Question 121
What are the steps required to read text from a file?
Correct Answer:
Question 122
Which element is NOT required if you need a custom class to raise an event?
A. A method to add an event handler
B. A class containing event data, derived from EventArgs
C. A delegate for the event
D. A class raising the event
Correct Answer: A
Question 123
Which class is used to write primitive types in binary to a stream and supports writing strings in a specific encoding?
A. TextReader class
B. BinaryReader class
C. BinaryWriter class
D. TextWriter class
Correct Answer: C
Question 124
Which class is a byte of data that reads and writes from and to a disk?
A. StringReader class
B. TextReader class
C. XmlTextReader class
D. Stream class
Correct Answer: D
Question 125
Namespaces are used a lot in C# programming in two ways. What are those two ways? Each correct answer represents a part of the solution. Choose two.
A. Use the namespace keyword to declare a namespace
B. Declaring your own namespaces
C. The .NET Framework uses namespaces to organize its many classes
D. Using global namespace
Correct Answer: BC
Question 126
You are creating an application using .NET Framework 4.0. You need to use a last-in collection in the application. Which of the following is a last-in, first-out collection?
A. Queue
B. List
C. Stack
D. Hash
Correct Answer: C
Question 127
How is an XmlWriter object useful when writing XML data to XML documents? Each correct answer represents a complete solution. Choose all that apply.
A. It ensures that XML data is represented in file format.
B. It ensures that an XML document is well-formed.
C. It allows XML values to be passed as parameters by using CLR types instead of using strings.
D. It ensures that XML characters are legal and contains valid element and attribute names.
Correct Answer: BCD
Question 128
What are the benefits of asymmetric key cryptography? Each correct answer represents a complete solution. Choose all that apply.
A. It is not scalable.
B. Key regeneration is not required when a user’s private key is compromised.
C. Asymmetric algorithms provide a key revocation mechanism.
D. The same key pair is required to have effective communication with all the users of the asymmetric cryptosystem.
Correct Answer: CD
Question 129
How will you define a default value, Yellow, for a simple element of the XML schema?
A. <xs:element name=”ColorName” type=”xs:string” default=”Yellow”/>
B. <xs:element name=’ColorName’ default=’Yellow’/>
C. <xs:element ID=’ColorName’ default=’Yellow’/>
D. <xs:element ID=”ColorName” name=”Color” type=”xs:string” default=”Yellow”/>
Correct Answer: A
Question 130
What is the major advantage of using class libraries?
A. They secure code with a basic encryption system.
B. They deploy quicker than full applications.
C. Easy to organize and maintain your project.
D. They provide easy access to classes, interfaces, and value types.
Correct Answer: C
Instant Access to Download Testing Software & PDF File for Microsoft 98-372 Real Exam
Instant Access to Try Microsoft 98-372 Free Demo
70-410 Dumps VCE PDF
70-411 Dumps VCE PDF
70-412 Dumps VCE PDF
70-413 Dumps VCE PDF
70-414 Dumps VCE PDF
70-417 Dumps VCE PDF
70-461 Dumps VCE PDF
70-462 Dumps VCE PDF
70-463 Dumps VCE PDF
70-464 Dumps VCE PDF
70-465 Dumps VCE PDF
70-480 Dumps VCE PDF
70-483 Dumps VCE PDF
70-486 Dumps VCE PDF
70-487 Dumps VCE PDF