Question 121
What are the steps required to read text from a file?
Correct Answer:
Question 122
Which element is NOT required if you need a custom class to raise an event?
-
A method to add an event handler
-
A class containing event data, derived from EventArgs
-
A delegate for the event
-
A class raising the event
Correct Answer: A
Question 123
Which class is used to write primitive types in binary to a stream and supports writing strings in a specific encoding?
-
TextReader class
-
BinaryReader class
-
BinaryWriter class
-
TextWriter class
Correct Answer: C
Question 124
Which class is a byte of data that reads and writes from and to a disk?
-
StringReader class
-
TextReader class
-
XmlTextReader class
-
Stream class
Correct Answer: D
Question 125
Namespaces are used a lot in C# programming in two ways. What are those two ways? Each correct answer represents a part of the solution. Choose two.
-
Use the namespace keyword to declare a namespace
-
Declaring your own namespaces
-
The .NET Framework uses namespaces to organize its many classes
-
Using global namespace
Correct Answer: BC
Question 126
You are creating an application using .NET Framework 4.0. You need to use a last-in collection in the application. Which of the following is a last-in, first-out collection?
-
Queue
-
List
-
Stack
-
Hash
Correct Answer: C
Question 127
How is an XmlWriter object useful when writing XML data to XML documents? Each correct answer represents a complete solution. Choose all that apply.
-
It ensures that XML data is represented in file format.
-
It ensures that an XML document is well-formed.
-
It allows XML values to be passed as parameters by using CLR types instead of using strings.
-
It ensures that XML characters are legal and contains valid element and attribute names.
Correct Answer: BCD
Question 128
What are the benefits of asymmetric key cryptography? Each correct answer represents a complete solution. Choose all that apply.
-
It is not scalable.
-
Key regeneration is not required when a user’s private key is compromised.
-
Asymmetric algorithms provide a key revocation mechanism.
-
The same key pair is required to have effective communication with all the users of the asymmetric cryptosystem.
Correct Answer: CD
Question 129
How will you define a default value, Yellow, for a simple element of the XML schema?
-
<xs:element name=”ColorName” type=”xs:string” default=”Yellow”/>
-
<xs:element name=’ColorName’ default=’Yellow’/>
-
<xs:element ID=’ColorName’ default=’Yellow’/>
-
<xs:element ID=”ColorName” name=”Color” type=”xs:string” default=”Yellow”/>
Correct Answer: A
Question 130
What is the major advantage of using class libraries?
-
They secure code with a basic encryption system.
-
They deploy quicker than full applications.
-
Easy to organize and maintain your project.
-
They provide easy access to classes, interfaces, and value types.
Correct Answer: C
Instant Access to Download Latest Complete Collection of Microsoft MTA 98-372 Real Exam
Try Microsoft MTA 98-372 Free Demo
70-410 Dumps VCE PDF
70-411 Dumps VCE PDF
70-412 Dumps VCE PDF
70-413 Dumps VCE PDF
70-414 Dumps VCE PDF
70-417 Dumps VCE PDF
70-461 Dumps VCE PDF
70-462 Dumps VCE PDF
70-463 Dumps VCE PDF
70-464 Dumps VCE PDF
70-465 Dumps VCE PDF
70-480 Dumps VCE PDF
70-483 Dumps VCE PDF
70-486 Dumps VCE PDF
70-487 Dumps VCE PDF