Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "70-320" Exam

Developing XML Web Services and Server Components with Microsoft Visual C# .NET and the Microsoft .NET Framework

 Question 1.
You have just created an ASP.Net application using C#. You also need to config the Web.config file. You ensure that Baker can access all of the application's resources, except for those resources that are located in the /Apps/ResumeApplication directory. Baker is a member of the HRDepartment group.

What should you do? (Select the best choice.)

A. 
       
       
      
     
B. 
       
     
    
      
    
    
       
     
     
C. 
      
       
      
     
D.  
      
     

Answer: A

Explanation:
Baker can access all of the application's resources, including the resources in the /Apps/ResumeApplication directory. The first  section beginning on line 120 grants the HRDepartment group access to the application; thus, by virtue of his membership in the HRDepartment group, Baker can access the application. 

The second  block beginning on line 200 revokes access to the resources in the
/Apps/ResumeApplication directory from anonymous users, but it does not revoke this access from Baker. 

Therefore, Baker can access the entire application.

Question 2.
You have written a class named MyClass that should be accessed only from a user with a name of "JAMES." Which of the following lines of code should you use to control access to your class? (Select the best choice.)

A.  Public Class 
    MyClass
B.  Public Class 
    MyClass
C.  Public 
    Class MyClass
D.  Public 
    Class MyClass

Answer: A

Explanation:
You should use the code  Public Class MyClass to allow only a user with a name of "JAMES" to access the code in MyClass.

Question 3.
You have created the code shown below: (Line numbers are for reference purposes only.)

01 cRemoteObject ITRemotingApp
02 String sVal
03 String str
04 ITRemotingApp = CType(Activator.GetObject( _ GetType(cRemoteObject), _
"tcp://ITServer:454/ObjectApplicationName" _), cRemoteObject)
05 sVal = ITRemotingApp.GetData()

Which line of code results in the object's creation on the server? (Select the best choice.)

A. Line 03
B. Line 04
C. Line 02
D. Line 01

Answer: B

Explanation:
The object will be created on the server when line 04
ITRemotingApp = CType(Activator.GetObject( _ GetType(cRemoteObject),
_"tcp://servername:8320/ObjectApplicationName" _ ), cRemoteObject)
is executed. Client-activated objects are created on the server when New() or the Activator.GetObject method is called. This mechanism causes the same object on the server to be used by the proxy for all calls made to the object by the client.

Question 4
You need to use the  element in an XML schema definition. One student is related to many subjects. You need to ensure that datasets created with the XML data will produce a foreign key constraint between two columns in two of the tables. Which other elements must you not use with the  element in order to properly build the constraint? 
(Select the best choice.)

A. 
B. 
C. 
D. 
E. 

Answer: D, E

Explanation:
The  and  elements are used to place a foreign key constraint on two fields when a dataset is created from XML data. The  element identifies the key column of the parent table. The  element establishes the link between a parent column and a child column. When a dataset is created from the XML schema, a foreign key constraint will be created with the information supplied by the  element.

When you use the  and  elements, you should use the  and  elements to identify the tables and columns that are being constrained.

Question 5
You are modifying the XSD schema for the FlightData data table. You want to add a primary key that consists of the fields Flight No and IATA AirportCode. Which of the following XML code segments should you use? (Select the best choice.)

A. 
    
    
    
B. 
   
   
   
    
C.  
      
D.  
     

Answer: C

Explanation:
The  element defines a unique constraint. When combined with the msdata:PrimaryKey="true" attribute, the element defines a primary key. The xpath property of the  element points to the table element to which the constraint will be applied, and the xpath property of the  element identifies the fields that make up the primary key.

Question 6
You are querying an SQL server for customers with Gold status. To do this, you create a SqlDataReader object that contains data from the Customer Info table in a Microsoft SQL Server database. The SQL Server data type of one of the columns, Customer Status, is SmallInt. You want to store the value of the Customer Status column in a variable named current Index. You need to maintain the best performance. 
What should you do? (Select the best choice.)

A. GetValue
B. GetInt16
C. GetInt64
D. GetInt32

Answer: B

Explanation:
In order to read the data in a column of type SmallInt with the greatest performance, the GetInt16 method of a SqlDataReader object should be used. For this reason, when the data type of a column is known, typed accessors should be used rather than the generic GetValue method. Once retrieved, column values should be stored in variables of the appropriate type.

Question 7
You have created an ASP.Net application using C# for BlueFliers Inc. The application must ensure that all flight bookings can be shared and displayed quickly among all users of the application. Which of the following storage methods should you choose? (Select the best choice.)

A. an XML file on the Web server
B. an array in the Session object
C. a DataSet object stored in a Cache object
D. an array in a hidden field

Answer: C

Explanation:
You should create a DataSet object with the seismic data and store the dataset in a Cache object. By placing the dataset in a Cache object, the dataset resides in memory on the Web server and is available for all users of the application.

Question 8
You have created an ASP.Net application for BlueFliers Inc. You need to ensure that each customer is given a unique OD. Which schema segment will place the proper constraint on the CustomerID field? (Select the best choice.)

A. 
B. 
    
    
    
C. 
D. 
    
    
    

Answer: D

Explanation:
The unique element in an XML schema will create a unique constraint in a dataset so that no duplicate values are allowed. The msdata: Constraint Name property specifies the name of the constraint. The field element specifies the column that the constraint applies to. The selector element specifies the table that contains the column.

Question 9
You are to perform maintenance programming on an existing ASP.net application used by Blue Inc to update their customers' profile information. Your observation is shown below:

• The existing code uses a SqlCommand object to execute thirty Update statements in succession.
• Before each ExecuteNonQuery method, the code opens a connection to the database.
• After each ExecuteNonQuery command, the code closes the connection. The code uses the SQL Server managed provider.
What should you do to improve the performance of the code? (Select the best choice.)

A. Keep the SqlConnection object open during all Execute statements.
B. Encompass the Update statements inside a transaction.
C. Use a Data Reader object to execute the command.
D. Use OleDbConnection and OleDbCommand objects instead of SqlConnection and 
    SqlCommand objects.

Answer: A

Explanation:
You should keep the SqlConnection object open during all Execute statements in order to improve the performance of the code. Opening and closing connections takes considerable resources to perform and should only be performed when needed. You should explicitly close the connection when your code no longer needs to use it. You cannot use a transaction in this scenario unless you leave the connection open during each command. Transactions are committed when connections are closed.

Question 10
You are standardizing your application using C#'s exception handling for BlueFlier Inc. BlueFlier is promoting its frequently flier program. To do this, you have created a class named Exception Handler that inherits from System.Exception. ExceptionHandler is the base class for classes that define broad categories of exceptions, such as LoyaltyPointsRulesException. LoyaltyPointsRulesException, like all of the broad category classes, is the base class for more specific errors such as TooLittlePoints. Which of the following code will implement these three custom classes as described? (Select the best choice.)

A. Public Class TooLittlePoints{ Inherits System.Exception }
    Public Class BusinessRulesException: Inherits TooLittlePoints{ }
    Public Class ExceptionHandler:BusinessRulesException{}
B. Public Class ExceptionHandler:System.Exception{ }
    Public Class BusinessRulesException :ExceptionHandler{ }
    Public Class TooLittlePoints:ExceptionHandler{ }
C. Public Class ExceptionHandler{ Inherits System.Exception }Public Class 
    BusinessRulesException{ Inherits
    System.Exception }Public Class TooLittlePoints{ Inherits System.Exception }
D. Public Class ExceptionHandler{ }Public Class BusinessRulesException : ExceptionHandler{ 
    }Public Class TooLittlePoints Inherits ExceptionHandler }

Answer: B

Explanation:
You should not base all of your custom classes on the System.Exception object because this will not build the hierarchical structure of exception classes described in the scenario.

Question 11
You have created a Web services client that will communicate with a Web service to determine the quantity of each aircraft spare parts that Air Spares Inc offers. Your client application will use this information to order required spare parts. You application must ensure that AirSpares has enough to meet your orders. You use the ExecuteNonQuery method of a SqlCommand object. Which of the following values will be returned by the ExecuteNonQuery method? 
(Select the best choice.)

A. an integer indicating the number of rows affected
B. a Boolean value indicating that the command processed correctly
C. a string with the name of the stored procedure or query string that executed
D. a string with the description of any errors that may have occurred

Answer: A

Explanation:
The ExecuteNonQuery method returns an integer indicating the number of rows that were deleted, inserted or updated. The method is used to process Transact-SQL statements that perform Delete, Insert and Update functions. The ExecuteNonQuery method does not return any rows, but will populate any output parameters that are present in the Command object.

Question 12.
You are going to deploy your flight reservations application your client's server at Newark Airport. The application is to be installed a .NET assembly into the Global Assembly Cache (GAC). Which tool is not necessary? (Each choice presents a complete solution.) 
(Select all choices that are correct.)

A. Windows Installer
B. Tlbimp.exe
C. Secutil.exe
D. Gacutil.exe
E. Regasm.exe
F. Ngen.exe
G. Disco.exe
H. Tlbexp.exe

Answer: B, C, E, F, G, H

Explanation:
The Windows Installer and the Gacutil.exe utilities can be used to install .NET assemblies into the GAC.

Secutil.exe is used to manage strong name public key information or Authenticode signatures. Regasm.exe is used to register assemblies so that they can be used by COM components. Ngen.exe is used to compile native images of .NET applications and assemblies. Tlbexp.exe and Tlbimp.exe are used to export and import, respectively, type library information from .NET assemblies and COM components. Disco.exe is used to discover the URLs of Web services that are running on a server.

Question 13.
You are creating an XML service for customers of High World resort. The XML service will authenticate club users before accepting reservations. "A" customers may access all bookings application, while "B" customers must be given access to all booking applications except the golf course. What is the best method to authenticate users? (Select the best choice.)

A. Authentication
B. Impersonation
C. SOAP Headers
D. Authorization

Answer: D

Explanation:
The security mechanism that determines what rights a user who has submitted a valid username and password has in a Web service is Authorization. Authentication is the process of validating credentials obtained from a user against a trusted authority. Impersonation allows a Web service, or other Web application, to run using the credentials of the client. SOAP Headers are sometimes used to transfer a user's credentials for authentication, but cannot be used to determine the rights that a user has in the context of an application.



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 1Z0-032 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "1Z0-032" Exam

Oracle9i Database: Fundamentals II 1Z0-032

 Section A

Question 1.
When performing incomplete recovery using UNTIL SEQUENCE with RMAN, which two pieces of information are required? (Choose two)

A. Thread number.
B. Log Sequence number.
C. Control file sequence number.
D. Name of the last archived log.

Answer:   A & C

Explanation:
Thread number and control file sequence number are required to perform incomplete recovery using UNTIL SEQUENCE option with RMAN. The syntax of command is:

RECOVER DATABASE UNTIL SEQUENCE sequence_number THREAD tread_number;

Log sequence number is not required to perform this type of incomplete recovery.

You don’t need the name of the last archive log to do that.

Reference:
OCP Oracle9i Database: Fundamentals II Exam Guide, Rama Velpuri, p. 363-366
Chapter 15: RMAN Incomplete Recovery

Question 2.
Online index rebuild functionality has been extended to include which four index structures? (Choose four)

A. Bitmap indexes.
B. Reverse key indexes.
C. Function-based indexes.
D. Key-compressed indexes on regular tables.
E. Key-compressed indexes on IOT (including secondary indexes)

Answer:   B, C, D & E

Explanation:
It’s possible to rebuild reverse key, function-based, key-compressed indexes on regular tables and on IOT (including secondary indexes).

Oracle9i does not currently support online index rebuilding for bitmap or partitioned local and global indexes.

Reference:
OCP Oracle9i Database: New Features for Administrators, Daniel Benjamin, p. 74-83
Chapter 2: Availability Enhancements
Oracle 9i New Features, Robert Freeman, p. 46-53
Chapter 2: Oracle9i Architecture Changes

Question 3.
Examine the list of variables and their data types:

NAME DATA Type
TS, TS1 TIMESTAMP
TSZ TIMESTAMP WITH TIME ZONE
TLZ TIMESTAMP WITH LOCAL TIME ZONE
IYM INTERVAL YEAR TO MONTH
IDS, IDSI INTERVAL YEAR To SECOND

Which three expressions using the new data and time data types are valid? (Choose three)

A. IDS* 2
B. TS + IYM
C. TS –TSI
D. IDS – TS
E. IDS + IYM

Answer:   A, B & E

Explanation:
IDS*2, TS+IYM and IDS+IYM are valid new date and time data types.

You cannot subtract timestamps. Also it is not possible to subtract timestamp from the interval day to second.

Reference:
OCP Oracle9i Database: New Features for Administrators, Daniel Benjamin, p. 266-271
Chapter 5: Language Enhancements
Oracle 9i New Features, Robert Freeman, p. 132-135
Chapter 5: Miscellaneous Oracle9i Features and Enhancements

Question 4.
Consider the following statement:

SQL> EXECUTE DBMS_STATS.GATHER_SHEMA_STATS (-
2> ownname => ‘OE’, -
3> estimate_percent => DBMS_STATS.AUTO_SAMPLE_SIZE, -
4> method opt => ‘for all columns size AUTO’);
What is the effect of ‘for all columns size AUTO’ of the METHOD_OPT option?

A.	The Oracle server creates a new histogram based on existing histogram definitions for all table, column, and index statistics for the OE schema.
B.	The Oracle server creates a histogram based on data distribution regardless of how the application uses the column/s for all table, column, and index statistics for the OE schema.
C.	The Oracle server creates a histogram based on data and application usage of the column/s for all table, column, and index statistics for the OE schema.
D.	The Oracle server creates a histogram based on application usage, regardless of data distribution, for all table, column, and index statistics for the OE schema.

Answer:   C

Explanation:
The Oracle server creates a histogram based on data distribution and application usage of the column/s for all table, column, and index statistics for the OE schema.
The Oracle server does not create a new histogram based on existing histogram.
Histogram creation is not regardless of how the application uses the column/s for all table, column, and index statistics for the OE schema.
The Oracle server creates a histogram not only based on application usage, but based on data distribution also.

Reference:
OCP Oracle9i Database: New Features for Administrators, Daniel Benjamin, p. 220-222
Chapter 4: Performance and Scalability Enhancements
Oracle 9i New Features, Robert Freeman, p. 180-181
Chapter 6: Oracle9i SQL, PL/SQL New Features

Question 5.
Which two are true regarding external tables? (Choose two)

A. External tables can be updated.
B. External tables are read-only tables.
C. Indexes can be created on external tables.
D. Indexes cannot be created on external tables.

Answer:   B & D

Explanation:
External tables are read-only tables whose data resides in an external OS flat file, and whose definition is stored inside the database. Indexes cannot be created on external tables.
External tables cannot be updated. They are read-only tables.

Indexes cannot be created on external tables.

Reference:
OCP Oracle9i Database: New Features for Administrators, Daniel Benjamin, p. 131-134
Chapter 3: Manageability Enhancements
Oracle 9i New Features, Robert Freeman, p. 111-116
Chapter 4: New Oracle9i Database DDS and Data-Warehouse Features

Question 6.
When does Oracle9i flag an index as being used in the V$OBJECT_USAGE view?

A. During a query’s parse time only.
B. During a query’s execution time only.
C. During any kind of DML statement execution.
D. During the execution of an INSERT statement only.

Answer:   A

Explanation:
During a query's parse time Oracle9i flags an index as being used in the V$OBJECT_USAGE view. You can query the V$OBJECT_USAGE view to review the index utilization data. If the index has been used within the period of time it was monitored, the USED column within this view will contain a YES value; it will contain a NO otherwise.

During a query's execution time Oracle9i does not flag an index as being used in the V$OBJECT_USAGE view.

Oracle9i flags an index as being used in the V$OBJECT_USAGE view during a query's parse time, not during any kind of DML statement execution.

Oracle9i flags an index as being used in the V$OBJECT_USAGE view during a query's parse time, not during execution of an INSERT statement.

Reference:
OCP Oracle9i Database: New Features for Administrators, Daniel Benjamin, p. 212-214
Chapter 4: Performance and Scalability Enhancements
Oracle 9i New Features, Robert Freeman, p. 56-57
Chapter 2: Oracle9i Architecture Changes

Question 7.
Using a bitmap structure to manage database object space has several benefits over using freelist structures. Which three are benefits of managing space using automaticsegment- space managed objects? (Choose three)

A.	It readily responds to dynamic changes for concurrent access.
B.	It improves performance and space utilization in a multiple-instance environment.
C.	It requires fewer space related options then freelist managed structures.
D.	It improves performance for SYSTEM tablespaces where a high degree of concurrency is required.

Answer:   A, B, D

Explanation:
Managing space with automatic segment-space managed objects can respond to dynamic changes for concurrent access, improves performance and space utilization in a multi-instance environment and improves performance for SYSTEM table spaces where a high degree of concurrency is required.

Incorrect Answers
C: It requires more space related options than free list managed structures.

Reference:
OCP Oracle9i Database: New Features for Administrators, Daniel Benjamin, p. 138-140
Chapter 3: Manageability Enhancements
Oracle 9i New Features, Robert Freeman, p. 53-54
Chapter 2: Oracle9i Architecture Changes

Question 8.
The EMPLOYEES table has six indexes and DML operations are slow. Which command begins monitoring the EMPLOYEE_IDX_FK index to determine whether it has been used by an execution plan?

A. ALTER TABLE employees monitor index employee_idx_fk;
B. ALTER INDEX employee_idx_fk monitoring on;
C. ALTER TABLE employees monitor all indexes;
D. ALTER INDEX employee_idx_fk monitoring usage;

Answer:   D

Explanation:
This statement provides correct syntax to start monitoring the EMPLOYEE_IDX_FK index to determine whether it has been used by an execution plan.

This command requires MONITORING USAGE clause with ALTER INDEX command to be used, not MONITOR INDEX clause with ALTER TABLE command.

This command requires MONITORING USAGE clause to be used, not MONITORING ON clause.

This command requires MONITORING USAGE clause with ALTER INDEX command to be used, not MONITOR ALL INDEXES clause with ALTER TABLE command.

Reference:
OCP Oracle9i Database: New Features for Administrators, Daniel Benjamin, p. 212-214
Chapter 4: Performance and Scalability Enhancements
Oracle 9i New Features, Robert Freeman, p. 56-59
Chapter 2: Oracle9i Architecture Changes

Question 9.
You can control instance recover performance by setting parameters to define targets for ______.

A.	The size of the redo buffer in SGA.
B.	The instance that will perform recovery in Real Application Cluster database.
C.	The number of blocks to be read during instance recovery, or the time needed to complete instance recovery.
D.	The number of passes through the redo logs made by the recovery process to identify blocks needing recovery.

Answer:   C

Explanation:
Oracle9i added the FAST_START_MTTR_TARGET parameter to define targets for the number of blocks to be read during instance recovery, or the time needed to complete instance recovery. Oracle internally uses the FAST_START_MTTR_TARGET parameter value to calculate and set the FAST_START_IO_TARGET and LOG_CHECKPOINT_INTERVAL parameters. If you specified the FAST_START_IO_TARGET and LOG_CHECKPOINT_INTERVAL parameter values, they will override the values Oracle calculates from the FAST_START_MTTR_TARGET parameter.

You cannot control instance recovery performance by setting parameters to define targets for the size of the redo buffer in the SGA

It’s not possible to control instance recovery performance for the instance that will perform recovery in a Real Application Clusters database.

The number of passes through the redo logs made by the recovery process to identify blocks needing recovery will not help to control instance recovery performance.

Reference:
OCP Oracle9i Database: New Features for Administrators, Daniel Benjamin, p. 42-45
Chapter 2: Availability Enhancements
Oracle 9i New Features, Robert Freeman, p. 73-75
Chapter 3: New Oracle9i Availability and Recoverability Features

Question 10.
Which three statements are true about the privileged connection options available in Oracle9i? (Choose three)

A. The CONNECT INTERNAL is disallowed.
B. The Server Manager tool is no longer supplied.
C. The listener must be running to make a connection.
D. The use of remote password login file (orapw) is unchanged.

Answer:   A, B & C

Explanation:
The CONNECT INTERNAL is disallowed in Oracle9i. The Server Manager tool is no longer supplied also. And the listener must be running to make a connection.

The use of a remote password login file (orapw) is changed in Oracle9i.

Reference:
OCP Oracle9i Database: New Features for Administrators, Daniel Benjamin, p. 5-10
Chapter 1: Security Enhancements
Oracle 9i New Features, Robert Freeman, p. 132-135
Chapter 5: Miscellaneous Oracle9i Features and Enhancements



Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.