Professional Documents
Culture Documents
2. Determine a data storage mechanism for the application. R1 indicates that you might need to consider a local storage option. This could be isolated storage, or you could consider SQL Everywhere on the mobile device or desktop. R3 indicates a large enough workforce that you will want to support a SQL Server standard back-end. It might synch with the mobile clients. 3. What additional technologies (outside of ASP.NET) should you consider for this solution? Consider cost-effective products that satisfy some of these requirements. R5 indicates that integration around a couple of business processes is necessary. Explore the potential of using BizTalk Server to aid in this effort. R6 indicates sending data extracts. Again, BizTalk might be warranted. Also, consider SQL Server Integration Services (SSIS). R7 opens up the possibility of using WSS and SQL Reporting Services. The former could be used to deliver the dashboard-like features. The latter could deliver the reports. You might also consider using SQL Analysis Services to help with the drilldown of the reporting.
Lesson Review 1. You have been given the requirement The application should log all system failures and generate a support ticket to ensure proper follow-up and response. This is an example of what type of requirement? A. Business requirement B. Quality-of-service requirement C. User requirement D. Functional requirement 2. Requirements are useful for which of the following? (Choose all that apply.) A. Allowing testers to confirm if the implemented application is acceptable B. Defining the process a user will perform to accomplish a given task C. Defining a common understanding of scope among the business, users, and project team D. Determining which technologies should be used for the application
3. Given the following requirements, which client technology would you recommend? Users expect a highly interactive experience. They should not have to wait for multiple seconds between requests. The application must work on Microsoft Windows, Unix, and Macintosh computers. The users should be able to run the application only from their corporate computers. A. Standard browser-based client B. AJAX-enabled client C. Mobile client D. Smart Client 4. Given the following requirements, which data storage technology would you recommend? Users should be able to work with the application when they are not connected to the Internet. The applications data is retrieved and aggregated from multiple sources on a monthly basis. After the updated data is posted, users should receive it. The application should have a small footprint on the users computer or device. A. SQL Enterprise B. SQL Express C. SQL Everywhere (Mobile) D. SQL Standard
Lesson Review 1. Review the following questions, which you need to answer with your prototype. Based on these questions, what type of prototype should you create? How will users be led through the search, review, and purchase process? How will the user identify the features and actions of the system without extensive training? What are the common types of screens required for the application? A. Vertical prototype B. Mockup prototype C. Proof-of-concept prototype D. Reference architecture prototype 2. You need to confirm the estimates for your project. Which of the following prototype steps should you take? (Choose all that apply.) A. Create a reference architecture. B. Define the screens, their types, and their complexities. C. Create a working prototype of each unique element defined by the application. D. Update the requirements based on the findings from your prototype. 3. Which of the following should you consider when evaluating your proposed security model? (Choose all that apply.) A. User authentication mechanism B. User authorization methods C. Resources control D. Connectivity 4. You need to evaluate the effectiveness of your prototype. Which of the following might lead you to believe your prototype was effective? (Choose all that apply.) A. A number of gaps were identified in the requirements. B. The use cases were validated as correct and sufficient.
C. Certain areas of the application were exposed as requiring additional focus in terms of design. D. The new technologies that were recommended worked just as expected.