Jaa


Conclusion

patterns & practices Developer Center

On this page: Download:
Questions | More Information Download code samples
Download book as PDF

This chapter described how the developers at Tailspin implemented the model elements from the MVVM pattern in the Tailspin Surveys mobile client application, and how the application leverages services offered by the Windows Phone platform, such as isolated storage and location services.

The developers at Tailspin also created some services themselves; for example, they created the synchronization service that runs both in the background, and in the foreground as a set of asynchronous parallel tasks that manage the data used by the application. This synchronization service needs to access data held remotely by the Tailspin Surveys application that runs on the Windows Azure™ technology platform. The next chapter will describe how the mobile client application can access remote services like the one that provides access to the data held in the Windows Azure application.

Questions

  1. The Data Protection API (DPAPI) can be used to encrypt and decrypt data in isolated storage. What does the DPAPI use as an encryption key?
    1. A user-generated private key.
    2. The user credentials.
    3. The phone credentials.
    4. The user and phone credentials.
  2. What happens when your application is reactivated?
    1. You return to the first screen in your application.
    2. The operating system makes sure that the screen is displayed as it was when the application was deactivated.
    3. The operating system recreates the navigation stack within your application.
    4. The Launching event is raised.
  3. What data should you save when you handle the deactivation request?
    1. State data required to rebuild the state of the last screen that was active before the application was deactivated.
    2. State data required to rebuild the state of previous screens that user had navigated through before the application was deactivated.
    3. Data that is normally persisted to isolated storage by the application at some point.
    4. The currently active screen.
  4. Why does Tailspin use the Reactive Extensions (Rx) for .NET?
    1. To handle notifications from the Microsoft Push Notification Service.
    2. To handle UI events.
    3. To manage asynchronous tasks.
    4. To make the code that implements the asynchronous and parallel operations more compact and easier to understand.
  5. What factors should you consider when you use location services on the phone?
    1. What level of accuracy your application requires for its geo-location data.
    2. Whether the device has a built-in Global Positioning System (GPS).
    3. How quickly you need to obtain the current location.
    4. Whether the user has consented to allowing your application to use the phone's GPS data.
  6. Which factors constrain the use of a ResourceIntensiveTask agent?
    1. Resource-intensive agents do not run unless the Windows Phone device is connected to an external power source.
    2. Resource-intensive agents do not run unless the Windows Phone device has a network connection over Wi-Fi or through a connection to a PC.
    3. Resource-intensive agents do not run unless the Windows Phone device’s battery power is greater than 90%.
    4. Resource-intensive agents do not run unless the Windows Phone device screen is locked.

More Information

For more information about isolated storage, see "Local Data Storage for Windows Phone" on MSDN.
For more information about handling deactivation, reactivation, and tombstoning, see "Execution Model for Windows Phone" on MSDN.
For more information about launchers and choosers, see "Launchers and Choosers for Windows Phone" on MSDN.
For more information about Reactive Extensions, see "Reactive Extensions for .NET Framework Overview for Windows Phone" and "The Reactive Extensions (Rx)" on MSDN.
For more information about location services, see "Location for Windows Phone" on MSDN.
These and all links in this book are accessible from the book's online bibliography. You can find the bibliography on MSDN at: https://msdn.microsoft.com/en-us/library/gg490786.aspx.

Next Topic | Previous Topic | Home

Last built: May 25, 2012