Answer the following statements true (T) or false (F)

1. A key benefit of WPF is that it provides a single platform to handle GUI, images, animation 2D and 3d graphics, audio and video.
2. WPF GUIs can be created by dragging predefined controls from the Toolbox onto the design surface.
3. Using XAML gives WPF the benefit of raster-based graphics.
4. WPF graphics are resolution-independent, meaning that they are designed to look similar on screens of different sizes.
5. A major benefit of using XAML is that GUI design can be done separately from programming.

1. True.
2. True.
3. False. XAML gives WPF the benefit of vector-based graphics.
4.True.
5. True.

Computer Science & Information Technology

You might also like to view...

Your company wants to set up a new online business. The new solution must be extendable for new products to be developed and added. Customers and business partners must be able to log in to the system. The new system must be usable and manageable. Non-core functions must integrate seamlessly with third parties. Customers' personal and financial information must be protected during transport and

while at rest. The application will consist of a three-tiered architecture for the front-end components and an ESB to provide services. It will include transformation capability, legacy system integration, and a web services gateway. You implement WS-Security for services authentication and XACML for service authorization. What else should you do? A. Use application level encryption to encrypt sensitive fields, database encryption on sensitive flows, and SSL encryption for sensitive data storage. B. Use database encryption to encrypt sensitive fields, SSL encryption on sensitive flows, and application-level encryption for sensitive data storage. C. Use application-level encryption to encrypt sensitive fields, SSL encryption on sensitive flows, and database encryption for sensitive data storage. D. Use SSL encryption to encrypt sensitive fields, application-level encryption on sensitive flows, and database encryption for sensitive data storage.

Computer Science & Information Technology

Suppose you are tasked with determining the risks of failure of an ERP implementation project.  What organizational characteristics will you focus on?

What will be an ideal response?

Computer Science & Information Technology