[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] abbreviations (coding standards) accessability (PASS MADE) logical design validation accessibility (logical design) UI design requirements accessibility (PASS MADE) physical design validation 2nd accessibility requirements (PASS MADE) 2nd Certified for Windows logo requirements 2nd needs assessments accounts service accounts data access authentication (security policies) data access authorization (security policies) 2nd user accounts security requirements Windows accounts data access authentication (security policies) ACID transactions 2nd ACL (Access Control List) ACT (Application Center Tests) activity diagrams (UML) actors association relationships extends relationships external hardware other systems principal actors scenarios usage scenarios 2nd secondary actors uses relationships analogy (Envisioning Phase) 2nd analyzing business processes 2nd business requirements data modeling 2nd 3rd 4th 5th defining data requirements 2nd 3rd 4th dependency identification 2nd DFD 2nd 3rd 4th 5th system feature identification 2nd case studies major exam objectives 2nd 3rd major exam objectives, conceptual design 2nd major exam objectives, developing specifications 2nd major exam objectives, Envisioning Phase major exam objectives, logical design 2nd 3rd major exam objectives, ORM major exam objectives, physical design 2nd 3rd major exam objectives, processes 2nd major exam objectives, requirement-gathering phase major exam objectives, standards 2nd PASS MADE 2nd PASS MADE, accessibility PASS MADE, availability 2nd PASS MADE, deployability PASS MADE, extensibility PASS MADE, maintainability PASS MADE, performance 2nd PASS MADE, scalability PASS MADE, security risk (Envisioning Phase) 2nd answers (exams) randomizing choices showing Application event log system activity information storing Application logs (Event Viewer) 2nd application monitoring WMI 2nd Application objects 2nd application state Application state server-side state management 2nd application structures (enterprise templates) Application.Idle method ApplicationException class applications automated deployment breadth of maintainability requirements building conceptual design 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th developing-specifications phase 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd 54th 55th 56th 57th 58th 59th 60th 61st 62nd 63rd 64th 65th 66th 67th 68th 69th 70th 71st 72nd 73rd Envisioning Phase Envisoning Phase 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st logical design 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd 54th 55th 56th 57th 58th 59th 60th 61st 62nd 63rd 64th 65th 66th 67th 68th 69th 70th 71st 72nd 73rd 74th 75th 76th 77th 78th 79th 80th 81st 82nd 83rd 84th 85th 86th 87th 88th 89th 90th 91st 92nd 93rd 94th 95th 96th 97th 98th 99th 100th 101st 102nd 103rd 104th 105th 106th 107th 108th 109th 110th 111th 112th 113th 114th 115th 116th 117th 118th 119th 120th 121st 122nd 123rd 124th 125th 126th organizational performance metrics 2nd physical design 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd 54th 55th 56th 57th 58th 59th 60th 61st 62nd 63rd 64th 65th 66th 67th 68th 69th 70th 71st 72nd 73rd 74th 75th 76th 77th 78th 79th 80th 81st 82nd 83rd 84th 85th 86th 87th 88th 89th 90th 91st 92nd 93rd 94th 95th 96th 97th 98th 99th 100th 101st 102nd 103rd 104th 105th 106th 107th 108th 109th 110th 111th 112th 113th 114th 115th 116th 117th 118th 119th 120th 121st 122nd 123rd 124th 125th 126th 127th 128th 129th 130th processes 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th project control metrics requirement-gathering phase 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th requirements-gathering phase 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th ROI metrics 2nd standards 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd distribution methods maintainability requirements extranet applications developing forms applications authorization globalized applications 2nd 3rd bitmap images colloquialisms cultures/locales maps obscure phrasing slang expressions instrumenting internet applications developing intranet applications developing localized applications 2nd character displays currency symbols date and time formats keyboard layouts number formats sorting data maintenance expectations maintainability requirements plug-ins Windows Forms 2nd thin-client applications Web farm architectures 2nd 3rd third-party agreements maintainability requirements validating logical design 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th physical design 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th Web applications authorization state management 2nd 3rd 4th USL versus Windows applications 2nd 3rd 4th Windows applications DirectX state management USL 2nd versus Web applications 2nd 3rd 4th world-ready applications .globalization 2nd 3rd 4th .NET Framework, System.Globalization namespaces .NET Framework, System.Resources namespaces .NET Framework, Unicode localization 2nd architecting .NET solutions exam objectives 2nd 3rd exam objectives, conceptual design 2nd exam objectives, developing specifications 2nd exam objectives, Envisioning Phase exam objectives, logical design 2nd 3rd exam objectives, ORM exam objectives, physical design 2nd 3rd exam objectives, processes 2nd exam objectives, requirement-gathering phase exam objectives, standards 2nd PASS MADE 2nd PASS MADE, accessibility PASS MADE, availability 2nd PASS MADE, deployability PASS MADE, extensibility PASS MADE, maintainability PASS MADE, performance 2nd PASS MADE, scalability PASS MADE, security architectural models selecting layers legacy integration 2nd tiers 2nd Web applications versus Windows applications 2nd XML Web services architectures design guidelines 2nd GXA n-tier architectures 2nd reference architectures service architectures (logical design) 2nd BizTalk Server callbacks Windows services Web farm architectures 2nd 3rd archiving data operations strategies arity arrays coding standards ASP.NET Application objects 2nd Cache objects Cache state server-side state management caching Forms deploying 2nd 3rd 4th globalization Page objects .ViewState property Request objects Response objects security strategies Session objects state managing 2nd 3rd managing, client-side state management 2nd managing, server-side state management 2nd Web Forms 2nd 3rd Web interfaces deploying Web Services deploying assembly tests assessing organizational structures 2nd 3rd 4th 5th decentralized business unit organizational structures functional organizational structures geographic organizational structures matrix organizational structures strategic business unit organizational structures assigning permissions security strategies associate entities association relationships (UML) associative entities 2nd asynchronous processing .NET Framework Application.Idle method BeginInvoke() method EndInvoke() method BizTalk interrupting idle tasks MSMQ (Microsoft Message Queue) spawning new threads versus synchronous processing 2nd 3rd 4th asynchronous programming 2nd attribute elements (XML) attributes ComVisible() attributes (entities) 2nd identifiers 2nd surrogate keys 2nd attributes (logical data models) defining 2nd key attributes foreign keys 2nd 3rd primary keys 2nd 3rd 4th surrogate keys attributes. fields [See also columns] auditing files physical design 2nd 3rd 4th system activity (development strategies) 2nd 3rd tracing 2nd auditing (security requirements) authentication (logical design) Forms authentication Passport authentication signing code Authenticode Windows authentication authentication (security requirements) Authenticode authorization (logical design) 2nd forms applications resource-based authorization ACL Web applications authorization (security requirements) automated application deployment deployment strategies availability (PASS MADE) 2nd logical design validation physical design validation availability requirements (PASS MADE) 2nd 3rd |