98-361 : Software Development Fundamentals : Part 03

  1. In the application life cycle, the revision of an application after it has been deployed is referred to as:

    • Unit testing
    • Integration
    • Maintenance
    • Monitoring
  2. In which order do the typical phases of the Software Development Life Cycle occur?

    • Development, design, requirements gathering, and testing
    • Design, requirements gathering, development, and testing
    • Design, development, requirements gathering, and testing
    • Requirements gathering, design, development, and testing
  3. You execute the following code.

    98-361 Part 03 Q03 006
    98-361 Part 03 Q03 006

    What will the variable iResult be?

    • 1
    • 2
    • 3
    • 4
  4. You execute the following code.

    98-361 Part 03 Q04 007
    98-361 Part 03 Q04 007

    How many times will the word Hello be printed?

    • 49
    • 50
    • 51
    • 100
    Explanation:

    The % operator computes the remainder after dividing its first operand by its second. All numeric types have predefined remainder operators.
    In this case the reminder will be nonzero 50 times (for i with values 1, 3, 5,..,99).

  5. You are creating a routine that will perform calculations by using a repetition structure. You need to ensure that the entire loop executes at least once.

    Which looping structure should you use?

    • For
    • While
    • Do..While
    • For..Each
    Explanation:

    In a Do..While loop the test is at the end of the structure, so it will be executed at least once.

  6. The purpose of the Finally section in an exception handler is to:

    • Execute code regardless of whether an exception is thrown.
    • Conclude the execution of the application.
    • Execute code only when an exception is thrown.
    • Break out of the error handler.
    Explanation:

    By using a finally block, you can clean up any resources that are allocated in a try block, and you can run code even if an exception occurs in the try block. Typically, the statements of a finally block run when control leaves a try statement. The transfer of control can occur as a result of normal execution, of execution of a break, continue, goto, or return statement, or of propagation of an exception out of the try statement.

  7. You are creating the necessary variables for an application. The data you will store in these variables has the following characteristics:
    – Consists of numbers
    – Includes numbers that have decimal points
    – Requires more than seven digits of precision

    You need to use a data type that will minimize the amount of memory that is used.

    Which data type should you use?

    • decimal
    • double
    • byte
    • float
    Explanation:

    The double keyword signifies a simple type that stores 64-bit floating-point values.
    Precision: 15-16 digits

    Incorrect:
    Not D: The float keyword signifies a simple type that stores 32-bit floating-point values.
    Precision: 7 digits

  8. Your database administrators will not allow you to write SQL code in your application.

    How should you retrieve data in your application?

    • Script a SELECT statement to a file.
    • Query a database view.
    • Call a stored procedure.
    • Reference an index in the database.
    Explanation:

    The SQL will only be inside the stored procedure.

  9. You are reviewing a design for a database. A portion of this design is shown in the exhibits. Note that you may choose either the Crow’s Foot Notation or Chen Notation version of the design. (To view the Crow’s Foot Notation, click the Exhibit A button. To view the Chen Notation, click the Exhibit B button.)

    98-361 Part 03 Q09 008
    98-361 Part 03 Q09 008
    98-361 Part 03 Q09 009
    98-361 Part 03 Q09 009

    Which term is used to describe the Customer component?

    • Field
    • Attribute
    • Property
    • Entity
    Explanation:

    Customer is a table (entity).

  10. You have a server that limits the number of data connections.

    What should you use to optimize connectivity when the number of users exceeds the number of available connections?

    • Connection timeouts
    • Named pipes
    • Normalization
    • Connection pooling
    Explanation:

    In software engineering, a connection pool is a cache of database connections maintained so that the connections can be reused when future requests to the database are required.

  11. Your application must pull data from a database that resides on a separate server.

    Which action must you perform before your application can retrieve the data?

    • Configure the network routers to allow database connections.
    • Install the database on each client computer.
    • Create a routine that bypasses firewalls by using Windows Management Instrumentation (WMI).
    • Establish a connection to the database by using the appropriate data provider.
  12. You have a class named Truck that inherits from a base class named Vehicle. The Vehicle class includes a protected method named brake ().

    How should you call the Truck class implementation of the brake () method?

    • Vehicle. brake ();
    • This. brake ();
    • MyBase. brake();
    • Truck. brake ();
    Explanation:

    The MyBase keyword behaves like an object variable referring to the base class of the current instance of a class.MyBase is commonly used to access base class members that are overridden or shadowed in a derived class.

  13. Which of the following must exist to inherit attributes from a particular class?

    • Public properties
    • A has-a relationship
    • An is-a relationship
    • Static members
    Explanation:

    There must be some public properties that can be inherited.

  14. Which type of function can a derived class override?

    • a non-virtual public member function
    • a private virtual function
    • a protected virtual member function
    • a static function
    Explanation:

    You can override virtual functions defined in a base class from the Visual Studio.
    The override modifier is required to extend or modify the abstract or virtual implementation of an inherited method, property, indexer, or event.

  15. Class C and Class D inherit from Class B. Class B inherits from Class A. The classes have the methods shown in the following table.

    98-361 Part 03 Q15 010
    98-361 Part 03 Q15 010

    All methods have a protected scope.

    Which methods does Class C have access to?

    • only m3, m4
    • only m2, m3
    • only ml, m3
    • m1, m3, m3
    • m2, m3, m4
    • m1, m2, m3
  16. You need to create a property in a class. Consumers of the class must be able to read the values of the property. Consumers of the class must be prevented from writing values to the property.

    Which property procedure should you include?

    • Return
    • Get
    • Set
    • Let
  17. How many parameters can a default constructor have?

    • 0
    • 1
    • 2
    • 3 or more
    Explanation:

    If a class contains no instance constructor declarations, a default instance constructor is automatically provided. That default constructor simply invokes the parameterless constructor of the direct base class.

  18. Which function does Simple Object Access Protocol (SOAP) provide when using Web services?

    • directory of registered Web services
    • communications protocol
    • security model
    • model for describing Web services
    Explanation:

    SOAP, originally defined as Simple Object Access Protocol, is a protocol specification for exchanging structured information in the implementation of web services in computer networks. It relies on XML Information Set for its message format, and usually relies on other application layer protocols, most notably Hypertext Transfer Protocol (HTTP) or Simple Mail Transfer Protocol (SMTP), for message negotiation and transmission.

  19. Which term is used to describe small units of text that are stored on a client computer and retrieved to maintain state?

    • trace
    • cookie
    • server transfer
    • cross-page post
    Explanation:

    HTTP is a stateless protocol. This means that user data is not persisted from one Web page to the next in a Web site. One way to maintain state is through the use of cookies. Cookies store a set of user specific information, such as a reference identifier for a database record that holds customer information.

  20. You are creating a Web application. The application will be consumed by client computers that run a variety of Web browsers.

    Which term is used to describe the process of making the application available for client computers to access?

    • Casting
    • Deploying
    • Hosting
    • Virtualization
    Explanation:

    You host web applications.