Allen works as a Software Developer for ABC Inc. The company uses Visual Studio.NET as its application development platform. He creates an application using .NET Framework. He wants to encrypt all his e-mails that he sends to anyone. Which of the following will he use to accomplish the task?
A. PPP
B. FTP
C. PPTP
D. PGP
You work as a Software Developer for ABC Inc. The company has several branches worldwide. The company uses Visual Studio .NET 2005 as its application development platform. You are creating an application using .NET Framework 2.0. The application will be used by all the branches of the company. You are using the CompareInfo class for culture-sensitive string comparisons. You write the following code in the application:
String s1 = "C rtify";
String s2 = "c rtify";
String s3 = "c rtify";
You need to compare the s1 string with the s2 string and ensure that the string comparison must ignore case. Which of the following code segments will you use to accomplish the task?
A. CompareInfo cmp = CultureInfo.InvariantCulture.CompareInfo; Console.WriteLine(cmp.Compare(s1, s2, CompareOptions.IgnoreCase));
B. CompareInfo cmp = CultureInfo.InvariantCulture.CompareInfo; Console.WriteLine(cmp.Compare(s1, s2, CompareOptions.None));
C. CompareInfo cmp = CultureInfo.InvariantCulture.CompareInfo; Console.WriteLine(cmp.Compare(s1, s2, CompareOptions.Ordinal));
D. CompareInfo cmp = CultureInfo.InvariantCulture.CompareInfo; Console.WriteLine(cmp.Compare(s1, s2, CompareOptions.OrdinalIgnoreCase));
Allen works as a Software Developer for ABC Inc. The company uses Visual Studio.NET as its application development platform. He creates an application using .NET Framework. He wants to encrypt all his e-mails that he sends to anyone. Which of the following will he use to accomplish the task?
A. PPP
B. FTP
C. PPTP
D. PGP
You work as a Software Developer for Hi-Tech Inc. You develop an application using Visual Studio .NET 2005. You create an unregistered COM DLL file named Com1.dll. You want to use this Com1.dll file in your application code. However, Com1.dll needs to be registered in the Windows Registry before it is used by the application. Which of the following tools will you use to accomplish the task?
A. Wsdl.exe
B. Regsvr32.exe
C. Tlbimp.exe
D. Disco.exe
Sandra works as a Software Developer for ABC Inc. She develops an application named MyApp that contains a data-bound control named MyDataControl. She wants to use an Oracle database in order to bind data to MyDataControl. Which of the following GUI-based data sources will Sandra use to accomplish the task?
A. AccessDataSource
B. SqlDataSource
C. ObjectDataSource
D. XmlDataSource
E. SitemapDataSource
You work as a Software Developer for ABC Inc. You create a Console application. You write the following code in the application: RC2CryptoServiceProvider TestRC2 = new RC2CryptoServiceProvider();
Console.WriteLine(TestRC2.Mode);
What output will the above code display?
A. Cipher Block Chaining (CBC)
B. Output Feedback (OFB)
C. Cipher Text Stealing (CTS)
D. Electronic Codebook (ECB)
E. Cipher Feedback (CFB)
You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You are deploying a class library using the .NET Framework. Portions of your code need to access system environment variables. You need to force a runtime security exception only when the callers that are higher in the call stack do not have necessary permissions to access the resources. Which of the following methods will you use to accomplish the task?
A. PermitOnly()
B. Demand()
C. Assert()
D. Deny()
You work as a Web Application Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You create a Web application using .NET Framework 2.0. You configure the application at the following levels:
l Root Web
l Web application root directory
l Web site
l Web application subdirectory
In which of the following files will these levels be stored?
A. Proxy auto-config
B. ApplicationName.config
C. Manhine.config
D. Web.config
You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You are creating an application using .NET Framework 2.0. You are using regular expression in the application to validate email, phone number, etc. You are required to match the preceding character or sub expression zero or more times. Which of the following wildcard characters will you use to accomplish the task?
A. ?
B. +
C. *
D. [n]
Robert works as a Software Developer for InfoTech Inc. He develops an application named MyApp that uses SQL Server database and three database components. He wants to ensure that other developed applications cannot use these database components. Users should be authorized before they can access these components. Robert configures the database component assemblies to accomplish this task. Choose the correct actions that Robert should take after the configuration.
A. True
B. False