Question: Which of the following is the correct precedence order of the data types in SQL Server 2008?
1.xml
2.text
3.bigint
4.image
5.float
6.datetime
Question: Suppose e1 and e2 denote two decimal expressions with precisions p1 and p2 and scales s1 and s2, respectively. What is the result precision of the following operation on the two expressions?
Operation: e1 / e2
Question: Before you deserialize, you want to make sure that the XML you are about to deserialize will map into the class with which you instantiated this serializer. Which of the following methods will you use to verify this?
Question: Creating a hash with a public key encryption is the ability to verify the integrity of data without necessarily encrypting it. Which of the following are correct with regard to HASH?
A
The hash is a nearly unique digest of the message
B
The hash is encrypted using the public key of the sender
C
The encrypted hash serves as a signature of the sender and is sent separately from the decrypted message
D
The hash is the opposite of the usual process used in encryption, in which the public key is used to encrypt, and the plain text is not sent
Question: Client access is accomplished via custom proxy classes that use the WebRequest and HttpWebRequest classes. Which kinds of .NET applications use these proxy classes?
Question: Which of the following is correct with regard to the statements given below?
Statement 1: RPC-encoded clients are very similar to document-encoded ones.
Statement 2: RPC-encoded clients need to set the Use property of the [SoapRpcMethod("http://mySoapAction")] attribute to indicate that this client is encoded, and not literal XML.