Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "BCP-810" Exam

Developing Applications for the BlackBerry Solution

 Question 1.
Application X must receive push updates from a public server every morning. The application must display a notification to the BlackBerry device user when the new update is received. 

Which two of the following application approaches will support these requirements? (Choose two.)

A. Web application with BlackBerry Internet Service browsing
B. BlackBerry Widget with BlackBerry Internet Service Push APIs
C. BlackBerry Widget with BlackBerry Enterprise Server Push APIs
D. BlackBerry Java application with BlackBerry Internet Service Push APIs
E. BlackBerry Java application with BlackBerry Internet Service browsing

Answer: B, D

Question 2.
Application X must track field service agents, report their locations back to the intranet application server, and push alerts for new jobs during the day. 

Given the scenario, which three of the following components are required for application X to function properly? (Choose three.)

A. BlackBerry Enterprise Server
B. BlackBerry Internet Service
C. A GPS enabled BlackBerry device
D. BlackBerry Internet Service Push APIs
E. BlackBerry Mobile Data System Connection Service

Answer: A, C, E

Question 3.
Which three of the following debugging features are supported in BlackBerry IDEs? (Choose three.)

A. Get a variablevalueGet a variable? value
B. Change a variablevalueChange a variable? value
C. Hot code replacement
D. Arbitrary code execution
E. Creating new types

Answer: A, B, D

Question 4.
A developer wants to distribute an application OTA using the BlackBerry Browser. 

Which application file that provides information about the application needs to be placed on a web server? (Choose one.)

A. JAD
B. ALX
C. COD
D. JAR
E. JDE

Answer: A

Question 5.
What would cause a signed application to become unsigned? (Choose one.)

A. The application is re-compiled
B. The signature expires
C. The application is installed too many times
D. The evoke Key button of the Signature Tool is pressed
E. The JAD and ALX files are deleted

Answer: A

Question 6.
What are two ways to create an application UI that is consistent with the native BlackBerry UI? (Choose two.)

A. Provide context-specific action menus on each page
B. Make use of the banner to present interactive information
C. Inherit default behaviors by using or extending existing UI components
D. Use BlackBerry UI construction tool to build the new UI from an existing template
E. Specify the font for the application screens

Answer: A, C

Question 7.
A BlackBerry device application collects data and needs to merge it with data on a server before pushing out an updated summary page. 

Which of the following collection of tools would be most appropriate for testing this application? (Choose one.)

A. A BlackBerry MDS-CS Simulator and a real BlackBerry device
B. A database server, a proxy, and a real BlackBerry device
C. A BlackBerry ESS Simulator and a real BlackBerry device
D. A web server and a BlackBerry Device Simulator
E. A BlackBerry MDS-CS Simulator and a BlackBerry Device Simulator

Answer: E

Question 8.
Which two of the following simulators should be used to simulate the interaction between a web application on a BlackBerry device and a web server that is behind a corporate firewall? (Choose two.)

A. BlackBerry Firewall Simulator
B. BlackBerry Screen Simulator
C. BlackBerry Device Simulator
D. BlackBerry MDS-CS Simulator
E. BlackBerry ESS Simulator

Answer: C, D

Question 9.
Which method does RIM recommend for managing multiple screen displays within a BlackBerry device application? (Choose one.)

A. Organize the screens into a tabbed panel
B. Push full sized screens to the top of a stack
C. Generate pop-up screens as required
D. Use re-sizable screens that can be collapsed and restored
E. Use a mixture of transparent and opaque screens

Answer: B

Question 10.
Which tool should be used to facilitate application test cases by simulating BlackBerry device user interaction with the BlackBerry Device Simulator? (Choose one.)

A. BlackBerry MDS-CS Simulator
B. Javaloader
C. Controller Command
D. ESS
E. BlackBerry Desktop Manager

Answer: C


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 70-660 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "70-660" Exam

TS: Windows Internals

 Question 1.
You work as the desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. The ABC.com network has a Windows Server 2008 application server named ABC-SR01. ABC.com has entered into partnership with Weyland Industries. Weyland Industries has recently developed an application for their network users, which will be run from ABC-SR01. During the course of the day you receive complaints from the Weyland Industries network users that the application as result of heap corruption. After a brief analysis, you instruct the Weyland Industries network users to enable the full page heap dump when creating a user dump file for troubleshooting. You would like to verify whether the Weyland Industries network users had indeed enabled the full page heap dump when they created the user dump.

Which of the following actions should you take?

A. You should consider making use of the WinDbg !Locks command.
B. You should consider making use of the WinDbg !runaway command.
C. You should consider making use of the WinDbg !gflag command.
D. You should consider making use of the Debub: D (dump file) command.

Answer: C

Explanation:

Question 2.
You work as the desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. The ABC.com network has a Windows Server 2008 application server named ABC-SR01. ABC.com has recently developed an application that uses a service for their network users which will be run from ABC-SR01. While performing daily system maintenance on ABC-SR01 you notice that the CPU is operating at maximum capacity. You have been tasked with determining which service results in the CPU utilization being heavy by performing a process dump of the service.

Which of the following actions should you take?

A. You should consider making use of the System Monitor utility after running the dump.
B. You should consider making use of the Adplus.vbs utility after running the dump.
C. You should consider making use of a Process Viewer utility after running the dump.
D. You should consider making use of the Task Manager utility after running the dump.

Answer: B

Explanation:

Question 3.
You work as the desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the ABC.com network run Windows Server 2008. The ABC.com network contains an application server named ABC-SR01. ABC.com has recently developed an application that makes use of an I/O dispatch routine, which supports buffered I/O. The CIO from ABC.com has asked you to modify the application to make use of a 5-KB I/O request packet (IRP). The CIO from Weyland Industries has also asked you to obtain the kernel address of the 5-KB buffer.

Which of the following statements are true with regard to the kernel address of the 5-KB buffer?

A. The Irp->Overlay.Driver[1] field of the IRP would contain the kernel address of the 5-KB buffer.
B. The Irp->UserBufferContext field of the IRP would contain the kernel address of the 5-KB buffer.
C. The Irp->AssociatedIrp.SystemBuffer field of the IRP would contain the kernel address of the 5-KB buffer.
D. The Irp->Overlay.Context field of the IRP would contain the kernel address of the 5-KB buffer.

Answer: C

Explanation:

Question 4.
You work as the desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the ABC.com network run Windows Server 2008. The ABC.com network contains an application server named ABC-SR01. ABC.com has recently developed a multithreaded application for their network users, which will be run from ABC-SR01. A current ABC.com written security policy states that all applications should be tested for heap leaks. You have been given the task of enforcing this policy.

Which of the following actions should you take?

A. You should consider making use of the Process\Handle Count counter of Performance  Monitor.
B. You should consider making use of the Process %Privilege Time counter of Performance  Monitor.
C. You should consider making use of the Process\Private Byte counter of Performance Monitor.
D. You should consider making use of the Process %Elapsed Time counter of Performance  Monitor.

Answer: C

Explanation:

Question 5.
You work as the desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the ABC.com network run Windows Server 2008. The ABC.com network contains an application server named ABC-SR01. ABC.com has recently developed a driver for newly developed hardware. A current ABC.com written security policy states that verification on the process interrupts and processor time is used by new drivers. You have been instructed to enforce this security policy.

Which of the following actions should you take?

A. You should consider making use of the Windows Event Viewer utility.
B. You should consider making use of the Performance Monitor utility.
C. You should consider making use of the System MonitorTaskmgr.exe utility.
D. You should consider making use of a Process Viewer utility.

Answer: B

Explanation:

Question 6.
You work as the desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. The ABC.com network contains an application server named ABC-SR01. ABC.com has recently developed an application for their network users, which will be run from ABC-SR01. A new ABC.com written security policy states that all network users should be required to use Active Directory user accounts with passwords when accessing applications hosted on ABC-SR01. The CIO has instructed you to make sure that the new security policy is enforced. 

Which of the following actions should you take?

A. You should consider making use of the CredUIPromptForCredentials() routine to ensure the  network users use Active Directory user accounts and credentials.
B. You should consider making use of the CredUILogonProcess() routine to ensure the network  users use Active Directory user accounts and credentials.
C. You should consider making use of the CredWriteLocalCredentials() routine to ensure the  network users use Active Directory user accounts and credentials.
D. You should consider making use of the CredWriteDomainUserName() routine to ensure the  network users use Active Directory user accounts and credentials.

Answer: A

Explanation:

Question 7.
You work as the desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the network run Microsoft Windows Server 2008 and all client computers run Microsoft Windows XP Professional or Microsoft Windows Vista. The ABC.com network contains an application server named ABC-SR01. ABC.com has developed an audio driver for an application that will be run from ABC-SR01. You receive instruction from ABC.com to make sure that the new audio driver is checked for memory used after it has been released. It must also be checked for Memory underruns and overruns.

Which of the following actions should you take?

A. You should consider making use of Windows File Protection to check the driver.
B. You should consider using the Special pool option of the Driver Verifier tool.
C. You should consider making using of the System File Checker (SFC) tool.
D. You should consider making use of the File Signature Verification tool.

Answer: B

Explanation:

Question 8.
You work as the desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the ABC.com network run Windows Server 2008 and all workstations run either Windows XP Professional or Microsoft Windows Vista. The ABC.com network contains an application server named ABC-SR01. ABC.com has recently developed an application, which is programmed to write to a local transaction log. You have been instructed to make sure that the application is able to have write operations committed to the hard disk in sequential order, in the event of a server operating system failure.

Which of the following actions should you take?

A. You should consider having the application configured with its own memory space using the Memory mapped I/O method.
B. You should consider making use of the Asynchronous I/O method for the application.
C. You should consider making use of the Write-through I/O method for the application.
D. You should consider making use of the Synchronous I/O method for the application.

Answer: C

Explanation:

Question 9.
You work as the desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the ABC.com network run Windows Server 2008 and all workstations run either Windows XP Professional or Microsoft Windows Vista. The ABC.com network contains an application server named ABC-SR01. ABC.com has recently developed an application, which will be run from ABC-SR01. During the course of the day, you receive complaints from network users stating that the application fails as a result of a missing Dynamic Link Library (DLL). The CIO has requested that you determine which DLL file is missing from the application.

Which of the following actions should you take?

A. You should consider making use of the Depends.exe utility.
B. You should consider making use of the Windows Task Manager utility.
C. You should consider making use of a Process Viewer utility.
D. You should consider making use of auditing to audit the files that the application calls.

Answer: A

Explanation:

Question 10.
You work as the desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the ABC.com network run Windows Server 2008 and all workstations run either Windows XP Professional or Microsoft Windows Vista. The ABC.com network contains an application server named ABC-SR66. ABC.com has recently developed a device driver for newly acquired hardware. A new ABC.com written security policy states that all driver routines that utilize half the CPU should be identified. You have been instructed by the CIO to make sure that the new policy is adhered to.

Which of the following actions should you take?

A. You should consider making use of the Performance Monitor utility.
B. You should consider making use of the Kernrate.exe utility.
C. You should consider making use of the Task Manager utility.
D. You should consider making use of a Process Viewer utility.

Answer: B

Explanation:


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.