Archive for February, 2012

How to Use LinkedIn’s Skills & Expertise Section to Research Careers

Knowing what jobs match your skills is just as important as receiving the right career training when choosing a career. Luckily, LinkedIn has developed a great tool to help you learn more about the types of jobs that fit your skill set as well as give you ideas for career you many not have considered.

 

MCTS Certification, MCITP Certification

Microsoft CCNA Certification, CCNA Training and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com

The new tool is in the “Skills & Expertise” section, under the “More” tab in LinkedIn. On this page you will be able to enter a career title, skill or keyword into the Search box.

The search results provide you with a wide variety of topics and information to explore and help you decide which career is right for you. Some examples of the information you will find include:

Skills defined. A description of the related career is displayed in the center top of the page. This description includes the primary industry of which it’s a part, but view these descriptions with a grain of salt. The definitions are taken from Wikipedia and have varying levels of accuracy. The small arrow in the box that is pointing up or down is an indication of the amount of positive or negative growth expected from that career field.

Affiliated expertise. A list of “Related Skills” is shown to the left of the description that provides general guidance about other careers that use skills similar to the terms you entered into your search. This list provides you a window into an expansive circle of opportunities that align with your skills.

Professionals with similar skills. This section, located under the career description provides you a list of LinkedIn members who have listed skills similar to those you entered into your search. Viewing these profiles will allow you to see these individual’s career histories (both present as well as past positions) and what keywords they list to summarize their professional experience and abilities. Knowing how others in your desired career field describe themselves should give you ideas on what keywords you want to use in your own profile. Finally, this section will show you how many of these people you are connected to through LinkedIn.

Historical and predicted growth. The small chart located at the top right of the page provides insight into growth trends of the career. Is the career growing or contracting? Are there particular aspects of the career that are experiencing expanding at a quicker rate? The chart shown in this section will provide the answers.

Notable employers. The “Related Companies” section lists notable employers in your area of interest. This section will direct you to their company page. Take advantage of this feature to learn more about the company’s services, products and culture as well as potential job openings.

Find related groups. Why do LinkedIn groups matter? Groups provide one more avenue to explore a career, including the roles and responsibilities of the people in that career, where they work, and their thoughts about the industry. Groups also provide a way to connect with professionals in that career and start building your professional network. For those reasons, be sure to check out the groups section listed on the lower left side of the page.

Opportunities and Openings. Even if you’re not ready to send in your resume, reading the various job descriptions can prove worthwhile. Job descriptions allow you to see what employers are looking for in terms of skills and experience. They can also show you what type of work will be expected in a given career so you can determine whether it suits you or not. Additionally, you’ll be able to monitor what keywords employers are using so you can be sure to have these terms in your LinkedIn profile.

The LinkedIn “Skills & Expertise” section is a terrific launching pad to begin evaluating your career options. Using this tool will help you weigh all potential job opportunities, their key characteristics and responsibilities and who in your network may be an asset as you pursue a career path. But, the section is not just for job search newbies, it can also help more seasoned professionals determine how to expand existing skills or prepare for a career change.

70-562 Q & A / Study Guide / Testing Engine

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
You work as a Web Developer at CERTKINGDOM.com. You make use of Microsoft .NET Framework 3.5 to
develop ASP.NET Web applications.
CERTKINGDOM.com has a server, named CERTKINGDOM-SR13, which runs an instance of Microsoft SQL Server 2005
locally and is configured to make use of Windows Authentication. You have developed a Web
application named CERTKINGDOMApp1 that will be hosted on CERTKINGDOM-SR13.
You are preparing to configure the role management and membership providers on CERTKINGDOM-SR13.
Which of the following actions should you take?

A. You should consider making use of the Aspnet_compiler.exe command.
B. You should consider making use of the aspnet_regiis.exe command.
C. You should consider making use of the Aspnet_merge.exe command
D. You should consider making use of the ASP.NET SQL Server registration tool.

Answer: A,B

Explanation:


QUESTION 2
You work as a Web Developer at CERTKINGDOM.com. You make use of Microsoft .NET Framework 3.5 to
develop ASP.NET Web applications.
You have recently developed a Web application named CERTKINGDOMWebApp1, and configured it to make
use of Windows Authentication. After specific group is granted NTFS permissions to access a
specific file named CERTKINGDOM.doc, you are informed that you have to make sure that users not
belonging to the group are prevented from accessing the file.
Which of the following actions should you take?

A. You should configure the machine.config file to include the <identity impersonate=”true”/> element.
B. You should configure the machine.config file to include the <authentication mode=”[None]“> element.
C. You should configure the app.config file to include the <authentication mode=”[None]“> element.
D. You should configure the Web.config file to include the <identity impersonate=”true”/> element.
E. You should configure the Web.config file to include the <authentication mode=”[None]“> element.
F. You should configure the app.config file to include the <authentication mode=”[None]“> element.

Answer: D

Explanation:


QUESTION 3
You work as a Web Developer at CERTKINGDOM.com. You make use of Microsoft .NET Framework 3.5 to
develop ASP.NET Web applications.
You have developed a web application named CERTKINGDOMWebApp. You are now preparing to configure
authentication for CERTKINGDOMWebApp so that clients are not allowed to access it anonymously. You also
need to make sure that access for users from untrusted domains are allowed.
You have written the code segment shown below:
<system.web>
<authentication mode=”Forms”>
<forms loginUrl=”login.aspx” />
</authentication>
<authorization>
<deny users=”?” />
</authorization>
</system.web>
Which of the following actions should you take NEXT?

A. You should consider adding the code segment to the web.config file.
B. You should consider adding the code segment to the project’s property pages.
C. You should consider adding the code segment to the app.config file.
D. You should consider adding the code segment to the workstation’s machine.config file.

Answer: A


QUESTION 4
You work as a Web Developer at CERTKINGDOM.com. An MS ASP.NET Web application, named CERTKINGDOMApp1,
has been developed using the 3.5 version of MS Net Framework.
Subsequent to retrieving the most recent project version from the source control repository, you try
to compile it on your workstation and find that the reference to the assembly is absent.
You want to add a reference path that connects to the absent assembly.
Which of the following options should you access to achieve this?

A. The project’s property pages.
B. CERTKINGDOMApp1’s web.config file.
C. CERTKINGDOMApp1’s app.config file.
D. Your workstation’s machine.config file.

Answer: A

Explanation:


QUESTION 5
You work as a Web Developer at CERTKINGDOM.com. You make use of Microsoft .NET Framework 3.5 to
develop Microsoft ASP.NET Web applications.
An existing Web application was developed using Microsoft .NET Framework 1.0. the Web
application makes use of Microsoft Internet Information Services (IIS) 6.0, but does not make use
of any features of Microsoft .NET Framework 3.5.
You want to configure the Web application for .NET Framework 3.5 with as little administrative
effort as possible.
Which of the following actions should you take?

A. You should consider accessing Microsoft Internet Information Services (IIS) 6.0 to modify the
handler runtime version.
B. You should consider accessing the machine.config file to modify the handler runtime version.
C. You should consider accessing the app.config file to modify the handler runtime version.
D. You should consider accessing the web.config file to modify the handler runtime version.

Answer: A

Explanation:


 

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Listing of Top 5 Tech Certifications

There are lots of tech certification programs that are offered for the candidates. A number of the certifications are awarded from vendors like software organization, some of them are given by educational institution, and a few seem to be awarded by vendor neutral corporation. Listed below are a few of the tech certifications and they are generally:

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com

1) Microsoft certified system engineer program (MCSE):

MCSE certification could be the certification that’s awarded from Microsoft. Initially, applicants simply started understanding answers for all those possible questions by using dumps that are offered in the online. When the exam fee pays if applicants passes the test, chances are they can certainly type in to i . t field. At one stage, Microsoft changed quality topics plus it was substituted for knowledge based multiple choices questions. The difficulty level increased and amount of certified candidates reduced and then topic is been changed.

2) Microsoft certified architect (MCA):

This method is just about the prestigious programs which are awarded from Microsoft. MCA may be the premiere level program designed by Microsoft to get experts within the i . t . field. Technical certifications like MCA requires the least 36 months at work expertise in established track record field in order to pass the certification examination.

3) Cisco certified internetwork expert (CCIE)

Like MCA and MCSE, CCIE program can be one of several specialist certifications which might be awarded from Cisco. Cisco programs are designed mainly for gaining knowledge as well as competencies on Cisco products. This method requires a written exam plus a lab exam after passing the written exam. The cost for the written exam is roughly 300$ and after productive completion, applicants must attend the lab examination within 18 months from your date of written exam’s result announced. The fee for the CCIE lab examination is approximately 1250$ to 1500$ with 8 hours of your energy duration.

4) CCSP program:

Cisco certified security pro program is an additional Cisco’s program that mainly relates to Cisco routers to be able to secure the networks in the organization. Using this certification, professionals should be able to safeguard along with handle effortlessly types of issues that appear in the networking operation.

5) CISSP:

CISSP is probably the technical certifications that really help the candidates when you get high paying salary jobs inside multinational providers. CISSP examination will definitely cost around 500$ and includes 250 multiple choice questions. It is just a 6 hour test that will need a minimum of 70% to feed.

Apple’s iPad trademark battle comes to US from China

Proview Electronics has brought its legal battle against Apple to the U.S., accusing the company of using deceptive practices to acquire the iPad trademark.

MCTS Certification, MCITP Certification

Best Microsoft MCTS Certification, Microsoft MCITP Training at examkingdom.com

Proview is asking for damages and for Apple to permanently stop using the iPad trademark, according to documents filed with the Superior Court of California for the County of Santa Clara. Proview, which is struggling financially, is accusing Apple of fraudulently acquiring trademarks through a shell company called IP Application Development Ltd.

Proview is already in a protracted legal battle with Apple on the iPad trademark in China, and on Feb. 17 said the legal battle could spill over to the U.S.

Proview owns the iPad trademark in China and has asked courts there to bar Apple from selling the iPad tablet in the country. A Proview request for a legal injunction that would have forced Apple to halt iPad sales in its Shanghai stores was rejected earlier this week, while Proview won a battle in December in which a court in Shenzhen rejected Apple’s claims to the iPad trademark. That decision is being appealed by Apple in the Guangdong provincial high court, with a hearing scheduled for next week.

Apple did not respond to requests for comment. According to the documents, the defendants listed include IP Application Development, a U.K. company that Proview alleged was established by Apple with the sole purpose of acquiring the trademark to use for the iPad tablet. The company name was “deliberately chosen” because its abbreviation is iPad, according to the court filing.

Apple acted with oppression, fraud and malice, Proview said in the court filing. Proview is also seeking to cancel an agreement that transferred the iPad trademark to IP Application Development in 2009.

Proview offered an Internet appliance called iPad after acquiring the trademark in several countries between 2000 and 2003. However, the company fell on rough financial times due to the global economic crisis and after two top customers, Polaroid and Circuit City, filed for bankruptcy in the second half of 2008, according to the court filing.

In 2009, Apple registered IP Application Development, which acquired the iPad trademark in December of that year for APS35,000 (US$41,335) with the promise not to use it to compete against Proview’s products. IP Application Development ultimately transferred the trademark to Apple, which launched the iPad to much fanfare in 2010.

Proview is accusing Apple of fraud and intentional misrepresentation of facts to acquire the trademark, according to the court filing.

70-561 Q & A / Study Guide

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
You work as an application developer at CertKingdom.com. You are making use of .NET Framework
3.5, as well as Microsoft ADO.NET for application development.
You have recently developed an application that references a database named, CKDDatabase1,
which is hosted by a server, named CERTKINGDOM-SR13. You then created a storage schema
definition file, a conceptual schema definition file, and a mapping schema definition file. The files
are named CertKingdom.ssdl, CertKingdom.csdl, and CertKingdom.msl respectively.
After modifying the contents of the conceptual schema definition file and the mapping schema
definition file, you are required to create the .NET Framework entities from the modified schema
definitions.
You have decided to make use of the Edmgen.exe tool.
Which of the following actions should you take?

A. You should consider making use of the EntityClassGeneration mode.
B. You should consider making use of the FromSsdlGeneration mode.
C. You should consider making use of the ValidateArtifacts mode.
D. You should consider making use of the FullGeneration mode.

Answer: A


QUESTION 2
You work as an application developer at CertKingdom.com. You are making use of .NET Framework
3.5, as well as Microsoft ADO.NET for application development.
You have recently developed an application that has two entities named CKDClient and CKDOrders.
The CKDClient entity has a navigable property, named CKDOrders, which returns a collection of
CKDOrders entity instances.
You have been instructed to create code that returns the corresponding CKDOrders entity instances
when a CKDClient entity instance is queried.
Which of the following actions should you take?

A. You should construct the following code:
CKDEntities context = new CKDEntities();
ObjectQuery<CKDClient> query;
query = context.Client.Include(“CKDOrders”);
B. You should construct the following code:
CKDEntities context = new CKDEntities();
ObjectQuery<CKDClient> query;
query = context.Client.Insert(“CKDOrders”);
C. You should construct the following code:
CKDEntities context = new CKDEntities();
ObjectQuery<CKDClient> query;
query = context.Client.Release(“CKDOrders”);
D. You should construct the following code:
CKDEntities context = new CKDEntities();
ObjectQuery<CKDClient> query;
query = context.Client.Remove(“CKDOrders”);

Answer: A


QUESTION 3
You work as an application developer at CertKingdom.com. You are making use of .NET Framework
3.5, as well as Microsoft ADO.NET for application development.
CertKingdom.com has a server, named CERTKINGDOM-SR35, which hosts a Microsoft SQL Server
2005 database named CKDDatabase1. You are in the process of developing a new application that
is linked to CKDDatabase1, which hosts has two tables. Each table is displayed in its own GridView
control using its own SqlConnection object.
You have received instructions to reconfigure the way that the tables are displayed, so that it
makes use of one SqlConnection object to display the tables at the same time.
Which of the following actions should you take?

A. You should consider making use of a SqlCommand object to simultaneously implement two
SqlDataReader objects.
B. In the connection string of the application, have the Multiple Active Result Sets (MARS)
enabled.
C. You should consider making use of the xsd.exe tool.
D. In the connection string of the application, have the Default Result Set enabled.

Answer: B


QUESTION 4
You work as an application developer at CertKingdom.com. You are making use of .NET Framework
3.5, as well as Microsoft ADO.NET for application development.
You are in the process of configuring an application that you recently developed. You have to
configure the application so that it is able to connect to all kinds of databases.
You start by specifying the database driver name in the application’s connection string.
Which of the following actions should you take NEXT?

A. You should make use of ODBC Connection Pooling for creating the connection object.
B. You should make use of the OLE DB Connection Manager for creating the connection object
C. You should consider making use of the subsequent code to construct the connection object:
DSProviderFactory factory = DSProviderFactories.GetFactory(“System.Data”);DbConnection =
CreateConnection();
D. You should consider making use of the subsequent code to construct the connection object:
DbProviderFactory factory =
DbProviderFactories.GetFactory(databaseProviderName);DbConnection connection =
factory.CreateConnection();

Answer: D


QUESTION 5
You work as an application developer at CertKingdom.com. You are making use of .NET Framework
3.5, as well as Microsoft ADO.NET for application development.
You have recently created a new application that has Microsoft OLE DB Provider configured as its
data provider.
You received instruction to reconfigure the application so that the data provider is Microsoft
SqlClient. Subsequent to the reconfiguration, you find that errors are thrown when the application
performs parameterized queries.
You are required to make sure that this does not occur.
Which of the following actions should you take?

A. You should make use of the OracleClient Provider instead of the OLE DB Provider.
B. You should insert an XSD file to the schema collections of the XmlReader object.
C. Use the Unicode attribute in the connection string to false.
D. You should consider reconfiguring the the application code by replacing the positional
parameters with named parameters.

Answer: D


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Education to Become a Remarkably Sought After A linux systemunix Skilled

Crimson Head wear preparation lessons paying back warmer there is much surprise

In today’s scene of action, Linux system contains the largest member list, similar to the way Microsoft characterizes with your desktop computers. It’s a given that more than the time, A linux systemunix has grown its popularity aggressively. At the moment, you will find there’s growing sales of Linux knowledgeable experts, nobody take pleasure in superior products and services, including higher shell out provides, profession enhances and also price from the group and so on.

MCTS Certification, MCITP Certification

Best Microsoft MCTS Certification, Microsoft MCITP Training at examkingdom.com

A linux systemunix, unquestionably features very much edge on a few of the various other leading os’s, in relation to The item stability field, it becomes much more visible. Due to these kind of sharpened as well as effectively tuned security measures, among the other prominent characteristics, a lot of Federal and also Armed service organizations have got leaped within the Red hat and Crimson Head wear technologies quite a early on.

Red Hat teaching have been growing immensely in recent times; numerous organizations are selling upon-internet site teaching courses regarding groupings. There are many choices wherever individuals could also union these types of education classes. There are lots of understanding methods.

Selected Reddish colored Hat qualifications programs in demand:

RHCSA certification – Your current review in addition to feedback research done about it specialists globally, signifies that Crimson Head wear Qualified Technique Administrator is recognized as being a unexampled addition to the Reddish colored Hat’s set of efficiency primarily based qualifications. That equips The idea specialists having ideal instruction and satisfaction dependent exams on the market. That qualification implies as well as demonstrates specific in addition to thorough analysis of the expertise along with ability required for your present-day(a) system facilitators.

RHCSA accreditation would be the initiation levels system management official certifications. Created late, for experts who need to gain RHCE along RHEL six at this point, must achieve that official certifications along with create distinct quiz with regard to RHCE. The current authentication can even now continue being your before-necessary; even so RHCE has become upgraded to be a advanced process administration authentication by Reddish colored Head wear.

RHCE accreditation – As a worldwide accepted abilities, RHCE, is highly regarded and also valued around manufacture. This This authorities possessing cleared this particular credential exhibits excellent degree of expertise in employing in addition to trouble shooting Red Do not lik Venture. A few of the matters provided are generally superior, like offer managing, substance configuration, program companies, circle settings, chain mail providers in addition to virtualization.

Which really should attend

* System directors whom at the moment control Linux system machines, on the company flat

* Experienced Linux system facilitators who would like or need displaying their own abilities

* Experts who wanted to assemble his or her professions farther, and aforethought(ip) for getting RHCE organism the particular prerequisite to the higher level qualification.

Linux system below continues their exercise of assessing understanding in addition to expertise as a result of custody-on, lab- based test. And so, similar to different qualifications connected with Reddish Hat, re-decorating A overall performance centered check wherever, college students ought to install, manage, put into practice and repair system as well as security measures sites in alive programs.”

I got numerous Information Technology Certification. I have written many articles in different ITcertification as well as he has a vast experience in IT industry. In this article I guide the students that how they can pass the exams and how can they get the certification for the latest knowledge this certification exam students click at1z0-860or visit its1z0-861its better for your bright future and will helpful to attain the IT certification for more information touch with me.

Show you quality with MCP ways

Just what exactly would be the big issue using as a Ms Qualified Specialized also referred to as MCP? Will it be the particular letter de cachet of obtaining a little extra email driving your business for your job application? Even so, making probable employers find out about which ‘Microsoft’ official certifications can start a number of gates for you as part of your quest after the latest job.

Getting MCP courses in addition to growing MCP examinations for your qualification is the most beneficial and only approach to enable potential employers realize that an individual grabs in addition to extensively understanding one of the most current technologies and products to come out of Microsoft. Without encountering proper MCP exercising, you should possess a pretty tough time sending your understanding on your latest boss or even long term recruiters. They like to find out those official small characters, for instance, MCP on your resume. These kinds of firms apparently have faith in than a Ms official certifications.

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com

Who ordinarily goes through these MCP courses? The answer: Individuals that are probably to wish a diverse selection of scientific expertise. This may be a salesperson pushing software or maybe additional techie items. Pros, product manufacturers and perhaps training organizations can benefit just as one MCP. Sometimes individuals with additional accreditations such as the MCSE benefit. They may be multi-level moderators as well as designers or professionals giving service for you to end-consumers. Your MCP information on your MCP lessons is going to exhibit skills with a single MS Computer just like Microsoft windows year 2000 or Eye-port Windows xp.

Your awesome point about the MCP is that you simply have to pass just one single accreditation examine coming from recent ‘Microsoft’ stuff. Meaning you can’t examination in nearly anything obsolete. And something warning is always that the test can’t be on web 2 Concepts Can your organization include SQL database machines? You could possibly consider one of the qualifications about developing or even administering SQL nodes.

Perhaps your favorite luxury career will involve e-trade or perhaps web-site pattern. Have a look into MCP training in the topic of website nodes and also business hosting space. When you are customer service minded, acquire MCP exams around troubleshooting desktop models for end users or perhaps assisting snail mail machines. Keep in mind that authorities within the technology sector assist to develop most of these qualifications, and that means you will probably be examined about the most up-to-date in addition to greatest throughout technologies.

When you buy the MCP, you are showing your current technological usefulness. In addition there are strengths that are included with moving those MCP examinations. You will be current while using the hottest data by way of e-zines and you’ll go for stationery in order to particular round-table conference groupings, coaching instruction and also conferences. This is also an ideal networking application!

Just simply considering a Microsoft accreditation may be the help the proper way on your job. By having an MCP, find it as being the humanistic discipline stage within accreditations. You possibly can specialize using a big with MCSE as well as MCSD. Although to adopt which step one, the particular MCP may be the way to go.

70-542 Q & A / Study Guide

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
There is a web site CertKingdomWS.
CertKingdomWS uses MS Office SharePoint Server 2007 Search Center.
CertKingdomWS runs a fixed keyword query.
If the result of this query is a fail to return any data.
How can this be achieved?

Answer:


QUESTION 2
There is a MS Office SharePoint Server 2007 application CertKingdomApp.
CertKingdomApp uses two tables Employees and EmployeesDetails.
They are related through a one-to many relation.
Two entities Employees and EmployeesDetails are defined in a BDC definition.
The metadata of this definition need to be defined.
Which code is appropriate?

Answer:


QUESTION 3
There is a MS Office SharePoint Server 2007 web site CertKingdomWS.
There is a MS Office SharePoint Server 2007 application CertKingdomApp.
There is a security group named DOMAIN\Employees.
In CertKingdomWS there is content that this group should have access to.
How can this be ensured? Select two.

A. Add a custom Web Part…
B. Add an audience…
C. Add a site group…
D. Use a filter…
E. ..based on the DOMAIN\Employees group.
F. ..that has the DOMAIN\Employees group as a member.
G. …that shows only the members of the DOMAIN\Employees group.

Answer: B,E

Explanation:


QUESTION 4
There is a MS Office SharePoint Server 2007 web site CertKingdomWS.
There is a MS Office SharePoint Server 2007 application CertKingdomApp.
There is a MS Excel 2007 workbook which contain employee data such as name, city, salary.
End users must be able to filter the workbook on city.
How can this be achieved through MS Office SharePoint Server 2007 Excel services? Select two.

A. Add an Excel VBA application…
B. Add an ActiveX control…
C. Use the Data-Filter option…
D. …in the workbook.
E. ..in CertKingdomApp.
F. ..in CertKingdomWS.

Answer: C,D

Explanation:


QUESTION 5
There is a MS SQL Server 2005 database CertKingdomDB.
There is a BDC definition which is used to search for employee data in CertKingdomDB.
Incremental crawls must be performed for indexing in CertKingdomDB.
How can this be ensured? Select two or three.

A. Add method
B. Add function..
C. Add stored procedure…
D. ..Finder
E. ..GenericInvoker
F. .. IDEnumerator
G. .. ViewAccessors
H. ..to have a return field representing the last update time of CertKingdomDB.
I. .. to return a different set of columns from the CertKingdomDB.

Answer: A,F,H

Explanation:


QUESTION 6
Exhibit:
public class CertKingdomClass
{
public double CertKingdom1 (double d)
{
return d * 9; }
public DateTime CertKingdom2 {
return ( DateTime.Today );
}
}
There are two UDFs CertKingdom1 and CertKingdom2.
These are defined as Excel Services in MS Office SharePoint Server 2007.
The code is displayed in the exhibit.
What action should you take?

Answer:


QUESTION 7
There is a ASP.NET web site CertKingdomWS.
There is a MS Office SharePoint Server 2007 application CertKingdomApp.
There is a Microsoft Office InfoPath form CertKingdomForm.
There is a custom control CertKingdomC that is derived from the XMLFormView class.
CertKingdomC will show CertKingdomForm inside an ASP.NET page on CertKingdomWS.
How can this be ensured?

Answer:


QUESTION 8
There is a web site CertKingdomWS.
There is a portal site template CertKingdomTempl.
CertKingdomTempl is used within CertKingdom Ltd. To recreate site hierarchies,
Extra sites must be added to the hierarchy.
What steps should be taken?
Your company uses a portal site template to recreate site hierarchies. You need to add additional
sites to the hierarchy that is defined in the portal site template. What should you do?

A. Modify file Webtemp*.xml…
B. Modify file webconfig…
C. Modify file global.aspx…
D. Modify the XML definition file..
E. Modify CertKingdomTempl…
F. Modify CertKingdomWS…
G. ..by adding a Template element that contains the site definitions for the new sites.
H. ..by adding extra Web elements to the XML definition file of the portal site template.
I. .. to include the new hierarchy and create a new site template on the Site Settings page.

Answer: D,H

Explanation:


 

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Microsoft slams Google over iPhone, Mac privacy boner

Microsoft today used the latest privacy flap involving Google to again blast its rival’s behavior.

Yesterday, the Wall Street Journal accused Google and several other online advertising companies of circumventing the privacy protections built into Apple’s Safari browser, and enabled by default on iPhones, iPads and Macs.

 

MCTS Certification, MCITP Certification

Best Microsoft MCTS Certification, Microsoft MCITP Training at examkingdom.com

In a response to a request for comment from the IDG News Service, Rachel Whetstone, Google’s senior vice president for communications and public policy, called the newspaper’s charges a mischaracterization, denied the code embedded in websites tracked users, but admitted that the code installed other advertising tracking “cookies” on users’ iOS and OS X devices.

“We didn’t anticipate that this would happen,” Whetstone said, “and we have now started removing these advertising cookies from Safari browsers.”

Microsoft used the brouhaha — not Google’s first over privacy — to again ding its rival.

“This type of tracking by Google is not new,” said Ryan Gavin, Microsoft’s head of marketing for its Internet Explorer (IE) browser, in a Friday blog. “The novelty here is that Google apparently circumvented the privacy protections built into Apple’s Safari browser in a deliberate, and ultimately, successful fashion.”

Gavin also took the time to pitch IE9 as an alternative, arguing that Microsoft’s browser “respects your privacy.”

Microsoft and Google have different ideas on Do Not Track, the label for ways browser users can set their applications to block advertisers’ efforts to track their movements and record their behavior on the Web.

IE, along with Mozilla’s Firefox and Apple’s Safari, supports the Do Not Track HTTP Header, an initiative promoted by the Federal Trade Commission (FTC) and several privacy advocacy groups, including the Electronic Frontier Foundation (EFF). That effort relies on websites and advertisers to modify code on their end to respond to the Do Not Track request.

IE9 also includes a different feature, dubbed “Tracking Protection,” that uses third-party-published lists to selectively block sites and content embedded in Web sites.

Google’s Chrome does not support the Do Not Track header. Instead, the browser leans on a plug-in called “Keep My Opt-Outs” that blocks targeted ads produced by several dozen companies and ad networks that hew to self-regulation guidelines set by the online advertising industry.

Microsoft and Google have regularly butted heads over privacy.

Two weeks ago, Microsoft ran a three-day campaign in several major newspaper with advertisements claiming IE9 was superior in protecting users’ privacy. At the time, Google countered with a blog post that characterized Microsoft’s claims as “myths.”

Today, the EFF and other privacy groups called on Google to straighten up.

“You need to make a pro-privacy offering to restore your users’ trust,” wrote Peter Eckersley and Rainey Reitman, the EFF’s technology projects director and activism director, in an open letter to Google. “It’s time to commit to giving users a voice about tracking and then respecting those wishes.”

The Center for Democracy & Technology (CDT) was harsher, calling Google’s actions “unacceptable.”

“We are severely disappointed that Google and others choose to place tracking cookies on Safari browsers using invisible form submission,” said Justin Brookman, director of consumer privacy, in an email. “We are perplexed how this decision evaded Google’s internal design and review process. After several recent missteps — and two new reboots on privacy-by-design — this should never have happened.”

The Safari bungle was only the most recent in a series from Google.

Last month, the company demoted the search ranking of Chrome’s download page after bloggers revealed a pay-for-links scheme that Google attributed to a rogue operation run by a marketing firm it had hired.

Google promised to keep the search penalty in place for at least 60 days, a move that one metrics vendor used to explain the January downturn in Chrome’s usage share.

70-536 Q & A / Study Guide

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
You work as the application developer at CertKingdom.com. CertKingdom.com uses Visual Studio.NET
2005 as its application development platform.
You are in the process of storing numerical values up to 2,100,000,000 into a variable and may
require storing negative values using a .NET Framework 2.0 application. You are required to
optimize memory usage
What should you do?

A. Int32
B. UInt16
C. UInt32
D. Int16

Answer: A

Explanation:
The Int32 type should be used in the scenario as it can be used to store positive and negative
numerical values from -2,147,483,648 to +2,147,483,647.
Incorrect Answers:
B: The UINT32 and UInt16 type should not be used in the scenario because they are used to store
only unsigned positive numbers.
Reference types
C: The UINT32 and UInt16 type should not be used in the scenario because they are used to store
only unsigned positive numbers.
Attributes
D: The Int16 type should not be used as you will only be allowed to store values from -32768 to
+32768.


QUESTION 2
You work as an application developer at CertKingdom.com. You are currently in the process of
creating a class that stores data about CertKingdom.com’s customers.
CertKingdom.com customers are assigned unique identifiers and various characteristics that may
include aliases, shipping instructions, and sales comments. These characteristics can change in
both size and data type.
You start by defining the Customer class as shown below:
public class Customer
{
private int custID;
private ArrayList attributes;
public int CustomerID
{
get {return custID;}
}
public Customer (int CustomerID)
{
this.custID = CustomerID;
this.attributes = new ArrayList ();
}
public void AddAttribute (object att)
{
attributes.Add (att);
}
}
You have to create the FindAttribute method for locating attributes in Customer objects no matter
what the data type is.
You need to ensure that the FindAttribute method returns the attribute if found, and you also need
to ensure type-safety when returning the attribute.
What should you do?

A. Use the following code to declare the FindAttribute method:
public T FindAttribute (T att)
{
//Find attribute and return the value
}
B. Use the following code to declare the FindAttribute method:
public object FindAttribute (object att)
{
//Find attribute and return the value
}
C. Use the following code to declare the FindAttribute method:
public T FindAttribute <T> (T att)
{
//Find attribute and return the value
}
D. Use the following code to declare the FindAttribute method:
public string FindAttribute (string att)
{
//Find attribute and return the value
}

Answer: C

Explanation:
This code declares the method FindAttribute and specifies an argument named att using the T
placeholder as the argument and return data type. To ensure the FindAttribute method accepts
arguments of different types, you should specify an argument using a generic placeholder. The
argument att in this generic method will accept any valid data type and ensures type-safety by
returning that same data type.
Incorrect Answers:
A: You should not use this code because it does not declare the placeholder T. when declaring a
generic method, you have to use the < > bracketsto declare the place holder before using it.
B: You should not use this code because it does not guarantee type-safery.
D: You should not use this code because it will only accept a string argument and return a string
argument.
Generic types


QUESTION 3
You work as an application developer at CertKingdom.com. You are creating a custom exception
class named ProductDoesNotExistException so that custom exception messages are displayed in
a new application when the product specified by users is unavailable.
This custom exception class will take the ProductID as an argument to its constructor and expose
this value through the ProductID. You are now in the process of creating a method named
UpdateProduct. This method will be used to generate and manage the
ProductDoesNotExistException exception if the ProductID variable contains the value 0.
You need to ensure that use the appropriate code for the UpdateProduct method.
What should you do?

A. Make use of the following code:
public void UpdateProduct ()
{
try
{
if (ProductID == 0)
throw new ProductDoesNotExistException (ProductID);
}
catch (ProductDoesNotExistException ex)
{
MessageBox.Show (“There is no Product” + ex. ProductID);
}
}
B. Make use of the following code:
public void UpdateProduct ()
{
try
{
if (ProductID = = 0)
throw new Exception (“Invalid ProductID”);
}
catch (ProductDoesNotExistException ex)
{
MessageBox.Show (ex.Message);
}
}
C. Make use of the following code:
public void UpdateProduct ()
{
if (ProductID = = 0)
throw new ProductDoesNotExistException (ProductID);
}
D. Make use of the following code:
public void UpdateProduct ()
{
if (ProductID = = 0)
throw new Exception (“Invalid ProductID”);
}

Answer: A

Explanation:
This code verifies the value of the ProductID variable by using the if statement. If the ProductID
variable contains a value of 0, this code generates an exception of type
ProductDoesNotExistException . To explicitly generate an exception, you are required to use the
throw statement. The exception generated by using the throw statement can be handled by the
try…catch block. This code generates the custom exception by calling the constructor of the
custom exception class named ProductDoesNotExistException . The constructor argument is the
ProductID attached to the ProductDoesNotExistException object. This code then handles the
custom exception named ProductDoesNotExistException by using a catch block, which handles
exceptions by using a variable named ex of the type ProductDoesNotExistException . This code
displays the ” There is no Product ” error message by using the MessageBox.Show method and
concatenating the ex. ProductID to it.
Incorrect Answers:
B: You should not use the code that generates an exception of the type Exception and handles the
exception of the type ProductDoesNotExistException in the catch block. This code is incorrect
because you are required to generate a custom exception named ProductDoesNotExistException.
C: You should not use the codes that do not use a try…catch block because the application an
unhandled exception.
D: You should not use the codes that do not use a try…catch block because the application an
unhandled exception.


QUESTION 4
You work as the application developer at CertKingdom.com. CertKingdom.com uses Visual Studio.NET
2005 as its application development platform.
You have recently finished development of a class named TestReward and package the class in a
.NET 2.0 assembly named TestObj.dll. After you ship the assembly and it is used by client
applications, you decide to move the TestReward class from TestObj.dll assembly to the
TestRewardObj.dll Assembly. You are to ensure when you ship the updated TestObj.dll and
TestRewardObj.dll assemblies that the client applications continue to work and do not require
recompiling.
What should you do?

A. The TypeForwardedTo attribute should be used
B. The TypeConvertor.ConvertTo method should be used
C. The InternalsVisibleTo attribute should be used
D. The Type Convertor.ConvertFrom method should be used

Answer: A

Explanation:
The statement used for you to add a type from one assembly into another assembly is the
TypeForwardTo attribute which enables you not to have the application recompiled.
Incorrect Answers:
B: The TypeConverter class provides a unified way of converting different types of values to other
types and can not be used to move a type.
C: The method in question here specifies all nonpublic types in an assembly are visible to other
assemblies but can not be used to move types.Part 2: Manage a group of associated data in a
.NET Framework application by using collections. (Refer System.Collections namespace)
D: The TypeConverter class provides a unified way of converting different types of values to other
types and can not be used to move a type.


QUESTION 5
You work as an application developer at CertKingdom.com. You have recently created a custom
collection class named ShoppingList for a local supermarket. This custom class will include
ShoppinItem objects that have the public properties listed below.
* Name
* AisleNumber
* OnDiscount
You are required to enable users of your class to iterate through the ShoppingList collection, and
to list each product name and aisle number using the foreach statement.
You need to achieve this by declaring the appropriate code.
What code should you use?

A. public class ShoppingList : ICollection
{
// Class implementation
}
B. public class ShoppingList : IEnumerator, IEnumerable
{
// Class implementation
}
C. public class ShoppingList : Ilist
{
// Class implementation
}
D. public class ShoppingList : Enum
{
// Class implementation
}

Answer: B

Explanation:
You should implement the IEnumerable and IEnumerator interfaces of the System.Collections
namespace to ensure that your collection class supports foreach iteration. The IEnumerable
interface defines only one method named GetEnumerator that returns an object of type
IEnumerator of the System.Collections namespace and is used to support iteration over a
collection. The IEnumerator interface supports methods, such as Current , MoveNext , and Reset
to iterate through a collection. The Current method returns the current element of the collection.
The Move method positions the enumerator to the next available element of the collection. The
Reset method positions the enumerator before the first element of the collection.
Incorrect Answers:
A: You should not use the code that implements the ICollection interface because this interface is
used to define properties in a collection. Implementing this interface will not ensure that your
collection class supports foreach iteration because it does not inherit the IEnumerator interface.
C: You should not use the code that implements the Ilist interface because this interface is used to
define properties of a non-generic list of items accessed by index. Implementing this interface will
not ensure that your collection class supports foreach iteration because it does not inherit the
IEnumerator interface.
D: You should not use the code that inherits the Enum because this structure is used as a base
class for those classes that provide enumeration values. Inheriting the Enum structure will not
ensure that your collection class supports foreach iteration.


QUESTION 6
You work as the application developer at CertKingdom.com. CertKingdom.com uses Visual Studio.NET
2005 as its application development platform.
You are developing a .NET Framework 2.0 application used to store a type-safe list of names and
e-mail addresses. The list will be populated all at ones from the sorted data which means you well
not always need to perform insertion or deletion operations on the data. You are required to
choose a data structure that optimizes memory use and has good performance.
What should you do?

A. The System.Collections.Generic.SortedList class should be used
B. The System.Collections.HashTable class should be used
C. The System.Collections.Generic.SortedDictionary class should be used
D. The System.Collections.SortedList class should be used

Answer: A

Explanation:
The SortedList generic class should be used in the scenario class as it provides type safety
compared against the System.Collections.SortedList class.
Incorrect Answers:
B: The System.Collections.HashTable class should not be used as this class provides no type
safety.
Collection interfaces
C: Although this is very similar to the SortedList class the SortedList class should be used instead
in the scenario.
Iterators
D: Although this is very similar to the SortedList class the SortedList class should be used instead
in the scenario.


QUESTION 7
You work as an application developer at CertKingdom.com. You are currently in the process of
reviewing an application that was created by a fellow developer.
The application that you are reviewing includes a declaration for a collection named EmployeeList,
which stores Employee objects. The declaration is shown below:
public class EmployeeList : Enumerator, IEnumerable
{
// Class implementation
}
You require the ability to iterate through the EmployeeList with minimum development effort.
What should you do?

A. Utilize the switch statement
B. Utilize the dowhile statement
C. Utilize the foreach statement
D. Utilize the if statement

Answer: C

Explanation:
the IEnumerable and IEnumerator interfaces of the System.Collections namespace are used to
ensure that your collection class supports foreach iteration. The IEnumerable interface defines
only one method named GetEnumerator that returns an object of type IEnumerator of the
System.Collections namespace and is used to support iteration over a collection. The
IEnumerator interface supports methods, such as Current , MoveNext , and Reset to iterate
through a collection. The Current method returns the current element of the collection. The Move
method positions the enumerator to the next available element of the collection. The Reset
method positions the enumerator before the first element of the collection.
Incorrect Answers:
A: These statements will not allow you to iterate through the EmployeeList collection.
B: You should not use this statement because it will require manually calling the MoveNext and
Current methods. The scenario states that you need to “…iterate through the EmployeeList with
minimum development effort.”
D: These statements will not allow you to iterate through the EmployeeList collection.
Hashtable class


QUESTION 8
You work as an application developer at CertKingdom.com. CertKingdom.com has been contracted to
develop an application for the local bank.
You have been given the responsibility of creating this application and need to store each
transaction record, which is identified using a complex transaction identifier, in memory. The bank
informs you that the total amount of transaction records could reach 200 per day.
To achieve this, you decide to utilize one of the existing collection classes in the .NET 2.0 class
library.
You need to ensure that you the collection class you select is the most efficient one for storing
transaction records.
What should you do?

A. Select the ListDictionary collection class.
B. Select the HashTable collection class.
C. Select the Queue collection class.
D. Select the StringCollection collection class.

Answer: B

Explanation:
You should select the HashTable class to store transaction records because each element is
identified using a unique identifier and the size of the collection is large. Elements in the
HashTable collection are stored with a key/value pair where each key is created using a hash
code. The default capacity of a HashTable class is zero, and you can use the Add method to add
a new element to the collection. The Count property provides the total number of elements in the
HashTable collection. An element of the HashTable class can be accessed using the
DictionaryEntry class. You can use the Key and Value properties of the DictionaryEntry class to
access the key associated with the element and the value of the element, respectively.
Incorrect Answers:
A: You should not select this collection class because this class is used if the total number of
elements to be stored in a collection is less than 10 elements in length.
C: You should not select this collection class because you need to access transaction records
using a transaction identifier, not in sequential order.
D: You should not select this collection class because this class is used to manage a collection of
string values.


QUESTION 9
You work as an application developer at CertKingdom.com. CertKingdom.com has been hired by a small
local private school to develop a class library that will be used in an application named
ManageAttendance for the purpose of managing student records.
You are responsible for developing this class library. CertKingdom.com has instructed you to create a
collection in the application to store learners’ results.
The school has informed you that they currently only have seven learners, but that this value will
triple in the following year. Due to the limited resources, you need to ensure that the collection you
create consumes a minimum amount of resources.
What should you use to create the collection?

A. The HybridDictionary collection class.
B. The HashTable collection class.
C. The ListDictionary collection class.
D. The StringCollection collection class.

Answer: A

Explanation:
You should use the HybridDictionary class to create the collection because this class is useful in
scenarios where the number of elements is unknown or could grow in size. A collection of the
HybridDictionary type manages the collection depending on the number of elements. The
HybridDictionary type collection uses the ListDictionary class to manage the collection when there
are only a few elements. When the number of elements exceeds ten, the HybridDictionary type
collection automatically converts the elements into HashTable management.
Incorrect Answers:
B: You should not use this collection class because this class is used if the total number of
elements to be stored in a collection is known and is greater than ten elements in length.
C: You should not use this collection class because this class is used if the total number of
elements to be stored in a collection is known and is less than ten elements in length.
D: You should not use this collection class because this class is used to manage a collection of
string values.


QUESTION 10
You work as an application developer at CertKingdom.com. CertKingdom.com wants you to develop an
application that stores and retrieves client information by means of a unique account number.
You create a custom collection class, which implements the IDictionary interface, named
ClientDictionary. The following code have been included into the new application.
//Create Client objects
Client c1 = new Client (“AReid”, “Andy Reid”, Status.Current);
Client c2 = new Client (“DAustin”, “Dean Austin”, Status.New);
//Create ClientDictionary object
IDictionary cData = new ClientDictionary ();
cData.Add (“10001″, c1);
cData.Add (“10002″, c2);
You use the same method to add other Client objects to the collection. You need to ensure that
you are able to retrieve client information associated with the account number 10111.
What should you do?

A. Use the following code:
Client foundClient;
foundClient = (Client) cData.Find (“10111″);
B. Use the following code:
Client foundClient;
if (cData.Contains (“10111″))
foundClient = cData ["10111"];
C. Use the following code:
Client foundClient;
if (cData.Contains (“10111″))
foundClient = (Client) cData ["10111"];
D. Use the following code:
Client foundClient;
foreach (string key in cData.Keys
{
if (key == “10111″)
foundClient = (Client) cData.Values ["10111"];
}

Answer: C

Explanation:
This code invokes the Contains method of the IDictionary interface to determine whether a value is
associated with the key 10111. If a value exists for that key, then the clientData ["10111"]
statement retrieves the client data as a generic object. The code casts the generic object into a
Client object, and it is stored in the foundClient variable
Incorrect Answers:
A: You should not use the code that uses the Find method because no such method exists in the
IDictionary interface.
B: You should not use the code that assigns the foundClient variable to a generic object because
the foundClient variable is declared as a Client type.
D: You should not use the code that iterates through the Keys collection because it is unnecessary
and process-intensive.

 

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Go to Top