Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "70-300" Exam

Analyzing Requirements and Defining Microsoft .Net Solution Architectures

 Question 10.
After the online store is implemented, vendors will use data files instead of tape to deliver product update data. However, each vendor uses a different file format. Input files need to be processed to produce output files in a standard format. Output files will be submitted to the mainframe computer. You need to recommend Microsoft Biz Talk Server for file processing. How can you justify it?

A. It can transform various file formats into one specific file format
B. It has Data and transformation services and the application integration features
C. It integrates well with Microsoft SQL 2000
D. It integrates well with Microsoft Biz Talk Server

Answer: B

Explanation:
Microsoft Biz Talk Server is able to support for various document types. It has Data and transformation services and the application integration features in BizTalk Server can provide businesses with the tools they need to achieve a unified view of data and applications both within the organization and business partners.

Question 11.
The data store you are accessing has a different authentication mechanism than the rest of your application and you have very limited change control over the accounts that can log on to the other system. Which type of account should you use to access Data Access Components?

A. Service Accounts
B. Administrator Accounts
C. Guest Accounts
D. Impersonate Caller

Answer: A

Explanation:
Use service accounts when:

• You connect to the underlying data source from an environment in which impersonation of the initial caller is unavailable (for example, Microsoft BizTalk ® Server).

• You have very limited change control over the accounts that can log on to the other system, for example, when logging on to a relational database management system, which is strictly managed by the database administrator.

• The data store you are accessing has a different authentication mechanism than the rest of your application, for example, when you are logging on to a Web service across the Internet.

Question 12.
What services must your solution offer? (Select all that apply)

A. User services
B. Business services
C. Data services
D. System services

Answer: A, B, C, D

Explanation:
The services that a solution typically provides are:

• User services. User services are units of application logic that provide the user interface in an application. The user services of an application manage the interaction between the application and its users. To design efficient user services, you need a thorough understanding of the users of the application, the tasks that they will perform, and the typical interactions they will have with the application to perform their activities.

• Business services. Business services are units of application logic that enforce business rules in the correct sequence. A business service hides the logic of implementing business rules and transforming data from the user services, other
business services, and data services.

• Data services. Data services are units of application logic that provide the lowest visible level of detail for manipulating data. You use data services to implement business schema on the data store being used by the application. Data services are used to manage all kinds of data—static, structured, and dynamic. You use data services in all scenarios in which a user or business service needs to access or work with data.

• System services. System services are the units of application logic that provide functionality outside the business logic. Common system services include:

Question 13.
You want to reuse the functions in ASP that the company has developed earlier. How can you ensure performance is maximized when compiling? (Select the best) 

A. Use early binding
B. Use late binding
C. Disable ASPCompat
D. Turn On Option Strict and Explicit

Answer: A

Explanation:
Visual Basic 6 does a lot of work under the hood to support casting of objects, and many programmers aren't even aware of it. In Visual Basic 7, this is an area that out of which you can squeeze a lot of performance. When you compile, use early binding. This tells the compiler to insert a Type Coercion is only done when explicitly mentioned. This has two major effects:
• Strange errors become easier to track down.
• Unneeded coercions are eliminated, leading to substantial performance improvements.

Question 14.
What strategies should you use to distribute your components into separate assemblies?
(Select all that apply)

A. Create a separate assembly for each component type
B. Avoid deploying one assembly into multiple locations
C. Avoid deploying one assembly into a single location
D. Consider having more than one assembly per component type
E. Split into more than one assembly when the size is too large

Answer: A, B, D

Explanation:
Many factors affect how you distribute your components into separate assemblies. The following recommendations will help you make the appropriate choices for your application size, team composition and distribution, and management processes:

•Create a separate assembly for each component type. Using separate assemblies for data access components, business components, service interfaces, business entities, and so on gives
you basic flexibility for deployment and maintenance of the application.

•Avoid deploying one assembly into multiple locations. Deploying the same components in multiple places increases the complexity of your deployment and management processes, so carefully consider whether you can consolidate all deployments into one physical tier, or whether you should use more than one assembly for a particular component type.

•Consider having more than one assembly per component type. Not all components of the same type follow the same development and maintenance cycles. For example, you may have multiple service agent components abstracting service calls for multiple business partners. In this case, it may be better to create one assembly per business partner to simplify versioning. Consider the following factors when deciding whether to use more than one assembly per component type:.

Question 15.
You realize data access is rather slow. You want to remove any optional commands. The code is shown below: public DataSet SelectSqlSrvRows(DataSet dataset,string connection,string query){ SqlConnection conn = new SqlConnection(connection); SqlDataAdapter adapter = new SqlDataAdapter(); adapter.SelectCommand = new SqlCommand(query, conn); adapter.MissingSchemaAction = MissingSchemaAction.AddWithKey; adapter.Fill(dataset); return dataset; }
How can you optimize this data access code? (Select the best)

A. Do not set MissingSchemaAction.Add with key
B. Use a stored procedure to replace the code
C. Use a trigger to replace the code
D. Use OLEDB classes

Answer: A


Explanation:
When filling a dataset with the data adapter, it is best not to get primary key information if you do not have to.

Question 16.
You need to optimize data access. Which strategy should you use? (Select the best)

A. Pick data reader over data set when you can
B. Use more triggers
C. Perform more data validation
D. Use more constraints on data defined in the database

Answer: A

Explanation:
Use a data reader whenever when you don't need to keep the data lying around. This allows a fast read of the data, which can be cached if the user desires.

Question 17.
You need to guarantee in which orders Finalize methods are called. What should you do? (Select the best).

A. Implement destructors
B. Develop finalize methods
C. Implement constructors
D. Implement Dispose method. We cannot guarantee in which orders Finalize methods are 
    called.

Answer: D

Explanation:
We should use Dispose methods to deallocate resources

Question 18.
You intend to create your own memory allocator. What practices should you consider?
(Select the best)

A. Allocate all of the memory to be used with a given data structure at the same time.
B. Remove all allocations that can be avoided with little penalty in complexity.
C. Minimize the number of times object pointers get written
D. Increase the density of pointers in your data structures.
E. Make limited use the IDisposable interface

Answer: A, B, C

Explanation:
To get the best out of the allocator you should consider practices such as the following:
• Allocate all of the memory (or as much as possible) to be used with a given data structure at the same time.

• Remove temporary allocations that can be avoided with little penalty in complexity.

• Minimize the number of times object pointers get written, especially those writes made to older objects.

• Reduce the density of pointers in your data structures.

• Make limited use of finalizers, and then only on "leaf" objects, as much as possible.
Break objects if necessary to help with this.

Question 19.
You need to find the best way to increase performance while performing garbage collection. What approach should you use? (Select the best)

E. Implement destructors
F. Develop finalize methods
G. Implement IDisposable interface
H. Implement constructors

Answer: C

Explanation:
In many cases it is possible for objects that would otherwise always need to be finalized to avoid that cost by implementing the IDisposable interface. This interface provides an alternative method for reclaiming resources whose lifetime is well known to the programmer, and that actually happens quite a bit.

Question 20.
You need to customize policy for use with Enterprise Templates. From which template files can you customize your own policy files? (Select the best)

A. .etp files provided
B. Net Reflections template
C. DAP.tdl and VSIDE.tdl
D. Secsvr.inf

Answer: C

Explanation:
The two policy files that ship with Visual Studio .NET, DAP.tdl and VSIDE.tdl, can be used as a starting point for a custom policy file. These files are general because the policy requirements of specific applications vary widely. For use in a specific application, you must create a customized copy that defines the rules you want your policy to implement.

Question 21.
You are using an Enterprise Template to help you to update the class and namespace names at project creation time. You also need to be able to provide additional flexibility in what you can add to the initial project structure.
What should you use? (Select the best)

A. Use .etp with static prototypes
B. Use Custom Project Wizard
C. Use .etp with subproject wizrds
D. Use .Net Reflections

Answer: C


Explanation:
Etp with sub project wizards allows you to update the class and namespace names at project creation time. It also provides additional flexibility in what you can add to the initial project structure.

Question 22.
You need a way to programmatically execute solution and project builds. You also need to perform these common tasks: 
• Build a solution by calling the Build method of the Solution Build object.
• Build a particular project within a solution by calling the Build Project method.
• Initiate a debug build of the solution by calling the Debug method.
• Deploy certain projects in a solution by calling the Deploy method.
• Execute the designated Start Project by calling the Run method
• What should you do? (Select the best)

A. Use the Visual Studio .NET Automation object
B. Use the Solution Build object
C. Use a custom script
D. Use Enterprise Templates

Answer: B

Explanation:
Using the Visual Studio .NET Automation model, you can programmatically execute solution and project builds. The primary object for doing this is the Solution Build object. Using this object, you can:

• Build a solution by calling the Build method of the Solution Build object.
• Build a particular project within a solution by calling the Build Project method.
• Initiate a debug build of the solution by calling the Debug method.
• Deploy certain projects in a solution by calling the Deploy method.
• Execute the designated Start Project by calling the Run method.

Question 23.
What Features Does a Well-Designed Interface Include? (Select all that apply)

A. Command to report errors or bugs
B. Ease of navigation
C. Controlled navigation
D. Populating default value

Answer: A, B, C, D

Explanation:
• Ease of navigation. Because different users prefer different ways of accessing components on an interface, design the components so they are easily accessible by using the Tab key, the arrow keys, and other keyboard shortcuts, in addition to the mouse. Sometimes, as in the preceding data entry example, faster navigation is more important than guided navigation. When designing keyboard shortcuts into the UI, associate the shortcut keys with the action being performed. For example, if you are creating a shortcut that will fill in default data for a product description, a shortcut such as Ctrl+Alt+D might be more intuitive than Ctrl+Alt+P.

• Controlled navigation. Although it is important for an interface to provide easy navigation, it is also important to maintain the order in which the components can be accessed. For example, in interfaces that are designed for the purpose of data entry and modifications, you might require that the values be entered in a specific order. However, be wary of taking away the user’s feeling of control over the input process.

• One of the key benefits of Windows-based applications is that they typically do not constrain a user to an input sequence, so users have more control. You should also consider adding breadcrumb trail navigation functionality to the interface. This type of navigation shows the path the user has navigated to get to the current position. To see an example of a Web site that uses the breadcrumb trail navigation functionality, see the article The Developing Phase, on MSDN, at http://msdn.microsoft.com/library/en-us/dnsolac/html/m05_develphase1.asp
.
• Populating default value. If the interface includes fields that always take default values, it is better to provide the default values automatically, therefore avoiding the user having to enter anything whenever possible. 

Question 24.
How can you authenticate access to the XML service without requiring input? (Select all that apply)

A. Internet Protocol Security
B. Passport
C. Basic
D. Digest
E. Integrated Windows authentication
F. Certificate Mapping authentication
G. Application specific or custom authentication

Answer: A, B, C, D, E, F, G

Explanation:
The following authentication methods can be easily used and do not require users to input credentials, making them good choices for programmable Web services:
•Basic, Digest, and Integrated Windows authentication
•Certificate Mapping authentication
•Application specific or custom authentication
Potentially, you could also use:
•Internet Protocol Security
•Passport


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for JN0-303 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "JN0-303" Exam

Juniper Networks Certified Internet Specialist (JNCIS-M)

 Question 1.
What is the Draft-Kompella control plane based on?

A. IGP
B. LDP
C. MPLS
D. BGP

Answer: D

Question 2.
A router receives an IPv6 packet which is 2000 bytes in length. The MTU of the outgoing interface is 1500 bytes. 

What action will the router take?

A. fragments the packet
B. forwards the packet
C. drops the packet and sends an ICMP message
D. drops the packet silently

Answer: C

Question 3.
In which two ways can you influence how downstream LSRs treat MPLS traffic? (Choose two.)

A. Use a DSCP rewrite table.
B. Statically assign a CoS value to an RSVP-signaled LSP.
C. Statically assign a CoS value to an LDP-signaled LSP.
D. Use an EXP rewrite table.

Answer: B, D

Question 4.
What is the use of MSDP across multiple PIM domains?

A. It advertises RPs to all downstream routers.
B. It advertises active multicast sources.
C. It prevents multicast routing loops.
D. It scopes multicast traffic.

Answer: B

Question 5.
Which two statements are true when configuring a domain-id ? (Choose two.)

A. The default OSPF domain-id is 127.0.0.1
B. For a layer 3 VPN connecting multiple OSPF domains, configuring a domain-id can help 
    Control LSA translations
C. In most cases, a domain-id must be configured
D. In most cases, you do not need to configure a domain-id

Answer: B, D

Question 6.
Into which protocol are LDP hello messages encapsulated?

A. IP
B. UDP
C. TCP
D. MPLS

Answer: B

Question 7.
Which two forwarding classes have bandwidth assigned when CoS is not explicitly configured in JUNOS software? (Choose two.)

A. Network control (NC)
B. Assured forwarding (AF)
C. Expedited forwarding (EF)
D. Best effort (BE)

Answer: A, D

Question 8.
In JUNOS software, which type of encapsulation is required on a PE router for the CE-facing interface in a Martini-based VPN?

A. ATM
B. CCC
C. Ethernet
D. HDLC

Answer: B

Question 9.
Which routing table stores IPv6 routes?

A. inet.2
B. inet.0
C. inet.v6
D. inet6.0
E. ip-net.0

Answer: D

Question 10.
Which three authentication options does IS-IS support? (Choose three.)

A. unauthenticated
B. MD5
C. Kerberos
D. simple password
E. DES

Answer: A, B, D



Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.