Posts Tagged ‘MCTS Certification’

09.1
12

MCTS Video At No. 1 Site Certkingdom

by lilycollins24@gmail.com ·

MCTS Video At No. 1 Site Certkingdom


certkingdom offers self-study MCTS training to IT technicians seeking to enhance their careers through certification. If you want to specialize in a Microsoft technology, earning this credential proves that not only do you care about getting relevant technical skills for today’s business world, it also validates those skills and prepares you for specific job roles. Choose an MCTS certkingdom training course for self-paced training that you participate in on your computer. Each self-study MCTS certkingdom course features a complete curriculum that prepares you for the required certification exams through a series of videos. A certified instructor leads you throughout the MCTS training appearing in full motion videos that you can access whenever you are ready to train.

Cisco CCNA Training, Cisco CCNA Certification
Best Microsoft Free MCTS Video Training,  Microsoft MCTS Videos Tutorial at MCTS Videos

MCTS Windows Training Videos


Windows Server 2008 Active Directory Configuration Training
Windows Server 2008 Network Infrastructure Configuration Training
Windows Server 2008 Applications Infrastructure Configuration Training
Windows 7, Configuration
Windows Vista Configuration
Business Desktop Deployment
Configuring Windows Small Business Server (SBS) 2008 Training
Configuring Windows Server Virtualization
MCTS Exchange Training Courses
Microsoft Exchange Server 2010
Configuring Microsoft Exchange Server 2007 Training
MCTS SQL Training Videos
Implementation and Maintenance SQL Server 2008 Training
Database Development SQL Server 2008
Business Intelligence Development and Maintenance SQL Server 2008
Microsoft SQL Server 2005
SQL Server 2005 Business Intelligence
MCTS SharePoint Training Courses
Microsoft Office SharePoint Server (MOSS) 2010, Configuration
Microsoft Office SharePoint Server (MOSS) 2007 Configuration Training
Microsoft Office SharePoint Server 2007 – Application Development
Windows SharePoint Services 3.0 Configuration
Microsoft Windows SharePoint Services 3.0 – Application Development
MCTS Project Training Videos
Managing Projects with Microsoft Office Project 2010
Enterprise Project Management with Microsoft Office Project Server 2007
Managing Projects with Microsoft Office Project 2007
Microsoft Office Project Server 2007, Configuration
MCTS Visual Studio / .NET Training Courses
ADO.NET Applications 3.5 Training
ASP.NET Applications 3.5
Windows Communication Foundation Applications 3.5 Training
Windows Forms Applications 3.5
Windows Presentation Foundation Applications 3.5
Windows Workflow Foundation Applications 3.5

04.30
12

Microsoft MCTS Exams 70-642 Knowledge

by admin ·

Information Technology industry could be said to be entering in the forth wave, previous generation focused on speed, navigation, now the IT industry demands on security, reliability, and performance. The internet has become today’s single most important business platform, enabling connectivity to the entire IT major solutions providers, including Microsoft, Cisco, CompTIA, IBM, HP, Avaya, your are all well aware that a major problem in the IT industry is that there is a lack of quality here, we now turn to looking at larger issues and strategy required to enable companies to manage there business.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training
at certkingdom.com

Our Certification Microsoft MCTS Exams Preparation Materials provide you everything you will need to take a certification examination.

This Microsoft Certification is created and designed for information technology (IT) professionals who work in the complex computing environment of medium-sized to large companies and who also plan to take the Microsoft Certified Technology Specialist (MCTS) 70-642 exam. We assume that before you begin using this kit you have a solid foundation-level understanding of Microsoft Windows server operating systems and common Internet technologies.

What you will learning in 70-642 Exams:
■ Configure IP addressing, routing, and IPsec
■ Configure name resolution using Domain Name System (DNS)
■ Configure remote and wireless network access
■ Configure Network Access Protection (NAP)
■ Configure file and print services
■ Monitor and manage a network infrastructure

Details are researched and produced by Certification Experts who are constantly using industry experience to produce precise, logical and verified explanations for the answers.

You may get questions from different web sites or books, but logic is the key. Microsoft MCTS Exam Preparation from certkingdom include: Comprehensive MCTS brain dumps questions with complete details Detailed explanations of all the questions (when available) Questions accompanied by exhibits Verified Answers Researched by Industry Experts Drag and Drop questions as experienced in the MCTS study guides and Actual Exams Questions updated on regular basis These questions and answers are backed by our GUARANTEE. Like actual certification exams our product is in multiple-choice questions (MCQs). Our Microsoft MCTS Exam will provide you with exam questions and verified answers that reflect the actual exam.

Most of the training tools require two computers or virtual machines running Windows Server 2008 using the default settings. “Protecting Network Traffic with IPSec,” require a third such computer or virtual machine.) All lab computers must be physically connected to the same network for most lessons. However, some lessons will describe different network configurations. We recommend that you use an isolated network that is not part of your production network to perform the practice exercises in this training.

To minimize the time and expense of configuring physical computers, we recommend that you use virtual machines for the computers. To run computers as virtual machines within Windows, you can use Virtual PC 2007, Virtual Server 2005 R2, Hyper-V, or third-party virtual machine software.

Make use of the Testing Engines that are available, as well as the free Webcasts. Practice test material is just for that… PRACTICE. It may help you pass the test but believe me you will only last one day in a job if you don’t know what you are doing, so if you use practice material, read the question and if you don’t know the answer, research it and learn it, don’t just memorize the answer….I will tell you right now that their answers are not always right.

If your ready for career change and looking for Microsoft MCTS Training, Microsoft MCITP Training or any other Microsoft Certification preparation get the best online training from Certkingdom.com they offer all Microsoft, Cisco, Comptia certification exams training in just one Unlimited Life Time Access Pack, included self study training kits including, Q&A, Study Guides, Testing Engines, Videos, Audio, Preparation Labs for over 2000+ exams, save your money on boot camps, training institutes, It’s also save your traveling and time. All training materials are “Guaranteed” to pass your exams and get you certified on the fist attempt, due to best training they become no1 site 2012.

About The Author
Hi I educated in the U.K. with working experienced for 5 years in multinational companies, As an IT Manager and IT Instructor, I am attached with certkingdom.com here they provide IT exams study material, the study materials included exams Q&A with Explanation, Testing Engine, Study Guides, Training Labs, Exams Simulations, Training Videos, Audio Exams Training, etc. for certification like MCTS Training, MCITP MCTS, MCSD, MCSA, MCSE Training, CCNA exams preparation, CompTIA A+ Training, and more Certkingdom.com provide you the best training 100% guarantee. “Best Material Great Results”

My Specialties
I’ve worked with a lot of technologies, but these are where my focus has been in recent years:
* Microsoft SQL Server (particularly high availability and disaster recovery)
* VMWare Virtualization
* Oracle (yes, Oracle, I’ve worked on 7-11)
* Microsoft Clustering
* Red Hat Linux (I can still write shell scripts)
MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training
at certkingdom.com

03.24
12

70-595 Q&A / Study Guide / Testing Engine

by admin ·

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training
at certkingdom.com


QUESTION 1
You are employed as a developer at Certkingdom.com. Certkingdom.com makes use of BizTalk Server 2010 in
their environment.
You have designed a BizTalk Server 2010 messaging solution for processing XML messages. You
then configured the solution to makes use of a solitary Business Activity Monitoring (BAM) activity
and BAM tracking profile to obtain content values from a message.
When a message is received, a portion of the values are bound to a receive port. When a
message is sent, the rest of the values are bound to a send port.
You have been instructed to make sure that a single record that includes all content values is
created for each message.
Which of the following actions should you take?

A. You should consider making use of the BizTalk Tracking Profile Utility (bttdeploy.exe) to
redeploy the tracking profile used in this solution.
B. You should consider linking a complete value to ActivityID field.
C. You should consider adding a relationship to the BAM tracking profile.
D. You should consider configuring the solution to make use of another Business Activity
Monitoring (BAM) activity.

Answer: C

Explanation:


QUESTION 2
You are employed as a developer at Certkingdom.com. You are currently in the process of designing a
BizTalk Server 2010 orchestration for Certkingdom.com’s environment.
You have already created and saved a policy, named CertkingdomEmployeeBonus, to compute an
employee’s bonus based on year-to-date sales via the Business Rule Composer. You have also
included a Call Rules shape in the new BizTalk Server 2010 orchestration.
When you access the BizTalk Orchestration Designer, you are unable to find CertkingdomEmployeeBonus
in the menu of accessible policies.
It is imperative that CertkingdomEmployeeBonus is made available.
Which of the following actions should you take?

A. You should consider publish CertkingdomEmployeeBonus from the BizTalk Orchestration Designer.
B. You should consider publish CertkingdomEmployeeBonus from the Business Rules Composer.
C. You should consider creating and publishing a vocabulary containing a definition that
references the XML schema used to evaluate CertkingdomEmployeeBonus from the Business Rules Composer.
D. You should consider creating and publishing a vocabulary containing a definition that
references the XML schema used to evaluate CertkingdomEmployeeBonus from the BizTalk Orchestration Designer.

Answer: B
Reference:
http://msdn.microsoft.com/en-us/library/aa995582(v=BTS.70).aspx


QUESTION 3
You are employed as an administrator at Certkingdom.com. Certkingdom.com is a shipping company that uses
radio frequency identification (RFID) readers with a server shipping management system built on
BizTalk Server 2010 to track shipped containers.
Subsequent to defining a custom tag event, named ContainerArrivalEvent, you include the
SqlServerSink component to the RFID process using the RFID manager.
You are required to make sure that only the custom tag event is logged.
Which of the following actions should you take?

A. You should make use of the Inline XSLT script type.
B. You should make use of the fully qualified assembly name for the EventType property.
C. You should make use of the Inline C# script type.
D. You should make use of the Generic EventType property.

Answer: D
Reference:
http://msdn.microsoft.com/en-us/library/dd352454(v=BTS.70).aspx


QUESTION 4
You are employed as an administrator at Certkingdom.com. Certkingdom.com has a BizTalk Server 2010
environment.
Certkingdom.com has three trading partners to which EDI purchase orders are regularly sent. Certkingdom.com’s
trading partners make use of email, instead of through response messages, to confirm purchase
order acknowledgements. Furthermore, Certkingdom.com’s three trading partners employ identical
versions of the purchase order message. The only difference is that the product types for each
trading partner are defined by custom codes, which are not included in the standard BizTalk
purchase order schemas.
You have been instructed to make sure that a purchase order schema is used for each trading
partner when sending purchase orders. Each purchase order schema should contain the required
custom product type codes for that particular trading partner.
Which two of the following actions should you take? (

A. You should consider defining a local host setting for each of the three trading partners via the
transaction set settings for the party.
B. You should consider defining an envelope for each of the three trading partners via the
transaction set settings for the party.
C. You should consider making use of the default namespace defined by BizTalk for EDI
messages.
D. You should consider defining a custom namespace for each BizTalk schema.

Answer: B,C
Reference:
http://technet.microsoft.com/en-us/library/ff629750(v=BTS.70).aspx


QUESTION 5
You work as a BizTalk Server 2010 administrator at Certkingdom.com. Certkingdom.com makes use of a BizTalk
Server 2010 orchestration that calls a Business Rules Engine policy.
You have previously configured the policy to assess test scores for passes or fails. You then
deployed The BizTalk solution, as well as the policy.
When Certkingdom.com decides to increase the value of a passing score, you are instructed to make the
necessary changes to the policy so that the adjusted rule parameter is displayed.
Which of the following actions should you take? (Choose all that apply.)

A. You should create a new version of the policy in the Business Rules Composer
B. You should create a different policy with a new name that includes the changed parameter in
the Business Rules Composer.
C. You should create a new vocabulary in the Business Rules Composer.
D. You should create a new version of the policy in the Business Rules Composer
E. Add the new parameter to this vocabulary
F. You should edit this version to reflect the changed parameter.
G. You should deploy the new version.
H. You should publish the new version.
I. You should publish the vocabulary.
J. You should deploy the new policy.

Answer: C,E,I
Reference:
http://msdn.microsoft.com/en-us/library/aa560288(v=BTS.70).aspx


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training
at certkingdom.com

02.27
12

70-562 Q & A / Study Guide / Testing Engine

by admin ·

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
You work as a Web Developer at CERTKINGDOM.com. You make use of Microsoft .NET Framework 3.5 to
develop ASP.NET Web applications.
CERTKINGDOM.com has a server, named CERTKINGDOM-SR13, which runs an instance of Microsoft SQL Server 2005
locally and is configured to make use of Windows Authentication. You have developed a Web
application named CERTKINGDOMApp1 that will be hosted on CERTKINGDOM-SR13.
You are preparing to configure the role management and membership providers on CERTKINGDOM-SR13.
Which of the following actions should you take?

A. You should consider making use of the Aspnet_compiler.exe command.
B. You should consider making use of the aspnet_regiis.exe command.
C. You should consider making use of the Aspnet_merge.exe command
D. You should consider making use of the ASP.NET SQL Server registration tool.

Answer: A,B

Explanation:


QUESTION 2
You work as a Web Developer at CERTKINGDOM.com. You make use of Microsoft .NET Framework 3.5 to
develop ASP.NET Web applications.
You have recently developed a Web application named CERTKINGDOMWebApp1, and configured it to make
use of Windows Authentication. After specific group is granted NTFS permissions to access a
specific file named CERTKINGDOM.doc, you are informed that you have to make sure that users not
belonging to the group are prevented from accessing the file.
Which of the following actions should you take?

A. You should configure the machine.config file to include the <identity impersonate=”true”/> element.
B. You should configure the machine.config file to include the <authentication mode=”[None]”> element.
C. You should configure the app.config file to include the <authentication mode=”[None]”> element.
D. You should configure the Web.config file to include the <identity impersonate=”true”/> element.
E. You should configure the Web.config file to include the <authentication mode=”[None]”> element.
F. You should configure the app.config file to include the <authentication mode=”[None]”> element.

Answer: D

Explanation:


QUESTION 3
You work as a Web Developer at CERTKINGDOM.com. You make use of Microsoft .NET Framework 3.5 to
develop ASP.NET Web applications.
You have developed a web application named CERTKINGDOMWebApp. You are now preparing to configure
authentication for CERTKINGDOMWebApp so that clients are not allowed to access it anonymously. You also
need to make sure that access for users from untrusted domains are allowed.
You have written the code segment shown below:
<system.web>
<authentication mode=”Forms”>
<forms loginUrl=”login.aspx” />
</authentication>
<authorization>
<deny users=”?” />
</authorization>
</system.web>
Which of the following actions should you take NEXT?

A. You should consider adding the code segment to the web.config file.
B. You should consider adding the code segment to the project’s property pages.
C. You should consider adding the code segment to the app.config file.
D. You should consider adding the code segment to the workstation’s machine.config file.

Answer: A


QUESTION 4
You work as a Web Developer at CERTKINGDOM.com. An MS ASP.NET Web application, named CERTKINGDOMApp1,
has been developed using the 3.5 version of MS Net Framework.
Subsequent to retrieving the most recent project version from the source control repository, you try
to compile it on your workstation and find that the reference to the assembly is absent.
You want to add a reference path that connects to the absent assembly.
Which of the following options should you access to achieve this?

A. The project’s property pages.
B. CERTKINGDOMApp1’s web.config file.
C. CERTKINGDOMApp1’s app.config file.
D. Your workstation’s machine.config file.

Answer: A

Explanation:


QUESTION 5
You work as a Web Developer at CERTKINGDOM.com. You make use of Microsoft .NET Framework 3.5 to
develop Microsoft ASP.NET Web applications.
An existing Web application was developed using Microsoft .NET Framework 1.0. the Web
application makes use of Microsoft Internet Information Services (IIS) 6.0, but does not make use
of any features of Microsoft .NET Framework 3.5.
You want to configure the Web application for .NET Framework 3.5 with as little administrative
effort as possible.
Which of the following actions should you take?

A. You should consider accessing Microsoft Internet Information Services (IIS) 6.0 to modify the
handler runtime version.
B. You should consider accessing the machine.config file to modify the handler runtime version.
C. You should consider accessing the app.config file to modify the handler runtime version.
D. You should consider accessing the web.config file to modify the handler runtime version.

Answer: A

Explanation:


 

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

02.24
12

70-561 Q & A / Study Guide

by admin ·

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
You work as an application developer at CertKingdom.com. You are making use of .NET Framework
3.5, as well as Microsoft ADO.NET for application development.
You have recently developed an application that references a database named, CKDDatabase1,
which is hosted by a server, named CERTKINGDOM-SR13. You then created a storage schema
definition file, a conceptual schema definition file, and a mapping schema definition file. The files
are named CertKingdom.ssdl, CertKingdom.csdl, and CertKingdom.msl respectively.
After modifying the contents of the conceptual schema definition file and the mapping schema
definition file, you are required to create the .NET Framework entities from the modified schema
definitions.
You have decided to make use of the Edmgen.exe tool.
Which of the following actions should you take?

A. You should consider making use of the EntityClassGeneration mode.
B. You should consider making use of the FromSsdlGeneration mode.
C. You should consider making use of the ValidateArtifacts mode.
D. You should consider making use of the FullGeneration mode.

Answer: A


QUESTION 2
You work as an application developer at CertKingdom.com. You are making use of .NET Framework
3.5, as well as Microsoft ADO.NET for application development.
You have recently developed an application that has two entities named CKDClient and CKDOrders.
The CKDClient entity has a navigable property, named CKDOrders, which returns a collection of
CKDOrders entity instances.
You have been instructed to create code that returns the corresponding CKDOrders entity instances
when a CKDClient entity instance is queried.
Which of the following actions should you take?

A. You should construct the following code:
CKDEntities context = new CKDEntities();
ObjectQuery<CKDClient> query;
query = context.Client.Include(“CKDOrders”);
B. You should construct the following code:
CKDEntities context = new CKDEntities();
ObjectQuery<CKDClient> query;
query = context.Client.Insert(“CKDOrders”);
C. You should construct the following code:
CKDEntities context = new CKDEntities();
ObjectQuery<CKDClient> query;
query = context.Client.Release(“CKDOrders”);
D. You should construct the following code:
CKDEntities context = new CKDEntities();
ObjectQuery<CKDClient> query;
query = context.Client.Remove(“CKDOrders”);

Answer: A


QUESTION 3
You work as an application developer at CertKingdom.com. You are making use of .NET Framework
3.5, as well as Microsoft ADO.NET for application development.
CertKingdom.com has a server, named CERTKINGDOM-SR35, which hosts a Microsoft SQL Server
2005 database named CKDDatabase1. You are in the process of developing a new application that
is linked to CKDDatabase1, which hosts has two tables. Each table is displayed in its own GridView
control using its own SqlConnection object.
You have received instructions to reconfigure the way that the tables are displayed, so that it
makes use of one SqlConnection object to display the tables at the same time.
Which of the following actions should you take?

A. You should consider making use of a SqlCommand object to simultaneously implement two
SqlDataReader objects.
B. In the connection string of the application, have the Multiple Active Result Sets (MARS)
enabled.
C. You should consider making use of the xsd.exe tool.
D. In the connection string of the application, have the Default Result Set enabled.

Answer: B


QUESTION 4
You work as an application developer at CertKingdom.com. You are making use of .NET Framework
3.5, as well as Microsoft ADO.NET for application development.
You are in the process of configuring an application that you recently developed. You have to
configure the application so that it is able to connect to all kinds of databases.
You start by specifying the database driver name in the application’s connection string.
Which of the following actions should you take NEXT?

A. You should make use of ODBC Connection Pooling for creating the connection object.
B. You should make use of the OLE DB Connection Manager for creating the connection object
C. You should consider making use of the subsequent code to construct the connection object:
DSProviderFactory factory = DSProviderFactories.GetFactory(“System.Data”);DbConnection =
CreateConnection();
D. You should consider making use of the subsequent code to construct the connection object:
DbProviderFactory factory =
DbProviderFactories.GetFactory(databaseProviderName);DbConnection connection =
factory.CreateConnection();

Answer: D


QUESTION 5
You work as an application developer at CertKingdom.com. You are making use of .NET Framework
3.5, as well as Microsoft ADO.NET for application development.
You have recently created a new application that has Microsoft OLE DB Provider configured as its
data provider.
You received instruction to reconfigure the application so that the data provider is Microsoft
SqlClient. Subsequent to the reconfiguration, you find that errors are thrown when the application
performs parameterized queries.
You are required to make sure that this does not occur.
Which of the following actions should you take?

A. You should make use of the OracleClient Provider instead of the OLE DB Provider.
B. You should insert an XSD file to the schema collections of the XmlReader object.
C. Use the Unicode attribute in the connection string to false.
D. You should consider reconfiguring the the application code by replacing the positional
parameters with named parameters.

Answer: D


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

02.24
12

4 Varying Kinds Of Mobile Computer Gadgets

by IT Trainer ·

Varying types of portable computer gadgets include the following: smartphones, laptop computers, netbook computers, and tablet PCs.

Technology has provided us with an array of choices in mobile computer gadgets. These devices may have computer operations that are similar to each other, but they also have numerous other aspects that make each one unique. If you are planning to get yourself one of these gadgets, read this article to find out more about each kind so that you can figure out which is perfect for you.

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com

Smartphones

A smartphone is a combination of a personal organizer and a cellular phone. It is a small device that looks a lot more like a PDA than an ordinary cellular phone, but it has a complex systems program to enable its “smart” functions. Moreover, it also provides simplicity of use to its owners. The user interface of smartphones is also better than regular cellular phones, with larger screens and QWERTY keyboards. There are also many programs and work productivity applications that can be used on these devices, such as mailers, organizers, spreadsheets, text editors, and web browsers, among many others. Additionally, these gadgets boast 1 or 2 cameras and allow users take and view photos or videos in several file formats. In contrast to ordinary cellphones, smartphones can be connected in numerous ways, like through Wi-Fi, 3G, and also WiMax. Even a LAN network is easily done with these devices. If you have to send files from or to your smartphone, you can either do it through USB cables or its Bluetooth feature.

Laptop computers

Also known to manufacturers as notebook computers, a laptop is a pc that can be brought around to such places as libraries, airplanes, meetings and temporary offices. This is because, as opposed to desktop computers, laptops are normally smaller than a briefcase and can be powered both by battery or AC. They also generally weigh less than 5 pounds and have a thickness of three inches or less. This device, though, is more costly than a desktop computer with the same features because of the complexity involved in trying to fit all the same properties into a much more compact device. But what also make them more useful desktop computers is that they can be utilized either as a laptop or desktop computer.

Netbook computers

Netbook computers are new versions of laptop computers that are defined by their size, price and a couple of other properties. These new computers are small, inexpensive, with low horsepower, and run on an operating system that is either old or unfamiliar. The dimension of the monitors range from 9-10 inches, and they have a keyboard that is somewhat similar to that of laptops. They also weigh only about 2 to 3 pounds. This kind of computer is very handy, indeed. Yet, one certain attribute that this gadget doesn’t have is the optical drive of laptop computers. CD and DVD drives have been taken out from this types of device to allow for its small size and weight.

Tablet PC

A tablet PC is yet another type of computer that you can bring anywhere with you. With its wireless network card, you can conveniently connect to the Internet to check your email, chat with friends, update your social network status, or look for ipad support. What makes this device unique, though, is that it doesn’t fold or have a keyboard like that of a laptop. This device is just a single tablet that you work either by making use of a stylus or the tips of your fingers.

Because these gadgets are available in various prices and with different features, it is essential that you ascertain your needs first and then find the device that is closest to the price you can afford, as well as offers the most valuable functions for you. Be well informed before making a decision

02.21
12

Intel ponders solar-powered CPU tech in graphics, memory

by IT Trainer ·

Intel’s experimental solar-powered processor may have started off as a fun project, but the chip maker is now looking to extend the technology to hardware such as graphics processors, memory and floating point units.

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com

Intel last year showed the low-power processor — charged only by the light from a reading lamp — running Windows and Linux PCs. Intel is expected to share further details about the processor, which is code-named Claremont, at the International Solid-State Circuits Conference in San Francisco next week.

The CPU, which is the size of a postage stamp, is also known as the near-threshold voltage (NTV) CPU for its ability to keep operating at extremely low voltage levels. The CPU’s power consumption could go down to as little as 280 millivolts when running at 3MHz, and up to 1.2 volts when running at around 1Ghz when more performance is needed.

The NTV CPU is designed to bring extreme energy efficiency to computing devices, said Justin Rattner, Intel’s chief technology officer, in a briefing ahead of the show.

“It’s allowing us to make Intel’s product more [power efficient] across the compute continuum” while reaching appropriate performance levels, Rattner said.

The CPU can remain at near-threshold voltage levels when not operational, which could keep laptops operational without killing battery life. That is much better than putting a PC into sleep or hibernation mode to save battery.

In an on-stage demonstration at last year’s Intel Developer Forum, an engineer demonstrated a PC running a small animation when powered by the CPU. After the light source was blocked from the chip, the computer froze. The CPU worked with concept DDR3 memory developed by Micron called Hybrid Memory Cube, which is seven times more power-efficient than current DDR3 memory.

“It was not our intention to build a solar-powered microprocessor,” Rattner joked, reminiscing about the experiment.

But the demonstration was an interesting way to show what the company was trying to achieve with NTV technology. The energy gains are about five to 10 times with NTV, Rattner said.

“The design has generated an extraordinary amount of interest,” Rattner said.

The next goal is to extend the technology to other key components inside a computer.

“We are continuing to expand the use of these low-voltage techniques … to graphics and memory,” Rattner said. The technology can also be deeply embedded inside circuitry to bring more power efficiency to supercomputing.

The solar-powered CPU is based on a Pentium chip design, and the researchers converted the logic circuit to operate at near-threshold voltage. The CPU was made using the 32-nanometer processor, which is the same used to make Intel’s latest smartphone chip code-named Medfield. That chip will be appear in smartphones and tablets later this year.

Intel is sharing details about the chip layout and design methodology at ISSCC, which is being held from Feb. 19 to Feb. 23. The chip maker is also presenting separate papers that cover memory, graphics processors and floating-point units based on near-threshold voltage technology.

The research around the solar-powered CPU is being carried out in Intel’s research labs. The chip maker has said it does not expect the solar-powered CPU to go commercial, but that elements from the research would be implemented in future Intel products.

02.20
12

70-542 Q & A / Study Guide

by admin ·

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
There is a web site CertKingdomWS.
CertKingdomWS uses MS Office SharePoint Server 2007 Search Center.
CertKingdomWS runs a fixed keyword query.
If the result of this query is a fail to return any data.
How can this be achieved?

Answer:


QUESTION 2
There is a MS Office SharePoint Server 2007 application CertKingdomApp.
CertKingdomApp uses two tables Employees and EmployeesDetails.
They are related through a one-to many relation.
Two entities Employees and EmployeesDetails are defined in a BDC definition.
The metadata of this definition need to be defined.
Which code is appropriate?

Answer:


QUESTION 3
There is a MS Office SharePoint Server 2007 web site CertKingdomWS.
There is a MS Office SharePoint Server 2007 application CertKingdomApp.
There is a security group named DOMAIN\Employees.
In CertKingdomWS there is content that this group should have access to.
How can this be ensured? Select two.

A. Add a custom Web Part…
B. Add an audience…
C. Add a site group…
D. Use a filter…
E. ..based on the DOMAIN\Employees group.
F. ..that has the DOMAIN\Employees group as a member.
G. …that shows only the members of the DOMAIN\Employees group.

Answer: B,E

Explanation:


QUESTION 4
There is a MS Office SharePoint Server 2007 web site CertKingdomWS.
There is a MS Office SharePoint Server 2007 application CertKingdomApp.
There is a MS Excel 2007 workbook which contain employee data such as name, city, salary.
End users must be able to filter the workbook on city.
How can this be achieved through MS Office SharePoint Server 2007 Excel services? Select two.

A. Add an Excel VBA application…
B. Add an ActiveX control…
C. Use the Data-Filter option…
D. …in the workbook.
E. ..in CertKingdomApp.
F. ..in CertKingdomWS.

Answer: C,D

Explanation:


QUESTION 5
There is a MS SQL Server 2005 database CertKingdomDB.
There is a BDC definition which is used to search for employee data in CertKingdomDB.
Incremental crawls must be performed for indexing in CertKingdomDB.
How can this be ensured? Select two or three.

A. Add method
B. Add function..
C. Add stored procedure…
D. ..Finder
E. ..GenericInvoker
F. .. IDEnumerator
G. .. ViewAccessors
H. ..to have a return field representing the last update time of CertKingdomDB.
I. .. to return a different set of columns from the CertKingdomDB.

Answer: A,F,H

Explanation:


QUESTION 6
Exhibit:
public class CertKingdomClass
{
public double CertKingdom1 (double d)
{
return d * 9; }
public DateTime CertKingdom2 {
return ( DateTime.Today );
}
}
There are two UDFs CertKingdom1 and CertKingdom2.
These are defined as Excel Services in MS Office SharePoint Server 2007.
The code is displayed in the exhibit.
What action should you take?

Answer:


QUESTION 7
There is a ASP.NET web site CertKingdomWS.
There is a MS Office SharePoint Server 2007 application CertKingdomApp.
There is a Microsoft Office InfoPath form CertKingdomForm.
There is a custom control CertKingdomC that is derived from the XMLFormView class.
CertKingdomC will show CertKingdomForm inside an ASP.NET page on CertKingdomWS.
How can this be ensured?

Answer:


QUESTION 8
There is a web site CertKingdomWS.
There is a portal site template CertKingdomTempl.
CertKingdomTempl is used within CertKingdom Ltd. To recreate site hierarchies,
Extra sites must be added to the hierarchy.
What steps should be taken?
Your company uses a portal site template to recreate site hierarchies. You need to add additional
sites to the hierarchy that is defined in the portal site template. What should you do?

A. Modify file Webtemp*.xml…
B. Modify file webconfig…
C. Modify file global.aspx…
D. Modify the XML definition file..
E. Modify CertKingdomTempl…
F. Modify CertKingdomWS…
G. ..by adding a Template element that contains the site definitions for the new sites.
H. ..by adding extra Web elements to the XML definition file of the portal site template.
I. .. to include the new hierarchy and create a new site template on the Site Settings page.

Answer: D,H

Explanation:


 

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

02.18
12

70-536 Q & A / Study Guide

by admin ·

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
You work as the application developer at CertKingdom.com. CertKingdom.com uses Visual Studio.NET
2005 as its application development platform.
You are in the process of storing numerical values up to 2,100,000,000 into a variable and may
require storing negative values using a .NET Framework 2.0 application. You are required to
optimize memory usage
What should you do?

A. Int32
B. UInt16
C. UInt32
D. Int16

Answer: A

Explanation:
The Int32 type should be used in the scenario as it can be used to store positive and negative
numerical values from -2,147,483,648 to +2,147,483,647.
Incorrect Answers:
B: The UINT32 and UInt16 type should not be used in the scenario because they are used to store
only unsigned positive numbers.
Reference types
C: The UINT32 and UInt16 type should not be used in the scenario because they are used to store
only unsigned positive numbers.
Attributes
D: The Int16 type should not be used as you will only be allowed to store values from -32768 to
+32768.


QUESTION 2
You work as an application developer at CertKingdom.com. You are currently in the process of
creating a class that stores data about CertKingdom.com’s customers.
CertKingdom.com customers are assigned unique identifiers and various characteristics that may
include aliases, shipping instructions, and sales comments. These characteristics can change in
both size and data type.
You start by defining the Customer class as shown below:
public class Customer
{
private int custID;
private ArrayList attributes;
public int CustomerID
{
get {return custID;}
}
public Customer (int CustomerID)
{
this.custID = CustomerID;
this.attributes = new ArrayList ();
}
public void AddAttribute (object att)
{
attributes.Add (att);
}
}
You have to create the FindAttribute method for locating attributes in Customer objects no matter
what the data type is.
You need to ensure that the FindAttribute method returns the attribute if found, and you also need
to ensure type-safety when returning the attribute.
What should you do?

A. Use the following code to declare the FindAttribute method:
public T FindAttribute (T att)
{
//Find attribute and return the value
}
B. Use the following code to declare the FindAttribute method:
public object FindAttribute (object att)
{
//Find attribute and return the value
}
C. Use the following code to declare the FindAttribute method:
public T FindAttribute <T> (T att)
{
//Find attribute and return the value
}
D. Use the following code to declare the FindAttribute method:
public string FindAttribute (string att)
{
//Find attribute and return the value
}

Answer: C

Explanation:
This code declares the method FindAttribute and specifies an argument named att using the T
placeholder as the argument and return data type. To ensure the FindAttribute method accepts
arguments of different types, you should specify an argument using a generic placeholder. The
argument att in this generic method will accept any valid data type and ensures type-safety by
returning that same data type.
Incorrect Answers:
A: You should not use this code because it does not declare the placeholder T. when declaring a
generic method, you have to use the < > bracketsto declare the place holder before using it.
B: You should not use this code because it does not guarantee type-safery.
D: You should not use this code because it will only accept a string argument and return a string
argument.
Generic types


QUESTION 3
You work as an application developer at CertKingdom.com. You are creating a custom exception
class named ProductDoesNotExistException so that custom exception messages are displayed in
a new application when the product specified by users is unavailable.
This custom exception class will take the ProductID as an argument to its constructor and expose
this value through the ProductID. You are now in the process of creating a method named
UpdateProduct. This method will be used to generate and manage the
ProductDoesNotExistException exception if the ProductID variable contains the value 0.
You need to ensure that use the appropriate code for the UpdateProduct method.
What should you do?

A. Make use of the following code:
public void UpdateProduct ()
{
try
{
if (ProductID == 0)
throw new ProductDoesNotExistException (ProductID);
}
catch (ProductDoesNotExistException ex)
{
MessageBox.Show (“There is no Product” + ex. ProductID);
}
}
B. Make use of the following code:
public void UpdateProduct ()
{
try
{
if (ProductID = = 0)
throw new Exception (“Invalid ProductID”);
}
catch (ProductDoesNotExistException ex)
{
MessageBox.Show (ex.Message);
}
}
C. Make use of the following code:
public void UpdateProduct ()
{
if (ProductID = = 0)
throw new ProductDoesNotExistException (ProductID);
}
D. Make use of the following code:
public void UpdateProduct ()
{
if (ProductID = = 0)
throw new Exception (“Invalid ProductID”);
}

Answer: A

Explanation:
This code verifies the value of the ProductID variable by using the if statement. If the ProductID
variable contains a value of 0, this code generates an exception of type
ProductDoesNotExistException . To explicitly generate an exception, you are required to use the
throw statement. The exception generated by using the throw statement can be handled by the
try…catch block. This code generates the custom exception by calling the constructor of the
custom exception class named ProductDoesNotExistException . The constructor argument is the
ProductID attached to the ProductDoesNotExistException object. This code then handles the
custom exception named ProductDoesNotExistException by using a catch block, which handles
exceptions by using a variable named ex of the type ProductDoesNotExistException . This code
displays the ” There is no Product ” error message by using the MessageBox.Show method and
concatenating the ex. ProductID to it.
Incorrect Answers:
B: You should not use the code that generates an exception of the type Exception and handles the
exception of the type ProductDoesNotExistException in the catch block. This code is incorrect
because you are required to generate a custom exception named ProductDoesNotExistException.
C: You should not use the codes that do not use a try…catch block because the application an
unhandled exception.
D: You should not use the codes that do not use a try…catch block because the application an
unhandled exception.


QUESTION 4
You work as the application developer at CertKingdom.com. CertKingdom.com uses Visual Studio.NET
2005 as its application development platform.
You have recently finished development of a class named TestReward and package the class in a
.NET 2.0 assembly named TestObj.dll. After you ship the assembly and it is used by client
applications, you decide to move the TestReward class from TestObj.dll assembly to the
TestRewardObj.dll Assembly. You are to ensure when you ship the updated TestObj.dll and
TestRewardObj.dll assemblies that the client applications continue to work and do not require
recompiling.
What should you do?

A. The TypeForwardedTo attribute should be used
B. The TypeConvertor.ConvertTo method should be used
C. The InternalsVisibleTo attribute should be used
D. The Type Convertor.ConvertFrom method should be used

Answer: A

Explanation:
The statement used for you to add a type from one assembly into another assembly is the
TypeForwardTo attribute which enables you not to have the application recompiled.
Incorrect Answers:
B: The TypeConverter class provides a unified way of converting different types of values to other
types and can not be used to move a type.
C: The method in question here specifies all nonpublic types in an assembly are visible to other
assemblies but can not be used to move types.Part 2: Manage a group of associated data in a
.NET Framework application by using collections. (Refer System.Collections namespace)
D: The TypeConverter class provides a unified way of converting different types of values to other
types and can not be used to move a type.


QUESTION 5
You work as an application developer at CertKingdom.com. You have recently created a custom
collection class named ShoppingList for a local supermarket. This custom class will include
ShoppinItem objects that have the public properties listed below.
* Name
* AisleNumber
* OnDiscount
You are required to enable users of your class to iterate through the ShoppingList collection, and
to list each product name and aisle number using the foreach statement.
You need to achieve this by declaring the appropriate code.
What code should you use?

A. public class ShoppingList : ICollection
{
// Class implementation
}
B. public class ShoppingList : IEnumerator, IEnumerable
{
// Class implementation
}
C. public class ShoppingList : Ilist
{
// Class implementation
}
D. public class ShoppingList : Enum
{
// Class implementation
}

Answer: B

Explanation:
You should implement the IEnumerable and IEnumerator interfaces of the System.Collections
namespace to ensure that your collection class supports foreach iteration. The IEnumerable
interface defines only one method named GetEnumerator that returns an object of type
IEnumerator of the System.Collections namespace and is used to support iteration over a
collection. The IEnumerator interface supports methods, such as Current , MoveNext , and Reset
to iterate through a collection. The Current method returns the current element of the collection.
The Move method positions the enumerator to the next available element of the collection. The
Reset method positions the enumerator before the first element of the collection.
Incorrect Answers:
A: You should not use the code that implements the ICollection interface because this interface is
used to define properties in a collection. Implementing this interface will not ensure that your
collection class supports foreach iteration because it does not inherit the IEnumerator interface.
C: You should not use the code that implements the Ilist interface because this interface is used to
define properties of a non-generic list of items accessed by index. Implementing this interface will
not ensure that your collection class supports foreach iteration because it does not inherit the
IEnumerator interface.
D: You should not use the code that inherits the Enum because this structure is used as a base
class for those classes that provide enumeration values. Inheriting the Enum structure will not
ensure that your collection class supports foreach iteration.


QUESTION 6
You work as the application developer at CertKingdom.com. CertKingdom.com uses Visual Studio.NET
2005 as its application development platform.
You are developing a .NET Framework 2.0 application used to store a type-safe list of names and
e-mail addresses. The list will be populated all at ones from the sorted data which means you well
not always need to perform insertion or deletion operations on the data. You are required to
choose a data structure that optimizes memory use and has good performance.
What should you do?

A. The System.Collections.Generic.SortedList class should be used
B. The System.Collections.HashTable class should be used
C. The System.Collections.Generic.SortedDictionary class should be used
D. The System.Collections.SortedList class should be used

Answer: A

Explanation:
The SortedList generic class should be used in the scenario class as it provides type safety
compared against the System.Collections.SortedList class.
Incorrect Answers:
B: The System.Collections.HashTable class should not be used as this class provides no type
safety.
Collection interfaces
C: Although this is very similar to the SortedList class the SortedList class should be used instead
in the scenario.
Iterators
D: Although this is very similar to the SortedList class the SortedList class should be used instead
in the scenario.


QUESTION 7
You work as an application developer at CertKingdom.com. You are currently in the process of
reviewing an application that was created by a fellow developer.
The application that you are reviewing includes a declaration for a collection named EmployeeList,
which stores Employee objects. The declaration is shown below:
public class EmployeeList : Enumerator, IEnumerable
{
// Class implementation
}
You require the ability to iterate through the EmployeeList with minimum development effort.
What should you do?

A. Utilize the switch statement
B. Utilize the dowhile statement
C. Utilize the foreach statement
D. Utilize the if statement

Answer: C

Explanation:
the IEnumerable and IEnumerator interfaces of the System.Collections namespace are used to
ensure that your collection class supports foreach iteration. The IEnumerable interface defines
only one method named GetEnumerator that returns an object of type IEnumerator of the
System.Collections namespace and is used to support iteration over a collection. The
IEnumerator interface supports methods, such as Current , MoveNext , and Reset to iterate
through a collection. The Current method returns the current element of the collection. The Move
method positions the enumerator to the next available element of the collection. The Reset
method positions the enumerator before the first element of the collection.
Incorrect Answers:
A: These statements will not allow you to iterate through the EmployeeList collection.
B: You should not use this statement because it will require manually calling the MoveNext and
Current methods. The scenario states that you need to “…iterate through the EmployeeList with
minimum development effort.”
D: These statements will not allow you to iterate through the EmployeeList collection.
Hashtable class


QUESTION 8
You work as an application developer at CertKingdom.com. CertKingdom.com has been contracted to
develop an application for the local bank.
You have been given the responsibility of creating this application and need to store each
transaction record, which is identified using a complex transaction identifier, in memory. The bank
informs you that the total amount of transaction records could reach 200 per day.
To achieve this, you decide to utilize one of the existing collection classes in the .NET 2.0 class
library.
You need to ensure that you the collection class you select is the most efficient one for storing
transaction records.
What should you do?

A. Select the ListDictionary collection class.
B. Select the HashTable collection class.
C. Select the Queue collection class.
D. Select the StringCollection collection class.

Answer: B

Explanation:
You should select the HashTable class to store transaction records because each element is
identified using a unique identifier and the size of the collection is large. Elements in the
HashTable collection are stored with a key/value pair where each key is created using a hash
code. The default capacity of a HashTable class is zero, and you can use the Add method to add
a new element to the collection. The Count property provides the total number of elements in the
HashTable collection. An element of the HashTable class can be accessed using the
DictionaryEntry class. You can use the Key and Value properties of the DictionaryEntry class to
access the key associated with the element and the value of the element, respectively.
Incorrect Answers:
A: You should not select this collection class because this class is used if the total number of
elements to be stored in a collection is less than 10 elements in length.
C: You should not select this collection class because you need to access transaction records
using a transaction identifier, not in sequential order.
D: You should not select this collection class because this class is used to manage a collection of
string values.


QUESTION 9
You work as an application developer at CertKingdom.com. CertKingdom.com has been hired by a small
local private school to develop a class library that will be used in an application named
ManageAttendance for the purpose of managing student records.
You are responsible for developing this class library. CertKingdom.com has instructed you to create a
collection in the application to store learners’ results.
The school has informed you that they currently only have seven learners, but that this value will
triple in the following year. Due to the limited resources, you need to ensure that the collection you
create consumes a minimum amount of resources.
What should you use to create the collection?

A. The HybridDictionary collection class.
B. The HashTable collection class.
C. The ListDictionary collection class.
D. The StringCollection collection class.

Answer: A

Explanation:
You should use the HybridDictionary class to create the collection because this class is useful in
scenarios where the number of elements is unknown or could grow in size. A collection of the
HybridDictionary type manages the collection depending on the number of elements. The
HybridDictionary type collection uses the ListDictionary class to manage the collection when there
are only a few elements. When the number of elements exceeds ten, the HybridDictionary type
collection automatically converts the elements into HashTable management.
Incorrect Answers:
B: You should not use this collection class because this class is used if the total number of
elements to be stored in a collection is known and is greater than ten elements in length.
C: You should not use this collection class because this class is used if the total number of
elements to be stored in a collection is known and is less than ten elements in length.
D: You should not use this collection class because this class is used to manage a collection of
string values.


QUESTION 10
You work as an application developer at CertKingdom.com. CertKingdom.com wants you to develop an
application that stores and retrieves client information by means of a unique account number.
You create a custom collection class, which implements the IDictionary interface, named
ClientDictionary. The following code have been included into the new application.
//Create Client objects
Client c1 = new Client (“AReid”, “Andy Reid”, Status.Current);
Client c2 = new Client (“DAustin”, “Dean Austin”, Status.New);
//Create ClientDictionary object
IDictionary cData = new ClientDictionary ();
cData.Add (“10001”, c1);
cData.Add (“10002”, c2);
You use the same method to add other Client objects to the collection. You need to ensure that
you are able to retrieve client information associated with the account number 10111.
What should you do?

A. Use the following code:
Client foundClient;
foundClient = (Client) cData.Find (“10111”);
B. Use the following code:
Client foundClient;
if (cData.Contains (“10111”))
foundClient = cData [“10111”];
C. Use the following code:
Client foundClient;
if (cData.Contains (“10111”))
foundClient = (Client) cData [“10111”];
D. Use the following code:
Client foundClient;
foreach (string key in cData.Keys
{
if (key == “10111”)
foundClient = (Client) cData.Values [“10111”];
}

Answer: C

Explanation:
This code invokes the Contains method of the IDictionary interface to determine whether a value is
associated with the key 10111. If a value exists for that key, then the clientData [“10111”]
statement retrieves the client data as a generic object. The code casts the generic object into a
Client object, and it is stored in the foundClient variable
Incorrect Answers:
A: You should not use the code that uses the Find method because no such method exists in the
IDictionary interface.
B: You should not use the code that assigns the foundClient variable to a generic object because
the foundClient variable is declared as a Client type.
D: You should not use the code that iterates through the Keys collection because it is unnecessary
and process-intensive.

 

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

02.17
12

Microsoft’s Windows Azure Active Directory plans takes shape

by IT Trainer ·

This year should be a big one for Microsoft’s Windows Azure Active Directory cloud service, yet another piece of its hybrid public/private cloud puzzle.

 

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com

In the coming months, Windows users and partners are going to be hearing a lot more about Windows Azure Active Directory, the “conceptual equivalent” of Microsoft’s Active Directory directory service in Windows Server.

I only recently learned about the Windows Azure Active Directory — or WAAD (ugh!) — name via a December post I found on Dominik’s Cloud Security Blog). But the Softies have been dropping hints about plans to step up rights and management policies using Active Directory on the cloud side of the house, too, since last November.

Sessions about WAAD are on the docket for Microsoft’s upcoming TechEd conferences in June. Before that, Microsoft is planning to make some WAAD-related capabilities available to its Windows Azure cloud customers, according to a Microsoft cloud roadmap I saw earlier this year.

Microsoft is expected to tout the synergies of on-premises Active Directory and WAAD across several fronts, according to that roadmap document. Users will be able to maintain secure access to their apps in the cloud using their existing Active Directory set-ups. They’ll be able to migrate apps that depend on Active Directory to the Azure cloud “without making any changes.”

Office 365 enterprise users already can use their on-premises Active Directory to implement single sign-on. As it currently stands, “the administrator, and your users will need to maintain separate user names and passwords for your online and on-premises accounts,” and requires both Active Directory Federation Services (ADFS) 2.0 and the Active Directory sync service. Based on the aforementioned cloud roadmap, it sounds like Microsoft may be adding more Active Directory single sign-on capabilities and features to Office 365 some time this spring.

A Microsoft Web page on WAAD calls WAAD a multi-tenant cloud service. From that page:

“Windows Azure Active Directory is a cloud service that provides identity and access capabilities for applications on Windows Azure and Microsoft Office 365. Windows Azure Active Directory is the multi-tenant cloud service on which Microsoft Office 365 relies on for its identity infrastructure.

“Windows Azure Active Directory utilizes the enterprise-grade quality and proven capabilities of Active Directory, so you can bring your applications to the cloud easily. You can enable single sign-on, security enhanced applications, and simple interoperability with existing Active Directory deployments using Access Control Service (ACS), a feature of Windows Azure Active Directory.”

Microsoft announced last year the availability of ACS 2.0, which added new federation capabilities for Web sites and services. The latest update to the Azure Service Bus includes built-in support for ACS 2.0.

Update: I’m not entirely sure if WAAD is just a new name/new positioning for ACS or if it actually is something more. I’ll try asking Microsoft to see if I can get clarity. If so, I’ll update this post.

In other Microsoft cloud news, Microsoft announced plans to drop SQL Azure pricing (again) this week, effective immediately. The reduced pricing is aimed at customers with databases bigger than 1 GB in size who need to scale. Microsoft also added a new 100 MB database plan to its SQL Azure line-up this week.