P

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

partitioning
     database partitions 2nd 3rd
     disk partitions 2nd
     horizontal partitions 2nd 3rd
     vertical partitions 2nd
Pascal cases 2nd
PASS MADE 2nd
    accessability
         logical design validation
     accessibility
         physical design validation 2nd
     availability 2nd
         logical design validation
         physical design validation
     deployability
         logical design validation
         physical design validation
     extensibility
         logical design validation
         physical design validation 2nd
     maintainability
         logical design validation 2nd
         physical design validation
     performance 2nd
         logical design validation 2nd
         physical design validation 2nd
     scalability
         logical design validation
         physical design validation 2nd
     security
         logical design validation 2nd
         physical design validation 2nd
PASS MADE (operational requirements)
     accessibility requirements 2nd
         Certified for Windows logo requirements 2nd
         needs assessments
     availability requirements 2nd 3rd
     deployment requirements 2nd
         application configuration
         application distribution
     extensibility requirements 2nd
     maintainability requirements 2nd
         concerns
         concerns, breadth of applications
         concerns, distribution methods
         concerns, maintenance expectations
         concerns, third-party agreements
         objectives 2nd
     performance requirements
         response time
     scalability requirements
         scalability pyramid
         scaling out
         scaling up
     security requirements 2nd
         acceptable risk
         auditing
         authentication
         authorization
         data protection
         encryption policies
         intruder prevention processes
         logon policies
         monitoring security measures
         passwords
         user accounts
Passport authentication
passwords (security requirements)
performance (PASS MADE) 2nd
     logical design validation 2nd
     physical design validation 2nd
performance requirements (PASS MADE)
     response time
performance tests
     ACT
permissions
    assigning
         security strategies
     objects
     role-based security
personnel training plans
     current business states, evaluating 2nd
physical data model design
     indexes
         clustered indexes
         Index Tuning Wizard (SQL Wizard)
         non-clustered indexes
     partitioning
         database partitions 2nd 3rd
         disk partitions 2nd
         horizontal partitions 2nd 3rd
         vertical partitions 2nd
physical deployment design
     data migration
         bandwidth
         BCP (SQL Server 2000) 2nd
         DTS (SQL Server 2000) 2nd
         transfer capacity
     deployment
         Form deployment 2nd 3rd 4th
         Visual Studio .NET deployment projects 2nd 3rd
         Web interface deployment
         Web Service deployment
     licensing
         .NET Licensing 2nd
         custom licensing
     upgrading
         .NET automatic updates
         versioning 2nd
physical design 2nd 3rd
     auditing 2nd
         tracing 2nd
     Business Services Layer
         business components 2nd 3rd
         business entities 2nd 3rd
         business service interfaces 2nd
         business workflows
         Enterprise Services
         network bandwidth
         network latency 2nd
         service interfaces
         transactions 2nd
    case studies
         analyzing 2nd 3rd
    Data Access Layer
         building
         data services 2nd 3rd 4th 5th
     denormalization
     exception handling
         .NET exceptions
         custom exceptions
         structured exceptions 2nd
         unhandled esceptions
     exception-handling processes
     integration
         DTS 2nd
         EAI
         XML Web Services
     interoperability 2nd 3rd
         COM object identitities
         data marshaling
         data translation
         exceptions
         object binding
         object lifetime management
     logging 2nd
         custom logging 2nd
         database logging
         Event Viewer Application logs 2nd
         WMI
     physical data model design
         indexes 2nd 3rd 4th
         partitioning 2nd 3rd 4th 5th 6th 7th
     physical deployment design
         data migration 2nd 3rd 4th
         deployment 2nd 3rd 4th 5th 6th 7th 8th
         licensing 2nd 3rd 4th
         upgrading 2nd 3rd 4th
    physical maintenance design
         maintenance 2nd 3rd 4th 5th
    Presentation Layer
         user services 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th
     proof-of-concept deliverables
    security policies
         authentication 2nd
         authentication, business services 2nd
         authentication, data access
         authentication, user services
         authorization
         authorization, business services
         authorization, data access 2nd
         authorization, user services
         developing 2nd
         secure communication
    state
         managing 2nd 3rd
         managing, client-side state management 2nd
         managing, server-side state management 2nd
    validation
         accessibility requirements 2nd
         availability requirements
         deployability requirements
         extensibility requirements 2nd
         maintainability requirements
         performance requirements 2nd
         scalability requirements 2nd
         security requirements 2nd
         usage scenarios 2nd
     workflow diagrams
physical maintenance design
     maintenance
         application monitoring 2nd
         WMI 2nd
physical tiers
pilot tests
plug-ins
     Windows Forms 2nd
policies
     encryption policies
     logon policies (security requirements)
    security policies
         authentication 2nd
         authentication, business services 2nd
         authentication, data access
         authentication, user services
         authorization
         authorization, business services
         authorization, data access 2nd
         authorization, user services
         developing 2nd
         encryption policies
         logon policies
         passwords
         secure communication
     zones
policies (enterprise templates)
political climate
     current business state, evaluating 2nd
population checks (fact lists) 2nd
practice exams
     PrepLogic Practice Exams, Preview Edition
    starting
         PrepLogic Practice Exams, Preview Edition 2nd
Practice Test mode (PrepLogic Practice Exams, Preview Edition)
     starting 2nd
preconfigured exams
PrepLogic
     comments/suggestions
     customer service information
PrepLogic Practice Exams, Preview Edition
     Enable Item Review button
     Enable Show Answer button
     exam simulation interface
     exam simulations
     Examination Score Report window 2nd
     Exhibit button
     Flash Review mode
         starting
     Grade Exam option
     installing software 2nd
     Item Review button
     Mark Item option
     Next Item option
     Practice Test mode
         starting 2nd
     Previous Item option
     questions
     Randomize Choices option
     removing software
     Show Answer option
     software requirements
     viewing time remaining
     Your Score Report window
PrepLogic Web site 2nd
Presentation Layer
    user services
         caching 2nd
         mobile controls 2nd
         UI
         UIC
         UPC (UI process components)
         User Service facades
         Web farm architectures 2nd 3rd
         Web Forms 2nd 3rd
         Windows Forms 2nd 3rd
Previous Item option (PrepLogic Practice Exams, Preview Edition)
primary key relationships
    ORM
         DBMS 2nd
primary keys
     defining 2nd 3rd 4th
primitive level diagrams (DFD) 2nd 3rd
principal actors
prioritizing
     business requirements
     goals lists (Envisioning Phase deliverables) 2nd
problem statements (case studies)
     Book Seller, Inc. 2nd
     Charles Laboratories, Allergy Products Division 2nd
     Setsko, Inc.
problem statements (Envisioning Phase deliverables) 2nd 3rd
process symbol (DFD)
processes 2nd
     build processes 2nd
    case studies
         analyzing 2nd
     change management processes
     code review processes
     documentation review processes
     enterprise templates 2nd 3rd
     exception-handling processes
     issue tracking processes
     maintenance processes
     release management processes 2nd
     source code management processes 2nd
     testing processes
         assembly tests
         build validation tests 2nd 3rd
         code coverage tests
         performance tests 2nd
         pilot tests
         unit tests
         user acceptance tests
product management (MSF project development roles)
program management (MSF project development roles)
programming
     asynchronous programming 2nd
project control metrics
project development roles (MSF)
     logistics management
     product management
     program management
     testing
     user educations
project sponsors
projects
     analogy (Envisioning Phase) 2nd
     metaphors (Envisioning Phase) 2nd
    quality
         organizational performance metrics 2nd
         project control metrics
         ROI metrics 2nd
     scope (Envisioning Phase) 2nd
     successful projects, defining 2nd
     vision (Envisioning Phase) 2nd 3rd
proof-of-concept deliverables
     logical design 2nd
     physical design
properties
     .ViewState property
    associating in entities
         conceptual design
     naming 2nd
     ShowSounds property
proposing
     solutions (Envisioning Phase) 2nd
         analogy 2nd
         feasibility 2nd
         feasibility, business perspective
         feasibility, resource perspective 2nd 3rd
         feasibility, technical perspective 2nd
         metaphors 2nd
         reference architectures
         risk management 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
         scope versus vision 2nd
         vision
         vision versus scope 2nd
proxies
purging
    data
         operations strategies 2nd



Analyzing Requirements and Defining. Net Solution Architectures (Exam 70-300)
MCSD Self-Paced Training Kit: Analyzing Requirements and Defining Microsoft .NET Solution Architectures, Exam 70-300: Analyzing Requirements and ... Exam 70-300 (Pro-Certification)
ISBN: 0735618941
EAN: 2147483647
Year: 2006
Pages: 175

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net