A

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

abbreviations (coding standards)
accessability (PASS MADE)
     logical design validation
accessibility (logical design)
     UI design requirements
accessibility (PASS MADE)
     physical design validation 2nd
accessibility requirements (PASS MADE) 2nd
     Certified for Windows logo requirements 2nd
     needs assessments
accounts
    service accounts
         data access authentication (security policies)
         data access authorization (security policies) 2nd
    user accounts
         security requirements
    Windows accounts
         data access authentication (security policies)
ACID transactions 2nd
ACL (Access Control List)
ACT (Application Center Tests)
activity diagrams (UML)
actors
     association relationships
     extends relationships
     external hardware
     other systems
     principal actors
     scenarios
         usage scenarios 2nd
     secondary actors
     uses relationships
analogy (Envisioning Phase) 2nd
analyzing
     business processes 2nd
     business requirements
         data modeling 2nd 3rd 4th 5th
         defining data requirements 2nd 3rd 4th
         dependency identification 2nd
         DFD 2nd 3rd 4th 5th
         system feature identification 2nd
    case studies
         major exam objectives 2nd 3rd
         major exam objectives, conceptual design 2nd
         major exam objectives, developing specifications 2nd
         major exam objectives, Envisioning Phase
         major exam objectives, logical design 2nd 3rd
         major exam objectives, ORM
         major exam objectives, physical design 2nd 3rd
         major exam objectives, processes 2nd
         major exam objectives, requirement-gathering phase
         major exam objectives, standards 2nd
         PASS MADE 2nd
         PASS MADE, accessibility
         PASS MADE, availability 2nd
         PASS MADE, deployability
         PASS MADE, extensibility
         PASS MADE, maintainability
         PASS MADE, performance 2nd
         PASS MADE, scalability
         PASS MADE, security
     risk (Envisioning Phase) 2nd
answers (exams)
     randomizing choices
     showing
Application event log
    system activity information
         storing
Application logs (Event Viewer) 2nd
application monitoring
     WMI 2nd
Application objects 2nd
application state
Application state
     server-side state management 2nd
application structures (enterprise templates)
Application.Idle method
ApplicationException class
applications
     automated deployment
    breadth of
         maintainability requirements
    building
         conceptual design 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th
         developing-specifications phase 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd 54th 55th 56th 57th 58th 59th 60th 61st 62nd 63rd 64th 65th 66th 67th 68th 69th 70th 71st 72nd 73rd
         Envisioning Phase
         Envisoning Phase 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st
         logical design 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd 54th 55th 56th 57th 58th 59th 60th 61st 62nd 63rd 64th 65th 66th 67th 68th 69th 70th 71st 72nd 73rd 74th 75th 76th 77th 78th 79th 80th 81st 82nd 83rd 84th 85th 86th 87th 88th 89th 90th 91st 92nd 93rd 94th 95th 96th 97th 98th 99th 100th 101st 102nd 103rd 104th 105th 106th 107th 108th 109th 110th 111th 112th 113th 114th 115th 116th 117th 118th 119th 120th 121st 122nd 123rd 124th 125th 126th
         organizational performance metrics 2nd
         physical design 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd 54th 55th 56th 57th 58th 59th 60th 61st 62nd 63rd 64th 65th 66th 67th 68th 69th 70th 71st 72nd 73rd 74th 75th 76th 77th 78th 79th 80th 81st 82nd 83rd 84th 85th 86th 87th 88th 89th 90th 91st 92nd 93rd 94th 95th 96th 97th 98th 99th 100th 101st 102nd 103rd 104th 105th 106th 107th 108th 109th 110th 111th 112th 113th 114th 115th 116th 117th 118th 119th 120th 121st 122nd 123rd 124th 125th 126th 127th 128th 129th 130th
         processes 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th
         project control metrics
         requirement-gathering phase 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th
         requirements-gathering phase 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th
         ROI metrics 2nd
         standards 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd
    distribution methods
         maintainability requirements
    extranet applications
         developing
    forms applications
         authorization
     globalized applications 2nd 3rd
         bitmap images
         colloquialisms
         cultures/locales
         maps
         obscure phrasing
         slang expressions
     instrumenting
    internet applications
         developing
    intranet applications
         developing
     localized applications 2nd
         character displays
         currency symbols
         date and time formats
         keyboard layouts
         number formats
         sorting data
    maintenance expectations
         maintainability requirements
    plug-ins
         Windows Forms 2nd
    thin-client applications
         Web farm architectures 2nd 3rd
    third-party agreements
         maintainability requirements
    validating
         logical design 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
         physical design 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th
    Web applications
         authorization
         state management 2nd 3rd 4th
         USL
         versus Windows applications 2nd 3rd 4th
    Windows applications
         DirectX
         state management
         USL 2nd
         versus Web applications 2nd 3rd 4th
     world-ready applications
         .globalization 2nd 3rd 4th
         .NET Framework, System.Globalization namespaces
         .NET Framework, System.Resources namespaces
         .NET Framework, Unicode
         localization 2nd
architecting
    .NET solutions
         exam objectives 2nd 3rd
         exam objectives, conceptual design 2nd
         exam objectives, developing specifications 2nd
         exam objectives, Envisioning Phase
         exam objectives, logical design 2nd 3rd
         exam objectives, ORM
         exam objectives, physical design 2nd 3rd
         exam objectives, processes 2nd
         exam objectives, requirement-gathering phase
         exam objectives, standards 2nd
         PASS MADE 2nd
         PASS MADE, accessibility
         PASS MADE, availability 2nd
         PASS MADE, deployability
         PASS MADE, extensibility
         PASS MADE, maintainability
         PASS MADE, performance 2nd
         PASS MADE, scalability
         PASS MADE, security
architectural models
     selecting
         layers
         legacy integration 2nd
         tiers 2nd
         Web applications versus Windows applications 2nd
         XML Web services
architectures
     design guidelines 2nd
     GXA
     n-tier architectures 2nd
     reference architectures
     service architectures (logical design) 2nd
         BizTalk Server
         callbacks
         Windows services
     Web farm architectures 2nd 3rd
archiving
    data
         operations strategies
arity
arrays
     coding standards
ASP.NET
     Application objects 2nd
     Cache objects
    Cache state
         server-side state management
     caching
    Forms
         deploying 2nd 3rd 4th
     globalization
    Page objects
         .ViewState property
     Request objects
     Response objects
     security strategies
     Session objects
    state
         managing 2nd 3rd
         managing, client-side state management 2nd
         managing, server-side state management 2nd
     Web Forms 2nd 3rd
    Web interfaces
         deploying
    Web Services
         deploying
assembly tests
assessing
     organizational structures 2nd 3rd 4th 5th
         decentralized business unit organizational structures
         functional organizational structures
         geographic organizational structures
         matrix organizational structures
         strategic business unit organizational structures
assigning
    permissions
         security strategies
associate entities
association relationships (UML)
associative entities 2nd
asynchronous processing
     .NET Framework
         Application.Idle method
         BeginInvoke() method
         EndInvoke() method
     BizTalk
     interrupting idle tasks
     MSMQ (Microsoft Message Queue)
     spawning new threads
     versus synchronous processing 2nd 3rd 4th
asynchronous programming 2nd
attribute elements (XML)
attributes
     ComVisible()
attributes (entities) 2nd
     identifiers 2nd
         surrogate keys 2nd
attributes (logical data models)
     defining 2nd
    key attributes
         foreign keys 2nd 3rd
         primary keys 2nd 3rd 4th
         surrogate keys
attributes.
     fields [See also columns]
auditing
     files
     physical design 2nd 3rd 4th
     system activity (development strategies) 2nd 3rd
     tracing 2nd
auditing (security requirements)
authentication (logical design)
     Forms authentication
     Passport authentication
    signing code
         Authenticode
     Windows authentication
authentication (security requirements)
Authenticode
authorization (logical design) 2nd
     forms applications
    resource-based authorization
         ACL
     Web applications
authorization (security requirements)
automated application deployment
     deployment strategies
availability (PASS MADE) 2nd
     logical design validation
     physical design validation
availability requirements (PASS MADE) 2nd 3rd



Analyzing Requirements and Defining. Net Solution Architectures (Exam 70-300)
MCSD Self-Paced Training Kit: Analyzing Requirements and Defining Microsoft .NET Solution Architectures, Exam 70-300: Analyzing Requirements and ... Exam 70-300 (Pro-Certification)
ISBN: 0735618941
EAN: 2147483647
Year: 2006
Pages: 175

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net