Hannah works as a Programmer in a college of Information Technology. The company uses Visual Studio .NET as its application development platform. The Dean of the college wants to obtain the performance report of each student. Hannah develops an application named StudentPerformanceReport by using Visual C# .NET. This application uses a SQL Server database named Database1 and a stored procedure named PROC1. PROC1 executes a query that returns the internal assessment result of each student.
Hannah uses a TextBox control named AssessmentText in the application form named MyForm. She wants to display the total test result of each student in the AssessmentText text box control.
StudentPerformanceReport uses a SqlCommand object to run PROC1. Hannah wants to write code to call PROC1. PROC1 contains an output parameter and displays its value as "@AssessmentResult" in text format. Which of the following code segments can Hannah use to accomplish this task?
Each correct answer represents a complete solution. Choose two.
A. AssessmentText.Text = comm.Parameters["@AssessmentResult"].SourceColumn;
B. AssessmentText.Text = (string)comm.Parameters["@AssessmentResult"].Value;
C. AssessmentText.Text = comm.Parameters["@AssessmentResult"].Value.ToString();
D. AssessmentText.Text = comm.Parameters["@AssessmentResult"].ToString();
John works as a Web Developer for ABC Inc. He develops an ASP.NET application, named MyApp1, using Visual Studio .NET. The application will be used in the Sales department to generate monthly reports. John wants to deploy the application on the company's intranet. The company uses Microsoft Windows authentication. John wants to deny access to all the members of the Guest1 role. Which of the following attributes will he use in the
A.
B.
C.
D.
Holmes works as a Programmer for HiTech Institute. He develops an ASP.NET application named LibraryRecord by using Visual Studio .NET. The LibraryRecord application uses a SQL Server database named Database1. Database1 contains two tables: Students and Books. The Students table comprises three columns: StudentID, StudentName, and BookID. The Books table comprises two columns: BooksID and BooksName. Holmes creates a stored procedure that returns the records of all students who borrowed books from the institute. What will Holmes do to retrieve the records of the issued books most efficiently?
A. Use the INNER JOIN keyword in his query.
B. Use the INNER JOIN keyword more than once in his query.
C. Use the LEFT OUTER JOIN keyword in his query.
D. Use the WHERE clause in his query.
You work as a Web Application Developer for SunInfo Inc. The company uses Visual Studio 2008 as its application development platform. You create a Web application using .NET Framework 3.5. You want to redirect users to a default error page if an unhandled error occurs within your site. Which of the following actions will you perform to accomplish the task?
A. Set the mode attribute of the customErrors element to Off and the defaultRedirect attribute to an error page within your site.
B. Set the statusCode attribute of the error element to 404 and the redirect attribute to a custom error page.
C. Set the mode attribute of the customErrors element to On and the defaultRedirect attribute to an error page within your site.
D. Set the redirect attribute of the error element to an error page within your site.
You work as a Software Developer for Mansoft Inc. You create an application. You want to use the application to encrypt data. You use the HashAlgorithmType enumeration to specify the algorithm used for generating Message Authentication Code (MAC) in Secure Sockets Layer (SSL) communications. Which of the following are valid values for HashAlgorithmType enumeration?
Each correct answer represents a part of the solution. Choose all that apply.
A. RSA
B. None
C. DES
D. MD5
E. SHA1
F. 3DES
Sam works as a Software Developer for BlueWell Inc. He develops two applications: MyApp1 and MyApp2 using Visual Studio .NET 2005. He wants to ensure that both these applications use the same assembly named Assembly1. Therefore, he signs Assembly1 with a strong name for each application. What is significant about the strong name that consists of the assembly's identity?
Each correct answer represents a part of the solution. Choose all that apply.
A. A strong name assures the uniqueness of a name.
B. A strong name protects the root version of an assembly.
C. A strong name provides a strong integrity check.
D. A strong name creates different versions of an assembly.
You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2005 as its application development platform. You have recently finished development of a Windows application using .NET Framework. Users report that
the application is not running properly. When the users try to complete a particular action, the following error message comes out:
Unable to find assembly 'myservices, Version=1.0.0.0, Culture=neutral,
PublicKeyToken=29b5ad26c9de9b95'.
You notice that the error occurs as soon as the application tries to call functionality in a serviced component that was registered by using the following command:
regsvcs.exe myservices.dll
You must make sure that the application can call the functionality in the serviced component with no exceptions being thrown. What will you do to accomplish this task?
A. Run the command line tool: regasm.exe myservices.dll.
B. Copy the serviced component assembly into the C:\Program Files\ComPlus Applications fold er.
C. Run the command line tool: gacutil.exe /i myservices.dll.
D. Copy the serviced component assembly into the C:\WINDOWS\system32\Com folder.
You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create an ASP.NET Web application using .NET Framework 3.5. The application uses the health monitoring events to raise application audit events in the following situations:
l When users login
l When users modify their password
l When users perform other security-related actions
You must ensure that the application logs all audit events for all applications on the Web server.
What will you do?
A. Configure the eventMappings Element in the Web.config file to allow an entry for success a udits.
B. Configure the eventMappings Element in the Web.config file to allow a single entry for auditing events that is present for all audits.
C. Configure the eventMappings Element in the Machine.config file to allow an entry for success audits.
D. Configure the eventMappings Element in the Machine.config file to allow a single entry for auditing events that is present for all audits.
Allen works as a Software Developer for ABC Inc. He develops an application using Visual Studio .NET
2005. The application will be used for the registration of employees by filling a form provided in the application. The form contains the following fields:
l First Name
l Last Name
l Date of Birth
l E-mail
He provides a TextBox control for each field. He wants an employee to be able to receive a user- defined error message when he makes a wrong entry. Which of the following properties is mandatory if a
CustomValidator control is used to validate an entry?
A. EnableViewState
B. EnableTheming
C. ErrorMessage
D. IsValid
You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You are in process of creating an application using the .NET Framework 2.0. The application must collect data from different streams by performing the following operations:
l Reading data from the byte stream l Reading data from the memory stream l Reading data from the file stream Which of the following stream classes will you use to accomplish the task? Each correct answer represents a part of the solution. Choose all that apply.
A. MemoryStream
B. StreamWriter
C. FileStream
D. StreamReader