Tag Archives: MCITP Training

83-640 Q & A / Study Guide / Testing Engine

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
You work as the network administrator at CERTKINGDOM.com. The CERTKINGDOM.com network has a
domain named CERTKINGDOM.com. All servers on the CERTKINGDOM.com network run Windows Server 2008.
Only one Active-Directory integrated zone has been configured in the CERTKINGDOM.com domain.
CERTKINGDOM.com has requested that you configure DNS zone to automatically remove DNS records
that are outdated.
What action should you consider?

A. You should consider running the netsh /Reset DNS command from the Command prompt.
B. You should consider enabling Scavenging in the DNS zone properties page.
C. You should consider reducing the TTL of the SOA record in the DNS zone properties page.
D. You should consider disabling updates in the DNS zone properties page.

Answer: B

Explanation: In the scenario you should enable scavenging through the zone properties because
scavenging removes the outdated DNS records from the DNS zone automatically. You should
additionally note that patience would be required when enabling scavenging as there are some
safety valves built into scavenging which takes long to pop.
Reference: https:://www.gilham.org/Blog/Lists/Posts/Post.aspx?List=aab85845-88d2-4091-8088-
a6bbce0a4304&ID=211


QUESTION 2
You work as the network administrator at CERTKINGDOM.com. The CERTKINGDOM.com network has a
domain named CERTKINGDOM.com. All servers on the CERTKINGDOM.com network run Windows Server
2008.
The CERTKINGDOM.com network has a server named CERTKINGDOM-SR15. You install the Active
Directory Lightweight Directory Services (AD LDS) on CERTKINGDOM-SR15.
Which of the following options can be used for the creation of new Organizational Units (OU’s) in
the application directory partition of the AD LDS?

A. You should run the net start command on CERTKINGDOM-SR15.
B. You should open the ADSI Edit Microsoft Management Console on CERTKINGDOM-SR15.
C. You should run the repadmin /dsaguid command on CERTKINGDOM-SR15.
D. You should open the Active Directory Users and Computers Console on CERTKINGDOM-SR15.

Answer: B

Explanation: You need to use the ADSI Edit snap-in to create new OUs in the AD LDS
application directory partition. You also need to add the snap-in in the Microsoft Management
Console (MMC).


QUESTION 3
You work as the network administrator at CERTKINGDOM.com. The CERTKINGDOM.com network has a
domain named CERTKINGDOM.com. All servers on the CERTKINGDOM.com network run Windows Server
2008.
The CERTKINGDOM.com network has two domain controllers CERTKINGDOM-DC01 and CERTKINGDOMDC02.
CERTKINGDOM-DC01 suffers a catastrophic failure but it is causing problems because it was
configured to have Schema Master Operations role. You log on to the CERTKINGDOM.com domain as
a domain administrator but your attempts to transfer the Schema Master Operations role to
CERTKINGDOM-DC02 are unsuccessful.
What action should you take to transfer the Schema Master Operations role to CERTKINGDOMDC02?

A. Your best option would be to have the dcpromo /adv command executed on CERTKINGDOMDC02.
B. Your best option would be to have the Schema Master role seized to CERTKINGDOM-DC02.
C. Your best option would be to have Schmmgmt.dll registered on CERTKINGDOM-DC02.
D. Your best option would be to add your user account to the Schema Administrators group.

Answer: B

Explanation: To ensure that CERTKINGDOM-DC02 holds the Schema Master role you need to seize
the Schema Master role on CERTKINGDOM-DC02. Seizing the schema master role is a drastic step
that should be considered only if the current operations master will never be available again. So to
transfer the schema master operations role, you have to seize it on CERTKINGDOM-DC02.
Reference: https:://technet2.microsoft.com/windowsserver/en/library/d4301a14-dd18-4b3c-a3ccec9a773f7ffb1033.
mspx?mfr=true


QUESTION 4
You work as the network administrator at CERTKINGDOM.com. The CERTKINGDOM.com network has a
single forest. The forest functional level is set at Windows Server 2008.
The CERTKINGDOM.com network has a Microsoft SQL Server 2005 database server named
CERTKINGDOM-DB04 that hosts the Active Directory Rights Management Service (AD RMS).
You try to access the Active Directory Rights Management Services administration website but
received an error message stating:
“SQL Server does not exist or access is denied.”
How can you access the AD RMS administration website?

A. You need to restart the Internet Information Server (IIS) service and the MSSQLSVC service on
CERTKINGDOM-DB04.
B. You need to install the Active Directory Lightweight Directory Services (AD LDS) on
CERTKINGDOM-DB04.
C. You need to reinstall the AD RMS instance on CERTKINGDOM-DB04.
D. You need to reinstall the SQL Server 2005 instance on CERTKINGDOM-DB04.
E. You need to run the DCPRO command on CERTKINGDOM-SR04

Answer: A

Explanation: You need to restart the internet information server (IIS) to correct the problem. The
starting of the MSSQULSVC service will allow you to access the database from AD RMS
administration website.


QUESTION 5
You work as an enterprise administrator at CERTKINGDOM.com. The CERTKINGDOM.com network has a
domain named CERTKINGDOM.com. The CERTKINGDOM.com network has a Windows Server 2008
computer named CERTKINGDOM-SR03 that functions as an Enterprise Root certificate authority (CA).
A new CERTKINGDOM.com security policy requires that revoked certificate information should be
available for examination at all times.
What action should you take adhere to the new policy?

A. This can be accomplished by having a list of trusted certificate authorities published to the
CERTKINGDOM.com domain.
B. This can be accomplished by having the Online Certificate Status Protocol (OCSP) responder implemented.
C. This can be accomplished by having the OCSP Response Signing certificate imported.
D. This can be accomplished by having the Startup Type of the Certificate Propagation service set to Automatic.
E. This can be accomplished by having the computer account of CERTKINGDOM-SR03 added to the
PGCertificates group.

Answer: B

Explanation: You should use the network load balancing and publish an OCSP responder. This
will ensure that the revoked certificate information will be available at all times. You do not need to
download the entire CRL to check for revocation of a certificate; the OCSP is an online responder
that can receive a request to check for revocation of a certificate. This will also speed up certificate
revocation checking as well as reducing network bandwidth tremendously.


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

70-562 Q & A / Study Guide / Testing Engine

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
You work as a Web Developer at CERTKINGDOM.com. You make use of Microsoft .NET Framework 3.5 to
develop ASP.NET Web applications.
CERTKINGDOM.com has a server, named CERTKINGDOM-SR13, which runs an instance of Microsoft SQL Server 2005
locally and is configured to make use of Windows Authentication. You have developed a Web
application named CERTKINGDOMApp1 that will be hosted on CERTKINGDOM-SR13.
You are preparing to configure the role management and membership providers on CERTKINGDOM-SR13.
Which of the following actions should you take?

A. You should consider making use of the Aspnet_compiler.exe command.
B. You should consider making use of the aspnet_regiis.exe command.
C. You should consider making use of the Aspnet_merge.exe command
D. You should consider making use of the ASP.NET SQL Server registration tool.

Answer: A,B

Explanation:


QUESTION 2
You work as a Web Developer at CERTKINGDOM.com. You make use of Microsoft .NET Framework 3.5 to
develop ASP.NET Web applications.
You have recently developed a Web application named CERTKINGDOMWebApp1, and configured it to make
use of Windows Authentication. After specific group is granted NTFS permissions to access a
specific file named CERTKINGDOM.doc, you are informed that you have to make sure that users not
belonging to the group are prevented from accessing the file.
Which of the following actions should you take?

A. You should configure the machine.config file to include the <identity impersonate=”true”/> element.
B. You should configure the machine.config file to include the <authentication mode=”[None]”> element.
C. You should configure the app.config file to include the <authentication mode=”[None]”> element.
D. You should configure the Web.config file to include the <identity impersonate=”true”/> element.
E. You should configure the Web.config file to include the <authentication mode=”[None]”> element.
F. You should configure the app.config file to include the <authentication mode=”[None]”> element.

Answer: D

Explanation:


QUESTION 3
You work as a Web Developer at CERTKINGDOM.com. You make use of Microsoft .NET Framework 3.5 to
develop ASP.NET Web applications.
You have developed a web application named CERTKINGDOMWebApp. You are now preparing to configure
authentication for CERTKINGDOMWebApp so that clients are not allowed to access it anonymously. You also
need to make sure that access for users from untrusted domains are allowed.
You have written the code segment shown below:
<system.web>
<authentication mode=”Forms”>
<forms loginUrl=”login.aspx” />
</authentication>
<authorization>
<deny users=”?” />
</authorization>
</system.web>
Which of the following actions should you take NEXT?

A. You should consider adding the code segment to the web.config file.
B. You should consider adding the code segment to the project’s property pages.
C. You should consider adding the code segment to the app.config file.
D. You should consider adding the code segment to the workstation’s machine.config file.

Answer: A


QUESTION 4
You work as a Web Developer at CERTKINGDOM.com. An MS ASP.NET Web application, named CERTKINGDOMApp1,
has been developed using the 3.5 version of MS Net Framework.
Subsequent to retrieving the most recent project version from the source control repository, you try
to compile it on your workstation and find that the reference to the assembly is absent.
You want to add a reference path that connects to the absent assembly.
Which of the following options should you access to achieve this?

A. The project’s property pages.
B. CERTKINGDOMApp1’s web.config file.
C. CERTKINGDOMApp1’s app.config file.
D. Your workstation’s machine.config file.

Answer: A

Explanation:


QUESTION 5
You work as a Web Developer at CERTKINGDOM.com. You make use of Microsoft .NET Framework 3.5 to
develop Microsoft ASP.NET Web applications.
An existing Web application was developed using Microsoft .NET Framework 1.0. the Web
application makes use of Microsoft Internet Information Services (IIS) 6.0, but does not make use
of any features of Microsoft .NET Framework 3.5.
You want to configure the Web application for .NET Framework 3.5 with as little administrative
effort as possible.
Which of the following actions should you take?

A. You should consider accessing Microsoft Internet Information Services (IIS) 6.0 to modify the
handler runtime version.
B. You should consider accessing the machine.config file to modify the handler runtime version.
C. You should consider accessing the app.config file to modify the handler runtime version.
D. You should consider accessing the web.config file to modify the handler runtime version.

Answer: A

Explanation:


 

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

70-542 Q & A / Study Guide

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
There is a web site CertKingdomWS.
CertKingdomWS uses MS Office SharePoint Server 2007 Search Center.
CertKingdomWS runs a fixed keyword query.
If the result of this query is a fail to return any data.
How can this be achieved?

Answer:


QUESTION 2
There is a MS Office SharePoint Server 2007 application CertKingdomApp.
CertKingdomApp uses two tables Employees and EmployeesDetails.
They are related through a one-to many relation.
Two entities Employees and EmployeesDetails are defined in a BDC definition.
The metadata of this definition need to be defined.
Which code is appropriate?

Answer:


QUESTION 3
There is a MS Office SharePoint Server 2007 web site CertKingdomWS.
There is a MS Office SharePoint Server 2007 application CertKingdomApp.
There is a security group named DOMAIN\Employees.
In CertKingdomWS there is content that this group should have access to.
How can this be ensured? Select two.

A. Add a custom Web Part…
B. Add an audience…
C. Add a site group…
D. Use a filter…
E. ..based on the DOMAIN\Employees group.
F. ..that has the DOMAIN\Employees group as a member.
G. …that shows only the members of the DOMAIN\Employees group.

Answer: B,E

Explanation:


QUESTION 4
There is a MS Office SharePoint Server 2007 web site CertKingdomWS.
There is a MS Office SharePoint Server 2007 application CertKingdomApp.
There is a MS Excel 2007 workbook which contain employee data such as name, city, salary.
End users must be able to filter the workbook on city.
How can this be achieved through MS Office SharePoint Server 2007 Excel services? Select two.

A. Add an Excel VBA application…
B. Add an ActiveX control…
C. Use the Data-Filter option…
D. …in the workbook.
E. ..in CertKingdomApp.
F. ..in CertKingdomWS.

Answer: C,D

Explanation:


QUESTION 5
There is a MS SQL Server 2005 database CertKingdomDB.
There is a BDC definition which is used to search for employee data in CertKingdomDB.
Incremental crawls must be performed for indexing in CertKingdomDB.
How can this be ensured? Select two or three.

A. Add method
B. Add function..
C. Add stored procedure…
D. ..Finder
E. ..GenericInvoker
F. .. IDEnumerator
G. .. ViewAccessors
H. ..to have a return field representing the last update time of CertKingdomDB.
I. .. to return a different set of columns from the CertKingdomDB.

Answer: A,F,H

Explanation:


QUESTION 6
Exhibit:
public class CertKingdomClass
{
public double CertKingdom1 (double d)
{
return d * 9; }
public DateTime CertKingdom2 {
return ( DateTime.Today );
}
}
There are two UDFs CertKingdom1 and CertKingdom2.
These are defined as Excel Services in MS Office SharePoint Server 2007.
The code is displayed in the exhibit.
What action should you take?

Answer:


QUESTION 7
There is a ASP.NET web site CertKingdomWS.
There is a MS Office SharePoint Server 2007 application CertKingdomApp.
There is a Microsoft Office InfoPath form CertKingdomForm.
There is a custom control CertKingdomC that is derived from the XMLFormView class.
CertKingdomC will show CertKingdomForm inside an ASP.NET page on CertKingdomWS.
How can this be ensured?

Answer:


QUESTION 8
There is a web site CertKingdomWS.
There is a portal site template CertKingdomTempl.
CertKingdomTempl is used within CertKingdom Ltd. To recreate site hierarchies,
Extra sites must be added to the hierarchy.
What steps should be taken?
Your company uses a portal site template to recreate site hierarchies. You need to add additional
sites to the hierarchy that is defined in the portal site template. What should you do?

A. Modify file Webtemp*.xml…
B. Modify file webconfig…
C. Modify file global.aspx…
D. Modify the XML definition file..
E. Modify CertKingdomTempl…
F. Modify CertKingdomWS…
G. ..by adding a Template element that contains the site definitions for the new sites.
H. ..by adding extra Web elements to the XML definition file of the portal site template.
I. .. to include the new hierarchy and create a new site template on the Site Settings page.

Answer: D,H

Explanation:


 

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

70-536 Q & A / Study Guide

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
You work as the application developer at CertKingdom.com. CertKingdom.com uses Visual Studio.NET
2005 as its application development platform.
You are in the process of storing numerical values up to 2,100,000,000 into a variable and may
require storing negative values using a .NET Framework 2.0 application. You are required to
optimize memory usage
What should you do?

A. Int32
B. UInt16
C. UInt32
D. Int16

Answer: A

Explanation:
The Int32 type should be used in the scenario as it can be used to store positive and negative
numerical values from -2,147,483,648 to +2,147,483,647.
Incorrect Answers:
B: The UINT32 and UInt16 type should not be used in the scenario because they are used to store
only unsigned positive numbers.
Reference types
C: The UINT32 and UInt16 type should not be used in the scenario because they are used to store
only unsigned positive numbers.
Attributes
D: The Int16 type should not be used as you will only be allowed to store values from -32768 to
+32768.


QUESTION 2
You work as an application developer at CertKingdom.com. You are currently in the process of
creating a class that stores data about CertKingdom.com’s customers.
CertKingdom.com customers are assigned unique identifiers and various characteristics that may
include aliases, shipping instructions, and sales comments. These characteristics can change in
both size and data type.
You start by defining the Customer class as shown below:
public class Customer
{
private int custID;
private ArrayList attributes;
public int CustomerID
{
get {return custID;}
}
public Customer (int CustomerID)
{
this.custID = CustomerID;
this.attributes = new ArrayList ();
}
public void AddAttribute (object att)
{
attributes.Add (att);
}
}
You have to create the FindAttribute method for locating attributes in Customer objects no matter
what the data type is.
You need to ensure that the FindAttribute method returns the attribute if found, and you also need
to ensure type-safety when returning the attribute.
What should you do?

A. Use the following code to declare the FindAttribute method:
public T FindAttribute (T att)
{
//Find attribute and return the value
}
B. Use the following code to declare the FindAttribute method:
public object FindAttribute (object att)
{
//Find attribute and return the value
}
C. Use the following code to declare the FindAttribute method:
public T FindAttribute <T> (T att)
{
//Find attribute and return the value
}
D. Use the following code to declare the FindAttribute method:
public string FindAttribute (string att)
{
//Find attribute and return the value
}

Answer: C

Explanation:
This code declares the method FindAttribute and specifies an argument named att using the T
placeholder as the argument and return data type. To ensure the FindAttribute method accepts
arguments of different types, you should specify an argument using a generic placeholder. The
argument att in this generic method will accept any valid data type and ensures type-safety by
returning that same data type.
Incorrect Answers:
A: You should not use this code because it does not declare the placeholder T. when declaring a
generic method, you have to use the < > bracketsto declare the place holder before using it.
B: You should not use this code because it does not guarantee type-safery.
D: You should not use this code because it will only accept a string argument and return a string
argument.
Generic types


QUESTION 3
You work as an application developer at CertKingdom.com. You are creating a custom exception
class named ProductDoesNotExistException so that custom exception messages are displayed in
a new application when the product specified by users is unavailable.
This custom exception class will take the ProductID as an argument to its constructor and expose
this value through the ProductID. You are now in the process of creating a method named
UpdateProduct. This method will be used to generate and manage the
ProductDoesNotExistException exception if the ProductID variable contains the value 0.
You need to ensure that use the appropriate code for the UpdateProduct method.
What should you do?

A. Make use of the following code:
public void UpdateProduct ()
{
try
{
if (ProductID == 0)
throw new ProductDoesNotExistException (ProductID);
}
catch (ProductDoesNotExistException ex)
{
MessageBox.Show (“There is no Product” + ex. ProductID);
}
}
B. Make use of the following code:
public void UpdateProduct ()
{
try
{
if (ProductID = = 0)
throw new Exception (“Invalid ProductID”);
}
catch (ProductDoesNotExistException ex)
{
MessageBox.Show (ex.Message);
}
}
C. Make use of the following code:
public void UpdateProduct ()
{
if (ProductID = = 0)
throw new ProductDoesNotExistException (ProductID);
}
D. Make use of the following code:
public void UpdateProduct ()
{
if (ProductID = = 0)
throw new Exception (“Invalid ProductID”);
}

Answer: A

Explanation:
This code verifies the value of the ProductID variable by using the if statement. If the ProductID
variable contains a value of 0, this code generates an exception of type
ProductDoesNotExistException . To explicitly generate an exception, you are required to use the
throw statement. The exception generated by using the throw statement can be handled by the
try…catch block. This code generates the custom exception by calling the constructor of the
custom exception class named ProductDoesNotExistException . The constructor argument is the
ProductID attached to the ProductDoesNotExistException object. This code then handles the
custom exception named ProductDoesNotExistException by using a catch block, which handles
exceptions by using a variable named ex of the type ProductDoesNotExistException . This code
displays the ” There is no Product ” error message by using the MessageBox.Show method and
concatenating the ex. ProductID to it.
Incorrect Answers:
B: You should not use the code that generates an exception of the type Exception and handles the
exception of the type ProductDoesNotExistException in the catch block. This code is incorrect
because you are required to generate a custom exception named ProductDoesNotExistException.
C: You should not use the codes that do not use a try…catch block because the application an
unhandled exception.
D: You should not use the codes that do not use a try…catch block because the application an
unhandled exception.


QUESTION 4
You work as the application developer at CertKingdom.com. CertKingdom.com uses Visual Studio.NET
2005 as its application development platform.
You have recently finished development of a class named TestReward and package the class in a
.NET 2.0 assembly named TestObj.dll. After you ship the assembly and it is used by client
applications, you decide to move the TestReward class from TestObj.dll assembly to the
TestRewardObj.dll Assembly. You are to ensure when you ship the updated TestObj.dll and
TestRewardObj.dll assemblies that the client applications continue to work and do not require
recompiling.
What should you do?

A. The TypeForwardedTo attribute should be used
B. The TypeConvertor.ConvertTo method should be used
C. The InternalsVisibleTo attribute should be used
D. The Type Convertor.ConvertFrom method should be used

Answer: A

Explanation:
The statement used for you to add a type from one assembly into another assembly is the
TypeForwardTo attribute which enables you not to have the application recompiled.
Incorrect Answers:
B: The TypeConverter class provides a unified way of converting different types of values to other
types and can not be used to move a type.
C: The method in question here specifies all nonpublic types in an assembly are visible to other
assemblies but can not be used to move types.Part 2: Manage a group of associated data in a
.NET Framework application by using collections. (Refer System.Collections namespace)
D: The TypeConverter class provides a unified way of converting different types of values to other
types and can not be used to move a type.


QUESTION 5
You work as an application developer at CertKingdom.com. You have recently created a custom
collection class named ShoppingList for a local supermarket. This custom class will include
ShoppinItem objects that have the public properties listed below.
* Name
* AisleNumber
* OnDiscount
You are required to enable users of your class to iterate through the ShoppingList collection, and
to list each product name and aisle number using the foreach statement.
You need to achieve this by declaring the appropriate code.
What code should you use?

A. public class ShoppingList : ICollection
{
// Class implementation
}
B. public class ShoppingList : IEnumerator, IEnumerable
{
// Class implementation
}
C. public class ShoppingList : Ilist
{
// Class implementation
}
D. public class ShoppingList : Enum
{
// Class implementation
}

Answer: B

Explanation:
You should implement the IEnumerable and IEnumerator interfaces of the System.Collections
namespace to ensure that your collection class supports foreach iteration. The IEnumerable
interface defines only one method named GetEnumerator that returns an object of type
IEnumerator of the System.Collections namespace and is used to support iteration over a
collection. The IEnumerator interface supports methods, such as Current , MoveNext , and Reset
to iterate through a collection. The Current method returns the current element of the collection.
The Move method positions the enumerator to the next available element of the collection. The
Reset method positions the enumerator before the first element of the collection.
Incorrect Answers:
A: You should not use the code that implements the ICollection interface because this interface is
used to define properties in a collection. Implementing this interface will not ensure that your
collection class supports foreach iteration because it does not inherit the IEnumerator interface.
C: You should not use the code that implements the Ilist interface because this interface is used to
define properties of a non-generic list of items accessed by index. Implementing this interface will
not ensure that your collection class supports foreach iteration because it does not inherit the
IEnumerator interface.
D: You should not use the code that inherits the Enum because this structure is used as a base
class for those classes that provide enumeration values. Inheriting the Enum structure will not
ensure that your collection class supports foreach iteration.


QUESTION 6
You work as the application developer at CertKingdom.com. CertKingdom.com uses Visual Studio.NET
2005 as its application development platform.
You are developing a .NET Framework 2.0 application used to store a type-safe list of names and
e-mail addresses. The list will be populated all at ones from the sorted data which means you well
not always need to perform insertion or deletion operations on the data. You are required to
choose a data structure that optimizes memory use and has good performance.
What should you do?

A. The System.Collections.Generic.SortedList class should be used
B. The System.Collections.HashTable class should be used
C. The System.Collections.Generic.SortedDictionary class should be used
D. The System.Collections.SortedList class should be used

Answer: A

Explanation:
The SortedList generic class should be used in the scenario class as it provides type safety
compared against the System.Collections.SortedList class.
Incorrect Answers:
B: The System.Collections.HashTable class should not be used as this class provides no type
safety.
Collection interfaces
C: Although this is very similar to the SortedList class the SortedList class should be used instead
in the scenario.
Iterators
D: Although this is very similar to the SortedList class the SortedList class should be used instead
in the scenario.


QUESTION 7
You work as an application developer at CertKingdom.com. You are currently in the process of
reviewing an application that was created by a fellow developer.
The application that you are reviewing includes a declaration for a collection named EmployeeList,
which stores Employee objects. The declaration is shown below:
public class EmployeeList : Enumerator, IEnumerable
{
// Class implementation
}
You require the ability to iterate through the EmployeeList with minimum development effort.
What should you do?

A. Utilize the switch statement
B. Utilize the dowhile statement
C. Utilize the foreach statement
D. Utilize the if statement

Answer: C

Explanation:
the IEnumerable and IEnumerator interfaces of the System.Collections namespace are used to
ensure that your collection class supports foreach iteration. The IEnumerable interface defines
only one method named GetEnumerator that returns an object of type IEnumerator of the
System.Collections namespace and is used to support iteration over a collection. The
IEnumerator interface supports methods, such as Current , MoveNext , and Reset to iterate
through a collection. The Current method returns the current element of the collection. The Move
method positions the enumerator to the next available element of the collection. The Reset
method positions the enumerator before the first element of the collection.
Incorrect Answers:
A: These statements will not allow you to iterate through the EmployeeList collection.
B: You should not use this statement because it will require manually calling the MoveNext and
Current methods. The scenario states that you need to “…iterate through the EmployeeList with
minimum development effort.”
D: These statements will not allow you to iterate through the EmployeeList collection.
Hashtable class


QUESTION 8
You work as an application developer at CertKingdom.com. CertKingdom.com has been contracted to
develop an application for the local bank.
You have been given the responsibility of creating this application and need to store each
transaction record, which is identified using a complex transaction identifier, in memory. The bank
informs you that the total amount of transaction records could reach 200 per day.
To achieve this, you decide to utilize one of the existing collection classes in the .NET 2.0 class
library.
You need to ensure that you the collection class you select is the most efficient one for storing
transaction records.
What should you do?

A. Select the ListDictionary collection class.
B. Select the HashTable collection class.
C. Select the Queue collection class.
D. Select the StringCollection collection class.

Answer: B

Explanation:
You should select the HashTable class to store transaction records because each element is
identified using a unique identifier and the size of the collection is large. Elements in the
HashTable collection are stored with a key/value pair where each key is created using a hash
code. The default capacity of a HashTable class is zero, and you can use the Add method to add
a new element to the collection. The Count property provides the total number of elements in the
HashTable collection. An element of the HashTable class can be accessed using the
DictionaryEntry class. You can use the Key and Value properties of the DictionaryEntry class to
access the key associated with the element and the value of the element, respectively.
Incorrect Answers:
A: You should not select this collection class because this class is used if the total number of
elements to be stored in a collection is less than 10 elements in length.
C: You should not select this collection class because you need to access transaction records
using a transaction identifier, not in sequential order.
D: You should not select this collection class because this class is used to manage a collection of
string values.


QUESTION 9
You work as an application developer at CertKingdom.com. CertKingdom.com has been hired by a small
local private school to develop a class library that will be used in an application named
ManageAttendance for the purpose of managing student records.
You are responsible for developing this class library. CertKingdom.com has instructed you to create a
collection in the application to store learners’ results.
The school has informed you that they currently only have seven learners, but that this value will
triple in the following year. Due to the limited resources, you need to ensure that the collection you
create consumes a minimum amount of resources.
What should you use to create the collection?

A. The HybridDictionary collection class.
B. The HashTable collection class.
C. The ListDictionary collection class.
D. The StringCollection collection class.

Answer: A

Explanation:
You should use the HybridDictionary class to create the collection because this class is useful in
scenarios where the number of elements is unknown or could grow in size. A collection of the
HybridDictionary type manages the collection depending on the number of elements. The
HybridDictionary type collection uses the ListDictionary class to manage the collection when there
are only a few elements. When the number of elements exceeds ten, the HybridDictionary type
collection automatically converts the elements into HashTable management.
Incorrect Answers:
B: You should not use this collection class because this class is used if the total number of
elements to be stored in a collection is known and is greater than ten elements in length.
C: You should not use this collection class because this class is used if the total number of
elements to be stored in a collection is known and is less than ten elements in length.
D: You should not use this collection class because this class is used to manage a collection of
string values.


QUESTION 10
You work as an application developer at CertKingdom.com. CertKingdom.com wants you to develop an
application that stores and retrieves client information by means of a unique account number.
You create a custom collection class, which implements the IDictionary interface, named
ClientDictionary. The following code have been included into the new application.
//Create Client objects
Client c1 = new Client (“AReid”, “Andy Reid”, Status.Current);
Client c2 = new Client (“DAustin”, “Dean Austin”, Status.New);
//Create ClientDictionary object
IDictionary cData = new ClientDictionary ();
cData.Add (“10001”, c1);
cData.Add (“10002”, c2);
You use the same method to add other Client objects to the collection. You need to ensure that
you are able to retrieve client information associated with the account number 10111.
What should you do?

A. Use the following code:
Client foundClient;
foundClient = (Client) cData.Find (“10111”);
B. Use the following code:
Client foundClient;
if (cData.Contains (“10111”))
foundClient = cData [“10111”];
C. Use the following code:
Client foundClient;
if (cData.Contains (“10111”))
foundClient = (Client) cData [“10111”];
D. Use the following code:
Client foundClient;
foreach (string key in cData.Keys
{
if (key == “10111”)
foundClient = (Client) cData.Values [“10111”];
}

Answer: C

Explanation:
This code invokes the Contains method of the IDictionary interface to determine whether a value is
associated with the key 10111. If a value exists for that key, then the clientData [“10111”]
statement retrieves the client data as a generic object. The code casts the generic object into a
Client object, and it is stored in the foundClient variable
Incorrect Answers:
A: You should not use the code that uses the Find method because no such method exists in the
IDictionary interface.
B: You should not use the code that assigns the foundClient variable to a generic object because
the foundClient variable is declared as a Client type.
D: You should not use the code that iterates through the Keys collection because it is unnecessary
and process-intensive.

 

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

70-523 Q & A / Study Guide

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

 

QUESTION 3
There is a service WCF (Windows Communication Foundation) Data Services CertKingdomService.
CertKingdomService has been developed with MS .NET Framework 4 and MS Visual Studio 2010.
An application CertKingdomApp uses CertKingdomService.
There is a problem. Whenever CertKingdomApp sends DELETE and PUT requests to
CertKingdomService there is an error.
What should be done in this scenario? Select three.

A. When accessing CertKingdomService CertKingdomApp should use header..
B. When accessing CertKingdomService CertKingdomApp should use footer..
C. ..https:-Method..
D. .. X-https:-Method..
E. .. https: ContentType..
F. .. XML ContentType..
G. .. XLS-Method..
H. ..as part of a DELETE request.
I. ..as part of a GET request.
J. ..as part of a POST request.
K. ..as part of a PUT request.

Answer: A,D,J

Explanation:


QUESTION 4
There is an application CertKingdomApp.
CertKingdomApp has been developed with MS .NET Framework 4 and MS Visual Studio 2010.
There is a server CertKingdomSrv.
There is a Microsoft SQL Server 2008 database CertKingdomDb on CertKingdomSrv.
CertKingdomApp connects to CertKingdomDb.
CertKingdomDb includes a table CertKingdomProducts.
CertKingdomProducts includes product information.
CertKingdomProducts has a column ProductType.
ProductType is used to identify if the product is digital or physical.
There is Product entity base type.
There is an Association entity Digital inheriting from the Product entity base type.
All digital products must be bound to Digital class.
What should be done? Select three.

A. The Entity Data Model Designer should be used to..
B. Change the file..
C. ..code-behind to include..
D. ..global.aspx to include..
E. .. .edmx file to include..
F. ..to set up a referential constraint..
G. .. to set up an association between..
H. .. the primary key of the Digital class and ProductType.
I. .. between the Digital class and ProductType.
J. <NavigationProperty Name=”Type” FromRole=”ProductType” ToRole=”Digital” />
K. <Condition ColumnName=”ProductType” Value=”Digital” />

Answer: B,E,J

Explanation:


QUESTION 5
There is an application CertKingdomApp.
CertKingdomApp has been developed with MS .NET Framework 4 and MS Visual Studio 2010.
To model entities CertKingdomApp ADO.NET Entity Framework is used.
CertKingdomApp make sure that users can update entities even if they are not connected to the
central store. In such a case, when the user reconnects: changes the local data must be persisted,
latest updates from the central data store are loaded to the local store (when no local changes
have been made).
What should be done in this scenario? Select three.

A. Use method…
B. Use library..
C. Use attribute..
D. ..Execute..
E. ..Refresh of ObjectContext class..
F. ..Refresh of ViewContext class..
G. ..through usage of MergeOptions.OverwriteChanges
H. ..through usage of RefreshMode.StoreWins.AppendOnly
I. ..through usage of RefreshMode.ClientWins
J. ..through usage of MergeOptions.AppendOnly

Answer: A,E,I

Explanation:


QUESTION 6
There is an application CertKingdomApp.
CertKingdomApp has been developed with MS .NET Framework 4 and MS Visual Studio 2010.
You are implementing the CertKingdomApp data layer.
In particular when the GetDataReader method returns a SqlDataReader, the SqlDataReader can
retrieve rows from the database.
Also when the SqlDataReader is closed the active SQL connections, opened with the
GetDataReader method, must be closed.
What code should be used in this scenario?

Answer:


QUESTION 7
Sales Exhibit:
Sales Properties:
SalesID
CustomerID
OrderDate
ShipAddress
Sales_details Exhibit:
Properties:
SalesID
ProductID
UnitPrice
Quantity
There is an application CertKingdomApp.
CertKingdomApp has been developed with MS .NET Framework 4 and MS Visual Studio 2010.
There is a server CertKingdomSrv.
There is a Microsoft SQL Server 2008 database CertKingdomDb on CertKingdomSrv.
CertKingdomApp connects to CertKingdomDb.
LINQ is used to created the Sales and Sales_details in the exhibit.
There is a one- to-many relation from the SalesID of Sales to the SalesID of Sales_details.
The primary key of Sales is SalesID column.
The primary key of Sales_details is the SalesID and ProductID columns.
You are required to provide SQL code that produces the sum of the price of each Sales record.
Which code should be used?

Answer:

 

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

70-519 Q & A / Study Guide

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
There is ASP NET 3.5 Web application CertKingdomApp.
You are required to upgrade CertKingdomApp to ASP.NET 4.0.
You need to make sure that CertKingdomApp is optimized for search engines.
In particular this optimization must include HTML that is generated by CertKingdomApp and URLs
local within CertKingdomApp.
Within CertKingdomApp there is a Data List control CertKingdomC.
CertKingdomApp must be able to load data at runtime into CertKingdomC with the help of the current
URL.
What is appropriate in this scenario? Select four.

A. Use property Repeat Layout of..
B. Use property Data List Layout of..
C. Use property Render Outer table Layout of..
D. ..Web Forms routing and set the property to…
E. .. permanent redirect and set the property to..
F. .. temporary redirect and set the property to..
G. ..Null..
H. ..True..
I. ..False..
J. ..Table..
K. ..List..
L. .. on all list controls.
M. ..on all controls.
N. .. all Form View controls.

Answer: B,D,I,N

Explanation:


QUESTION 2
There a ASP.NET MVC 2 application CertKingdomApp.
Consider unhandled exceptions.
CertKingdomApp must manage and log these unhandled exceptions.
What would be best to achieve this if you want to put the logic into a single place?

A. Use a custom Handle Error attribute to…
B. Use the default Handle Error attribute to…
C. For every method..
D. For each controller..
E. .. override the Exception method.
F. .. override the OneException method.
G. .. and apply it to all controllers.
H. ..use try and catch.

Answer: A,G

Explanation:


QUESTION 3
There is an ASP.NET Web application CertKingdomApp.
CertKingdomApp has pages that are available for public users.
CertKingdomApp has pages that are available for only administrative purposes.
Consider error handling code for these pages.
The same code must be used for the public pages and the administrative pages.
Errors must be handled in one way for the public pages and in another way for the administrative
pages.
How can this be achieved? Select two.

A. Use file Global.asax.cs (or Global.asax.vb)
B. Use file code-behind.
C. Use the Page_Error method(s).
D. ..for every public page and for every administrative page.
E. ..of the subclasses of System.Web.UI.Page.
F. ..of the subclasses of System.Web.URL.Page.
G. ..use the Application_error method.
H. .. for each master page.

Answer: C,E

Explanation:


QUESTION 4
CertKingdom has multiple ASP.NET Web applications.
There is a class library CertKingdomLib that are used by all these application.
There is a variable CertKingdomVar in CertKingdomLib.
CertKingdomVar is within the helper class.
CertKingdomVar contains secret information.
CertKingdomVar must not be seen by developers debugging applications.
How can this be achieved?

Answer:


QUESTION 5
There is an ASP.NET Web application CertKingdomApp.
CertKingdomApp has a Menu Control CertKingdomMC.
For unauthorized users CertKingdomMC shows a menu of public pages.
For authorized users CertKingdomMC shows a menu of both public pages and some private pages.
For security you need to ensure that the private pages (both the menu options and the URLs) are
not shown to unauthorized user.
What is appropriate in this scenario? Select four.

A. The event handler..
B. The attribute..
C. The method..
D. The exception handler..
E. ..Page_Refresh should be used..
F. ..Page_Load should be used..
G. ..window.onload should be used..
H. ..window.update should be used..
I. ..window.onupdate should be used..
J. ..Page_Init should be used..
K. .. JavaScript document ready should be used..
L. ..VBS (or C# script) document ready should be used..
M. …to add pages to CertKingdomMC that are to be accessed by all users
N. ..to hide the private pages from the list of pages shown on CertKingdomMC.
O. ..to add pages to CertKingdomMC that are to be accessed by authorized users.
P. ..to add pages to CertKingdomMC that are to be accessed by unauthorized users.

Answer: C,F,O

Explanation:

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Bluetooth in Brief

Bluetooth is a radio or wireless technology designed for short range data communications in the Industrial, Scientific and Medical (ISM) band. The frequency range is from 2.402Ghz to 2.480Ghz, with the available frequency sprectrum being broken up into 79 x 1Mhz wide bands.

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at https:://www.actualkey.com

Bluetooth was designed by Ericsson as a short range wireless connectivity solution and is used to build Personal Area Networks, or PANs as they are known so that devices in close proximity can pass information. Typical examples being a mobile phone downloading data to a Personal Computer or a mobile phone earpiece communicating with the phone itself.
The technology behind Bluetooth is known as FHSS (Frequency Hopped Spread Spectrum), where the datastream is broken up into small pieces, each containing several binary bits of data which are transmitted in a pseudo random sequence over a series of up to 79 frequency bands. As Bluetooth has developed and matured, a number of data modulation schemes have been used to modulate the data onto the radio carriers including GFSK (Gaussian Frequency Shift Keying), DQPSK (Differential Quadrature Phase Shift Keying) and 8DPSK (8-ary Differential Phase Shift Keying). The development and use of the different modulation schemes were an attempt to increase the data rates of the system.
So how does Bluetooth operate?
Two or more Bluetooth devices that establish a connection (and share a channel) form a small wireless network known as a Piconet, with up to eight devices, forming the piconet . One device becomes the Master station, can join a Bluetooth piconet. Normally the device which initiates the connection will be the Master and other devices joining the PAN will be slaves. The master passes a Frequency Hopping Synchronisation (FHS) packet to any slaves containing its address and clock. The address of the Master Bluetooth device is used to determine the hop sequence and all slaves use the Master Clock to determine which frequency to transmit or receive on at any given time.
A group of piconets are referred to as a Scatternet, with each individual piconet having a unique hopping sequence, determined by it’s Master’s address. If a collision occurs where two devices transmit on the same frequency, a device will just retransmit the data on the next frequency hop. Although this can ultimately affect the performance and data rate of the transmission, it is the accepted method, just like collisions are a way of life in a shared Ethernet network when a hub is in use.
Devices can be a member of multiple piconets by using each Master address to determine the hopping sequence for each network, but can only be the Master for one piconet. The access method used by Bluetooth devices is known as TDD (Time-Division Duplex) where each device (Master and Slave) share the same frequency and are allocated a timeslot during which to transmit. A master will normally use even-numbered time slots and the slave will use odd numbered timeslots.
There are two types of transmission links normally supported by Bluetooth, known as SCO (Synchronous Connection-Orientated) and ACL (Asynchronous Connectionless Link). General Bluetooth operation uses ACL, where the packet and payload length will determine how many timeslots are required. Because ACL is Connection-Orientated, packets that are not acknowledged will be automatically retransmitted, abeit on a different timeslot or timeslots. Forward error correction can be employed as an option and although the data delivery may be more reliable, the data rate will reduce accordingly depending on how error prone the environment is at the time.
Voice over Bluetooth normally used an SCO link, where the voice data is sent over a number of reserved timeslots within an already established ACL link. Retransmissions do not occur on an SCO link as this could cause a number of problems, least of all latency and jitter. However, forward error correction can be used to provide a degree of reliability. There is an Enhanced version of SCO that can employ retransmission in some circumstances.
The latest version of Bluetooth, version 4 and all previous versions of Bluetooth have been designed to be backward compatible with previous versions, so no worry about using older devices with the newer Bluetooth devices.
The Bluetooth technologies have allowed us to provide fast data communications between devices that are in close proximity (within a few metres) without the need for a cable running RS-232 protocol for example and so have provided us with mobility free from the constraints imposed with the use of copper wiring.

Cloud platform supports product development activities

OneDesk collects feedback and ideas from internal sources and social media; a new API allows it to integrate with apps from NetSuite, Oracle, SAP and Salesforce.com.

MCTS Certification, MCITP Certification

Microsoft Oracle Exam Training , Oracle Certification and over 2000+
Exams with Life Time Access Membership at https:://www.actualkey.com

When you talk about the sorts of internal collaboration activities that companies of any size need to support, those related to product development should be right up near the top of the list.

That’s why your organization might want to take a peek at a platform called OneDesk, a cloud-based application that is explicitly intended too coordinate product managers, engineers, marketing teams and even customer support professionals.

I spoke a few weeks back with Catherine Constantinides, one of the OneDesk team members, a few weeks back about how the platform might be used and the sorts of features that are included.

She describes it as a place for companies to declare and manage all the “needs requirements” associated with a given product or product development project.

Internally speaking, there are places to share ideas for the next releases, which can bubble up from anywhere. As some of these ideas are embraced for future features, the team can track the progress as well as any challenges or objections that might occurs along the way.

From an external perspective, OneDesk can be used to monitor and gather feedback about a product that is emerging in social media or social networks.

Ultimately, the main benefit is that all feedback — whether it is internal or external — can be gathered and searched from one location. “You can see all of the requirements, feedback and tasks associated with a particular product release,” Constantinides said. Then again, you can turn off any particular module that isn’t relevant to your organization.

There are two flavors of OneDesk, one that is free, which supports up to 30 people within a company (which is great if you are small small business) and that comes with up to 100 megabytes of data storage. OneDesk Pro will cost your organization $30 per user, per month. That essentially pays for the much larger storage capacity each users gets, up to 1 gigabyte per person.

For midsize businesses that need to worry about such things, OneDesk just released an application programming interface (API) that enables its application to be integrated with enterprise resource planning and CRM applications including Oracle, SAP, Salesforce.com and NetSuite (they aren’t the only applications supported, but are among the most relevant, of course).

RIM’s new CEO wants to focus more on consumers

RIM’s new CEO, Thorsten Heins, wants the company to improve its product development while also becoming better at marketing, he said during a conference call on Monday.

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at https:://www.actualkey.com

Heins is taking over from Mike Lazaridis and Jim Balsillie, who had co-CEO roles and will remain with the company.

“I pledge to do everything possible to exceed the expectations of all of the company’s shareholders,” said Heins.

RIM’s decision to pick its new CEO from within the company makes it clear that it won’t budge from current strategy, which is based on its acquisition of the QNX operating system, according to Geoff Blaber, analyst at CCS Insight. QNX is already used on its PlayBook tablet, and will also be used on its smartphones with the arrival of BlackBerry 10, Blaber said.

“Eighteen months ago Mike and Jim took a bold step when we had to make a major decision around our future platform, and they purchased QNX to shepherd the transformation of the BlackBerry platform for the next decade,” Heins said. “Right now, with PlayBook 2.0 coming out in February, we are more confidant than ever that this was the right path to go.”

At first, Heins will focus on improving the company’s marketing efforts, which include hiring a new chief marketing officer as soon as possible, and the way it develops products.

“We need to be more marketing driven, and we need to be more consumer-oriented because that is where a lot of our growth is coming from,” said Heins.

RIM will also change how it develops products. The company has been innovating while developing the products, and that needs to stop, Heins said.

Innovation will take place with much more emphasis on prototyping, and RIM has great teams that can try new ideas out, he said.

“But when we say a product is defined … execution has to be really, really precise, with no churn in existing development programs,” said Heins.

Heins didn’t address rumors about RIM being acquired, but emphasized that its current model is the way forward.

“I will not in any way split this up or separate it into different businesses,” said Heins, adding that while he will listen to anyone who wants to license BlackBerry 10, it is not his main focus.

Picking a new CEO from within was the right decision, according to analysts.

“Heins has been the COO for some time. He has been at RIM for over four years now, and he has been leading the current product transition,” said Blaber. “It will be about delivering on the strategy they have already embarked on.”

Pete Cunningham, analyst at market research company Canalys agreed: “RIM has been stagnating and needed an injection of fresh leadership.”

Bringing someone in from the outside would have been riskier, according to Cunningham.

The big challenge now is to get BlackBerry 10 smartphones to market as soon as possible. In December, RIM said it would not start selling phones with the software platform until the “later part” of 2012, because it wanted to wait for the arrival of more advanced chipsets.

“It is hard to see that a change of leadership at the company can accelerate that schedule terribly much,” said Cunningham.

Products based on the BlackBerry 10 platform were expected to arrive earlier, and the delay has hurt RIM, according to Blaber.

“The reality is that creating a new platform, albeit be it on a pre-existing operating system in QNX, was always going to take some time,” said Blaber, who thinks that the development of the PlayBook distracted RIM’s engineering department to the detriment of new smartphones.

Another of Heins’ main challenges will also be to help RIM regain some of former glory in the U.S. The company watched its market share drop from 24 percent in the third quarter of 2010 to just 9 percent in the same period last year, according to Canalys.

However, the picture for RIM in other parts of the world is more positive. The Middle East and Africa and Southeast Asia were particular bright spots during the third quarter, Canalys said.

“There are a number of markets where BlackBerries are still selling really well, but the problem RIM has that everyone is focused on the U.S. market, and that is where is has taken a real beating,” said Cunningham.

It is likely to get worse before its gets better for RIM. Just like vendors such as Sony Ericsson, Motorola Mobility and HTC RIM struggled during the fourth quarter.

RIM has its BlackBerry World conference coming up at the beginning of May. That will be one of the first opportunities for Heins to present his vision for the company, and bring back some excitement.

“But that will not be an easy job,” said Cunningham.

70-545 Q & A / Study Guide

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
You are employed as a database developer at Certkingdom.com. You make use of SQL Server 2008 to
develop database strategies.
You are in the process of developing a strategy that has three tables named Certkingdom1, Certkingdom2, and
Certkingdom3. The Certkingdom1 and Certkingdom2 have the integer and varchar data type column types configured
respectively. Certkingdom3 has both the integer and varchar data types configured as column types.
You have configured rowlevel compression on Certkingdom1, and page-level compression on Certkingdom2 and
Certkingdom3.
Which of the following describes the reason for this configuration?

A. It allows for the reduction of disk space usage, while modifying the data types in the tables of the database
B. It allows for the reduction of disk space usage without modifying the data types in the tables of the database
C. It allows for the increase of disk space usage, while modifying the data types in the tables of the database
D. It allows for the increase of disk space usage, while modifying the data types in the tables of the database

Answer: B

Explanation:


QUESTION 2
You are employed as a database developer at Certkingdom.com. You make use of SQL Server 2008 to
develop database strategies.
You have received instructions to design a database strategy that includes a table which hosts
data imported from an outside source. This data includes a field named TransactionTime that
should be configured to make use of hh:mm:ss[.n] format.
You have been informed that the data type selected for the TransactionTime field must allow for
storage to be kept to a minimum.
You, therefore, make use of the time(1) data type.
Which of the following is TRUE with regards to the time data type?

A. The default fractional precision is 7 (100ns).
B. The default fractional precision is 3 (100ns).
C. The time produced by the time data type is not time zone aware and is based on a 24-hour clock.
D. The time produced by the time data type is time zone aware and is based on a 12-hour clock.

Answer: A,D

Explanation:


QUESTION 3
You are employed as a database developer at Certkingdom.com. You make use of SQL Server 2008 to
develop database strategies.
You have received instructions to design a strategy that has two tables named CertkingdomVendor and
CertkingdomItem. You have configured a foreign key constraint between the CertkingdomVendor and CertkingdomItem
tables on the CertkingdomVendorID column.
You have configured the CertkingdomVendor table to display a 0 value for the CertkingdomVendorID when a
vendor is removed. You also want make sure that the CertkingdomVendorID value in the CertkingdomItem table is
set to 0 when a vendor is removed.
You then create a default constraint on the CertkingdomVendorID column in the CertkingdomItem table, which is
used to set the value to 0.
Which of the following actions should you take NEXT?

A. You should consider setting the ON DELETE property of the foreign key constraint to Null.
B. You should consider setting the ON DELETE property of the foreign key constraint to Default.
C. You should consider setting the ON DELETE property of the foreign key constraint to Cascade.
D. You should consider setting the ON DELETE property of the foreign key constraint to No
Action.

Answer: B

Explanation:


QUESTION 4
You are employed as a database developer at Certkingdom.com. You make use of a SQL Server 2008
instance to develop database strategies.
You are in the process of designing a database strategy that makes use of the Integration
Services and Microsoft Sync Framework SQL Server components.
Which of the following is TRUE with regards to the use of these components?

A. Microsoft Sync Framework allows for collaboration and offline access for applications, services, and devices.
B. Microsoft Sync Framework prevents collaboration and offline access for applications, services, and devices.
C. Integration Services allows for the merging of data from Heterogeneous Data Stores.
D. Integration Services prevents the merging of data from Heterogeneous Data Stores.

Answer: A,C

Explanation:


QUESTION 5
You are employed as a database developer at Certkingdom.com. You make use of SQL Server 2008 to
develop database strategies.
You have received instructions to design a strategy that helps Certkingdom.com’s administration manager.
You have created three entities named User, UserTask, and UserAssignment. You have
configured the User entity to make use of the UserID attribute, the UserTask entity to make use of
the UserTaskID attribute, and the UserAssignment entity to make use of the UserAssignmentID attribute.
You have been informed that the strategy must allow for users to be assigned multiple tasks. You
also need to ensure that a task is deleted when it has been completed, and that the assignment
linked to that task is also deleted. Furthermore, a NULL value has to replace the user reference to
the user assignment as soon as a user becomes unavailable to finish a task.
Which combination of the following actions should you take? (Choose all that apply.)

A. You should consider configuring Foreign Key constraints on the UserTaskID and UserID
attributes in the UserAssignment entity.
B. You should consider configuring Foreign Key constraints on the UserTaskID and UserID
attributes in the UserTask and User entities respectively.
C. You should consider referencing the UserTask and User entities respectively.
D. You should consider referencing the UserAssignment and User entities respectively.
E. You should consider specifying the On Delete property as NULL.
F. You should consider specifying the On Delete property as Default.

Answer: A,C,E

Explanation:

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com