多项选择题
You create a mobile Web application. You need to use a Command control to post user input from the UI elements back to the server.
What are two possible ways to achieve this goal?()
A. Place the Command control within an instance of the System.Web.UI.MobileControls.SelectionList control.
B. Place the Command control within an instance of the System.Web.UI.MobileControls.ObjectList control.
C. Place the Command control within an instance of the System.Web.UI.MobileControls.Form control.
D. Place the Command control within an instance of the System.Web.UI.MobileControls.Panel control.
相关考题
-
多项选择题
You create a Web Form. You need to add controls that use adaptive rendering to display content. The type of content rendered must depend on the device that is requesting the page. What are two possible ways to achieve this goal? ()
A. Add custom controls that emit XHTML to the Web Form.
B. Add custom controls that emit WML to the Web Form.
C. Add mobile controls to the Web Form.
D. Add Web server controls to the Web Form. -
多项选择题
You create a server control that inherits from WebControl. You need to enable the server control to emit markup for a new kind of mobile device. You must not alter the code in the server controls. Which two actions should you perform?()
A. Create a class that inherits HtmlTextWriter and that can emit the new markup.
B. Create a class that inherits StreamWriter and that can emit the new markup.
C. Reference the class in the <capabilities> element of the new device's browser definition file.
D. Reference the class in the <controlAdapters> element of the new device's browser definition file. -
单项选择题
You are developing a Web application. Your code restricts access to some pages based on the users credentials. You need to configure IIS to supply the users Windows credentials to your Web application. These credentials must be encrypted. What should you do? ()
A. Enable Anonymous access. Enable Integrated Windows authentication.
B. Enable Anonymous access. Enable Basic authentication.
C. Disable Anonymous access. Enable Integrated Windows authentication.
D. Disable Anonymous access. Enable Basic authentication.
