单项选择题
You work as an application developer at Contoso.com. You use Microsoft .NET Framework 3.5 and Microsoft ADO.NET to develop an application. The user name and password that is kept by the connection string is stored directly in the code of the application. You want to make sure that the password in the connection string is as protected.
What should you do? ()
A. Add the connection string to the Settings.settings file.
B. Add connection string to the Web.config file and use protected configuration.
C. Use the TRUE setting in the Persist Security Info keyword.
D. Use the FALSE setting in the Persist Security Info keyword
相关考题
-
单项选择题
You work as an application developer at Contoso.com. You use Microsoft .NET Framework 3.5 and Microsoft ADO.NET to develop an application that will connect to the Microsoft SQL Server 2005 database. The application uses an XML file that contains product data. Furthermore, a corresponding XSD file contains the schema of the XML file. You want the application to do the following: Loads the XML file in a typed DataSet and validates it against the schema provided in the XSD file. What should you do? ()
A.A
B.B
C.C
D.D -
单项选择题
You work as an application developer at Contoso.com. You use Microsoft .NET Framework 3.5 and Microsoft ADO.NET to develop an application that will connect to the Microsoft SQL Server 2005 database. The application fills a DataSet object named cust with customer records. Your application contains the following code. (Line numbers are for reference only.) 01 System.IO.StreamWriter sw = 02 new System.IO.StreamWriter("Customers.xml"); 04 sw.Close(); You want to write the content of the cust object to the Customers.xml file as XML data along with inline XML schema. What should you do?()
A.A
B.B
C.C
D.D -
多项选择题
VOIPhasbeenimplementedatthemainofficeoftheCompanynetwork.WhichtwostatementsaretrueaboutvoicepacketsinaLAN?()
A. Voice carrier stream utilizes Real-Time Transport Protocol (RTP) to carry the audio/media portion of the VoIP communication.
B. Voice traffic data flow involves large volumes of large packets.
C. Because a packet loss involves a small amount of data, voice traffic is less affected by packet losses than traditional data traffic is.
D. Voice packets are encapsulated in TCP segments to allow for proper sequencing during delivery.
E. Voice packets are very sensitive to delay and jitter.
