D

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

DAL (Data Access Layer)
data
    archiving
         operations strategies
    caching
         BLL
     encryption
         SSL 2nd
    purging
         operations strategies 2nd
    sorting
         localized applications
     translating
data access authentication (security policies)
     service accounts
     Windows accounts
data access authorization (security policies) 2nd
data access components 2nd
     service agents 2nd
Data Access Layer
     building
     data services
         data access components 2nd
         service agents 2nd
data elements
    entity relationships
         conceptual design
         ORM
     ORM representation
data encryption
    IPSec
         security strategies
    RPC
         security strategies
     security strategies 2nd
         IPSec
         RPC
         SSL
         SSL/TLS
    SSL
         security strategies
    SSL/TLS
         security strategies
data entry errors
     development strategies
data flow symbol (DFD)
data integration
     deployment strategies
data integrity
     business rules (data modeling) 2nd
data marshaling
data migration
     deployment strategies
data migration (physical deployment design)
     bandwidth
     BCP (SQL Server 2000) 2nd
     DTS (SQL Server 2000) 2nd
    transfer capacity
         calculating
data modeling 2nd 3rd 4th 5th 6th
     business rules 2nd
    columns
         defining 2nd 3rd 4th 5th 6th 7th 8th 9th
    entities
         relationships 2nd 3rd 4th 5th 6th 7th
     ER Model 2nd
         entities 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st
     ERWIN
    tables
         defining 2nd 3rd 4th 5th 6th
         denormalizing 2nd 3rd
         normalizing 2nd 3rd 4th 5th 6th 7th
     Visio 2nd
     XML 2nd
         complexType
         elements 2nd 3rd 4th
         namespaces 2nd
         simpleType
         versus DTD
data objects (BLL)
data privacy strategies
     security strategies
data protection (security requirements)
data requirements
     defining 2nd 3rd 4th
data services
     data access components 2nd
     service agents 2nd
data storage
    cookies
         client-side state management 2nd
         server-side state management 2nd
     development strategies 2nd 3rd 4th
data store symbol (DFD)
data tampering
data type validation
data validation 2nd 3rd
     code checking
     complex validation
     data type validation
     range checking
database connection strings
     encryption
database logging
database partitions 2nd 3rd
database schemas
database sessions
databases
     federated databases
     relational databases
DataSets 2nd
date and time formats
     localized applications
DBMS (Database Management Systems)
     conceptual design
     ORM
         constraints
         converting conceptual diagrams to relational databases
         entities
         keys 2nd
         redundancy
Debug class
Debug classes
decentralized business unit organizational structures
defensive programming
defining
     attributes (logical data models) 2nd
     columns (logical data models) 2nd 3rd 4th 5th 6th 7th 8th 9th
     data requirements 2nd 3rd 4th
     foreign keys 2nd 3rd
     primary keys 2nd 3rd 4th
     standards 2nd
     successful projects 2nd
     tables (logical data models) 2nd 3rd 4th 5th 6th
     user personas (Envisioning Phase deliverables) 2nd
deliverables
     documentation review processes
    proof-of-concept deliverables
         logical design 2nd
         physical design
deliverables (Envisioning Phase)
     goals lists 2nd
     problem statements 2nd 3rd
    user personas
         defining 2nd
     vision statements
denormalization
denormalizing
     tables (logical data models) 2nd 3rd
dependencies
     external dependencies
     internal dependencies
dependencies (entities)
     many-to-many dependencies
     one-to-many dependencies
     one-to-one dependencies
deployability (PASS MADE)
     logical design validation
     physical design validation
deploying
    applications
         automated deployment
deployment
     no-touch deployment 2nd 3rd
deployment (physical deployment design)
     Form deployment
         no-touch deployment 2nd 3rd
    Visual Studio .NET deployment projects
         CAB Projects
         Merge Module Projects 2nd 3rd
         selecting
         Setup Projects 2nd
         Web Setup Projects 2nd
     Web interface deployment
     Web Service deployment
deployment diagrams (UML)
deployment requirements (PASS MADE) 2nd
     application configuration
     application distribution
deployment strategies 2nd 3rd
     automated application deployment
     coexisitence deployment strategies
     data integration
     data migration
     distributable media
     licensing 2nd
         Web Service licensing 2nd
     merge modules
     Visual Studio .NET
     Web servers 2nd
     Windows Installer
designing
    architectures
         guidelines 2nd
     logical data models
         columns 2nd 3rd 4th 5th 6th 7th 8th 9th
         data modeling 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th
         entities, relationships 2nd 3rd 4th 5th 6th 7th
         tables 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th
         XML 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
    threads
         coding standards
     UI (User Interfaces)
desktop user interfaces (Windows Forms)
determining
     entities 2nd
developing
    extranet applications
         scope
    internet applications
         scope
    intranet applications
         scope
     security policies 2nd
     world-ready applications
         .NET Framework, System.Globalization namespaces
         .NET Framework, System.Resources namespaces
         .NET Framework, Unicode
         globalization 2nd 3rd 4th
         localization 2nd
developing-specifications phase 2nd 3rd
     development strategies 2nd
         auditing system activity 2nd 3rd
         data storage 2nd 3rd 4th
         deployment strategies 2nd 3rd 4th 5th 6th 7th
         error handling 2nd 3rd 4th 5th 6th 7th 8th 9th
         globalization 2nd
         localizability
         localization 2nd 3rd 4th
         logging system activity 2nd 3rd
         logic handling
         monitoring system activity 2nd 3rd
         state management 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
         storing system activity information 2nd
         system integration
     operations strategies
         data archiving
         data purging 2nd
         upgrades
     security strategies
         ASP.NET
         assigning permissions
         data encryption 2nd
         data privacy strategies
         sealing messages
         securing system access
         signing 2nd
         system support 2nd
         testing strategies
development strategies 2nd
     data storage 2nd 3rd 4th
     deployment strategies 2nd 3rd
         automated application deployment
         coexistence deployment strategies
         data integration
         data migration
         distributable media
         licensing 2nd 3rd 4th
         merge modules
         Visual Studio .NET
         Web servers 2nd
         Windows Installer
     error handling
         data entry errors
         logic errors
         structured exception handling 2nd 3rd
         syntax errors
         system malfunctions
         unstructured exception handling
         user errors
     globalization
         cultures/locales rule
     localizability
     localization 2nd
         multilingual user interfaces
         Unicode character encoding
     state management
         client-side state management 2nd 3rd
         data validation 2nd 3rd
         server-side state management 2nd 3rd 4th
    system activity
         auditing 2nd 3rd
         logging 2nd 3rd
         monitoring 2nd 3rd
    system activity information
         storing 2nd
     system integration
DFD (data flow diagrams) 2nd 3rd 4th 5th
     context diagrams
     data flow symbol
     data store symbol
     external entity symbol
     level-0 diagrams
     level-n diagrams
     primitive level diagrams 2nd 3rd
     process symbol
diagrams
     activity diagrams (UML)
     class diagrams (UML)
     collaboration diagrams (UML)
     component diagrams (UML)
     context diagrams (DFD)
     deployment diagrams (UML)
     DFD 2nd 3rd 4th 5th
         context diagrams
         data flow symbol
         data store symbol
         external entity symbol
         level-0 diagrams
         level-n diagrams
         primitive level diagrams 2nd 3rd
         process symbol
     level-0 diagrams (DFD)
     level-n diagrams (DFD)
     object diagrams (UML)
     primitive level diagrams (DFD) 2nd 3rd
     sequence diagrams (UML)
     statechart diagrams (UML)
     system block diagrams
     use case diagrams (UML) 2nd 3rd
     workflow diagrams
digital certificates
     security strategies
dimensioning
     variables 2nd
DirectX
disk partitions 2nd
displays
    character displays
         localized applications
documentation review processes
documentation standards 2nd
documents
    input documents
         building fact lists (conceptual design)
    vision/scope documents
         building 2nd
documents. [See deliverables]
DoS (Denial of Service) attacks
drag-and-drop questions (exams)
DTD (Document Type Definitions)
     versus XML schemas
DTS (Data Transformation Services) 2nd 3rd 4th



Analyzing Requirements and Defining. Net Solution Architectures (Exam 70-300)
MCSD Self-Paced Training Kit: Analyzing Requirements and Defining Microsoft .NET Solution Architectures, Exam 70-300: Analyzing Requirements and ... Exam 70-300 (Pro-Certification)
ISBN: 0735618941
EAN: 2147483647
Year: 2006
Pages: 175

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net