MCSD Self-Paced Training Kit: Analyzing Requirements and Defining Microsoft .NET Solution Architectures, Exam 70-300: Analyzing Requirements and ... Exam 70-300 (Pro-Certification)

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

race conditions

Randomize Choices option (PrepLogic Practice Exams, Preview Edition)

randomizing

     answer choices (exams)

range checking

RCW (Runtime Callable Wrapper)

     unmanaged COM objects

RCW (Runtime Callable Wrappers)

redundancy

    ORM

         DBMS

reengineering

     business processes 2nd

reevaluating

    organizational structures

         warning signs

reference architectures

referential integrity

regression testing

     testing strategies

regulatory requirements

     current business state, evaluating

relational databases

relationships 2nd

     cardinality

     identifying 2nd

     many-to-many relationships

     one-to-many relationships 2nd

     one-to-one relationships

relationships (UML)

     association relationships

     extends relationships

     uses relationships

release management processes 2nd

reliability requirements (operation requirements) 2nd 3rd

remote access users

remoting 2nd

     client-activated objects

     single call objects

     Singleton objects

     versus XML Web services 2nd

removing

     PrepLogic Practice Exams, Preview Edition software

Request objects

requirement-gathering phase

     business requirements

         analyzing

         analyzing, data modeling 2nd 3rd 4th 5th

         analyzing, defining data requirements 2nd 3rd 4th

         analyzing, dependency identification 2nd

         analyzing, DFD 2nd 3rd 4th 5th

         analyzing, system feature identification 2nd

         classifying

         evaluating current business state 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st

         gathering, critical success factors

         gathering, information source identification 2nd

         gathering, vision/scope documents 2nd

         prioritizing

    operational requirements

         hardware requirements 2nd 3rd

         network infrastructure requirements 2nd 3rd

         PASS MADE 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd

         reliability requirements 2nd 3rd

         software requirements 2nd 3rd

requirements

     business requirement

         analyzing

         analyzing, data modeling 2nd 3rd 4th 5th

         analyzing, defining data requirements 2nd 3rd 4th

         analyzing, dependency identification 2nd

         analyzing, DFD 2nd 3rd 4th 5th

         analyzing, system feature identification 2nd

         evaluating current business state 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st

         gathering, critical success factors

         gathering, information source identification 2nd

         gathering, vision/scope documents 2nd

    business requirements

         classifying

         prioritizing

     Certified for Windows logo requirements 2nd

    data requirements

         defining 2nd 3rd 4th

    operational requirements

         hardware requirements 2nd 3rd

         network infrastructure requirements 2nd 3rd

         PASS MADE 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd

         reliability requirements 2nd 3rd

         software requirements 2nd 3rd

    regulatory requirements

         evaluating current business state

requirements-gathering phase

     UML 2nd 3rd 4th

         association relationships

         extends relationships

         uses relationships

     use cases

         actors 2nd 3rd 4th 5th

         association relationships

         extends relationships

         scenarios 2nd 3rd

         scope

         uses relationships

     world-ready applications 2nd

         globalization 2nd 3rd

         localization 2nd

resource-based authorization (logical design)

ResourceManager class (System.Resources namespace)

ResourceReader class (System.Resources namespace)

ResourceSet class (System.Resources namespace)

ResourceWriter class (System.Resources namespace)

Response objects

response time

reviewing

     exams

         PrepLogic Practice Exams, Preview Edition

         starting

ring constraints 2nd

risk (security requirements)

risk management (Envisioning Phase)

     risk analysis 2nd

     risk controll 2nd

     risk identification

     risk mitigation 2nd

     risk sources 2nd

     risk statements

     risk tracking

     Top 10 risk lists

risk statements (Envisioning Phase)

ROI (return on investment)

     calculating

ROI (return on investment) metrics 2nd

role-based security 2nd

RPC (Remote Procedure Call)

     security strategies

Категории