Q 41. What if I 
don't know where the database will be at run time?
A. For file-based data 
sources such as Jet, you can add an Open File Dialog control to the form and let 
the user browse and select the database. Then concatenate the filename 
with the rest of the connection information (such as the provider 
string).
Q 42. What are some applications that support automation?
A. 
All the Microsoft Office products, as well as Microsoft Visio, support 
automation. You can create a robust application by building a client 
that uses multiple automation servers. For example, you could calculate data in 
Excel and then format and print the data in Word.
Q 43. Is it 
possible to create an Automation server so that my application can be controlled 
by others?
A. Yes, it is possible to create .NET components that can be 
used by other applications. If this interests you, I suggest you seek out an advanced text on the subject.
Q 44. How can I create the great 
installation wizards I see other install applications use?
A. If you want 
to create robust installations that gather user input in wizards, make changes 
to the Registry, allow you to include additional files, create 
shortcuts, and so on, you need to use a tool that uses the Windows Installer 
technology.
Q 45. Should I assume that a user will always have the .NET 
Framework on her computer?
A. Generally, no. When distributing 
updates to your project, it's probably a safe bet that the user has installed 
the .NET Framework. For an initial installation, you should specify the 
.NET Framework as a prerequisite (note that this is set by default).
Q 45. Which class represents a hash algorithm used strictly for data integrity?
A The MD5 Class
Q 46. Which class grants a dynamically-generated FileIOPermission to the directory from which the code is executed?
A The FileCodeGroup class
Q 47. Which enumeration indicated whether an access rule is to allow or deny access?
A The AccessControlType enumeration
Q 48. What should you apply to a method for it to execute while an object is converted to a stream of bytes?
A. OnSerializing attribute to the method
Q 49. Which class should you use to paint filled shapes and text in GDI+?
A. Brush
Q 50. Which assembly attribute should you apply to indicate the keys used when compiling a strong-named assembly?
A. AssemblyKeyFile
Q 45. Which class represents a hash algorithm used strictly for data integrity?
A The MD5 Class
Q 46. Which class grants a dynamically-generated FileIOPermission to the directory from which the code is executed?
A The FileCodeGroup class
Q 47. Which enumeration indicated whether an access rule is to allow or deny access?
A The AccessControlType enumeration
Q 48. What should you apply to a method for it to execute while an object is converted to a stream of bytes?
A. OnSerializing attribute to the method
Q 49. Which class should you use to paint filled shapes and text in GDI+?
A. Brush
Q 50. Which assembly attribute should you apply to indicate the keys used when compiling a strong-named assembly?
A. AssemblyKeyFile
No comments:
Post a Comment