Flylib.com
List of Exercises
Previous page
Table of content
Next page
Chapter 2: Visualizing the Solution
Exercise 2-1: Create a UML State Diagram Using Visio for Enterprise Architects
Chapter 3: Gathering and Analyzing Business and User Requirements
Exercise 3-1: Create a Use Case Diagram
Exercise 3-2: Create a Data Flow Diagram
Chapter 4: Formalizing Business Requirements into Functional Specifications
Exercise 4-1: Creating Strong-Named Assemblies and Versioning Assemblies
Chapter 5: An Overview of Object Role Modeling
Exercise 5-1: Creating a Blank ORM Diagram in Visio for Enterprise Architects
Excerise 5-3: Creating a Simple ORM Diagram in Visio for Enterprise Architects
Excerise 5-3: Autogenerating an ORM Diagram in Visio for Enterprise Architects
Chapter 6: Conceptual Design
Exercise 6-1: Using Visio for Enterprise Architects to Create Procedure Diagrams
Exercise 6-2: Creating Gane-Sarson Data Flow Diagrams in Visio
Chapter 7: Logical Design
Exercise 7-1: Identifying Business Object Behaviors
Exercise 7-2: Converting Conceptual Database Design to Logical Design
Exercise 7-3: Creating Logical Design Diagrams Using Microsoft Visio for Enterprise Architects
Chapter 9: Developing Standards for Your Solution
Exercise 9-1: Create XML Documentation and Comment Web Pages
Exercise 9-2: Apply Constraints in an Enterprise Template Policy File
Previous page
Table of content
Next page
MCSD Analyzing Requirements and Defining .NET Solutions Architectures Study Guide (Exam 70-300 (Certification Press)
ISBN: 0072125861
EAN: 2147483647
Year: 2003
Pages: 94
Authors:
Scott Duffy
,
David Waddleton
BUY ON AMAZON
Java I/O
Multitarget Output Streams
JAR Archives
File Viewer, Part 5
General Techniques for Cross-Platform File Access Code
Buffered Readers and Writers
Interprocess Communications in Linux: The Nooks and Crannies
The /proc Filesystem
Key Terms and Concepts
Lock Files
Locking Files
Using a File as Shared Memory
WebLogic: The Definitive Guide
Using the Resource Adapter
Building CMP Entity Beans
Load-Balancing Schemes
Using J2EE Services on the Object Tier
Configuring Trust Between Two Domains
SQL Hacks
Hack 20. Uncover Trends in Your Data
Hack 24. Multiply Across a Result Set
Hack 27. Identify Overlapping Ranges
Hack 35. Tally Results into a Chart
Hack 48. Prevent an SQL Injection Attack
Microsoft Windows Server 2003(c) TCP/IP Protocols and Services (c) Technical Reference
Address Resolution Protocol (ARP)
Dynamic Host Configuration Protocol (DHCP) Server Service
Domain Name System (DNS)
RADIUS and Internet Authentication Service
Internet Information Services (IIS) and the Internet Protocols
VBScript in a Nutshell, 2nd Edition
Introduction
Windows Script Host 5.6
Program Flow
Accessing Other Object Models
Section B.3. Date and Time Constants
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies