Microsoft Certification Exam Code : 70-548 Q.1
A. B. C. D.
Users do not have valid logons for SQL Server. Users do not have the correct permissions for the sales database. Client computers are not configured correctly to use network. The database server is not configured correctly to use network.
Ans : B Q.2
A. B. C. D.
Flow Layout Panel Group Box Panel Table Layout
Ans : D
Q.3
A. The use of XML might limit the number of customers who will use the application. B. The use of SQL Server 2005 might limit the number of customers who will use the application. C. The use of .NET Framework might limit the number of workstations that can use the application. D. The use of Window domain might limit the number of customers who will use the application. Ans : D
Q.4
A. B. C. D. E. F.
The database does not store data about managers. The data about employees and managers is stored in the same table. An employee can work for only one department. An employee can work for any number of departments. An employee has only one job title. An employee can have any number of job titles.
Ans : B,D,E Q.5
A. The computer does not have enough memory to perform the task. A memory upgrade is necessary. B. The computer does not have enough space in the paging file. The paging has to be extended. C. The application has a memory leak. The application needs to be debugged to find the root cause. D. The application consumes too much processor time. The application needs to be debugged to find the root cause. Ans : D Q.6
Q.7
A. Write code to convert the video files to Microsoft Windows Media Video(WMV) format in real time. B. Convert the video files to Microsoft Windows Media Video(WMV) format, and requires the video to bit rate that is acceptable. C. Write a custom file format filter for Microsoft DirectShow , and distribute the filter to the client computers. D. Convert the video files into separate audio and video files. Ans : B Q.8
Q.9
A. Bitmap and Progress Bar Type properties, the Increment method for the original component. B. Bitmap and Progress Bar Type properties, the Increment method for the original component, and the Increment method for extended component. C. All properties and method for the original component. D. All properties and method for the original component and the extended component. Ans : B Q.10
A. Profile the performance of the component frequently by using common language runtime (CLR) profiler to identify potential performance constraints. B. Hold weekly code reviews to permit other developers to spot potential performance issues before they arise. C. Include custom instrumentation that will record performance data of various operations, including the context of each operation. D. Include a series of tests that will automatically time the operations of the component and find whether the performance of the component is getting better or worse. Ans : C
Q.11
A. B. C. D.
AreSame IsInstanceOfType IsNotNull Inconclusive
Ans : C Q.12
A. B. C. D. E.
Windows-based application Assemblies in the global assembly cache Database on the SQL Server 2005 server Web Service on the IIS 6.0 Server Number of assemblies installed by the application
Ans : C,D Q.13
A. Design the component as a single –threaded component. B. Design the component as a single –threaded apartment component. C. Design the component as a multi –threaded component that has a thread for user input and a thread for graphics. Grant the user input thread higher priority than the graphics thread D. Design the component as a multi –threaded component that has a thread for user input and a thread for graphics. Grant the user input thread lower priority than the graphics thread Ans : C Q.14
A. B. C. D.
Test all methods. Do not test exceptions. Test all other methods. Test all code, including variable declarations. Do not test accessor methods. Test all other methods and exceptions.
Ans : B
Q.15
A. B. C. D.
MenuStrip ContextMenuStrip GroupBox TabControl
Ans : D Q.16
Q.17
A. B. C. D.
Create Create Create Create
a a a a
Microsoft Windows Installer MSI installation. ClickOnce deployment. setup executable that installs your application. Web Deployment installation.
Ans : B Q.18
A. Use an XMLReader object to retrieve inventory data from the database and populate a DataSet object. B. Use a DataAdapter object to retrieve inventory data from the database and populate a DataSet object. C. Use methods from the DataSet class to generate a new XML file that contails data to be used to generate a purchase order. D. Use methods from the DataSet class to generate a new XMLDataDocument object that contains data to be used to generate a purchase order. E. Use and XSLCompiledTransform object to generate the purchase order XML file. F. Use and XMLWriter object to generate the purchase order XML file. Ans : B,D,E Q.19
A. B. C. D.
The The The The
solution solution solution solution
meets both the design requirements. does not meets any of the design requirements. meets the second requirements but not the first requirements. meets the First requirements but not the Second requirements.
Ans : D Q.20
A. Write a code segment to throw an application exception. B. Set a custom property of the composite user control to indicate a data validation error. C. Write a code segment to display a message box if the user enters blocked email address. D. Write a code segment to clear the txtEmailAddress text box if the users enters a blocked email address. Ans : C
Q.21
A. Create a performance counter to moniter memory. Raise an event when memory reaches the critical value. Change the external application to subscribe to the event. B. Create a performance counter to moniter memory .Call the external application when the counter reaches the critical value. C. Use the existing memory performance counters in the operating system. Call the external application when the counter reaches the critical value. D. Use the existing memory performance counters in the operating system. Use system moniter to create an alert to launch the external application when the counter reaches the critical value. Ans : D Q.22
A. Place the business components in a component load-balancing cluster. B. Add a database server to the network and place the database in a failover cluster. C. Add a Web server to the network and place the Web servers in Network Load Balancing cluster. D. Maintain an offline copy of the business components on a backup server. E. Maintain and offline copy of the Web services on a backup server. Ans : B,C
Q.23
A. Create a reference form with the correct branding and copyright information and copy and paste the controls on this form to all others form. B. Create a user control with the correct branding and copyright information and add the user control to each form.
C. Create a base form with the correct branding and copyright information and require all forms in the application to inherit from the base form. D. Create an image with the correct branding and copyright and add a picture box control to each form to display the image. Ans : C
Q.24
Q.25
A. B. C. D.
The design meets all the requirements. Change the Window Based application to use Window Authentication. Change the Web Services to impersonate the caller. Change the database schemas to use stored procedures in C#.
Ans : C Q.26
A. Separate the code that accesses the database as a COM + component. B. Separate the code that accesses the database as Web service. C. Separate the code that accesses the database as a different window based application. D. Add a generic server to the application logical datacenter to host the database access component. E. Add a Web server to the application logical datacenter to host the database access component. Ans : B,E Q.27
Q.28
A. B. C. D. E.
Implements Implements Implements Implements Implements
Ans : C,E Q.29
only private constructors for the Account Class. only private constructors for the SavingAccount Class. only internal constructors for the Account class. the SavingAccount class as an abstract public class. the SavingAccount class as a concrete non-inheritable class.
A. B. C. D.
Use Use Use Use
a single complex string concatenation. an array of string. an ArrayList object. a StringBuilder object.
Ans : D Q.30
A. Add an event handler for the TextChanged event for the txtAmount textbox to validate the data typed by the user. B. Add an event handler for the Validating event for the txtAmount textbox to validate the data typed by the user. C. Add a Try…Catch block to the cmdDeposit_Click method. D. Add a Try…Catch block to the ATMDeposit_Load method. E. Add a Try…Catch block to the ATMDeposit constructor.
Ans : B,C
Q.31
A. Create an application configuration file to store the connection string. Change the code to read the connection string from the configuration file. B. Create an XML file in the application folder to store the connection string. Change the code to use an XMLReader object to connect to a file stream and read the connection string. C. Create a component that returns the connection string. Change the code to use the component to get the connection string. D. Create a text file to store the connection string. Change the code to use a TextReader object to connect to file stream and read the connection string. Ans : A
Q.32
Q.33
A. B. C. D.
Data access component Business login component Control Library Data structure component
Ans : C Q.34
A. B. C. D.
Use Use Use Use
Transact-SQL that returns relational data. Transact-SQL that returns XML data. the .NET Framework language that returns relational data. the .NET Framework language that returns XML data.
Ans : A Q.35
A. B. C. D. E.
Security credential of the logged on user Code access security settings Hardware settings Network settings Database settings
Ans : C,D Q.36
A. B. C. D. E.
ASP.NET Web Service SQL connection over a Virtual Private Network(VPN) connection. Microsoft Message Queuing .NET Remoting. COM+ component.
Ans : A Q.37
A. All methods that are used by the application from the externally developed Web service. B. All methods that are used by the application from the internally developed and externally developed Web services. C. All methods that are exposed by the externally developed Web service. D. All method that are exposed by the internally developed and externally developed Web services. Ans : B
Q.38
A. Ask an administrator to enable Windows Integrated authentication in IIS. B. Modify the code access security machine policies for the computer running the code such that the code is permitted to execute. C. Change the SecurityAction from Demand to Deny. D. Ask an administrator to add the users to the YourDomain/Manager group. Ans : D
Q.39
Q.40
A. Update the status bar text in the main Window to indicate that a new incident is assigned to the user. B. Toggle the CAPS lock so that an LED on the users keyboard flashes to indicate that a new incident is assigned to the user.
C. Display a Microsoft Outlook style pop-up message from the system tray to indicate that a new incident is assigned to the user. D. Play a configurable sound to indicate that a new incident is assigned to the user. Ans : C Q.41
A. Firewall settings are blocking access from the Web server to the database server. B. Firewall settings are blocking access from the client computers to the web server. C. The Web server is offline. D. The database server is offline. Ans : A Q.42
A. B. C. D.
Presentation tier Business tier Data Access tier Data tier
Ans : A Q.43
A. Declare the class constructors as private. B. Declare the class constructor as internal. C. Declare a public static method to retrieve an existing instance of the class ,or a new instance if one does not exist. D. Create a public instance method to retrieve an existing instance of the class ,or new instance if one does not exist. E. Declare a private static method to retrieve an existing instance of the class ,or a new instance if one does not exist. Ans : B,C Q.44
A. B. C. D.
SQL injection can be used to execute malicious SQL statements. Code injection can be used to elevate privileges of malicious code. A buffer overflow can be caused by typing a very large string in the text box. Canonicalization can be used to add invalid characters to the search string.
Ans : A Q.46
A. Create a custom Window user control that inherit from CheckedListBox control. B. Use a multi-select ListBox control that display the possible answers. C. Use a Textbox control for the user th enter answers separated by commas. D. Use a CheckedListBox control to display the possible answers. Ans : A Q.47
A. The design meets the requirements. Logon and logoff events are tracked in the security log for the local maching. B. The design does not meet the requirements. The application must be changed to use tracing to send data to the security log. C. The design does not meet the requirements. The application must be changed to use tracing to send data to local database. D. The design does not meet the requirements. The application must be changed to use tracing send data to a database server. Ans : D Q.48
A. Design the thermometer component as a movable tool window that is always displayed as the top most Window. B. Design the thermometer component as part of the main questionnaire form that is always visible. C. Design the thermometer component to be displayed as modal Window when the insurance agent clicks a button. D. Design the thermometer component to display a non- modal Window that can be dismissed by the insurance agents when they are ready to ask the next question. Ans : B Q.49
A. Assert.AreEqual(100M,target.Balance);
B. Assert.IsTrue(target.Balance!=100M); C. Debug.Assert(target.Balance==100M,passed); D. Debug.Assert(target.Balance==100M,failed); Ans : A
Q.50
Q.52
A. The application is consuming too much network resources. It is necessary to debug the application to find out if the issue is related to the application , the network, or the database server. B. The application is consuming too much network resources. A faster network interface card is required to make the application performance better.
C. The application is consuming too much processor time. It is necessary to debug the application to find the root cause. D. The application is consuming too much processor time. A faster processor is required to make the application perform better. Ans: A
Q.53
Q.54
Q.55
Q.56
A. Use a listener to trace data to the Window System log. B. Use a listener to trace data to a text file in the local machine. Protect the file by using NTFS permissions. C. Write code to save log information to a database server. Configuration the database so that only administration can access it. D. Write code to save log information to an XML file in file share . Configure the share so that only administrators can access it. Ans : C Q.57
Q.58
A. B. C. D.
Use Use Use Use
Ans : C
Q.59
Q.60
a XML file stored in the application folder. the HKEY_LOCAL_MACHINE hive to store user settings. a table in a central database to store setting for each user. a serialized settings class and store an object for each user in memory.
A. Use an ODBC DSN instead of a connection string. B. Use OleDbDataAdapter object instead of SqlDataAdapter object to populate the dataset. C. Add a line of code before line 14 to open the database connection. D. Add a try … catch block and close the connection in the catch block. E. Add a try… catch … finally block and close the connection in the finally block. Ans : C,E
Q.61
Q.61
A. B. C. D. E.
User Name Name of the last used database List of databases the user has access to Type of chart Display settings
Ans : B,D,E Q.62
A. B. C. D. E. F. G.
Directory Services File IO OleDB User Interface SQL Client Printing Isolated Storage File
Ans : B,D,F Q.63
A. The application performance meets the requirements. The spikes display specific points In time when the application usage is at its peak. B. The analysis of the performance chart conclusively indicates that the application has a bug that needs to be fixed. C. The analysis of the performance chart is inconclusive .Code profiling must be used to find what happening with the application. D. The analysis of the performance chart is inconclusive. A load test must be used to find what is happening with the application. Ans : C Q.64
A. Add a Try block on line 03 along with a matching Catch block beginning on line 08 to handle the possible exception. B. Add a Try block on line 03 along with a matching Finally block beginning on line 08 to handle the possible exception. C. Add the following code of line 03 if(cn.ConnectionState! =ConnectionState.Open). D. Add the following code of line 03 if(cn.ConnectionState==ConnectionState.Closed).
Ans : C
Q.65
A. Write code complete. B. Write code C. Write code D. Write code processed. E. Write code
to change the title bar text of the application when the process is to reset the progress bar to its minimum value. to play a sound that indicates the process is complete. to update the status bar text to indicate the number of records to display an animated balloon tip when the process is completed.
Ans : C,E
Q.66
A. Use a modal dialog box to show each alert and to permit the user to trade stocks. B. Use a message box to show each alert and the main application form to permit the user to trade stocks. C. Use a Balloon Tip control to display multiple alerts and the main application form to permit the user to trade stocks. D. Use a custom Balloon Tip control to display multiple alerts and to permit the user to trade stocks. Ans : D
Q.67
A. Add to the form a context menu that has add to invoice and Remove from Invoice menu items. B. Add to the form a menu that has Add to Invoice and Remove from Invoice menu items. C. Add to the form a KeyPress event handler that toggles between Add to Invoice and Remove from Invoice modes. D. Add to form a ToolStrip control that has a button that toggles between Add to Invoice and Remove from Invoice modes. Ans : C
Q.68
A. The report is inconclusive. A sample profiling is required to verify the requirements. B. The report is inconclusive. A load test is required to verify the requirements. C. The report is conclusive. The requirements are not met. D. The report is conclusive. The requirements are met. Ans : D
Q.69
Q.70
Q.71
A. B. C. D. E.
Banking user interface IAccount Customer DACBank Bank database
Ans : C,D