You create Microsoft Windows-based applications. You are creating a sales management application. This application will permit sales personnel to search for customer information in a Microsoft SQL Server 2005
database. All communication with the database server is done by using an SSL channel.
When a user needs to search for customer information based on a name, the following sequence of actions occurs:
1.The user types a name into a text box.
2.The user clicks a button to initiate the search.
3.The component validates that the value the user types is less than 200 characters.
4.The value that is typed is passed as a string to a component.
5.The component concatenates the typed value to a Select statement in the Where clause of the component.
6.The statement is executed to generate a DataTable object. 7.The DataTable object is used to display the results to the user. You need to identify the risk factor in this application design. What should you conclude?
You create Microsoft Windows-based applications. You are creating an application to manage projects. Your current customers use Microsoft Windows 2000, Windows XP Professional, and Windows Server 2003, in
workgroup and domain settings.
The application must meet the following requirements:
Identify the user for workflow functionality.
Store data in a central location on your companys network.
Permit data to be stored locally for offline access.
Your application relies on Windows domainCbased authentication to identify the user without logging on to the application itself. You decide to use Microsoft SQL Server 2005 as the database engine and save the data
locally in XML format for offline access. You need to identify the risks that are related to your design. Which risk should you identify?
You create Microsoft Windows-based applications. You are creating a component that will encapsulate a data source. Dozens of applications will use the component.
The component must meet the following design requirements:
1.The component must be able to be modified within a Rapid Application Development environment.
2.The component must be without a user interface.
You propose to derive the component from the System.Windows.Forms.Control class and to implement the IComponent interface. You need to decide whether the component will meet the requirements. What should you conclude?
You create Microsoft Windows-based applications. You are designing a component that will draw a series of graphics based on an interactive user input. You need to ensure that the user can use the input without waiting for the graphics to be drawn. What should you do?
You create Microsoft Windows-based applications. You create a component that calls an existing function. The design for the function specifies that it might throw an application-specific exception named
InvalidChecksumException, which inherits from System.ApplicationException. The InvalidChecksumException exception is an error that can be handled. But the component cannot handle any other type of error. The
component does not have any additional information that can be added to other types of errors. You need to design the component to correctly handle exceptions. You also need to ensure that the exception-handling
strategy does not affect performance. What should you do?
You create Microsoft Windows-based applications. You are responsible for maintaining your companys application framework. You analyze the requirements for some of the applications that your company develops.
You identify a common functionality. The functionality includes user interface elements as well as data-binding logic and display logic. You need to implement the functionality in such a way that other applications can reuse
it. Which type of component should you implement?
You create Microsoft Windows-based applications. Two of your Windows-based applications require the use of graphical progress indicators. These indicators are based on bitmap files. Such a component is not available in
the .NET Framework.
To facilitate the search for a component, you identify the following requirements:
The component exposes methods to increment and decrement the progress bar, along with a method or a property to manually change the value of the progress bar. The component permits the use of different types of
progress indicators, such as a regular progress bar or a circular progress bar.
The component represents multiple progress indicators, permitting the developers to dynamically change the number of indicators.
You research three third party components and find a component that matches the first two criteria. The component you find represents a single progress indicator. The component also exposes extra methods and properties that the developers must not use. You need to implement a strategy to use the third party component. You want to achieve this goal by using the minimum amount of programming effort. What should you do?
You create Microsoft Windows-based applications. You are creating an internal application. The application requirements are that you can audit the application to discover when users logged on and when they logged off
from the application. Logon and logoff events must be stored in a centralized location. The application is designed to use the security credentials of the logged on Windows user. The auditing logon and logoff events
policy is enabled for all computers on the network. Because of these settings, the application does not log any data that is related to logon and logoff events. You need to evaluate the design to find if the application meets the auditing requirements. What should you conclude?
You create Microsoft Windows-based applications. You create a purchase order application. Sales personnel use the application to place orders for customers. Sales personnel need to connect to the network to use the
application. The application saves data to a database server on the network. Multiple sales personnel use the application simultaneously.
The purchase order application requires a logging mechanism to permit auditing of sales. The logging mechanism must meet the following requirements:
Log entry is created for every sales order created, saved, or deleted.
Log data is available only to administrators.
Log entries for all sales are stored together.
Current log data can be read while the application is running.
You need to decide on a storage mechanism for the logged data. Which storage mechanism should you choose?
You create Microsoft Windows-based applications. You are creating an application that will monitor sales data.
The application must meet the following requirements:
Users must be able to customize display settings and the amount of data to monitor. Users must be able to logon to any computer on the network to use the application. User settings must be retrieved based on the logged-on user from any computer on the network.
You need to decide where to store the user settings. What should you do?