aiotestking uk

70-483 Exam Questions - Online Test


70-483 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. - (Topic 2) 

You are testing an application. The application includes methods named CalculateInterest and LogLine. The CalculateInterest() method calculates loan interest. The LogLine() method sends diagnostic messages to a console window. 

The following code implements the methods. (Line numbers are included for reference only.) 

You have the following requirements: 

. The CalculateInterest() method must run for all build configurations. . The LogLine() method must run only for debug builds. 

You need to ensure that the methods run correctly. 

What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.) 

A. Insert the following code segment at line 01: 

#region DEBUG 

Insert the following code segment at line 10: 

#endregion 

B. Insert the following code segment at line 01: 

[Conditional("DEBUG")] 

C. Insert the following code segment at line 05: 

#region DEBUG 

Insert the following code segment at line 07: 

#endregion 

D. Insert the following code segment at line 10: 

[Conditional("DEBUG")] 

E. Insert the following code segment at line 01: 

#if DEBUG 

Insert the following code segment at line 10: 

#endif 

F. Insert the following code segment at line 10: 

[Conditional("RELEASE")] 

G. Insert the following code segment at line 05: 

#if DEBUG 

Insert the following code segment at line 07: 

#endif 

Answer: D,G 

Reference: http://stackoverflow.com/questions/2104099/c-sharp-if-then-directives-for-debug-vs-release 

Q2. - (Topic 1) 

You are developing an application that will transmit large amounts of data between a client computer and a server. 

You need to ensure the validity of the data by using a cryptographic hashing algorithm. 

Which algorithm should you use? 

A. HMACSHA256 

B. RNGCryptoServiceProvider 

C. DES 

D. Aes 

Answer:

Explanation: 

The .NET Framework provides the following classes that implement hashing algorithms: 

HMACSHA1. 

MACTripleDES. 

MD5CryptoServiceProvider. 

RIPEMD160. 

SHA1Managed. 

SHA256Managed. 

SHA384Managed. 

SHA512Managed. 

HMAC variants of all of the Secure Hash Algorithm (SHA), Message Digest 5 (MD5), and 

RIPEMD-160 algorithms. 

CryptoServiceProvider implementations (managed code wrappers) of all the SHA 

algorithms. 

Cryptography Next Generation (CNG) implementations of all the MD5 and SHA algorithms. 

http://msdn.microsoft.com/en-us/library/92f9ye3s.aspx#hash_values 

Q3. - (Topic 2) 

You develop an application by using C#. The application counts the number of times a specific word appears within a set of text files. The application includes the following code. (Line numbers are included for reference only.) 

You have the following requirements: 

. Populate the _wordCounts object with a list of words and the number of occurrences of each word. . Ensure that updates to the ConcurrentDictionary object can happen in parallel. 

You need to complete the relevant code. 

Which code segment should you insert at line 23? 

A. Option A 

B. Option B 

C. Option C 

D. Option D 

Answer:

Q4. DRAG DROP - (Topic 1) 

You are testing an application. The application includes methods named CalculateInterest and LogLine. The CalculateInterest() method calculates loan interest. The LogLine() method sends diagnostic messages to a console window. 

You have the following requirements: 

. The CalculateInterest() method must run for all build configurations. 

. The LogLine() method must be called only for debug builds. 

You need to ensure that the methods run correctly. 

How should you complete the relevant code? (To answer, drag the appropriate code segments to the correct locations in the answer area. Each code segment may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.) 

Answer:  

Q5. - (Topic 2) 

You are implementing a method named GetValidEmailAddresses. The GetValidEmailAddresses() method processes a list of string values that represent email addresses. 

The GetValidEmailAddresses() method must return only email addresses that are in a valid format. 

You need to implement the GetValidEmailAddresses() method. 

Which two code segments can you use to achieve this goal? (Each correct answer presents a complete solution. Choose two.) 

A. Option A 

B. Option B 

C. Option C 

D. Option D 

Answer: B,D 

Explanation: Note: 

* List<T>.Add Method 

Adds an object to the end of the List<T>. 

Q6. DRAG DROP - (Topic 1) 

You are developing an application that will include a method named GetData. The 

GetData() method will retrieve several lines of data from a web service by using a 

System.IO.StreamReader object. 

You have the following requirements: 

. The GetData() method must return a string value that contains the first line of the response from the web service. . The application must remain responsive while the GetData() method runs. 

You need to implement the GetData() method. 

How should you complete the relevant code? (To answer, drag the appropriate objects to the correct locations in the answer area. Each object may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.) 

Answer:  

Q7. DRAG DROP - (Topic 1) 

You are developing an application that includes a class named Warehouse. The Warehouse class includes a static property named Inventory- The Warehouse class is defined by the following code segment. (Line numbers are included for reference only.) 

You have the following requirements: 

Initialize the _inventory field to an Inventory instance. 

Initialize the _inventory field only once. 

Ensure that the application code acquires a lock only when the _inventory object must be instantiated. 

You need to meet the requirements. 

Which three code segments should you insert in sequence at line 09? (To answer, move the appropriate code segments from the list of code segments to the answer area and arrange them in the correct order.) 

Answer:  

Q8. HOTSPOT - (Topic 2) 

You are developing the following classes named: 

Class1 

Class2 

Class3 

All of the classes will be part of a single assembly named Assembly.dll. Assembly.dll will be used by multiple applications. 

All of the classes will implement the following interface, which is also part ofAssembly.dll: 

public interface Interface1 { void Method1(decimal amount); void Method2(decimal amount); } 

You need to ensure that the Method2 method for the Class3 class can be executed only when instances of the class are accessed through the Interface1 interface. The solution must ensure that calls to the Method1 method can be made either through the interface or through an instance of the class. 

Which signature should you use for each method? (To answer, select the appropriate signature for each method in the answer area.) 

Answer:  

Q9. - (Topic 2) 

You are developing an application that will process personnel records. 

The application must encrypt highly sensitive data. 

You need to ensure that the application uses the strongest available encryption. 

Which class should you use? 

A. System.Security.Cryptography.DES 

B. System.Security.Cryptography.Aes 

C. System.Security.Cryptography.TripleDES 

D. System.Security.Cryptography.RC2 

Answer:

Q10. - (Topic 1) 

You are developing an application that accepts the input of dates from the user. 

Users enter the date in their local format. The date entered by the user is stored in a string variable named inputDate. The valid date value must be placed in a DateTime variable named validatedDate. 

You need to validate the entered date and convert it to Coordinated Universal Time (UTC). The code must not cause an exception to be thrown. 

Which code segment should you use? 

A. Option A 

B. Option B 

C. Option C 

D. Option D 

Answer:

Explanation: 

AdjustToUniversal parses s and, if necessary, converts it to UTC. Note: The DateTime.TryParse method converts the specified string representation of a date and time to its DateTime equivalent using the specified culture-specific format information and formatting style, and returns a value that indicates whether the conversion succeeded.