_________ applications were designed using a modular approach.
Trang 14. In the current scenario, applications are expected to have the following
b) High network operability d) Scalability
5. Which of the following options are true with respect to monolithic
applications?
[0.5]
a) They are time consuming c) It is an expensive
process.
b) Sharing of data is possible d) Change was very easy
6. In the Distributed Component approach, the single middle-tier application object has been perceived as several _ that can communicate with each other
[1.0]
Trang 2b) Components d) Objects
7. The n-tier architecture talks about a logical architecture [0.5]
8. In Two-tier client server architecture, the business logic has to be
9. The middle tier can be hidden behind the firewall security of the
10 In Two-tier client server architecture, the _ controls the flow of
data between the database and the application [0.5]
11 In Distributed Component Approach, the interaction between
components and the environment is carried out through a Context Object
a) They behave like a black
box hiding the
implementation from the
outside world.
c) They can be used by locating it through its identity.
b) They encapsulate the data
and methods.
d) They are difficult to modify
Trang 313 The components in Distributed Component Approach require a
to run
[1.0]
a) Origin Server c) Content Server
b) Application Server d) Gateway Server
14 In n-tier architecture, the factor ‘n’ depends on the number of parts the
business logic is divided into
a) Server implements the rules
for data integrity.
c) Implementation of a powerful
hardware for the server does not enhance the reliability of the application
b) It prevents different data
integrity rules being
implemented by different
client applications.
d) Implementation of a powerful hardware for the server enhances the availability of the application.
17 To support the increase in load, an application needs to be highly
along with the additional hardware support
[1.0]
Trang 418 is a process of hiding the details about its operations from
c) Security
20 Which of the following is true for n-tier architecture? [1.5]
a) Due to division of
application logic into
multiple parts, scalability is
achieved.
c) More system resources are
not available to the application
b) The parts of the business
logic may reside on different
systems.
d) The middle tier objects are
able to communicate with each other
21 In three-tier architecture, the entire business logic of the application
physically resides on
[1.5]
b) Single machine d) Client, Server and Backend
22 In n-tier architecture, the number of parts obtained by dividing the
business logic are _ on/of each other
[1.5]
Trang 5b) Large application may not
have the desired scalability
level.
d) The business logic, or the database type or schema can be changed without causing interruption to the clients.
24 The synonym for middle tier, in a three-tier client server architecture is
a) Statement 1 is true c) Both statements are true
b) Statement 2 is false d) Both statements are false.
26 Which of the following are true for a two-tier client server architecture? [2.0]
b) The presentation logic and
the business logic are
clubbed together as a client
application
d) The client holds the
database
Trang 627 Application architectures are part of of the OSI model [2.0]
28 Two-tiered systems can only access one database system at a time
Other database systems, mainframe applications, or other resources must be accessed through gateways
[2.0]
29 Which of the following are true in case of two-tiered architecture? [2.0]
a) Databases must not maintain
connections with each active
client
c) None of the options given
b) It is difficult to reuse
two-tiered application logic
broadly, because
applications are tightly
bound to specific database
systems and table formats.
d) Databases must maintain connections with each active client.
30 Busy web sites typically employ two or more _ in a
load-balancing scheme
[2.0]
31 VB (Visual Basic) from Microsoft is one of the tools that competes with
Trang 732 Which of the following is true for Data Access tier? [2.0]
a) It lies between Business tier
and Data tier c) It is used to provide interfaces to the database.
b) It lies between presentation
and Data tier
d) It is used to handle data input/output.
33 In a _ tiered architecture, contention can occur in the database
as many clients try to work on the same data concurrently
[2.0]
34 _ computing is where remote servers and clients cooperate
over the Internet to perform tasks
[2.0]
35 Which one of the following is true in case of a three-tier architecture? [2.0]
a) Thin client, Fat server c) Fat client
b) Fat client, Thin server d) Thin server
36 Statement1: Two-tiered security focuses on granting or denying users
access to data
Statement 2: Three-tiered security focuses on granting or denying access on a component-by-component basis
[2.0]
a) Statement 1 is true c) Both statements are true.
b) Statement 2 is false d) Both statements are false.
Trang 837 is a platform-independent, distributed, object-oriented system
for creating binary software components that can interact
[0.5]
38 COM is not a but a set of specifications [0.5]
a) Distributed Technology b) Programming Language
40 Different classes can implement the interfaces differently [0.5]
42 Components can implement Multiple interfaces [0.5]
43 _ is a variation of Remote Procedure Call (RPC) enabling
communication between two processes on the same machine [0.5]
Trang 944 RPC enables applications residing on different machines to
communicate with each other using a variety of network transport techniques
[0.5]
45 The function decides whether the component supports a
particular type of interface
50 Open Software Foundation defines as a 128-bit number to
identify the remote systems in a distributed computing environment’s remote procedure call
[1.0]
Trang 1051 In Remote Process Server technique, the overheads in communicating
with the remote components are not high
[1.0]
52 In COM, the status of an operation is notified through the return value
of the function in a format known as HRESULT [1.0]
53 By providing binary standard for interoperability, COM enables
applications developed by multiple developers and vendors to communicate with each other
a) Language dependence for
developing the componentt
implementation of the component.
b) Reusable application
architecture
d) Language independence for developing the component
55 Which of the following are true in relation with IUnknown interface? [1.0]
specifications, it is mandatory
that every COM component
must support it
d) All the functions defined in
this interface are pure virtual functions
b) It is available by default for all
windows based systems
e) All of the above
c) It helps the client application to
Trang 11scan for other interfaces
available in the component
56 Which are the three functions or methods supported by IUnknown
58 Which of the following types of COM components depend on the type
of container chosen and the location of the component?
[1.0]
b) Out-of-process server d) In-range server
59 The function decides whether the component supports a
particular type of interface
[1.0]
60 In-process server is a type of COM component, which is implemented
in the form of DLL files
[1.0]
a) Creation and use of reusable
component objects
d) A good foundation for
security at the object level
Trang 12b) A single programming model
for developing components on
native and non-native
platforms
e) All of the above.
c) Optimum usage of the system
resources by encapsulating
the life-cycle management of
the object internally
62 Which are the standard interfaces to be implemented by COM that are
associated with the standard Ids and provide certain standard functionalities shared by most of the components developed by various component authors?
[1.5]
63 Which of the following are the advantages of the components created
a) Fully Language dependent c) Provides Location
Transparency
compatibility d) Fully independent Language
64 Which of the following are true in relation with an interface? [1.5]
a) Defines ways in which
components will talk to each
other.
c) Through few controls of interface, the user can use multiple functionalities.
b) Helps in hiding the business
logic used for developing
the object.
d) Does not enable the
interaction between different types of components of the system
Trang 1365 Which of the following is true with regards to Interface pointer? [1.5]
a) It points to a group of pointers
wherein each pointer from the
group points to another group
of pointers
c) It points to a group of pointers.
b) It points to the interface
member functions d) Each pointer from the group of pointers points to
the interface member functions.
66 Which of the following are the advantages of using DLLs? [1.5]
a) The overheads involved in
memory allocation are
reduced.
languages.
b) Does not save disk space e) All of the above.
c) Upgradations are easy.
67 Which of the following is true for COM components in relation with
.EXE and DLL formats?
[1.5]
a) The executable codes for the
COM objects are placed in
the .EXE format or the .DLL
format
d) EXE and DLL are the file
extensions provided for the files under Windows operating system to identify them as executables and dynamic link libraries respectively
b) The DLLs or EXEs act as a
component server as they are
the means of component
distribution
e) All of the above
c) The EXE or DLL files act as
containers for the COM
component
Trang 1468 Which of the following are true regarding a type of COM component
known as In-process server?
[1.5]
a) The overheads involved in
memory allocation increase c) Any change made to the DLL does not require the
client applications using it
69 The _ function returns a value of type HRESULT, which is
the COM error status code with a specific format, whereas the functions and _return ULONG i.e unsigned long values
70 Which of the following is the structure of GUID? [1.5]
a) typedef struct _GUID { // size
WORD Data2;
WORD Data3;
BYTE Data4[8];
WORD Data2;
WORD Data3;
BYTE Data4[4];
} GUID;
Trang 1571 Statement 1: CLSID, a class ID is a GUID that names an interface.
Statement 2: IID, an interface ID is a GUID that names an interface
[2.0]
a) Statement 1 is false c) Statement 1 is true
b) Statement 2 is true d) Statement 2 is false
72 Statement 1: CLSID is a class ID or a GUID which is used to name a
coclass
Statement 2: IID, an interface ID is a GUID that names an interface
[2.0]
a) Statement 1 is false c) Statement 1 is true
b) Statement 2 is true d) Statement 2 is false
73 Statement 1: There is no selective inheritance in COM; if one interface
inherits from another, it includes all the methods that the other
interface defines
Statement 2: Inheritance in COM means only reusing code
[2.0]
a) Statement 1 is true c) Both statements are true
b) Statement 2 is false d) Both statements are false
74 Which of the following is true in relation with namespaces for
d) All of the above.
75 and are the two ways of packaging
components in COM
[2.0]
a) Hierarchical and Physical c) Global and Local
Trang 16b) Hierarchical and Logical d) Logical and Physical.
76 Statement 1: In COM, all communication between clients and objects
occurs over methods defined on interfaces
Statement 2: Methods are implemented in classes, but defined on interfaces
[2.0]
a) Statement 1 is true c) Both statements are true
b) Statement 2 is false d) Both statements are false
77 Statement 1: HRESULT is a 32-bit signed integer with nonnegative
values indicating success
Statement 2: HRESULT is a 32-bit signed integer with nonnegative values indicating failure
[2.0]
a) Statement 1 is true c) Statement 1 is false
b) Statement 2 is true d) Statement 2 is false
78 Which are the two types of inheritance used by COM+? [2.5]
a) Interface inheritance c) Data inheritance
b) Implementation inheritance d) Class inheritance
79 Which of the following are true in relation with the IUnknown interface
a) Release() method tells the
COM object to increment its
reference count
d) AddRef() tells the COM
object to decrement its reference count
b) Release() method can be
called to tell the COM object
that it is no longer needed
e) All of the above.
c) Once Release() method is
called, we must not use the
interface pointer any more.
Trang 1780 Which of the following are true with respect to COM? [2.5]
a) For COM, we can define a new
version of an old interface and
give it the same identifier
d) In COM, interface names usually starts with I.
b) The structure of COM
objects in memory just
happens to use the same
structure that is used by C++
virtual functions.
e) All of the above.
c) As COM is Win32-specific, it
could, in theory, be ported to
Unix or any other OS
81 HKEY_CLASSES_ROOT key is the basic requirement of COM
82 _ are application specific names and their corresponding
83 The component ID is not stored in the CLSID key [0.5]
84 In a windows registry, _ are the keys created within a key [0.5]
Trang 1885 can be a decimal number, hexadecimal number or a string [0.5]
86 The files generated by the MIDL (Microsoft IDL) compiler can have an
89 The _ file contains the proxy/stub source that is used in local
process and remote components
[0.5]
90 HKEY_CLASSES_ROOT key holds the information about all the
registered components and file associations [0.5]
91 The _ file contains the GUID definitions of interfaces,
92 In DCOM, AppID is a sub key used for mapping a GUID to a
Trang 19a) True b) False
93 The Windows registry, being a unified database, can store information
about the details of the users, and hardware of a system but cannot
store information about the applications installed in it
[1.0]
94 Which of the following are true with regards to Default Values? [1.0]
a) They are provided with a
specific name
c) They are unnamed values.
b) Each key can have only one
default key d) Each key can have more than one default key
95 _ key holds information about globally accessible data like
general configurations of the system and applications [1.0]
96 _ are application specific names and their corresponding
values
[1.0]
97 Which of the following keys belong to Windows registry? [1.0]
a) It is used to view the
contents of the registry.
c) It displays the registry contents in Registry
Trang 20b) It is not a part of Windows
Operating System
d) It is a part of Windows Operating System.
99 Statement 1: The name.H file contains the definitions of the interfaces
in C++ language
Statement 2: The name_I.C file contains the GUID definitions of interfaces, components and type libraries
[1.0]
a) Statement 1 is true c) Both statements are true
b) Statement 2 is false d) Both statements are false
100 Which file is used as the language neutral library by the non-C++
client applications to communicate with the component server? [1.0]
101 Which are the .ini files in Windows 3.x systems that store the
information related to the system?
103 Statement 1: The DLLDATA.C file contains the proxy/stub source that
is used in local process and remote components
Statement 2: The name_P.C file contains the code to implement the proxy/stub DLL
[1.0]
a) Statement 1 is true c) Statement 1 is false
Trang 21b) Statement 2 is true d) Statement 2 is false
104 Statement 1: Microsoft has provided non-C++ clients with Type
Libraries, which are language independent files to help them in using
the component technology
Statement 2: Using the type library, the non-C++ client applications can get the type information about the interfaces and functions supported by the component
[1.0]
a) Statement 1 is false c) Statement 1 is true
b) Statement 2 is true d) Statement 2 is false
105 Statement 1: The problem with ini files was that they could be lost or
corrupted at any point of time
Statement 2: To prevent problems with ini files that stored information
in a scattered way, Microsoft implemented the concept of registry
[1.5]
a) Statement 1 is false c) Statement 1 is true
b) Both the statements are false d) Statement 2 is true
106 Which of the following is true regarding the Windows registry? [1.5]
a) Information is organized in a
hierarchical structure
c) A key is the item that is
referenced by the application
b) Each item in the hierarchy of
information is called a key d) All of the above.
107 Which of the following is true regarding HKEY_CURRENT_USER
a) Holds information about the
user who has currently logged
Trang 22or human readable identifier
for the class ids.
c) It is not easy to understand.
b) It is the programmer friendly
109 Consider a registry organization for Microsoft Word 2000 that has an
internal version as 9 Which of the following are true?
[1.5]
a) If the client application
needs to use the common
features of Microsoft Word,
it can use the version
independent ProgID.
c) If the client application needs to use the common features of Microsoft Word,
it can use the version dependent ProgID
b) If the client needs to use
the specific features of
d) All of the above
110 Which of the following is true with regards to the Interface Definition
Language (IDL)?
[1.5]
a) a) It is used to create the
interfaces in a language independent way
d) Microsoft adopted the
technology of the IDL for their Distributed Computing architecture and added few COM specific extensions to
Trang 23support object-oriented features of COM
b) The files created by compiling
IDL files contain the C++
equivalent interface
definitions, GUID definitions
and other details
e) All of the above.
c) Open Software Foundation
(OSF) originally designed the
IDL for their Distributed
helpstring(“xyzinf
Interface”),
pointer_default(unique)
HRESULT Add ([in] int
x, [in] int y, [out] int* res);
};
c) import “abc.idl”
//Interface xyzinf Header
[
object, helpstring(“xyzinf Interface”)
pointer_default(unique) ]
//Interface xyzinf Definition
interface xyzinf : IUnknown
{
HRESULT Add ([in]
int x, [in] int y, [out] int* res) };
uuid(C6ED4D50-0000E2102452),
d) import “abc.idl”
//Interface xyzinf Header
[
object, uuid(C6ED4D50- 5E76-11d4-95A7-
Trang 24helpstring(“xyzinf
Interface”),
pointer_default(unique)
HRESULT Add ([in] int
x, [in] int y, [out] int* res);
};
0000E2102452), helpstring(“xyzinf Interface”),
pointer_default(unique) ]
//Interface xyzinf Definition
interface xyzinf : IUnknown
{
HRESULT Add ([in]
int x, [in] int y, [out] int*
pointer_default(unique) ]
Which of the following are true with regard to the snippet above?
[1.5]
a) The contents within the
square brackets are a set of
MIDL attributes specifying
the characteristics of the
interface definition.
c) The attribute ‘uuid(…)’ specifies the interface ID (IID) to be associated with that interface
b) The attribute ‘helpstring(…)’
indicates that the interface is a
COM interface and directs the
MIDL compiler to generate the
proxy/stub code for that
interface
d) The attribute ‘object’ provides the description of the interface that will be placed in the type library
Trang 25113 Consider the following IDL snippet.
//Interface xyzinf Definition
interface xyzinf : IUnknown
a) The ‘out’ attribute informs the
MIDL compiler that the
direction of the parameter is
from the client application to
the component server
c) The ‘in’ attribute specifies
that the direction of the parameter is from the component to the client application
b) The ‘in’ attribute ensures
that no return value is being
sent from the component to
the client through the
parameter.
d) The ‘out’ attribute ensures that no return value is being sent from the client
115 Statement 1: IID stands for an interface ID.
Statement 2: IID registers new interfaces by associating an interface name with an interface ID
[2.0]
a) Statement 1 is true c) Both statements are true
b) Statement 2 is false d) Both statements are false
116 Which of the following is true?
Statement 1:Version Independent ProgID refers to the currently
installed version of the application's class
Statement 2:Version Dependent ProgID refers to the currently installed version of the application's class
[2.0]
a) Statement 1 is true c) Both statements are true
Trang 26b) Statement 2 is false d) Both statements are false
117 Which of the following are true in relation with ProgID? [2.0]
a) It can start with a digit and
have spaces
c) It can have a maximum of
39 characters.
b) It can contain no punctuation
including underscores except
one or more periods
d) Like the CLSID, the ProgID identifies a class, but with less precision.
118 Statement 1: File extensions are sub keys of the
HKEY_CLASSES_ROOT key
Statement 2:ProgIDs are the subkeys of the HKEY_CLASSES_ROOT key
[2.0]
a) Statement 1 is true c) Both statements are true
b) Statement 2 is false d) Both statements are false
119 Statement 1: The regedt32.exe editor provides the capability to view
and modify the registry permissions that allow and deny read-write
access to different users and user groups
Statement 2: The user interface for regedt32.exe and regedit.exe editor is the same
[2.0]
a) Statement 1 is true c) Both statements are true
b) Statement 2 is false d) Both statements are false
120 The following are the two statements regarding IDL file.
Statement 1: The server stub module provides entry points on the
client for each of the operations defined in the input IDL file
Statement 2: The client stub provides entry points on the server for each of the operations defined in the input IDL file
[2.0]
a) Statement 1 is true c) Statement 1 is false
b) Statement 2 is true d) Statement 2 is false
Trang 27121 Statement 1: Object Description Language (ODL) is a scripting
language used to describe exposed libraries, objects, types, and
interfaces
Statement 2: The MIDL compiler compiles ODL scripts into type libraries
[2.0]
a) Statement 1 is true c) Statement 1 is false
b) Statement 2 is true d) Statement 2 is false
122 Which of the following is true regarding a type library [2.0]
a) It is a file having an extension
of tlb
c) Through it, an application or
browser can determine the interfaces an object supports, and invokes an object's interface methods even if the object and client applications were written in different programming languages
b) It is a binary file that stores
information about a COM or
DCOM object's properties and
methods in a form that is
accessible to other
applications at runtime
d) All of the above.
123 Which of the following is true regarding IDL file? [2.5]
a) It is a file that contains
interface and type library
definitions.
d) In it, the interface header
contains attributes that do not apply to the entire interface
b) It has an .idm file name
extension
e) The body of the interface contains the interface definitions.
Trang 28c) In it, each interface consists
of a header and a body.
f) All of the above
124 Which of the following are true with regards to AppID key? [2.5]
a) It groups the configuration
options or a set of named
values for one or more
distributed COM objects into
one location in the registry.
c) It does not simplify the
management of common security and configuration settings
b) Subkeys under this key are
used to map an application
identifier to a remote server
name.
d) All of the above.
125 What is the right sequence of operations?
a With CLSID, COM can start an instance of the object
b After the ProgID is located, COM can determine the object CLSID
c COM binds the file to the object
d COM looks for the file extension key value that indicates where
it should look to find the ProgID for the COM object type
Trang 29131 In Microsoft terms, a NET component that utilizes COM+ services is
132 A Network Load Balance (NLB) cluster helps in balancing the IP traffic
133 SQL Server does not use failover clustering [0.5]
134 Internet Information Server or IIS is installed as a network service in
Windows 2000 operating system
[0.5]
135 Microsoft’s Host Integration Server is responsible for accessing
existing legacy systems from Windows platform
[0.5]
Trang 30136 SOAP allows access to services, objects and servers in a
platform-independent manner
[0.5]
137 Internet Security is a firewall used to protect LAN users from
unauthorized intrusion through Internet connection
[1.0]
a) Statement 1 is true c) Statement 1 is false
b) Statement 2 is false d) Statement 2 is true
139 Visual Studio.NET provides an application building tool for developing
applications using languages like VB.NET, C#, VC++ and JAVA
[1.0]
140 is a set of computers working together to run a single
application in order to make it continuously available even if a failure occurs
[1.0]
a) Universal Data Access
(UDA) Model allows any
type of data source like
mainframe databases,
b) Windows DNA uses UDA
model through ODBC
Trang 31spreadsheets etc to be used
in the data-tier.
142 Which of the following is true regarding middle-tier in the DNA
architecture?
[1.0]
a) It is the business logic built
using COM+ components,
which have no visual
representation.
c) The COM+ components in it
must be written using only one language
143 Statement 1: Any COM-enabled client can use existing COM
components, once they are configured and deployed to make its capabilities available through the operating system
Statement 2: COM components like ADO interact with the data-tier to avail data services
[1.0]
a) Statement 1 is true c) Statement 1 is false
b) Statement 2 is false d) Statement 2 is true
145 Which of the following are the optional elements of Windows DNA? [1.0]
b) Site Server 3.0 d) Application Center Server
146 Which of the following are the elements of Windows DNA? [1.0]
a) Windows NT with its features
Trang 32b) Site Server 3.0 d) ISA Server 2000
a) Two servers running in series
with each server configured to
take over the other in the
event of failure of one server
c) Two servers running in
series but do not take over the other server in the event
of failure of one server
b) Two servers running in
parallel with each server
configured to take over the
other server in the event of
failure of one server.
d) All of the above
148 Which of the following are true regarding ASP? [1.0]
a) Active Server Pages can
form a part of the
Presentation Tier.
c) Active Server Pages cannot
form a part of the Presentation Tier
b) Active Server Pages can
form a part of the middle-tier
or the business tier.
d) All of the above.
149 Statement 1: Microsoft.NET is a new platform, based on the idea of a
web service to make data available to the user from anywhere, and at
any time, using any device
Statement 2: Microsoft.NET is a multi-tiered architecture used to build distributed applications
[1.0]
a) Statement 1 is true c) Statement 1 is false
b) Statement 2 is false d) Statement 2 is true
a) Windows DNA stands for
Distributed interNet
c) It provides guidelines to build multi-tier, large-
Trang 33application Architecture scale, enterprise-level,
mission-critical applications.
b) DNA is Microsoft’s solution
for building Distributed
Applications using Windows
2000 Operating System and
its native services.
d) Windows DNA does not
follow three-tier architecture
a) ODBC is a mechanism for
accessing RDBMS provided
by the same vendor only
d) Applications can interact with the OLE DB directly
or through ADO.
b) OLE DB is a set of COM
interfaces used to access
any type of data.
Directory helps clients in locating the components present in the middle-tier
or Business tier.
c) Windows DNA uses UDA
model through ODBC
152 Statement 1: Issues like scalability or availability were not taken care
of by the Transaction Processing Coordinators in case of mainframes
and minicomputers
Statement 2: Earlier in the original DNA, MTS served the purpose by allowing the COM components to be deployed and managed by an administrator However, nowadays it is done by COM+
[1.5]
a) Statement 1 is false c) Both statements are true
b) Statement 2 is true d) Both statements are false
153 Which of the following are true regarding NET Enterprise servers? [1.5]
a) Exchange Server 2000 is a
mail server, integrated with c) LCB is the feature of COM+ that allows the scaling of
Trang 34Microsoft Active Directory and
IIS that supports only HTML
documents and no MIME
154 Which of the following are the ways of configuring COM+ services into
by making use of .NET framework SDK.
b) Configuring various property
settings programmatically
using coadmin.dll API
d) All of the above.
a) Availability refers to a failover
mechanism for different
processes
d) Microsoft’s Cluster Services
(MSCS) can be used to protect critical resources to make the application available all the time
b) SQL Server maintains a
transaction log, which can be
rerun in the event of a failure
e) All of the above
c) With Exchange Server,
messages are stored in the
server until they can be
delivered to the recipients
Trang 35156 Which of the following are true regarding Autonomy, the design
objective for DNA?
b) It is an extension of the
concept of Inheritance e) All of the above
c) Earlier in DNA, MTS was a
tool for implementing
Autonomy through DTC
(Distributed Transactions
Coordinator).
a) SNA Server helps in
integrating applications across
platforms that pass data in the
form of messages
c) BizTalk Server 2000 helps
Windows platform to access legacy applications running
158 Which of the following are true with regards to Application Center
a) Statement 1 is true c) Statement 1 is false
b) Statement 2 is false d) Statement 2 is true
Trang 36159 Statement 1: In Windows DNA, data-tier makes use of SQL Server to
manage relational data
Statement 2: In Windows DNA Data services are made available through the data-tier, which provides easy access to structured data through the ADO along with OLE DB and ODBC
[1.5]
a) Statement 1 is false c) Both statements are true
b) Statement 2 is true d) Both statements are false
160 Statement 1: Windows DNA enables organizations to build business
solutions to improve the flow of information within and without the
organization
Statement 2: Windows DNA enables organizations to build business solutions that can be centrally managed, maintained but cannot be integrated with existing systems and data
[2.0]
a) Statement 1 is true c) Both statements are true
b) Statement 2 is false d) Both statements are false
a) Microsoft introduced no-touch
deployment concept to make the need to register components in the system necessary
b) Microsoft introduced touch deployment concept
no-to eliminate problem referred to as DLL Hell
Windows systems.
162 Which of the following is true regarding the NET Framework? [2.0]
a) WinForms is a new forms
package that enables
b) In WinForms, data actually
runs on the server machine