MCSD Self-Paced Training Kit: Analyzing Requirements and Defining Microsoft .NET Solution Architectures, Exam 70-300: Analyzing Requirements and ... Exam 70-300 (Pro-Certification)

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

DAL (Data Access Layer)

data

    archiving

         operations strategies

    caching

         BLL

     encryption

         SSL 2nd

    purging

         operations strategies 2nd

    sorting

         localized applications

     translating

data access authentication (security policies)

     service accounts

     Windows accounts

data access authorization (security policies) 2nd

data access components 2nd

     service agents 2nd

Data Access Layer

     building

     data services

         data access components 2nd

         service agents 2nd

data elements

    entity relationships

         conceptual design

         ORM

     ORM representation

data encryption

    IPSec

         security strategies

    RPC

         security strategies

     security strategies 2nd

         IPSec

         RPC

         SSL

         SSL/TLS

    SSL

         security strategies

    SSL/TLS

         security strategies

data entry errors

     development strategies

data flow symbol (DFD)

data integration

     deployment strategies

data integrity

     business rules (data modeling) 2nd

data marshaling

data migration

     deployment strategies

data migration (physical deployment design)

     bandwidth

     BCP (SQL Server 2000) 2nd

     DTS (SQL Server 2000) 2nd

    transfer capacity

         calculating

data modeling 2nd 3rd 4th 5th 6th

     business rules 2nd

    columns

         defining 2nd 3rd 4th 5th 6th 7th 8th 9th

    entities

         relationships 2nd 3rd 4th 5th 6th 7th

     ER Model 2nd

         entities 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st

     ERWIN

    tables

         defining 2nd 3rd 4th 5th 6th

         denormalizing 2nd 3rd

         normalizing 2nd 3rd 4th 5th 6th 7th

     Visio 2nd

     XML 2nd

         complexType

         elements 2nd 3rd 4th

         namespaces 2nd

         simpleType

         versus DTD

data objects (BLL)

data privacy strategies

     security strategies

data protection (security requirements)

data requirements

     defining 2nd 3rd 4th

data services

     data access components 2nd

     service agents 2nd

data storage

    cookies

         client-side state management 2nd

         server-side state management 2nd

     development strategies 2nd 3rd 4th

data store symbol (DFD)

data tampering

data type validation

data validation 2nd 3rd

     code checking

     complex validation

     data type validation

     range checking

database connection strings

     encryption

database logging

database partitions 2nd 3rd

database schemas

database sessions

databases

     federated databases

     relational databases

DataSets 2nd

date and time formats

     localized applications

DBMS (Database Management Systems)

     conceptual design

     ORM

         constraints

         converting conceptual diagrams to relational databases

         entities

         keys 2nd

         redundancy

Debug class

Debug classes

decentralized business unit organizational structures

defensive programming

defining

     attributes (logical data models) 2nd

     columns (logical data models) 2nd 3rd 4th 5th 6th 7th 8th 9th

     data requirements 2nd 3rd 4th

     foreign keys 2nd 3rd

     primary keys 2nd 3rd 4th

     standards 2nd

     successful projects 2nd

     tables (logical data models) 2nd 3rd 4th 5th 6th

     user personas (Envisioning Phase deliverables) 2nd

deliverables

     documentation review processes

    proof-of-concept deliverables

         logical design 2nd

         physical design

deliverables (Envisioning Phase)

     goals lists 2nd

     problem statements 2nd 3rd

    user personas

         defining 2nd

     vision statements

denormalization

denormalizing

     tables (logical data models) 2nd 3rd

dependencies

     external dependencies

     internal dependencies

dependencies (entities)

     many-to-many dependencies

     one-to-many dependencies

     one-to-one dependencies

deployability (PASS MADE)

     logical design validation

     physical design validation

deploying

    applications

         automated deployment

deployment

     no-touch deployment 2nd 3rd

deployment (physical deployment design)

     Form deployment

         no-touch deployment 2nd 3rd

    Visual Studio .NET deployment projects

         CAB Projects

         Merge Module Projects 2nd 3rd

         selecting

         Setup Projects 2nd

         Web Setup Projects 2nd

     Web interface deployment

     Web Service deployment

deployment diagrams (UML)

deployment requirements (PASS MADE) 2nd

     application configuration

     application distribution

deployment strategies 2nd 3rd

     automated application deployment

     coexisitence deployment strategies

     data integration

     data migration

     distributable media

     licensing 2nd

         Web Service licensing 2nd

     merge modules

     Visual Studio .NET

     Web servers 2nd

     Windows Installer

designing

    architectures

         guidelines 2nd

     logical data models

         columns 2nd 3rd 4th 5th 6th 7th 8th 9th

         data modeling 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th

         entities, relationships 2nd 3rd 4th 5th 6th 7th

         tables 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th

         XML 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

    threads

         coding standards

     UI (User Interfaces)

desktop user interfaces (Windows Forms)

determining

     entities 2nd

developing

    extranet applications

         scope

    internet applications

         scope

    intranet applications

         scope

     security policies 2nd

     world-ready applications

         .NET Framework, System.Globalization namespaces

         .NET Framework, System.Resources namespaces

         .NET Framework, Unicode

         globalization 2nd 3rd 4th

         localization 2nd

developing-specifications phase 2nd 3rd

     development strategies 2nd

         auditing system activity 2nd 3rd

         data storage 2nd 3rd 4th

         deployment strategies 2nd 3rd 4th 5th 6th 7th

         error handling 2nd 3rd 4th 5th 6th 7th 8th 9th

         globalization 2nd

         localizability

         localization 2nd 3rd 4th

         logging system activity 2nd 3rd

         logic handling

         monitoring system activity 2nd 3rd

         state management 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

         storing system activity information 2nd

         system integration

     operations strategies

         data archiving

         data purging 2nd

         upgrades

     security strategies

         ASP.NET

         assigning permissions

         data encryption 2nd

         data privacy strategies

         sealing messages

         securing system access

         signing 2nd

         system support 2nd

         testing strategies

development strategies 2nd

     data storage 2nd 3rd 4th

     deployment strategies 2nd 3rd

         automated application deployment

         coexistence deployment strategies

         data integration

         data migration

         distributable media

         licensing 2nd 3rd 4th

         merge modules

         Visual Studio .NET

         Web servers 2nd

         Windows Installer

     error handling

         data entry errors

         logic errors

         structured exception handling 2nd 3rd

         syntax errors

         system malfunctions

         unstructured exception handling

         user errors

     globalization

         cultures/locales rule

     localizability

     localization 2nd

         multilingual user interfaces

         Unicode character encoding

     state management

         client-side state management 2nd 3rd

         data validation 2nd 3rd

         server-side state management 2nd 3rd 4th

    system activity

         auditing 2nd 3rd

         logging 2nd 3rd

         monitoring 2nd 3rd

    system activity information

         storing 2nd

     system integration

DFD (data flow diagrams) 2nd 3rd 4th 5th

     context diagrams

     data flow symbol

     data store symbol

     external entity symbol

     level-0 diagrams

     level-n diagrams

     primitive level diagrams 2nd 3rd

     process symbol

diagrams

     activity diagrams (UML)

     class diagrams (UML)

     collaboration diagrams (UML)

     component diagrams (UML)

     context diagrams (DFD)

     deployment diagrams (UML)

     DFD 2nd 3rd 4th 5th

         context diagrams

         data flow symbol

         data store symbol

         external entity symbol

         level-0 diagrams

         level-n diagrams

         primitive level diagrams 2nd 3rd

         process symbol

     level-0 diagrams (DFD)

     level-n diagrams (DFD)

     object diagrams (UML)

     primitive level diagrams (DFD) 2nd 3rd

     sequence diagrams (UML)

     statechart diagrams (UML)

     system block diagrams

     use case diagrams (UML) 2nd 3rd

     workflow diagrams

digital certificates

     security strategies

dimensioning

     variables 2nd

DirectX

disk partitions 2nd

displays

    character displays

         localized applications

documentation review processes

documentation standards 2nd

documents

    input documents

         building fact lists (conceptual design)

    vision/scope documents

         building 2nd

documents. [See deliverables]

DoS (Denial of Service) attacks

drag-and-drop questions (exams)

DTD (Document Type Definitions)

     versus XML schemas

DTS (Data Transformation Services) 2nd 3rd 4th

Категории