Thursday, June 16, 2016

Exam 70-481 Essentials of Developing Windows Store Apps Using HTML5 and JavaScript

Published: October 11, 2012
Languages: English, Chinese (Simplified), French, German, Japanese, Portuguese (Brazil)
Audiences: Developers
Technology: Visual Studio 2012
Credit toward certification: MCP, MCSD

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Design Windows Store apps (20-25%)
Design the UI layout and structure
Evaluate the conceptual design; decide how the UI will be composed; design for the inheritance and re-use of visual elements (e.g., styles, resources); design for accessibility; decide when custom controls are needed; use the Hub App template
Design for separation of concerns
Plan the logical layers of your solution to meet application requirements; design loosely coupled layers; incorporate WinMD components
Design and implement Process Lifetime Management (PLM)
Choose a state management strategy; handle the suspend event (oncheckpoint); prepare for app termination; handle the onactivated event; check the ActivationKind and previous state
Plan for an application deployment
Plan a deployment based on Windows 8 Application certification requirements; prepare an app manifest (capabilities and declarations); sign an app; plan the requirements for an enterprise deployment

Develop Windows Store apps (15-20%)
Access and display contacts
Call the ContactsPicker (windows.applicationmodel.contacts) class; filter which contacts to display; display a set number of contacts; create and modify contact information; select specific contact data
Design for charms and contracts
Choose the appropriate charms based on app requirements; design an application to be charm- and contract-aware; configure the application manifest for correct permissions
Implement search
Provide search suggestions using the SearchPane and SearchBox control class; search and launch other apps; provide and constrain search within an app, including inside and outside of search charm; provide search result previews; implement activation from within search; configure search contracts
Implement Share in an app
Use the DataTransferManager class to share data with other apps; accept sharing requests by implementing activation from within Share; limit the scope of sharing using the DataPackage object; implement in-app Share outside of Share charm; use web links and application links
Manage application settings and preferences
Choose which application features are accessed in AppSettings; add entry points for AppSettings in the Settings window; create settings flyouts using the SettingsFlyout control; add settings options to SettingsFlyout; store and retrieve settings from the roaming app data store
Integrate media features
Support DDS images; implement video playback; implement XVP and DXVA; implement TTS; implement audio and video playback using HTML5 DRM

Create the user interface (20-25%)
Implement WinJS controls
Flipview; flyout; grid layout; list layout; menu object; WebView; item container; repeater
Implement HTML layout controls
Implement layout controls to structure your layout; implement templates and bindings; support scrolling and zooming with CSS3; manage text flow and presentation, including overflow
Create layout-aware apps to handle windowing modes
Use CSS3 media queries to adapt to different devices; respond to changes in orientation; adapt to new windowing modes by using the ViewManagement namespace; manage setting for an apps view
Design and implement the app bar
Determine what to put on the app bar based on app requirements; style and position app bar items; design the placement of controls on the app bar; handle AppBar events
Apply CSS styling
Implement gradients, grid layouts, zooming, scroll snapping, and media queries

Preparation resources
XAML AppBar control sample

Program user interaction (20-25%)
Manage input devices
Capture gesture library events; create custom gesture recognizers; listen to mouse events or touch gestures; manage Stylus input and inking; handle drag and drop events
Design and implement navigation in an app
Handle navigation events, check navigation properties, and call navigation functions by using the WinJS.Navigation namespace; design navigation to meet app requirements; Semantic Zoom; load HTML fragments
Create and manage tiles
Create and update tiles and tile contents; create and update badges (the TileUpdateManager class); respond to notification requests; choose an appropriate tile update schedule based on app requirements
Notify users by using toast
Enable an app for toast notifications; populate toast notifications with images and text by using the ToastUpdateManager; play sounds with toast notifications; respond to toast events; control toast duration; configure and use Azure Mobile Services for push notifications

Preparation resources
Supporting navigation (Windows Store apps using JavaScript and HTML)
Tile and tile notification overview (Windows Store Apps)
Toast notification overview (Windows Store Apps)

Manage security and data (20-25%)
Choose a data access strategy
Choose the appropriate data access strategy (file based; web service; remote storage, including Microsoft Azure storage and Azure Mobile Services) based on requirements
Retrieve data remotely
Use XHR or HttpClient to retrieve web services; set appropriate HTTP verb for REST; handle progress of data requests; consume SOAP/WCF services; use WebSockets for bidirectional communication
Implement data binding
Choose and implement data-bound controls, including WinJS.UI.ListView, to meet requirements; bind data to item templates such as WinJS.Binding.Template; bind data to controls by using data-win-control and data-win-bind; configure an iterator with data-win-options; enable filtering, sorting, and grouping data in the user interface
Manage Windows Authentication and Authorization
Retrieve a user’s roles or claims; store and retrieve credentials by using the PasswordVault class; implement the CredentialPicker class; verify credential existence by using credential locker; store account credentials in app settings
Manage Web Authentication
Use the Windows.Security.Authentication.Web namespace; set up OAuth2 for authentication; CredentialPicker; set up single sign-on (SSO); implement credential roaming; implement the WebAuthenticationBroker class; support proxy authentication for enterprises

Preparation resources
Connecting to web services (Windows Store apps using JavaScript and HTML)
Data binding (Windows Store apps using JavaScript and HTML)
Managing user info (JavaScript)
QUESTION 1
You are preparing to write code that configures a CredentialPicker object. The code should allow
for platinum members to save their user credentials according to business authentication
prerequisites.
Which of the following is the property that should be included in your code?

A. The PreviousCredential property.
B. The AuthenticationProtocol property.
C. The CredentialSaveOption property.
D. The TargetName property.

Answer: C

Explanation:


QUESTION 2
You are preparing to write code that enforces the technical search capabilities requirements.
Which of the following is a method that should be included in your code?

A. The appendSearchSeparator method.
B. The appendResultSuggestion method.
C. The appendQuerySuggestions(suggestions) method.
D. The appendQuerySuggestion(text) method.

Answer: C

Explanation:


QUESTION 3
You have been instructed to make sure that customers and visitors are shown in keeping with the
prerequisites. You are preparing to write the necessary code.
Which of the following should be included in your code?

A. The CommitButtonText property of the ContactPicker class.
B. The SelectionMode property of the ContactPicker class.
C. The Email property of the ContactPicker class.
D. The DesiredFields property of the ContactPicker class.

Answer: D

Explanation:


QUESTION 4
You are preparing to write code to deal with adding and saving annotations according to the
technical product news updates prerequisites.
Which of the following should be included in the code?

A. You should consider making use of the onbeforenavigate navigation member.
B. You should consider making use of the onnavigated navigation member.
C. You should consider making use of the canGoForward navigation member.
D. You should consider making use of the canGoBack navigation member.

Answer: A

Explanation:


QUESTION 5
You are preparing to write code to satisfy the navigation business requirements.
Which of the following is the function that should be included in your code?

A. The navigate function.
B. The forward function.
C. The back function.
D. The addEventListener function.

Answer: A


Sunday, June 12, 2016

Tech’s biggest Fortune 500 companies

Fortune is out with its latest list of the Fortune 500 for 2016 and tech companies appear frequently throughout the rankings. While the top tech company on the list likely isn’t a surprise, it is interesting to note that only two tech company broke the Top 10 largest publicly-traded companies based on full-year revenue last year.

Apple
Apple was unable to beat out Walmart ($482 billion) and Exxon Mobile ($246 billion), but it is the highest ranked tech company. Apple moved from No. 5 to No. 3 with its revenues growing 28% year over year and profits growing more than 35% to surpass $53 billion.

AT&T
AT&T won out as the largest telecom company on the list, notching up two spots to help the tech industry secure two spots among the top 10. AT&T’s revenue increased 11% year over year and profits more than doubled to $13 billion.

Verizon
Verizon gained two spots from last year after the company’s revenue grew 4%; profits rose 85% to almost $18 billion.

Amazon.com
While Amazon is typically considered a retailer, the fact that it leads the IaaS public cloud computing market makes it one of the most important tech companies today. Amazon jumped from 29 last year to 18 this year, thanks to a 20% increase in revenue. Profits were a slim $596 million.

HP
HP fell one spot on the list from 19 to 20 after its revenues declined 7%. The company went through a tumultuous past year after splitting in half. Profits dropped 9% to $4.5 billion.

Microsoft
Microsoft climbed six spots from 31 last year, posting an 8% increase in revenue. Profits dipped 45% to $12 billion in year two of stewardship by CEO Satya Nadella.

IBM
Big Blue dropped seven spots from last year after revenue declined 12%. CEO Ginni Rometty managed a 10% uptick in profits to $13 billion, however.

Alphabet
Google’s parent company saw modest gains in both revenue (+4.9%) and profit (+15%), with profits landing at $16 billion.

Comcast
Telecom giant Comcast improved by 6 spots thanks to an 8% rise in revenue, despite a 2.6% drop in profits to $8 billion.

Intel
The world’s largest maker of seminconductors had stable revenue (a less than 1% drop), but profits dipped (-2.4%) to $11 billion.

Cisco
With CEO Chuck Robbins taking over for John Chambers – who has transitioned to executive chairman – the company jumped six spots thanks to modest revenue growth (4%) and rising profits – up more than 14% to $8.9 billion.

Ingram Micro
This IT distributor announced that it is being sold to a Chinese conglomerate this year after revenues dropped 7% and profits dipped 19% to $215 million.

Oracle
Oracle’s revenue was stagnant year-over-year, but profits dropped 9% to just under $10 billion; even with that, the company jumped four spots in the rankings.

Tech Data
This Clearwater, Fla.,-based company is a distributor of technology equipment. Its profits grew 50% to $266 million.

Qualcomm
The San Diego-based semiconductor company is going through a rough patch with revenues declining 5% and profits falling by 34% to $5.2 billion.

Other notable tech companies that were highly ranked on the list included EMC at 113 ($24 billion); Time Warner Cable at 116 ($23 billion); and Facebook at 157 ($17 billion).


Wednesday, June 1, 2016

How to craft a security awareness program that works

Organizations struggle with making security awareness training programs that work. One expert says that's because we treat security awareness training as an event rather than a continuous program of education that adapts to the risks employees face.

Employees are often considered the weakest link in organizations' efforts to create a strong security posture. Even organizations with security awareness programs in place struggle to instill strong security behaviors. Steve Conrad, managing director of MediaPro, a learning services company that specializes in information security, data privacy and compliance, says organizations can and should do better.

"Are we treating employees with the same seriousness as we are other threats to the organization? If you updated your firewall software and virus definitions once a year, people would say that you're negligent," Conrad says.

"It's time to really step up the human element," he adds. "Traditionally, CIOs and CISOs have looked at technology and processes. Now it's time to look at people. They're a very high threat to the organization, but we don't necessarily treat them like any other threat vector. Employees generally want to do the right thing."
Effective awareness training should be tailored for a variety of situations

Effective awareness training starts with a risk assessment, Conrad says. You need to understand what your most valuable assets are so you can better craft a plan to protect them.

"What are your risks? Align your training around those," Conrad says. "You shouldn't give the same training to everyone in your organization. Your executives need certain training that others in the organization may not."
MORE ON NETWORK WORLD: 6 simple tricks for protecting your passwords

Call center employees may need extra training around social engineering risks, while human resources employees may need particular training about handling personally identifiable information (PII).

Conrad notes that the National Institute of Standards and Technology (NIST) Cybersecurity Framework is an excellent foundational document with which to start the process.

Once you know what you need to protect and who needs special training to protect it, you need to craft a program of continuous education around it.

"You can't offer lackluster training for 30 minutes one a year and say it doesn't work," Conrad says. "Why would you expect it to work? You need foundational training, but the overall training program needs to be one of reinforcement. You need to look at it as an overall program, not an event."

User behavior analytics can play a key role in a continuous program that adapts to the risks that your employees face. These analytics can provide pop-up alerts when employees engage in certain activities.

"We see you're doing this, be aware that these are the best practices and what you need to watch out for," Conrad says.

"We call it 'just-in-time training' or 'performance-at-work training,'" he adds. "You're disclosing proprietary information to a partner, can I give you education and a checklist of what you should and shouldn't be sharing?"

It's also essential to treat your security awareness program as a communication exercise — essentially a change management problem. IT and the security function may not have the skills to make that happen, so Conrad suggests partnering with the training organization or the marketing organization to most effectively get the awareness training across.

"Anytime you can communicate a message to a person and make it personal, you're going to be much better off," Conrad says.

For instance, foundational training could show employees tools and best practices they can use at home to protect their children and other family members. They can then apply those tools and practices on the job.

"That's a very reasonable way to approach it," Conrad says. "Tie in that emotional hook. Make it real and personal."