans: 1
Queston 71:
David has created a .NET Remoting object, SalesInfo for storing the sales
information. A method, SalesDet is defined for saving the details of the sales. The
component is configured using the Integrated Windows authentication to
authenticate the clients. David wants to ensure that all the users of the method
SalesDet, should belong to User1 group before accessing the method. Which of the
following option is suitable for solving his problem?
Ans: 1
question 72:
2,SecurityCallContext sc=SecurityCallContext.CurrentCall;
3,SecurityIdentity sc=SecurityIdentity.CurrentCall;
4,SecurityIdentity sc=SecurityIdentity.OriginalCaller;
ans: 2
question 73:
1, [Transaction(TransactionOption.Requied)]
2, [Transaction(TransactionOption.NotSupported)]
3, [Transaction(TransactionOption.Supported)]
4, [Transaction(TransactionOption.RequiesNew)]
Ans: 2
Question 74:
1,Tag editors
2,Tag Insight
3,Tag Completion
4,Function Insight
Ans: 1
Question 75:
David is a Web designer in ABC Com. He is assigned a work of creating a Web site
containing general information, such as company profile, projects, job opportunities,
contact addresses in the Web site. In addition, he is also assigned the job of creating
a report displaying number of visitors and the Web browser used by them to access
the Web site. Which of the following type of Web report in FrontPage 2002 he should
create to display the desired information?
Ans; 4
Queston 76:
You are the project manager at ABC Com. You use waterfall model for software
development process. In which phase of the waterfall model should you identify the
problem perceived and the feasibility of solving it?
1,Initiation
2,Analysis
3,Conception
4,Design
Ans; 3
Queston 77:
Ans: 2
Question 80:
David is the system analyst at ABC Com. He uses waterfall model for software
development process. In which phase of the waterfall model should David identify
all the user requirements and perform cost/benefit analysis?
1,Design
2,Analysis
3,Conception
4,Initiation
Ans: 4
Quesiton 81:
Statement A: The risk assessment document identifies and analyzes the risks
associated with the project at the initial level.
Statement B: The project structure document focuses on the project team structure.
Question 82:
Statement B: Use case explains the series of steps taken by the system users and
the response of the system to achieve the business objective
Ans: 2
Question 83:
1,Conception
2,Analysis
3,Design
4,Initiation
Ans; 3
Question 84:
Ans: 2
Question 85:
You are the system administrator at ABC Corp. The database containing employee
information is stored on the hard disk of the main server. You need to backup this
database on secondary storage device. Which key data requirements will you
analyze to design the data archiving strategy?
3,Database Schema
Ans: 4
Question 86:
Ans: 2
Question 87:
You are the system analyst at XYZ Com. You use spiral model for the software
development process. In which phase of the spiral model should you understand the
system requirements by interacting with the customer?
1,Planning
2,Risk analysis
3,Customer evaluation
4,Customer communication
Ans: 4
Question 88:
How does the differential backup method helps in taking the backup of files?
1,Copies all the files and clear the data archive to mark them as baked up.
2,Copies only those files, which are new or changed since last incremental or full
back up, and does not mark the files as backed up.
3,Creates the Backup of only those files, which are changed or new since the last
incremental or full back up
4,Restores the data by combining the previous full backup and the recent
incremental backup.
Ans: 2
Quesiton 89:
Consider the following statements:
Statement A: A mask is one or more objects that are grouped in a special way.
Ans: 2
Question 90:
Ans: 2
Quesiton 91:
Statement A: You can select linear site organizational model as a base for
navigation system if the proposed Web site provides information in a linear manner.
Statement B: You can modify the linear model into five model prototypes to provide
a certain level of flexibility.
Which of the following is correct, with respect to the above statements?
Ans: 3
Queston 91:
onClipEvent (load)
stop ();
Statement B: The code stops the movie clip to be played automatically when it is
loaded.
Ans: 4
Quesiton 92:
Statement A: A green progress bar in the Bandwidth Profiler indicates how many
frames of your movie have been downloaded.
Statement B: A green progress bar in the Bandwidth Profiler indicates how many
frames of your movie are remaining.
Asn: 3
Question 93:
Ans: 3
Question 94:
Statement A: The Faucet Modifier for the Eraser tool is used to erase the entire
stroke or Fill.
Statement B: The Eraser Mode Modifier for the Eraser tool is used to select a shape
and size of Eraser from the Eraser Shape drop-down list.
Statement C: The Eraser Shape Modifier provides you the options for erasing.
2,Statement B is true.
Ans: 1
Question 95:
1,WindowsIdentity
2,GenericIdentity
3,FormsIdentity
4,PassportIdentity
Ans: 2
Queston 96:
Statement B: By making your XML Web service secure, you can prevent any
unauthorized client from accessing your XML Web service.
Which of the following options is correct with respect to the preceding statements?
Ans: 1
Question 97:
Ans: 4
Question 98:
Mary is using XMLTextReader class to read information from an XML file. She wants
to check if the current node is an element and moves the reader to the next node.
Which method of XMLTextReader class she can use to solve the preceding problem?
1,Read()
2,ReadAttributeValue()
3,ReadString()
4,ReadStartElement()
Ans: 4
Question 99:
Which of the following option is correct with respect to the preceding statements?
Ans: 2
Question 100:
Ans: 1
Queston 101:
1,Queued Components
2,Object Pooling
3,Automatic Transactions
4,Concurrency
Ans: 2
Queston 102:
Statement A: The 800 x 600 resolution is used in devices such as MSNTV and
WebTV.
Ans;2
Question 102:
Statement A: A discussion forum page enables an end user to post queries and
answer the queries posted by other registered users of the forum.
Statement B: A Legal page enables an end user to contact the Web site
management and submit suggestions and queries.
Ans: 3
Question 104:
Which of the following options is correct with respect to the preceding statements?
Ans: 1
Question 105:
Statement A: Microsoft.UDDI includes base classes and utility classes for the other
namespaces.
Which of the following options is correct with respect to the preceding statements?
Ans: 2
Question 106:
David is creating a Web site for ABC Corp. He wants to create a movie of the
company’s latest production on the company's Web site. The movie is proposed to
contain two scenes. In the first scene the movement of the film title is displayed. In
the second scene, there is a time based increase in the size of the film title.
What will Harrison do to incorporate the above activities in the Web site?
Ans: 1
Quesiton 107:
Which of the following code statement is used identify an overloaded Web method
by providing an alias?
1,[WebMethod(MessageName=”Method Name”)]
2,[WebMethod(Description=”Method Name”)]
3,[WebMethod(TransactionOption = TransactionOption.RequiresNew)]
4,[WebMethod(EnableSession=”True”)]
Ans: 1
Quesiton 107:
Statement A: Windows services are loaded automatically and run in the background
when an operating system starts.
Statement B: You cannot execute Windows services on any computer that has
Windows NT, Windows 2000, and Windows XP installed as an operating system.
Which of the following options is correct with respect to the preceding statements?
Ans: 1
Question 108:
A hacker can hack a Web site by crashing the server, overloading server resources
or network with fake requests. Which of the following methods does this type of
hacking come under?
1,Spoofing
2,Locking a service
3,Network sniffing
4,Breaking Passwords
Ans 2
Question 109:
Which of the following options is correct with respect to the preceding statements?
Ans: 4
Question 110:
1,The cloaking security feature, allows the thread token to be used if a proxy
identity is already set .
2,The cloaking security feature determines the type of client identity that will be
projected on to a server when the server tries to impersonate that particular client.
3,The cloaking security feature determines that a server cannot cover its own
identity and uses the client’s identity.
4,The cloaking security feature determines that a server while acting on behalf of a
client will not be able to enable cloaking.
Ans: 2