Hi,
Below is the link for MCTS 70 536 Exam Dump Images:
http://www.esnips.com/web/shaiksameercsesStuff
Have Fun.
Regards
Sameer Shaik
Free Online Training VIDEOS,SAMPLES,TUTORIALS ON MCTS EXAM C#.NET(MS VISUAL STUDIO) Thanks for your support. The blog is getting bigger and better day by day. please check out : www.blog.sameershaik.com for further interesting articles on other microsoft certification examinations
Search this blog
You can search for all the topics in our blog using our google custom search now.
Search the blog
Loading
Saturday, December 25, 2010
MCTS 70 536 Exam Dump Images
Technology Focus Questions 70 536
|
QUESTIONS Technology Focus: Implementing service processes, threading, and applications domains in a .NET Framework application
1. You create a Windows service application that consists of two services. One service monitors a directory for new orders and the other service replicates a database table with the most up-to-date inventory information.You need to develop a project installer class to install these services.What should you do? (Each correct answer presents part of the solution. Choose two.).
A. Instantiate one ServiceProcessInstaller instance and add it to the project installer class.
A. Instantiate one ServiceProcessInstaller instance and add it to the project installer class.
B. Instantiate two ServiceInstaller instances and add them to the project installer class.
C. Instantiate two ServiceProcessInstaller instances and add them to the project installer class.
D. Instantiate one ServiceInstaller instance and add it to the project installer class.
E. Instantiate one ComponentInstaller instance and add it to the project installer class.
F. Instantiate two ComponentInstaller instances and add them to the project installer class.
2. You are developing a Windows service application by using the .NET Framework. You need the application to perform several short tasks that require background processing. You do not want to actively manage threads in your application. You must ensure that security checks are performed during the execution of a task. Which method should you use to start a task in your application?
A. ThreadPool.QueueUserWorkItem
B. ThreadPool.UnsafeQueueUserWorkItem
C. Thread.Start
D. Thread.Resume
3. You are developing a Windows service application by using the .NET Framework. You need to synchronize execution of some resources across multiple processes. Which class should you use to accomplish this in your application?
A. Mutex (THIS IS THE ANSWER)
B. Monitor
C. Interlocked
D. Mutex
QUESTIONS Technology Focus: Embedding configuration, diagnostic, management, and installation features into a .NET Framework application
1. You develop a Windows application by using the .NET Framework. The application makes use of an assembly named MyAssembly. The assembly file MyAssembly.d11 is deployed in a folder named bin20 under the application's root directory. The MyAssembly assembly is not strongly named.
You must configure the Windows application to specify the location of the MyAssembly assembly. Any settings that you change must not affect other applications installed on the system. What should you do?
A. Modify the application configuration file to add the following settings to the section:
B. Modify the application configuration file to add the following settings to the section: >
C. Modify the machine configuration file and add the following settings to the section for the MyAssembly assembly:
D. Modify the machine configuration file and add the following settings to the section for the MyAssembly assembly:
2. You have deployed an application that uses a dependent assembly named TaxCalc. It was written to work with version 1.1.3.6 of TaxCalc, but has been tested successfully through version 2.1.1.0. The user updates the TaxCalc assembly to version 2.1.1.2 and your application no longer runs.
Several other applications on the computer use TaxCalc. The other applications on the computer can run with the new version of TaxCalc.You need to ensure that your application works with a supported version of TaxCalc that is installed on the computer. Your solution should allow other applications to continue to use the latest version of TaxCalc.What should you do?
A. Add the following to the publisher configuration file for the TaxCalc assembly:
B. Add the following to the application configuration file:
C. Add the following to the application configuration file:
|
QUESTIONS Technology Focus:Implementing serialization and input/output functionality in a .NET Framework application
1. You are developing a logging module for a large application by using the .NET Framework.You need to append logging information to a file named application.log. This log file is opened when the application is started and is closed only when the application is closed. However, you append text several times to the file during a session.
You must minimize overhead to the logging process to ensure maximum performance.Which code segment should you use to create the log file?
|
|
|
|
2. You are developing a class library by using the .NET Framework. You create the following classes:
|
You must be able to serialize the objects of the Encyclopedia class to a disk file. What should you do?
|
|
|
|
3. You are developing a Windows application by using the .NET Framework. The application uses a shared assembly for personalizing the user interface of the application.The same assembly is used by several other applications on the user's machine. Any changes in the user preferences in one application must be carried over to other applications.
You need to access the user's preferences for displaying the user interface.What should you do?
A: Use the IsolatedStorageFile.GetMachineStoreForAssembly method
B: Use the IsolatedStorageFile.GetMachineStoreForDomain method.
C. Use the IsolatedStorageFile.GetUserStoreForDomain method.
D: Use the IsolatedStorageFile.GetUserStoreForAssembly method.
QUESTIONS Technology Focus:Improving the security of .NET Framework applications by using the NET Framework security features
1. You use the .NET Framework to develop a client-server application. The server part of the application runs on a computer running Microsoft Windows Server 2003. All client computers run Microsoft Windows XP Professional. You need to write code that performs authentication and establishes a secure connection between the server and the client. You must make sure that the Kerberos protocol is used for authentication.
You must also make sure that data is encrypted before it is transmitted over the network and decrypted when it reaches the destination. Which code segment should you use?
|
|
|
|
2. You develop a .NET Framework application. This application is deployed throughout the company on all workstations. All workstations are networked and are part of a Microsoft Windows domain.
Your application requires certain permissions in order to run. As a domain administrator, you configure the enterprise policy to grant the required permissions to the application. This application may be part of more than one code group.
You must make sure that your application receives sufficient permissions to run at all times. You must override any policy changes made by end users that lower the permissions required by your application to run.What should you do?
A: Apply the Exclusive attribute to the application's code group on the enterprise policy level.
B: Apply the LevelFinal attribute to the application's code group on the user policy level.
C: Apply the LevelFinal attribute to the application's code group on the enterprise policy level.
D: Apply the Exclusive attribute to the application's code group on the user policy level.
3. You develop a .NET Framework application. The assembly is added to these four code groups at the Enterprise level policy:
* All Code code group with a permission set of Everything
* Known Code code group with a permission set of Local Intranet
* Unknown Code code group with a permission set of Internet
* Restricted Code code group with a permission set of Nothing
* Known Code code group with a permission set of Local Intranet
* Unknown Code code group with a permission set of Internet
* Restricted Code code group with a permission set of Nothing
The assembly is not a member of any other code groups.When the assembly is executed, what permissions does the Common Language Runtime (CLR) assign to the assembly?
A: Internet
B: Everything
C: Local Intranet
D: Nothing
MCTS Exam 70 536 Latest Dumps
Hi,
Below is the link for Latest Mcts 70 536 Brain dumps :
http://www.esnips.com/web/shaiksameercsesStuff
Enjoy.
Regards
Sameer Shaik
Below is the link for Latest Mcts 70 536 Brain dumps :
http://www.esnips.com/web/shaiksameercsesStuff
Enjoy.
Regards
Sameer Shaik
MCTS Exam 70 536 Preparation Notes By Pritam Singha
My dear friends,
One of our visitors has decided to share his preparation material with us. Recently he has cleared his mcts 70 536 examination with 930/1000 and he has decided to share his preparation material with all of us who seek to crack this examination. I really appreciate you guys for coming forward and helping me build this blog to make it useful to each one of us.Once again, thanks and congratulations pritam.
Regards
Sameer Shaik
PREPARATION MATERIAL FOR MCTS EXAMINATION 70 536
*****************************************50-100**********************************************
The BooleanSwitch class is used to toggle trace messages on and off.
If the value is 0, then the BooleanSwitch object is turned off and the Enabled
property returns false.
ManagementObjectSearcher object is instantiated with the WQL query string on which to search.
When implementing the IFormatter interface, you must provide implementation for two methods
and three properties. The two methods, Serialize and Deserialize control how objects will be
stored from memory and loaded into memory, respectively. Both methods accept a Stream object
as an argument. The Serialize method also takes a generic object as its second argument and
uses the Stream argument to write the object. The Deserialize method returns the object using
the Stream argument. The Binder, Context, and Surrogate Selector properties must also be
implemented.
[ONSERIALIZED/ONDESERIALIZED]StreamingContext as an argument for accessing the read/write stream during serialization/deserialization not OnSerializing/DeSerializing QUESTIONnO:57&250
The UnknownNode event is fired when an unexpected element or node is detected that does not
map to the XmlSerializer object's expected type.This would allow easy deserialization for the Shipping object.
The number of files in the directory is evaluated by using the GetFiles method, which returns an array of FileInfo objects and retrieves the Length Property of the array.
The UnsafeDeserialize and Deserialize methods perform the same operation, but the UnsafeDeserialize method uses unmanaged code and requires more permission. Because the UnsafeDeserialize method uses unmanaged code,your code should be granted full trust to execute properly.
The FileInfo object represents the information about a system file[LIKE AS HOST FILE].[Q: 67]
FileStream class is already a buffered stream
The reset switch will set the specified security policy or policies back to their default state. The all switch refers to machine, user, and enterprise policy levels.
The SetAccessRuleProtection method accepts two Boolean arguments, the first of which indicates whether settings are protected from inheritance, and the second of which indicates whether to preserve the existing inherited access rule
Including the MD5CryptoServiceProvider and SHA1CryptoServiceProvider classes. They all inherit the ComputeHash method from the HashAlgorithm class. DSA class and DSACryptoServiceProvider class
DIFFERENCE BETWEEN DES & DSA CRYPTOSERVICEPROVIDER?
DES AND TRIPLE-DES:[data confidentiality] The DESCryptoServiceProvider class represents a managed cryptographic provider of the DataEncryption Standard (DES) symmetric algorithm. The DES symmetric algorithm is commonly used for data confidentiality, and it supports 64-bit keys.Because the same key and IV are needed for encryption and decryption, the CreateEncryptor and CreateDecryptor methods generate the appropriate ICryptoTransform object to alter the data.
DSA:[data intigrity] The DSACryptoServiceProvider class represents a managed cryptographic provider of the Digital Signature Algorithm (DSA) asymmetric algorithm. The DSA asymmetric algorithm is commonly used for digital signatures and data integrity, supporting 1024 bit keys. When instantiating a DSACryptoServiceProvider object, a public/private key pair is generated and a default hash is assigned.The SignData method takes a byte array representing the original data and returns the hashed and then signed byte array.
Since the RSACryptoServiceProvider class implements an asymmetric cryptography algorithm
that makes use of a set of related keys to encrypt and decrypt data this class is the correct choice in the scenario.
manifestactivated application > ApplicationSecurityInfo appInfo = new ApplicationSecurityInfo (appDomain.CurrentDomain.ActivationContext);
IF ASSEMBLY SAME PUBLISHER [Check(Assembly.GetCallAssembly().Evidence)]or SAME ORIGANATING INTRANET WEBSITE/: Check (Assembly.GetCallingAssembly ().Evidence);
Imperative role-based security can use the PrincipalPermission class or the IPrincipal object
directly. The PrincipalPermission class takes a user name and role as string arguments
representing the required membership.The IPrincipal object can be retrieved using the Thread.CurrentPrincipal property.
DYNAMICALLY LOAD ASSEMBLLY SPECIFIED WITH PATH USE 'REFLECTIONONLYLOADFROM'
DYNAMICALLY LOAD ASSEMBLLY RESOLVE LOCATION REQUEST TO CLR 'LOADFROM'
*****************************************50-100**********************************************
******************************************01-21*********************************************
ICOLLECTION > USED TO DEFINE PROPERTIES IN A COLLECTION
ILIST > DEFINE THE PROPERTIES OF A NON-GENERIC LIST IF ITEMS
ICOMPARABLE > SUPPORT "COMPARETO()" METHOD The IComparable interface is
typically used when you want to create a class whose objects can be sorted in either a list or collection.
ICOMPARER > SUPPORT "COMPARE()" METHOD
The AddFirst and AddLast
methods accept an element argument and return a LinkedListNode object as a pointer reference.
The AddBefore and AddAfter methods also return a LinkedListNode object, but they accept
another LinkedListNode indicating which node before or after to insert the element
******************************************01-21**********************************************
*****************************************22-49***********************************************
For a Windows service to run in an application process, you must invoke the Run method on the
ServiceBase class. The Run method is overloaded to accept either a single ServiceBase object or an array of ServiceBase objects.
To monitor and control the behavior of a Windows service, you should use the ServiceController class.[CONTROLS THE WINDOWS SERVICES]
The Priority property indicates the relative position of a thread in the wait queue when being scheduled for execution
The QueueUserWorkItem method takes a WaitCallback delegate as an argument and manages the tasks using background threads. This allows the developer to concentrate on business logic and requires minimal synchronization code.
The BeginInvoke method takes the same arguments as the method it references but also includes
an AsyncCallack delegate and a generic object.
The CreateDomain method of the AppDomain class is an overload method that can be used to
create an application domain.
LOADFROM & LOAD
LOADFROM, LoadAssembly FOR DOMAIN: APPDOMAIN OBJECT DOMAIN ONLY SUPPORT LOAD METHOD PAGE: 44
AND LOADFROM,LOAD,REFLECTIONONLYLOADFROM THOSE METHOD ALSO SUPPORTED BY "ASSEMBLY CLASS"
The OpenExeConfiguration method takes a
ConfigurationUserLevel enumeration value to indicate the visibility of the configuration settings.
Configuration config=ConfigurationManager.OpenExeConfiguration(ConfigurationUserLevel.None);
The value None means that the settings apply to all users. The OpenExeConfiguration method
returns a Configuration object representing the current configuration settings.
You should not add the RunInstaller attribute to the assembly because the RunInstaller attribute
is applied to a class, not the entire assembly.
The supportedRuntime element identifies the versions of the CLR with which the application can be run. The supportedRuntime element is only supported in assemblies built using.NET 1.1 or later.
The requiredRuntime element should only be used by assemblies built by using the .NET 1.0
Framework(NOT THE ANSWER)
The publicKeyToken attribute specifies the strong-named key,
and the culture attribute indicates the localization type.
The developmentMode element instructs the CLR to use the DEVPATH environmental variable to
locate assemblies. If you do not add this element to the machine.config file, the DEVPATH
environmental variable will be ignored.
The EventSourceCreationData object is used to configure a new event log source
The GetSystemProcesses and GetAllProcesses methods do not exist in the Process class
simultaneously facilitate uninterrupted execution: WRITELINEIF
****************************************22-49************************************************
*****************************************100-150*********************************************
EventInstance class > FOR EVENT LOG ENTRY
EventBuilder class > DYNAMICALLY GENERATED CLASS
The ThreadStart method can be used to create actively managed foreground threads.
QUEUSERWORKITEM METHOD AND WAITCALLBACK DELEGATE FOR BACKGROUND THREAD THOSE UNDER THE THREADPOOL STATIC CLASS
AUTOMIC & NON-BLOCKING UPDATES,MULTIPLE THREADS OR THREAD SAFE RUN > INTERLOCKED CLASS
MUTEX CLASS > synchronize execution of some resources
READER LOCK > synchronization scheme that employs shared locks together
SEARCH PRIVATE ASSEMBLIES AND ADD BASE APPLICATION'S DIRECTORY
AppDomainSetup.PrivateBinPath property should be used.[APPDOMAINSETUP NOT APPDOMAIN]
To have your code protected from being deadlocked you should avoid using the SyncLock
statement and replace calls to Monitor.Enter with calls to "Monitor.TryEnter"
It is possible to provide the common language runtime with configuration information for a new application domain using the AppDomainSetup class. The most important property is the
ApplicationBase when creating your own application domains which is used to define the root
directory of the application. Q: 140
GetSection method of the ConfigurationManager > FOR WINDOWS CLIENT APPLICATIONS
The ConfigurationSection is a new class in .NET Framework 2.0 which should be used as it allows you to read and write custom configuration sections. The method in the answer also provides strongly typed access to the custom configuration sections. Q: 144
The usage of the and elements are incorrect as the one is useful for
specifying the search path for private assemblies and the other will affect settings of applications that are already deployed
*****************************************100-150*********************************************
*****************************************151-300*********************************************
The WriteEntry method of the EventLog class should be used in the scenario as this method is
used to write the localized messages to the event log.FOR 151 QUESTION NUMBER
if you run the application in debug mode both the Tracer and Debug statements will be executed.
Win32_NetworkAdapterConfiguration object as this property is associated with the network adapter configuration.
ManagementEventWatcher > Set up a listener for events by using the "EVENTARRIVED"
As the Serializable attribute is not inherited by the derived classes you should add the attribute to both classes in the scenario.
UnknownElement event will be raised when the XmlSerializer encounters an XML element such as number, style and size.
serialize all public and non-public data > BINARY FORMATTER CLASS
DriveFormat and TotalFreeSpace properties of the DriveInfo class
Use the FileStream class >to view the required files byte-by-byte
To successfully read the user's preferences you should make use of the
IsolatedStorageFile.GetUserStoreForAssembly method should be used. The method retrieves
assembly-specific and user-specific data from the isolated storage
1.any code that you call to perform actions that your code has permissions to perform however the callers may not have permissions to perform. > envPerm.Assert()
2.Deny on all permissions other than the permission P and this will affect other
permissions.> envPerm.PermitOnly()
3.Demand method requires all the callers to have permissions to perform the specific action
The usage of the -resolvegroup option in the scenario is incorrect because the -resolvegroup
option is used to show the code groups that the specified user belongs to. PAGE : 203 NOT A ANSWER
RSACryptoServiceProvider class implements an asymmetric cryptography algorithm
that makes use of a set of related keys to encrypt and decrypt data
Type Library Exporter tool (tlbexp.exe) > This tool is used to generate a Com library from an assembly and should not be considered for usage in the scenario.
dateValue.Ticks > SUPERFAST SERIALIZE
CURRENTCULTURE > CULTURE SENSITIVE OPERATIONS
INVARRIENTCULTURE > CULTURE INSENSITIVE OPERATIONS
System.UInt16 IS NOT GRATER THAN 65,535
ServiceInstaller.StartType controls how the service will start up automatically or manually
DRAG AND DROP > 1.DRIVEINFO.GETDRIVES METHOD 2. DRIVE INFO CLASS 3. DRIVEINFO.TOTALSIZE PROPERTY
DRAG AND DROP > 1.FILESECURITY OBJECT 2.FILESYSTEMACCESSRULE OBJECT 3.NEW FILESTREAM OBJECT/FILETSREAM CONTRUCTOR
DRAG AND DROP > 1. SYSTEM.TIMERS.TIMER 2.ONSTART METHOD 3.ELAPSED EVENT HANDLER
DEMAND METHOD : force all callers in the call stack
Assert will ignore the permissions of callers and allow them indiscriminately.
Use CurrencyNegativePattern property set to 1 to display negative currency values with a minus sign
CAREFULLY READ QUESTION NUMER : 249 [MACHINE SCOPED],252 [FOLLOW USER WORDS]
A & B GetProcesses() accepts a computer name for retrieving the processes on a remote
computer. GetProcessesByName() should be used to return processes by their name.
******************************************151-200********************************************
The Evidence object represents the identity
information used for Code Access Security (CAS) in the Microsoft .NET Framework to determine
the permissions granted to an assembly.
The Assert method of the debug class is an overloaded
method that provides you the ability to test assumptions made in your programming logic
A an Assert will stop execution of the application in debug mode if the condition is not met.
CodeAccessPermission.RevertAssert() should be used to undo a previous Assert call.
PermitOnly will instruct the runtime to reduce the access by only allowing callers with the
permissions explicitly stated and nothing else.
The String.Compare(Fileemployee1, Fileemployee2, true, CultureInfo.CurrentUICulture)
segment should be used for changing the user's interface culture used by a thread
The ThreadStart method can be used to create actively
managed foreground threads.
The usage of the TraceSwitch class is used to provide different levels of tracing switches which are defined by the enumeration as Off 0, Error 1, Warning 2, Info 3 and Verbose 4.
Because the Com applications expect to find runtime information about types in the Windows
registry the usage of the Assembly Registration toll(Regasm.exe) reads an assembly creates
entries required by the Com applications.
Secure Hash Algorithm (SHA-1).
B&C GetHashCode is the method inherited from the Object class. It will not perform a hash on the incoming message.
CultureTypes.SpecificCultures will filter all language codes that are specific to a country\region
The array will not be big enough to store the serialized object because it is not sized on the entire object.
Attempts to define a physical file location, this is not compatible with
AssemblyBuilder.Save
New questions start from 346 continue........................
One of our visitors has decided to share his preparation material with us. Recently he has cleared his mcts 70 536 examination with 930/1000 and he has decided to share his preparation material with all of us who seek to crack this examination. I really appreciate you guys for coming forward and helping me build this blog to make it useful to each one of us.Once again, thanks and congratulations pritam.
Regards
Sameer Shaik
PREPARATION MATERIAL FOR MCTS EXAMINATION 70 536
*****************************************50-100**********************************************
The BooleanSwitch class is used to toggle trace messages on and off.
If the value is 0, then the BooleanSwitch object is turned off and the Enabled
property returns false.
ManagementObjectSearcher object is instantiated with the WQL query string on which to search.
When implementing the IFormatter interface, you must provide implementation for two methods
and three properties. The two methods, Serialize and Deserialize control how objects will be
stored from memory and loaded into memory, respectively. Both methods accept a Stream object
as an argument. The Serialize method also takes a generic object as its second argument and
uses the Stream argument to write the object. The Deserialize method returns the object using
the Stream argument. The Binder, Context, and Surrogate Selector properties must also be
implemented.
[ONSERIALIZED/ONDESERIALIZED]StreamingContext as an argument for accessing the read/write stream during serialization/deserialization not OnSerializing/DeSerializing QUESTIONnO:57&250
The UnknownNode event is fired when an unexpected element or node is detected that does not
map to the XmlSerializer object's expected type.This would allow easy deserialization for the Shipping object.
The number of files in the directory is evaluated by using the GetFiles method, which returns an array of FileInfo objects and retrieves the Length Property of the array.
The UnsafeDeserialize and Deserialize methods perform the same operation, but the UnsafeDeserialize method uses unmanaged code and requires more permission. Because the UnsafeDeserialize method uses unmanaged code,your code should be granted full trust to execute properly.
The FileInfo object represents the information about a system file[LIKE AS HOST FILE].[Q: 67]
FileStream class is already a buffered stream
The reset switch will set the specified security policy or policies back to their default state. The all switch refers to machine, user, and enterprise policy levels.
The SetAccessRuleProtection method accepts two Boolean arguments, the first of which indicates whether settings are protected from inheritance, and the second of which indicates whether to preserve the existing inherited access rule
Including the MD5CryptoServiceProvider and SHA1CryptoServiceProvider classes. They all inherit the ComputeHash method from the HashAlgorithm class. DSA class and DSACryptoServiceProvider class
DIFFERENCE BETWEEN DES & DSA CRYPTOSERVICEPROVIDER?
DES AND TRIPLE-DES:[data confidentiality] The DESCryptoServiceProvider class represents a managed cryptographic provider of the DataEncryption Standard (DES) symmetric algorithm. The DES symmetric algorithm is commonly used for data confidentiality, and it supports 64-bit keys.Because the same key and IV are needed for encryption and decryption, the CreateEncryptor and CreateDecryptor methods generate the appropriate ICryptoTransform object to alter the data.
DSA:[data intigrity] The DSACryptoServiceProvider class represents a managed cryptographic provider of the Digital Signature Algorithm (DSA) asymmetric algorithm. The DSA asymmetric algorithm is commonly used for digital signatures and data integrity, supporting 1024 bit keys. When instantiating a DSACryptoServiceProvider object, a public/private key pair is generated and a default hash is assigned.The SignData method takes a byte array representing the original data and returns the hashed and then signed byte array.
Since the RSACryptoServiceProvider class implements an asymmetric cryptography algorithm
that makes use of a set of related keys to encrypt and decrypt data this class is the correct choice in the scenario.
manifestactivated application > ApplicationSecurityInfo appInfo = new ApplicationSecurityInfo (appDomain.CurrentDomain.ActivationContext);
IF ASSEMBLY SAME PUBLISHER [Check(Assembly.GetCallAssembly().Evidence)]or SAME ORIGANATING INTRANET WEBSITE/: Check (Assembly.GetCallingAssembly ().Evidence);
Imperative role-based security can use the PrincipalPermission class or the IPrincipal object
directly. The PrincipalPermission class takes a user name and role as string arguments
representing the required membership.The IPrincipal object can be retrieved using the Thread.CurrentPrincipal property.
DYNAMICALLY LOAD ASSEMBLLY SPECIFIED WITH PATH USE 'REFLECTIONONLYLOADFROM'
DYNAMICALLY LOAD ASSEMBLLY RESOLVE LOCATION REQUEST TO CLR 'LOADFROM'
*****************************************50-100**********************************************
******************************************01-21*********************************************
ICOLLECTION > USED TO DEFINE PROPERTIES IN A COLLECTION
ILIST > DEFINE THE PROPERTIES OF A NON-GENERIC LIST IF ITEMS
ICOMPARABLE > SUPPORT "COMPARETO()" METHOD The IComparable interface is
typically used when you want to create a class whose objects can be sorted in either a list or collection.
ICOMPARER > SUPPORT "COMPARE()" METHOD
The AddFirst and AddLast
methods accept an element argument and return a LinkedListNode object as a pointer reference.
The AddBefore and AddAfter methods also return a LinkedListNode object, but they accept
another LinkedListNode indicating which node before or after to insert the element
******************************************01-21**********************************************
*****************************************22-49***********************************************
For a Windows service to run in an application process, you must invoke the Run method on the
ServiceBase class. The Run method is overloaded to accept either a single ServiceBase object or an array of ServiceBase objects.
To monitor and control the behavior of a Windows service, you should use the ServiceController class.[CONTROLS THE WINDOWS SERVICES]
The Priority property indicates the relative position of a thread in the wait queue when being scheduled for execution
The QueueUserWorkItem method takes a WaitCallback delegate as an argument and manages the tasks using background threads. This allows the developer to concentrate on business logic and requires minimal synchronization code.
The BeginInvoke method takes the same arguments as the method it references but also includes
an AsyncCallack delegate and a generic object.
The CreateDomain method of the AppDomain class is an overload method that can be used to
create an application domain.
LOADFROM & LOAD
LOADFROM, LoadAssembly FOR DOMAIN: APPDOMAIN OBJECT DOMAIN ONLY SUPPORT LOAD METHOD PAGE: 44
AND LOADFROM,LOAD,REFLECTIONONLYLOADFROM THOSE METHOD ALSO SUPPORTED BY "ASSEMBLY CLASS"
The OpenExeConfiguration method takes a
ConfigurationUserLevel enumeration value to indicate the visibility of the configuration settings.
Configuration config=ConfigurationManager.OpenExeConfiguration(ConfigurationUserLevel.None);
The value None means that the settings apply to all users. The OpenExeConfiguration method
returns a Configuration object representing the current configuration settings.
You should not add the RunInstaller attribute to the assembly because the RunInstaller attribute
is applied to a class, not the entire assembly.
The supportedRuntime element identifies the versions of the CLR with which the application can be run. The supportedRuntime element is only supported in assemblies built using.NET 1.1 or later.
The requiredRuntime element should only be used by assemblies built by using the .NET 1.0
Framework(NOT THE ANSWER)
The publicKeyToken attribute specifies the strong-named key,
and the culture attribute indicates the localization type.
The developmentMode element instructs the CLR to use the DEVPATH environmental variable to
locate assemblies. If you do not add this element to the machine.config file, the DEVPATH
environmental variable will be ignored.
The EventSourceCreationData object is used to configure a new event log source
The GetSystemProcesses and GetAllProcesses methods do not exist in the Process class
simultaneously facilitate uninterrupted execution: WRITELINEIF
****************************************22-49************************************************
*****************************************100-150*********************************************
EventInstance class > FOR EVENT LOG ENTRY
EventBuilder class > DYNAMICALLY GENERATED CLASS
The ThreadStart method can be used to create actively managed foreground threads.
QUEUSERWORKITEM METHOD AND WAITCALLBACK DELEGATE FOR BACKGROUND THREAD THOSE UNDER THE THREADPOOL STATIC CLASS
AUTOMIC & NON-BLOCKING UPDATES,MULTIPLE THREADS OR THREAD SAFE RUN > INTERLOCKED CLASS
MUTEX CLASS > synchronize execution of some resources
READER LOCK > synchronization scheme that employs shared locks together
SEARCH PRIVATE ASSEMBLIES AND ADD BASE APPLICATION'S DIRECTORY
AppDomainSetup.PrivateBinPath property should be used.[APPDOMAINSETUP NOT APPDOMAIN]
To have your code protected from being deadlocked you should avoid using the SyncLock
statement and replace calls to Monitor.Enter with calls to "Monitor.TryEnter"
It is possible to provide the common language runtime with configuration information for a new application domain using the AppDomainSetup class. The most important property is the
ApplicationBase when creating your own application domains which is used to define the root
directory of the application. Q: 140
GetSection method of the ConfigurationManager > FOR WINDOWS CLIENT APPLICATIONS
The ConfigurationSection is a new class in .NET Framework 2.0 which should be used as it allows you to read and write custom configuration sections. The method in the answer also provides strongly typed access to the custom configuration sections. Q: 144
The usage of the
specifying the search path for private assemblies and the other will affect settings of applications that are already deployed
*****************************************100-150*********************************************
*****************************************151-300*********************************************
The WriteEntry method of the EventLog class should be used in the scenario as this method is
used to write the localized messages to the event log.FOR 151 QUESTION NUMBER
if you run the application in debug mode both the Tracer and Debug statements will be executed.
Win32_NetworkAdapterConfiguration object as this property is associated with the network adapter configuration.
ManagementEventWatcher > Set up a listener for events by using the "EVENTARRIVED"
As the Serializable attribute is not inherited by the derived classes you should add the attribute to both classes in the scenario.
UnknownElement event will be raised when the XmlSerializer encounters an XML element such as number, style and size.
serialize all public and non-public data > BINARY FORMATTER CLASS
DriveFormat and TotalFreeSpace properties of the DriveInfo class
Use the FileStream class >to view the required files byte-by-byte
To successfully read the user's preferences you should make use of the
IsolatedStorageFile.GetUserStoreForAssembly method should be used. The method retrieves
assembly-specific and user-specific data from the isolated storage
1.any code that you call to perform actions that your code has permissions to perform however the callers may not have permissions to perform. > envPerm.Assert()
2.Deny on all permissions other than the permission P and this will affect other
permissions.> envPerm.PermitOnly()
3.Demand method requires all the callers to have permissions to perform the specific action
The usage of the -resolvegroup option in the scenario is incorrect because the -resolvegroup
option is used to show the code groups that the specified user belongs to. PAGE : 203 NOT A ANSWER
RSACryptoServiceProvider class implements an asymmetric cryptography algorithm
that makes use of a set of related keys to encrypt and decrypt data
Type Library Exporter tool (tlbexp.exe) > This tool is used to generate a Com library from an assembly and should not be considered for usage in the scenario.
dateValue.Ticks > SUPERFAST SERIALIZE
CURRENTCULTURE > CULTURE SENSITIVE OPERATIONS
INVARRIENTCULTURE > CULTURE INSENSITIVE OPERATIONS
System.UInt16 IS NOT GRATER THAN 65,535
ServiceInstaller.StartType controls how the service will start up automatically or manually
DRAG AND DROP > 1.DRIVEINFO.GETDRIVES METHOD 2. DRIVE INFO CLASS 3. DRIVEINFO.TOTALSIZE PROPERTY
DRAG AND DROP > 1.FILESECURITY OBJECT 2.FILESYSTEMACCESSRULE OBJECT 3.NEW FILESTREAM OBJECT/FILETSREAM CONTRUCTOR
DRAG AND DROP > 1. SYSTEM.TIMERS.TIMER 2.ONSTART METHOD 3.ELAPSED EVENT HANDLER
DEMAND METHOD : force all callers in the call stack
Assert will ignore the permissions of callers and allow them indiscriminately.
Use CurrencyNegativePattern property set to 1 to display negative currency values with a minus sign
CAREFULLY READ QUESTION NUMER : 249 [MACHINE SCOPED],252 [FOLLOW USER WORDS]
A & B GetProcesses() accepts a computer name for retrieving the processes on a remote
computer. GetProcessesByName() should be used to return processes by their name.
******************************************151-200********************************************
The Evidence object represents the identity
information used for Code Access Security (CAS) in the Microsoft .NET Framework to determine
the permissions granted to an assembly.
The Assert method of the debug class is an overloaded
method that provides you the ability to test assumptions made in your programming logic
A an Assert will stop execution of the application in debug mode if the condition is not met.
CodeAccessPermission.RevertAssert() should be used to undo a previous Assert call.
PermitOnly will instruct the runtime to reduce the access by only allowing callers with the
permissions explicitly stated and nothing else.
The String.Compare(Fileemployee1, Fileemployee2, true, CultureInfo.CurrentUICulture)
segment should be used for changing the user's interface culture used by a thread
The ThreadStart method can be used to create actively
managed foreground threads.
The usage of the TraceSwitch class is used to provide different levels of tracing switches which are defined by the enumeration as Off 0, Error 1, Warning 2, Info 3 and Verbose 4.
Because the Com applications expect to find runtime information about types in the Windows
registry the usage of the Assembly Registration toll(Regasm.exe) reads an assembly creates
entries required by the Com applications.
Secure Hash Algorithm (SHA-1).
B&C GetHashCode is the method inherited from the Object class. It will not perform a hash on the incoming message.
CultureTypes.SpecificCultures will filter all language codes that are specific to a country\region
The array will not be big enough to store the serialized object because it is not sized on the entire object.
Attempts to define a physical file location, this is not compatible with
AssemblyBuilder.Save
New questions start from 346 continue........................
Subscribe to:
Posts (Atom)