Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Microsoft 70-547(CSharp) Exam - Cheat-Test.com

Free 70-547(CSharp) Sample Questions:

Q: 1 You create Web-based client applications. You are creating a sales management application. The application will be used to produce sales orders. Sales data, including orders and product information, is stored in a central Microsoft SQL Server 2005 database. The application uses Microsoft Windows Integrated security to access data. You test the application component that is used to retrieve sales order information from the database. The tests are successful. You check the code back into the source control so that the other testers can utilize the code. The testers notify you that the application fails to connect to the database in the test environment. You test the application again and the tests are successful. You need to recreate the bug environment to investigate and resolve the bug. Which three aspects of the testing environment should you take into account? (Each correct answer presents part of the solution. Choose three.)
A. Web server processor speed
B. Database security settings
C. Network bandwidth
D. Web server available memory
E. Network credentials used for testing
F. Impersonation settings
Answer: B, E, F

Q: 2 You create Web-based client applications. You are creating a Web control that includes data entry fields. The Web control also includes data validation code. The data validation code verifies whether the user has entered a valid date and a valid postal code in a text box. You are writing the code within the Web control to handle the invalid data. The Web control must work on as many browsers as possible. You need to design an appropriate feedback technique. What should you do?
A. Throw an exception, and include details about the invalid data in the Message property.
B. Throw an exception, and include details about the invalid data in the InnerException property.
C. Use a pop-up error message to inform the user that the data is not valid.
D. Display text to indicate why the data is not valid.
Answer: D

Q: 3 You create Web-based client applications. You are creating a content management system (CMS). You intend to sell CMS to your customers. It is important that customers customize the appearance and behavior of the CMS installation because the system will be used for external Web sites. However, your customers are not programmers. The customers will not be able to modify complicated source code to customize the appearance and behavior of their Web sites. You need to create the system in such a way that customers can modify the appearance and behavior of their Web sites by editing the minimum number of files, ideally one or two. Which strategy should you use?
A. By using ASP.NET Server Controls and class inheritance, create a template system that permits controls to inherit the appearance and behavior of their inherited class. Permit users to modify the root classes of the hierarchy to rearrange completely the appearance and behavior of their Web sites.
B. Create a set of ASP.NET master pages and associate every page in your system by using a specific master page. Permit users to modify these master pages to rearrange completely the appearance and behavior of their Web sites.
C. Configure your system to output completely compliant XHTML and use cascading style sheets (CSS) to create the visual layout of the pages. Permit users to modify the CSS files to rearrange completely the appearance and behavior of their Web sites.
D. Create the root pages by using ASP.NET #include directives to pull in the relevant sub-pages. Permit users to modify these root pages as desired to rearrange completely the appearance and behavior of their Web sites.
Answer: B

Q: 4 You create Web-based client applications. You are creating an ASP.NET intranet site. The site permits individual departments to post content without involving the Central Information Technology resources. The site also permits Central Information Technology to maintain control over the intranet as a whole. Each department wants complete control over the appearance and behavior of their departmental content. However, Information Technology directives require every page on the intranet to maintain a consistent appearance and behavior. You need to develop the Web page on the intranet site so that it meets the requirements. What should you do?
A. Create a single ASP.NET master page and individual department master pages. The pages must refer to the master page. Permit each department to modify its master page as desired as long as it references the company master page.
B. Create a set of common .aspx files that contain the common style sheets and the header, navigation bar, and footer content that are to be referenced from departmental home pages by using ASP.NET #include directives.
C. Create a base class that inherits from System.Web.UI.Page and design this page to control the common user interface elements.
D. Create the home pages for all departments as ASP.NET server controls. Reference each control from the main project and load the appropriate server control when a departments home page is loaded.
Answer: A

Q: 5 You create Web-based client applications. You are creating a user-assistance mechanism for a Web form. The Web form serves as a multilevel wizard for clients to set up a new inventory for items.
The user-assistance mechanism must meet the following requirements:
Enable entry-level users to understand every step of the multilevel wizard process.
Ensure that users complete the multilevel wizard on their first try.
You need to select the appropriate user-assistance mechanism to meet the outlined requirements. What should you do?
A. Place a Help link and a hidden label next to each field on each step of the wizard. The label must contain a brief description of the purpose of the field. Click the Help link to make the label visible.
B. Place a Help link at the bottom of each step of the wizard, which opens a Web-based Help document for the entire wizard.
C. Place a description of each step of the wizard on the first page of the wizard, before the user has entered any data.
D. Place text containing user assistance for each step of the wizard at the top of that step.
Answer: D

Q: 6 You create Web-based client applications. Your client company has an existing ASP.NET Web-based application. The Web-based application uses a combination of HTML and client-side scripting to deliver online training content. Your client company has asked you to enhance the application to deliver interactive multimedia content. The enhanced application must support dial-up users. You need to recommend an appropriate multimedia delivery mechanism for the application. What should you recommend?
A. Dynamic HTML
B. Streaming video
C. Vector graphics animation
D. XML/XSLT
Answer: C

Q: 7 You create Web-based client applications. You are designing an extranet site for a company of trading partners.
You decide to use the following technologies:
Windows Authentication
XML to transfer data between the company and the traders
Before implementation, these technologies must be validated. You propose the following approach to perform the validation:
Coordinate a test set of Active Directory accounts for one trading partner.
Provide the trading partner access to a test site that has logon facility.
Distribute the XML schema that permits the partner to access data.
You need to evaluate whether the approach validates the proposed technology successfully. What should
you conclude?
A. The approach validates the use of the proposed technology for the application.
B. The approach does not validate the use of the proposed technology for the application. The company and
the partner need to create test applications. The test applications need to read data in the proposed XML schema to establish the validation.
C. The approach does not validate the use of the proposed technology for the application. The company and the partner need to coordinate their Active Directory tree into a shared Active Directory forest.
D. The approach does not validate the use of the proposed technology for the application. You must either use an existing publicly documented XML schema or register the shared XML schema by using an authentication site.
Answer: B

Q: 8 You create Web-based client applications. You are evaluating the design of an e-commerce Web site. The Web site processes credit card information. The Web site has a shopping cart and expects a high volume of traffic, especially during peak shopping times.
The design specifications for the application must meet the following criteria:
The application will be hosted on a Web farm.
The application will use SSL during the checkout process.
Shopping cart information will be stored in InProc session variables.
You need to evaluate the design of the application and recommend whether it is technically feasible and complete.
What should you conclude?
A. The design is technically feasible, but it is not complete. The application must be configured to use cookieless sessions. Each server on the farm must use a unique certificate.
B. The design is technically feasible and complete.
C. The design is technically feasible, but it is not complete. The servers must have their affinity set to a single host (sticky sessions).
D. The design is not technically feasible. The application cannot be hosted on a Web farm.
Answer: C

Q: 9 You create Web-based applications. You are creating an Internet banking application. The application will be used by bank account holders.
You are creating a method to withdraw money from an account. The method must change the account balance according to one of the following rules:
If the amount that is being withdrawn is less than or equal to the account balance, then subtract the amount from the balance. If the amount that is being withdrawn is greater than the account balance by up to 500 dollars, then subtract the amount and a 35-dollar fee from the balance.
If the amount that is being withdrawn is greater than the account balance by more than 500 dollars, then generate an error.
You are translating the specification given here into pseudo code. You start by writing the following code.
Method
public void Withdraw Input parameters decimal amount Class field decimal balance Pseudo code //your
pseudo code
You need to insert the correct pseudo code. Which code segment should you insert?
A. If amount < balance then balance - = amount
If amount < balance + 500 then balance = balance - (amount + 35)
If amount > balance + 500 then throw exception
B. If amount <= balance then balance - = amount
If amount < = balance + 500 then balance = balance - (amount + 35)
If amount > balance + 500 then throw exception
C. If amount < balance then balance - = amount
Else If amount < balance + 500 then balance = balance - (amount + 35)
Else throw exception
D. If amount <= balance then balance - = amount
Else If amount < = balance + 500 then balance = balance - (amount + 35)
Else throw exception
Answer: D

Q: 10 You create Web-based client applications.
You are designing a database that must meet the following requirements:
Store data about people in the People table and data about the companies they work for in the
Companies table.
Track an unlimited number of companies for a person.
Track an unlimited number of persons who worked at each company.
You decide to create a one-to-many link from the People table to the Companies table. You need to evaluate whether the database is designed effectively and make a recommendation, if required. What should you recommend?
A. The database is not correctly designed according to the requirements. You must create a many-to-many link between the People table and the Companies table by using an intersection table.
B. The database is not correctly designed according to the requirements. You must create a many-to-many link directly between the People table and the Companies table.
C. The database is not correctly designed according to the requirements. You must create a one-to-many link from the People table to the Companies table. Create another one-to-many link from the Companies table to the People table. Add columns to the People table and the Companies table to accommodate multiple child rows.
D. The database is correctly designed according to the requirements. No changes are required.
Answer: A

Q: 11 You create Web-based client applications. All Web-based applications are created by using ASP.NET. Larger applications are hosted on Web server farms. The larger applications appear to intermittently lose session state information for users. You need to correct the problem. What should you do?
A. Add additional servers to the Web farm to accommodate load. Configure the entire Web farm to reside in the same domain. Configure IIS on each server to have domain-level administrative permissions.
B. Modify the Web.config file and set the mode attribute of the sessionState element to InProc. Restart IIS on each associated Web server.
C. Modify the Web.config file and set the mode attribute of the sessionState element to StateServer. Start the state service on each associated Web server.
D. Modify the Web.config file and set the mode attribute of the sessionState element to None. Configure IIS on each Web server to make state information available to all servers in the Web farm.
Answer: C

Q: 12 You create Web-based applications. You are creating an application that manages travel arrangements. Users can book business trips through the application and submit their expense reports. The current design specifies that 10 components are consumed by the application. You need to identify the components that require integration testing. Which three components should you choose? (Each correct answer presents part of the solution. Choose three.)
A. public Web service to retrieve weather information
B. third-party Web service to book flights
C. third-party Web service to book car rentals
D. locally hosted COM+ component to book hotels
E. locally hosted data access component to access a central database
F. the .NET Framework Web server controls
Answer: A, B, C

Q: 13 You create Web-based applications. You are creating an application for purchase order management. The application is composed of a Web client, business logic components, a Data Access Component (DAC) Web service, and a central database.
The application design meets the following specifications:
The Web-based client application is used for end-user interaction.
The Web-based client application uses two business logic components named Order and Customer.
Each customer can have multiple orders.
Each order belongs to a single customer.
The business logic components use a DAC Web service.
The business logic components make data available to the Web-based client application.
You receive a deployment diagram as shown in the following exhibit. (Click the Exhibit button.)

You need to evaluate the diagram to ensure that it complies with the specifications. What should you conclude?
A. The diagram complies with the specifications.
B. The diagram is incomplete. It needs a dependency from the Web client component to the Microsoft Data Access component.
C. The diagram is incomplete. It needs a dependency from the Data Access component to the Order component.
D. The diagram is incomplete. It needs a dependency from the Order component to the Web-based client application.
Answer: A

Q: 14 You create Web-based client applications. You deploy an application for a company. The application enables customers to access mobile phone invoices. Users report that the application fails to respond and time-outs occur. You test the application and find that the reports are valid. You need to identify the cause of the problem. Which analysis strategy should you use?
A. Start the performance MiCTOsoft Management Console snap-in.
Change to the Report view.
Add all ASP.NET performance object.. < inters.
Look for high counts of requests queued and requests timed out.
B. Start the event viewer Microsoft Management Console snap-in.
Switch to the Application view.
Look for high counts of number of requests timed that are shown at configured intervals.
C. Start the performance Microsoft Management Console snap-in.
Change to the Report view.
Add all the network interface performance object counters.
Look for high counts of requests queued and requests timed out.
D. Open the Trace.axd file.
Scroll to the performance count category.
Look for high counts of requests queued and requests timed out.
E. Start the event viewer Microsoft Management Console snap-in.
Switch to the System view.
Apply a filter to show only ASP.NET related events.
Look for high counts of number of requests timed out that are shown at configured intervals.
Answer: A

Q: 15 You create Web-based client applications. You deploy an application on your company extranet. The application uses an ASP.NET 2.0 Membership system. The support team requires that changes in passwords be communicated to their Microsoft Windows Management Instrumentation (WMI) integrated system.
You propose the use of health monitoring APIs to perform the following actions:
Respond to password changes inside the application.
Call a custom event handler when a password change occurs.
Report the changes to the support teams WMI system by using the custom event handler.
You need to examine whether the proposed solution meets the requirements. What should you conclude?
A. The proposed solution meets the requirements.
B. The proposed solution does not meet the requirements. The health monitoring API does not support WMI directly.
C. The proposed solution does not meet the requirements. The output of the WMI export is done on a batch basis that relies on the Heartbeat method. The Heartbeat method will not permit event-driven interaction.
D. The proposed solution does not meet the requirements. The health monitoring API cannot ascertain successful password changes.
Answer: A


© 2014 Cheat-Test.com, All Rights Reserved